09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

',1,4,lel<br />

fOP SE6REfS60MINli'i)(4<br />

P.L. 86-36<br />

undeserved connotatiofi;qf unreliability. Still, for an<br />

<strong>in</strong>terest<strong>in</strong>g set of recollec'1~H1S, it is suggested that the<br />

special Vietnam issue of Gtyp{olog be read for its trio<br />

of stories recount<strong>in</strong>g the expel'iences of four NSA technical<br />

advisors dur<strong>in</strong>g the last.p:.~Nodof the DGTS existence.<br />

75. (T8//8I) 143rd SIGIN':t' (»)mmittee Meet<strong>in</strong>g.<br />

March 1968, "Request by the G~yemmentof Vietnam<br />

for Assistance <strong>in</strong> Establish<strong>in</strong>gaCentralCryptologic<br />

Organization." - USIB-SC-29.2~111,\13 -. February<br />

1968.\\<br />

76. (8//8I) DIRNSA to NSAP~C\Jt£P CVIET­<br />

NA.\1), 182322Z March 1968, D33-451,\\\<br />

77. (6//8I) DIRNSA to NSAPAC REP.(VIETNAM),<br />

2900172 March 1968, D33-536.<br />

I'--- -----:.~---<br />

79. (T8//8I) Ibid., 3.<br />

80. (T8//8I) Ibid.<br />

85. (TS//8I) Ibid., 32-34.<br />

86. (TS//8I) Ibid., 13.<br />

\ ........ \\ \.\\<br />

\ ••••......••••.•••....... \ ..........<br />

.\\<br />

\........... \\<br />

\~<br />

\ \\\<br />

\ \.<br />

\<br />

MACV J-2, USASA TAREX, and ARVN. For example,<br />

<strong>in</strong> the chapter on VC/PAVN signals <strong>in</strong>telligence <strong>in</strong>'the<br />

history of the Purple Dragon program, Purple Dragon<br />

(CCH-E32-93-04, 1993), there are 41 citations, none of<br />

which are <strong>in</strong>dividual SIGINT reports, and only four.of<br />

these are classified at or higher than SECRET<br />

Codeword, mean<strong>in</strong>g SIGINT was used <strong>in</strong> the citation<br />

itself. (S/lSI) For further <strong>in</strong>formation on Project<br />

Touchdown see Project Touchdown accessions 3280~<br />

and 37377, NCA. (S/lSI) For further <strong>in</strong>formation on<br />

Project Touchdown see Project Touchdown assessions<br />

32802 and 37377, NCA.<br />

95. (T8//8I) Donzel E. Betts, \<br />

Work<strong>in</strong>g Aga<strong>in</strong>st the Tide: COMSEC Monitor<strong>in</strong>g and<br />

Analysis. Part One, Cryptologic History Series,<br />

Southeast Asia (Fort George G. Meade, Maryland:<br />

National Security Agency, June 1970), 22. This work<br />

wasthe orig<strong>in</strong>al study produced by a jo<strong>in</strong>t effort of the<br />

various history offices of the cryptologic community. It<br />

reflects ahigher classification and the use of extensive<br />

SIGINT and SIGINT-related <strong>in</strong>formation which<br />

were excluded from the later version, Deadly<br />

Transmissions.<br />

96. Ibid., 8~10.<br />

97. (T8//SI) \DIRNSA Message 062025Z May<br />

19.64.<br />

98. (TS//8I) Ibid'~L--:-_~~_~ _<br />

3/01 104-62/VNG for specific examples.<br />

99. (U) Bergen, 404.<br />

91. CU) Gaddy, 94.<br />

92. (S//SI) Donzel E. Betts, Hiram M. Wolfe,<br />

Raymond P. Schmidt, Thomas N. Thompson, Deadly<br />

Transmissions: (COMSEC Monitor<strong>in</strong>g and Analysis),<br />

Cryptologic History Series, Southeast Asia (Fort<br />

George G. Meade, Maryland: National Security<br />

v December 1 0<br />

94. Betts et a ., 4-; IS IS more t an an<br />

impressionistic or anecdotal op<strong>in</strong>ion. A review of official<br />

publications concern<strong>in</strong>g U.S. Communications/<br />

Operations/Signal Security concerns shows that they<br />

cite almost exclusively collateral reports issued by<br />

TOfl SEeR:ETUeOMINTft'*1<br />

101. (TS//SI) Betts et al., Work<strong>in</strong>g Aga<strong>in</strong>st the<br />

Tide, 3.<br />

102. (U) Bergen, 404-405.<br />

104. .f8t "VC/NVA COMINTEffort," USASAPAC<br />

TAREX Technical CQMINT Special Report (TCSR)<br />

04-71, 8 March 1971.<br />

105. ers//sI)Ir--------Ipurple Dragon:<br />

The Orig<strong>in</strong> and Development of the. United States<br />

OPSEC Program (Fort George G. Meade, MD: Center<br />

for Cryptologic History, National Security Agency,<br />

1993),68.<br />

106. fSt TCSR PAC-15-69, 18 November 1969,<br />

CCH XII.NN.1.F.<br />

107. ~ Betts et al., Deadly Transmissions, 11.<br />

Page 411<br />

P.L. 86-36<br />

OGA

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!