13.07.2015 Views

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

ENCYCLOPEDIA OF Espionage, Intelligence, and Security Volume ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

COMINTsettings of the Lorenz encoder were statistically significant.The Colossus output did not give a decoded message,but rather the settings of the first set of five wheels.Humans, using a combination of statistics, language skills,<strong>and</strong> intuition did the remaining decoding. Finally, thecomplete wheel settings were fed into a device that producedthe deciphered message. Later, the versatile Colossiwere reprogrammed to do more of the code-breakingwork, but there was always considerable input from theirhuman operators.Breaking the Lorenz cipher gained the Allies crucialinformation that aided in major operations, such as theBattle of Kursk, <strong>and</strong> the D-Day l<strong>and</strong>ings. Colossus showedthat Turing’s ideas of a universal computer could be madeinto practical machines. However, the existence of Colossuswas kept secret for many years, <strong>and</strong> so the AmericanElectronic Numerical Integrator <strong>and</strong> Computer (ENIAC),completed by the U.S. Army in 1946, was consideredthe world’s first computer until information on Colossuswas finally declassified in the 1970s. In 1996, a Colossuswas reconstructed, <strong>and</strong> it can be seen at the BletchleyPark Museum.❚ FURTHER READING:BOOKS:Hinsley, F. H., et al. British <strong>Intelligence</strong>s in the SecondWorld War: Its Influence on Strategy <strong>and</strong> Operations,<strong>Volume</strong> Three, Part I. London: Her Majesty’s StationaryOffice, 1984.Sale, Anthony E. “The Colossus of Bletchley Park—TheGerman Cipher System,” in Raùl Rojas <strong>and</strong> Ulf HashagenThe First Computers: History <strong>and</strong> Architectures. Cambridge,MA: MIT Press, 2000.Smith, Michael. Station X: The Codebreakers of BletchleyPark. London: Channel 4 Books, 2000.ELECTRONIC:WWII Codes <strong>and</strong> Ciphers. (December 19, 2002).SEE ALSOCipher KeyCipher MachinesCodes <strong>and</strong> CiphersEnigmaCOMINT(Communications <strong>Intelligence</strong>)❚ JUDSON KNIGHTCOMINT or communications intelligence is intelligencegained through the interception of foreign communications,excluding open radio <strong>and</strong> television broadcasts. It isEncyclopedia of <strong>Espionage</strong>, <strong>Intelligence</strong>, <strong>and</strong> <strong>Security</strong>a subset of signals intelligence, or SIGINT, with the latterbeing understood as comprising COMINT <strong>and</strong> ELINT, electronicintelligence derived from non-communication electronicsignals such as radar. During the early part of themodern intelligence era, the terms “signals intelligence”<strong>and</strong> “communications intelligence” were used virtuallyinterchangeably, <strong>and</strong> therefore, much of what was describedas signals intelligence in World War II is moreproperly understood as COMINT.Early History of Army <strong>and</strong>Navy COMINTCOMINT is the province of several services, both military<strong>and</strong> non-military, most notably the National <strong>Security</strong>Agency (NSA) <strong>and</strong> the United States Army <strong>Intelligence</strong><strong>and</strong> <strong>Security</strong> Comm<strong>and</strong> (INSCOM). Until the establishmentof NSA in 1947, however, the majority of COMINTtook place under the aegis of “signals intelligence” activitiesin the two principal military services. Though militarycryptanalytic <strong>and</strong> cryptographic operations dated back atleast to World War I, <strong>and</strong> included activities at the WarDepartment Military <strong>Intelligence</strong> Division under the directionof Herbert O. Yardley, the first true COMINT organizationwas the Army’s Signal <strong>Intelligence</strong> Service (SIS).Established on April 24, 1930, SIS not only undertookcryptographic <strong>and</strong> cryptanalytic tasks, but developed ciphermachines <strong>and</strong> produced studies on cryptology. Itsgreatest achievement was its breaking of the Japanesediplomatic ciphers with the PURPLE code machine prior toWorld War II. In June 1942, after the outbreak of war, SISacquired an intercept operation in the form of the 2ndSignal Service Battalion, which conducted radio interceptsat Vint Hill Farms in Warrenton, Virginia.A tale of two services. The interaction of army <strong>and</strong> navyCOMINT activities during the war is rather like a moralitytale of two brothers, the older one highly favored, butfailing to live up to expectations, <strong>and</strong> the younger onecoming from behind to triumph. In this analogy, the armywas the “older brother,” <strong>and</strong> the navy, which lacked a trueCOMINT organization during the war, the surprising darkhorse. After its initial victory with PURPLE, SIS conducteda long <strong>and</strong> frustrating effort to crack Japanese militarycodes, succeeding only in 1944.The Navy had, at the end of World I, a cryptologicbureau that had emerged during the war. The bureauprovided codes for the use of President Woodrow Wilsonduring the Paris Peace Conference, but when Yardleydemonstrated his ability to break the naval codes, theOffice of Naval <strong>Intelligence</strong> (ONI) closed down thecryptologic bureau in July 1918. Navy COMINT effortsthen retreated to the shadows—a fitting place for intelligenceoperations.243

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!