09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tap SE6RE"FN60MltfFmE1<br />

(TS//SI) Beg<strong>in</strong>n<strong>in</strong>g <strong>in</strong> about 1960, U.S. cryptanalysts<br />

had made some <strong>in</strong>roads <strong>in</strong>to the various<br />

codes and ciphers used by Hanoi and the <strong>in</strong>surgents<br />

<strong>in</strong> the south. At different times, and to vary<strong>in</strong>g<br />

degrees, U.S. cryptanalysts were able to<br />

exploit encrypted messages of the North<br />

Vietnamese political, military, and <strong>in</strong>telligence<br />

entities as well as the southern <strong>in</strong>surgents<br />

ETS//SI) However, this was not to happen.<br />

Beg<strong>in</strong>n<strong>in</strong>g <strong>in</strong> late 1961, American cryptologists<br />

observed that the numerous Viet M<strong>in</strong>h codes and<br />

ciphers they recently had started to penetrate<br />

cryptanalytically, had begun to disappear, to be<br />

Ireplaced by new, almost unbreakable, systemS'1<br />

1"-------___<br />

(TSl/Sf)<br />

I<br />

IPart of the 1962 change<br />

L...-----:"':':""""""';';"'""""":"'""""";"'"""";""""~<br />

specifically <strong>in</strong>cluded the appearance of cryptographic<br />

systems unique to Groups 959 and 559,<br />

as well as some of the special combat units which<br />

were either fight<strong>in</strong>g <strong>in</strong> Laos or provid<strong>in</strong>g security<br />

along the Ho Chi M<strong>in</strong>h Trail. 71 To facilitate the<br />

switchover <strong>in</strong> the south, specifically <strong>in</strong> Intersector<br />

V, a cadre of cryptographic specialists had set off<br />

south down the trail <strong>in</strong> September 1959" After a<br />

two-month journey across mounta<strong>in</strong>s and fordmg<br />

streams, the PAVN cryptographersarrived at<br />

the Intersector V HQs to beg<strong>in</strong> the transition over<br />

to the new systems."<br />

(TSl/Sf) The result for Alliedcryptologists<br />

was that any future signals <strong>in</strong>telligence <strong>in</strong>formation<br />

on the communist <strong>in</strong>filtration system, aside<br />

from \dated material which was f<strong>in</strong>ally be<strong>in</strong>g<br />

decrypted and translated, would be derived solely<br />

by exploitation of low-level ciphers and noncryptanalytic<br />

methods, that is, traffic analysis and<br />

direction f<strong>in</strong>d<strong>in</strong>g." Not that the <strong>in</strong>formation from<br />

TjA or DjF would be <strong>in</strong>significant. Despite a lack<br />

of exploitable messages, SIGINT would be able to<br />

track the growth of the communications complex<br />

that Hanoi was fashion<strong>in</strong>g! along the tri-border<br />

area of Laos, Cambodia, and South Vietnam, as<br />

well as along the DMZ.<br />

(TS//S:!) The communications structures<br />

associated with the southern land <strong>in</strong>filtration had<br />

been uncovered possibly as early as mid-1961<br />

when two Viet Cong .radio nets were recovered.<br />

One, determ<strong>in</strong>ed byNSA to be an <strong>in</strong>termediate<br />

headquarters 'ofthe Viet Cong Military Network,<br />

was located <strong>in</strong> Dong Hoi <strong>in</strong> the southern DRV,<br />

and was one'ofithestart<strong>in</strong>g term<strong>in</strong>als for the <strong>in</strong>filtration<br />

route; Dong Hoi controlled four radio<br />

TOP SE6RETHSOMINli'/X1 EO 1.4. (c) Page 105

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!