09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TSP SEeRETHeSMINTIIX1<br />

· / //£0 1. 4 . (c)<br />

('fEll/ElI) Dur<strong>in</strong>g the war, American and Allied<br />

cryptologists would be able to exploit lower level<br />

communist cryptographic systems, that is, more<br />

precisely, ciphers and codes used by operational<br />

and tactical-level units, usually regiment and<br />

below, on an almost rout<strong>in</strong>e basis. In fact, the volume<br />

of the so-called low-to-medium-grade systems<br />

exploited by NSA was so great that bv 1968 /i<br />

the exploitation had to be automated. 13 1 1<br />

(5//81) There are problems with this decision,<br />

though. Besides leav<strong>in</strong>g NSA open to the emotional<br />

charge of giv<strong>in</strong>g less "than full support,"<br />

as well as the perhaps <strong>in</strong>vidious comparison with<br />

the successful Emgma and PURPLE cryptanalytic<br />

efforts dur<strong>in</strong>g World War II, there is the<br />

technical problem of the difference <strong>in</strong> <strong>in</strong>telligence<br />

derived from T/A and cryptanalysis. Generally<br />

cryptanalysis produces direct <strong>in</strong>telligence <strong>in</strong>formation.<br />

The read<strong>in</strong>g of enemy messages, aside<br />

from the attendant language problem, is a first<br />

hand look <strong>in</strong>to the enemy's plann<strong>in</strong>g, <strong>in</strong>tentions,<br />

and purpose. Traffic analysis, on the other hand,<br />

with its emphasis on the exploitation of message<br />

I iI<br />

'FOP SESRE'F{,'SOMIN'F,v*1 Page 149

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!