01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> United States already had legislation. But <strong>the</strong> Espionage Act of 1917 required<br />

proof that <strong>the</strong> person revealing <strong>the</strong> secret information intended to injure <strong>the</strong> United<br />

States. <strong>The</strong> courts had required a high standard ofproof, including <strong>the</strong> direct involvement<br />

of agents of a wartime enemy, in order to secure a conviction. What if no enemy agents<br />

were involved? Or what if <strong>the</strong> agents were from a "friendly" country? Or what if <strong>the</strong><br />

person simply gave <strong>the</strong> information to a reporter who published it?<br />

Title 18 took care of all that. It made it a crime to divulge information relating to<br />

various aspects ofcryptologic activities to an unauthorized person "or uses in any manner<br />

prejudicial to <strong>the</strong> safety or interest of <strong>the</strong> United States or for <strong>the</strong> benefit of any foreign<br />

government...." It cast a very broad net, was almost totally inclusive, and was legally<br />

enforceable even in <strong>the</strong> absence of intent to injure. It could thus deter, or be used against,<br />

well-meaning but misguided idealists. 67<br />

Just as important, it implicitly authorized COMINT activities by acknowledging that<br />

<strong>the</strong>y were going on and by protecting <strong>the</strong>ir secrecy by law. Here was an implicit voiding of<br />

Section 605 of <strong>the</strong> Federal Communications Act of 1934 and earlier statutes as <strong>the</strong>y<br />

related to cryptology.<br />

This was followed two years later by <strong>the</strong> Truman Memorandum creating NSA and<br />

describing its responsibilities. Here was <strong>the</strong> "lawful authority," even though classified, so<br />

needed in <strong>the</strong> years prior to <strong>the</strong> war. As <strong>the</strong> years rolled on and Congress appropriated<br />

money for NSA's activities, <strong>the</strong> legal status of<strong>the</strong> business became less and less debatable.<br />

<strong>The</strong> 1959 anonymity statute (Public Law 86-36) for <strong>the</strong> first time named NSA in<br />

legislation. Finally, in 1968 <strong>the</strong> Omnibus Crime Control and Safe Streets Act specifically<br />

overruled Section 605 of <strong>the</strong> Federal Communications Act of 1934. <strong>Cryptology</strong> had made<br />

<strong>the</strong> journey from a secret black chamber to an officially authorized and avowed<br />

government activity.68<br />

PUBLIC REVELATIONS AND CRYPTOLOGIC SECRECY<br />

[It is] of<strong>the</strong> essence ofa secret service that it must be secret, andifyou once began disclosure, it is<br />

perfectly obvious that <strong>the</strong>re is no longer any secret service and that you must do without it.<br />

Austen Chamberlain, Britishforeign secretary in <strong>the</strong> 1920s<br />

Following Yardley, COMINT went underground. <strong>The</strong> <strong>Black</strong> Chamber had already been<br />

destroyed by Secretary of <strong>War</strong> Stimson in 1929 (through <strong>the</strong> device of pulling State<br />

Department funding). Its successor, Friedman's SIS, was so small (he started with a staff<br />

of six) as to be effectively invisible. <strong>The</strong> Navy had an effort of comparable size, and <strong>the</strong><br />

entire enterprise proceeded reasonably secure from <strong>the</strong> eyes of<strong>the</strong> public.<br />

IIANBI'::'8 VIA 'fALBN'f I(BYUeLliJ eeMm'f eeN'fReL BYB'fBMfMem'fI'::'I<br />

~fQT RI!lbEASABI:JE 'FQ F'QRBI8N !VtfleNAf::8<br />

274

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!