American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>The</strong> United States already had legislation. But <strong>the</strong> Espionage Act of 1917 required<br />
proof that <strong>the</strong> person revealing <strong>the</strong> secret information intended to injure <strong>the</strong> United<br />
States. <strong>The</strong> courts had required a high standard ofproof, including <strong>the</strong> direct involvement<br />
of agents of a wartime enemy, in order to secure a conviction. What if no enemy agents<br />
were involved? Or what if <strong>the</strong> agents were from a "friendly" country? Or what if <strong>the</strong><br />
person simply gave <strong>the</strong> information to a reporter who published it?<br />
Title 18 took care of all that. It made it a crime to divulge information relating to<br />
various aspects ofcryptologic activities to an unauthorized person "or uses in any manner<br />
prejudicial to <strong>the</strong> safety or interest of <strong>the</strong> United States or for <strong>the</strong> benefit of any foreign<br />
government...." It cast a very broad net, was almost totally inclusive, and was legally<br />
enforceable even in <strong>the</strong> absence of intent to injure. It could thus deter, or be used against,<br />
well-meaning but misguided idealists. 67<br />
Just as important, it implicitly authorized COMINT activities by acknowledging that<br />
<strong>the</strong>y were going on and by protecting <strong>the</strong>ir secrecy by law. Here was an implicit voiding of<br />
Section 605 of <strong>the</strong> Federal Communications Act of 1934 and earlier statutes as <strong>the</strong>y<br />
related to cryptology.<br />
This was followed two years later by <strong>the</strong> Truman Memorandum creating NSA and<br />
describing its responsibilities. Here was <strong>the</strong> "lawful authority," even though classified, so<br />
needed in <strong>the</strong> years prior to <strong>the</strong> war. As <strong>the</strong> years rolled on and Congress appropriated<br />
money for NSA's activities, <strong>the</strong> legal status of<strong>the</strong> business became less and less debatable.<br />
<strong>The</strong> 1959 anonymity statute (Public Law 86-36) for <strong>the</strong> first time named NSA in<br />
legislation. Finally, in 1968 <strong>the</strong> Omnibus Crime Control and Safe Streets Act specifically<br />
overruled Section 605 of <strong>the</strong> Federal Communications Act of 1934. <strong>Cryptology</strong> had made<br />
<strong>the</strong> journey from a secret black chamber to an officially authorized and avowed<br />
government activity.68<br />
PUBLIC REVELATIONS AND CRYPTOLOGIC SECRECY<br />
[It is] of<strong>the</strong> essence ofa secret service that it must be secret, andifyou once began disclosure, it is<br />
perfectly obvious that <strong>the</strong>re is no longer any secret service and that you must do without it.<br />
Austen Chamberlain, Britishforeign secretary in <strong>the</strong> 1920s<br />
Following Yardley, COMINT went underground. <strong>The</strong> <strong>Black</strong> Chamber had already been<br />
destroyed by Secretary of <strong>War</strong> Stimson in 1929 (through <strong>the</strong> device of pulling State<br />
Department funding). Its successor, Friedman's SIS, was so small (he started with a staff<br />
of six) as to be effectively invisible. <strong>The</strong> Navy had an effort of comparable size, and <strong>the</strong><br />
entire enterprise proceeded reasonably secure from <strong>the</strong> eyes of<strong>the</strong> public.<br />
IIANBI'::'8 VIA 'fALBN'f I(BYUeLliJ eeMm'f eeN'fReL BYB'fBMfMem'fI'::'I<br />
~fQT RI!lbEASABI:JE 'FQ F'QRBI8N !VtfleNAf::8<br />
274