01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

; Ib) (1)<br />

Ib) (3) -50 USC 403<br />

Ib) (3) -P.L. 86-36<br />

T9PSECRET~<br />

To Army cryptology, as to <strong>the</strong> Navy, peace was devastating/Most of <strong>the</strong> work force at<br />

Arlington Hall left civilian government service, and within/days /<strong>the</strong> halls were almost<br />

empty. Intercept sites overseas were suddenly confronted/with no Japanese or German<br />

intercept mission. One former soldier described <strong>the</strong> experience/as being left stranded on<br />

Okinawa with no Japanese mission to copy and no instructionson a/follow-on assignment.<br />

His unit eventually moved to Seoul, relocated to a/former /Japanese communications<br />

station, and <strong>the</strong>re got a new mission- Soviet and.Chinese Communist communications.<br />

European units tackled French and Greek missions, and/by mid-1946 nearly half <strong>the</strong><br />

Army's end product was based on <strong>the</strong> intercept of French communications. 12<br />

<strong>The</strong> late 1940s were a period of damaging retrep.chment. <strong>The</strong> Army and Navy<br />

cryptologic organizations that began <strong>the</strong> Soviet mission had little experience, less money,<br />

and no expertise. Yet ASA was able to survive better/than OP-20-G. <strong>The</strong> Army had relied<br />

historically on civilians, and many of <strong>the</strong> best, including William Friedman, Frank<br />

Rowlett, Abraham Sinkov, and Solomon Kullback, stayed/on. Missing <strong>the</strong> excitement of<br />

wartime cryptology, o<strong>the</strong>rs drifted back to Arlington Hall after brief, humdrum civilian<br />

careers. <strong>The</strong> Navy, which had r.elied on uniformed cryptologists, lost a far higher number<br />

to civilian life and found <strong>the</strong> transition to peacetime a difficult one.<br />

In 1947 ASA and OP-20-G were joined by yet a third cryptologic service, that of <strong>the</strong><br />

newly created Air Force./<strong>The</strong> Army Air Corps had actually established its SIGINT service<br />

in <strong>the</strong> Pacific in 1944. /<strong>The</strong> Air Force acquired an early reputation for parochialism and<br />

interservice rivalry./<strong>The</strong> feuding led Carter Clarke, <strong>the</strong>n head of Special Branch of<br />

Military Intelligence Service, to write in June 1944 that "<strong>the</strong> Air Force insists that <strong>the</strong>se<br />

I<br />

loperate only for <strong>the</strong> Air Force and insists fur<strong>the</strong>r that no personnel can<br />

be attached or detached <strong>the</strong>refrom; nei<strong>the</strong>r should <strong>the</strong> <strong>the</strong>aters give <strong>the</strong>m any operational<br />

directives in <strong>the</strong> sense that we think ofit." <strong>The</strong> first Air Force unit in <strong>the</strong> Pacific was <strong>the</strong><br />

_____________.....Ilwhich beganoperations in 1944 in New Guinea. 13<br />

When <strong>the</strong> independent Air Force was created in 1947, <strong>the</strong>re was no direct reference to<br />

cryptologic activities, and for a time ASA continued to provide <strong>the</strong>se to <strong>the</strong> nascent Air<br />

Force. Yet <strong>the</strong> Air Force was determined to establish its own capability. Certain Air Force<br />

generals were aware of <strong>the</strong> contributions of COMINT <strong>during</strong> <strong>the</strong> war. One in particular,<br />

Hoyt S. Ve.'1denberg, who was later to become Air Force chiefof staff, was convinced that<br />

<strong>the</strong> Air Force had to have its own cryptologic service. He saw how <strong>the</strong> British controlled<br />

cryptology in Europe and felt that it was essential to get this under <strong>American</strong>, and<br />

particularly Air Force, control. 14<br />

In early 1948 <strong>the</strong> Air Force fashi(med a transition agreement with ASA. <strong>The</strong> latter<br />

established an Air Force Security Group within its headquarters at Arlington Hall to<br />

oversee <strong>the</strong> transfer. Three c::::::::Jand eight COMSEC units were turned over to <strong>the</strong> Air<br />

Force. <strong>The</strong> Air Force role was defined as mobile and tactical, and ASA continued to<br />

operate all fixed sites. A set number ofASA officers (thirty-two) became blue-suiters, and<br />

this group became <strong>the</strong> "founding fa<strong>the</strong>rs" ofAir Force cryptology. Air Force cryptologists<br />

I1AUBLEl VIA 'fALElU'f IU..1YII6LEl e6fdHtf'f e6Itf'fft6L S-YS'fElMSd'6Htf'fLY<br />

'lOP SECRET u~ 10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!