23.12.2012 Views

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

Piercing the Fog - Air Force Historical Studies Office

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Tools of <strong>Air</strong> Intelligence<br />

cryptographic technology in early 1941 and to <strong>the</strong> rapid development of<br />

o<strong>the</strong>rwise remarkably integrated Anglo-American intelligence operations and<br />

organizations. During <strong>the</strong> first eighteen months, American military commanders<br />

in Europe and <strong>the</strong>ir superiors in Washington received only limited distribution<br />

of decrypted ULTRA and did not understand, except for a very few technical<br />

experts like <strong>the</strong> cryptologist William F. Friedman* of <strong>the</strong> Army’s Signal<br />

Intelligence Service, how <strong>the</strong> British handled <strong>the</strong> deciphering, distribution, or<br />

analysis of this inte1ligen~e.l~ For strategic air operations over Europe as well<br />

as during Operation TORCH and <strong>the</strong> subsequent struggle for North Africa, <strong>the</strong><br />

British maintained complete control over <strong>the</strong> interception, decryption,<br />

evaluation, and distribution of Enigma-generated intelligence.<br />

By <strong>the</strong> spring of 1943 <strong>the</strong> United States sought a greater role in SIGN activities in Europe. The British remained extremely reluctant to relinquish <strong>the</strong>ir<br />

monopoly over <strong>the</strong> Axis codes and ciphers, in part because <strong>the</strong> United States<br />

already had a blemished record when it came to keeping military secrets. Just<br />

days before Pearl Harbor <strong>the</strong> isolationist Chicago Herald Tribune had published<br />

<strong>the</strong> text of <strong>the</strong> War Department’s so-called Victory Program for <strong>the</strong> development<br />

of American military capabilities necessary to defeat <strong>the</strong> Axis in <strong>the</strong> event<br />

of war. The Tribune’s source for this document was almost certainly an officer<br />

within <strong>the</strong> War Department. In addition, from <strong>the</strong> fall of 1941 to <strong>the</strong> summer of<br />

1942 <strong>the</strong> Germans had broken <strong>the</strong> code used by <strong>the</strong> American military attache<br />

in Cairo, and <strong>the</strong>y used <strong>the</strong> information thus gained in operations against <strong>the</strong><br />

British in <strong>the</strong> Western Desert. By 1943, however, <strong>the</strong> Americans could offer an<br />

important bargaining chip, after recently breaking several of <strong>the</strong> major Japanese<br />

high-level military ~iphers.’~<br />

Despite an obvious wariness on both sides, <strong>the</strong> two governments signed an<br />

agreement on sharing information on May 17, 1943. According to this<br />

document, <strong>the</strong> British would continue <strong>the</strong>ir efforts against <strong>the</strong> German and<br />

Italian high-grade ciphers (ULTRA) as well as lower-grade signals and radio<br />

traffic sent in <strong>the</strong> clear (unencoded).? The Americans would continue <strong>the</strong>ir<br />

assault against Japanese military, air, naval, and diplomatic ciphers.16 The<br />

partners agreed to continue exchanging intelligence so gained and to establish<br />

special procedures to ensure its secure handling and to prevent it from being<br />

inadvertently commingled with intelligence from o<strong>the</strong>r sources. These<br />

*William F. Friedman (1891-1969), a cryptanalyst of great ability, began to<br />

appear prominently in Army SIGINT during World War I. After <strong>the</strong> war, Friedman<br />

worked as <strong>the</strong> Army’s chief cryptanalyst in a very small office directed more to<br />

developing new codes and ciphers than to penetrating those of foreign powers. He<br />

was instrumental in training Army officers in cryptography and cryptanalysis and<br />

in leading <strong>the</strong> team that broke <strong>the</strong> PURPLE cipher.<br />

tlow-grade and high-grade in this context refer to <strong>the</strong> complexity of<br />

encipherment, not to <strong>the</strong> inherent value of <strong>the</strong> intelligence that might be derived<br />

from intercepted signals.<br />

63

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!