01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ib) (1)<br />

Ib) (3) -50 USC 403<br />

Ib) (3) -18 USC 798<br />

Ib) (3) -P.L. 86-36<br />

TOfl SeERET l:IMBAA<br />

Security was a problem in Korea, as it has been <strong>during</strong> all wars. Occasional press<br />

releases exposed COMINT support to battlefield commanders. <strong>The</strong> release of information<br />

about AFSS exploitation of GCI communications became so serious.that in October 1951<br />

Detachment 3 of 1st RSM took <strong>the</strong> extraordinary step of suspending opera.tions for a few<br />

days until <strong>the</strong>y got <strong>the</strong> attention of key officers in 5th Air Force. 56 <strong>The</strong> employment of<br />

tactical GCI voice and tracking information in <strong>the</strong> air war c.aused AFSS to devise new<br />

measures to cover <strong>the</strong> information, and it set a precedent for use of similar information<br />

<strong>during</strong> <strong>the</strong> war in Vietnam.<br />

When NSA was created in November 1952, immedia.te steps were taken to sort out <strong>the</strong><br />

effort in Korea. NSA's recommendations amounted/to a classic "lessons learned" about<br />

war. Most pressing was a program which would allow <strong>the</strong> use of indigenous personnel<br />

with native language capability. Almost as urgent was <strong>the</strong> need to sort out <strong>the</strong> tangled<br />

relationships with <strong>the</strong> various ROK COMINT efforts. It would also be necessary to increase<br />

NSA representation in <strong>the</strong> field and to expand existing field offices with technical experts<br />

assisting <strong>the</strong> SCAs. Finally <strong>the</strong>re was a call to develop new special identification<br />

techniques that would allow NSA and.<strong>the</strong> SCAs to track target transmittersI<br />

INSA sponsored <strong>the</strong>se <strong>the</strong>mes for years, unt-il-t~h-ey-""<br />

became tantamount to COMINT doctrine on warfighting.<br />

I<br />

One beneficial effect of <strong>the</strong> Korean conflict was to begin a rapid rise in cryptologic<br />

resources. In July 1950 USCIB recommended to <strong>the</strong> National Security Council that<br />

COMINT receive a hiringjolt. <strong>The</strong> NSC approved this on 27 July in a meeting attended by<br />

<strong>the</strong> president himself.58<br />

Korea was America's first stalemated war, and recriminations resounded for years<br />

later. But even an acerbic CIA critic of <strong>the</strong> cryptologic community had to admit that<br />

"COMINT remained <strong>the</strong> principal source ofintelligence for threat until 27 July 1953, when<br />

<strong>the</strong> armistice was signed at Panmunjom."59<br />

1. Rowlett interview, OH 14-81.<br />

Notes<br />

2. Sinkov interview, OH 2-79; oral history interview with Herbert L. Conley, 5 March 1984, by Robert D. Farley,<br />

NSAOH 1-84.<br />

3. See both Burns. Origins, and Howe, "Narrative."<br />

4.William L. O'Neill, <strong>American</strong>High: <strong>The</strong> Years ofConfidence. 1945-1960 (New York: Free Press, 1988.)<br />

5. See Burns. Origins, 65.<br />

6. CCH Series V.F.5.1.<br />

IhldiBbl!J VIA 'f1tLl!Jfff f(I!JYII6LI!J e6MIN'f e6fi'fR:6b S'{S'fI!JMS J6IWft:: i<br />

H'6'f KI!JLI!JASABLI!J 'f6 f'6R:I!JI8fi ftA'fI8fiALS<br />

Tap SECRET l:IMBRA 56<br />

------_._---- ---

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!