09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

'f6P SEeRETHeSMIN:J=H*1<br />

comprehensive change by the communists. The<br />

VC essentially used paper codes and cipher systems,<br />

which meant that their development, production,<br />

and distribution over the length of South<br />

Vietnam would have taken months to accomplish.<br />

It simply could not be done overnight as it<br />

had aplleared to.<br />

...1Communist military communications<br />

<strong>in</strong> adjacent areas to the DRV, primarily Military<br />

Region V <strong>in</strong> South Vietnam, and eastern Laos,<br />

were also be<strong>in</strong>g ullgraded.<br />

L...-<br />

(S//Sl) Blam<strong>in</strong>g the South Vietnamese is all<br />

the more the surpris<strong>in</strong>g s<strong>in</strong>ce, for almost a year,<br />

NSAand military analysts had been accumulat<strong>in</strong>g<br />

substantial SIGINT evidence suggest<strong>in</strong>g another,<br />

perhaps more troublesome, explanation for the<br />

change - that the communists had been implement<strong>in</strong>g<br />

communications and cryptographic<br />

changes which allowed Hanoi to jump far ahead<br />

of the Americans <strong>in</strong> the long, silent struggle<br />

between cryptographers and cryptanalysts.<br />

(TS//SI) In fact, the NSA division responsible<br />

for Southeast Asia, B26, had been report<strong>in</strong>g<br />

for some months about the <strong>in</strong>creas<strong>in</strong>g cryptographic<br />

and communications security (COMSEC)<br />

upgrades on VCcommunications networks, especially<br />

<strong>in</strong> the Nam Bo region. S<strong>in</strong>ce October 1961,<br />

VC radio nets <strong>in</strong> that regionl<br />

L..-<br />

...1adopt<strong>in</strong>g<br />

more uniform communications procedures,<br />

abandon<strong>in</strong>g local practices which had been a useful<br />

form of transmitter identification. Not only<br />

had the communists strengthened their COM­<br />

SEC,but by centraliz<strong>in</strong>g the control of it, they had<br />

created the ability for future complete and simultaneous<br />

communications changes. us<br />

(TS//SI) As far back as early 1961, Hanoi had<br />

been <strong>in</strong>corporat<strong>in</strong>g changes <strong>in</strong>to its own military<br />

ma<strong>in</strong>l<strong>in</strong>e nets, chang<strong>in</strong>g callsign systems,<br />

<strong>in</strong>stall<strong>in</strong>g new, more complex frequency rotas,<br />

alter<strong>in</strong>g message formats and <strong>in</strong>troduc<strong>in</strong>g standardized<br />

0 erat<strong>in</strong>g procedures<br />

(D) What NSA was see<strong>in</strong>g <strong>in</strong> April 1962 was<br />

the culm<strong>in</strong>ation of a two-year upgrade tocommunist<br />

communications, COMSEC procedures, and,<br />

more importantly, its codes, ciphers, and associated<br />

material such as authenticators. This<br />

upgrade went hand-<strong>in</strong>-hand with Hanoi's decision<br />

to <strong>in</strong>tervene <strong>in</strong> the south. After the fifteenth<br />

congress of the Lao Dong Party's Executive<br />

Committee had decreed the beg<strong>in</strong>n<strong>in</strong>g of the liberation<br />

of the south through violent revolution,<br />

the cryptographic bureaus and sections <strong>in</strong> the<br />

People's Army of Vietnam and the General Staff<br />

had begun the process of upgrad<strong>in</strong>g all of their<br />

cryptographic systems and beef<strong>in</strong>g up both the<br />

number of cryptographic personnel and the size<br />

of their technical bases (depots and tra<strong>in</strong><strong>in</strong>g centers)<br />

<strong>in</strong> the south. By September 1959, the first<br />

cryptographic personnel, southern returnees like<br />

their military and political counterparts, were on<br />

their way down the narrow pathways of the nascent<br />

Ho Chi M<strong>in</strong>h Trail, carry<strong>in</strong>g on their backs<br />

loads of new cryptographic keypads and codebooks.V''<br />

(D) More importantly, <strong>in</strong> the same month, the<br />

party's cryptographic section and the military's<br />

cryptographic directorate met <strong>in</strong> a nationwide<br />

conference of all its personnel to "thoroughly<br />

establish a platform for the development of [new]<br />

technique." Recogniz<strong>in</strong>g the threat posed by the<br />

high level of American cryptanalysis and the<br />

sophistication of its "technical <strong>in</strong>telligence collection,"<br />

Hanoi's cryptographers sought a solution <strong>in</strong><br />

improved encryption systems.':" After what was<br />

termed an "ideological struggle" - a euphemism<br />

for a really serious technical dispute that implies<br />

that some. <strong>in</strong>dividuals may have been removed<br />

fromtheirpositions - the North Vietnamese set-<br />

TSP SEeRETHeSMltHHlE:1<br />

EO<br />

1.4. (c)<br />

Page 147

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!