30.12.2012 Views

Scanned Document - National Security Agency

Scanned Document - National Security Agency

Scanned Document - National Security Agency

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

This is an examination of codes and<br />

ciphers as they figured in American history<br />

prior to the twentieth century, prior to the<br />

era of wireless or radio communication and<br />

the advent of the electronic age. It forms<br />

a backdrop for understanding modern<br />

cryptology and the role of cryptology<br />

(notwithstanding its traditional secrecy) in<br />

the growth of this nation. Our guide is Dr.<br />

Ralph E. Weber of Marquette University,<br />

whose 1979 United States Diplomatic Codes<br />

and Ciphers, 1775-1938 (Chicago: Precedent<br />

Publishing Inc.) established him in the<br />

forefront of students of this arcane subject.<br />

Cryptology, the art and science of code-<br />

making (cryptography) and code-breaking<br />

(cryptanalysis), depends on the prevailing<br />

state of technology and the perception of<br />

threat:<br />

Technology determines the means of<br />

communications. Technology also provides<br />

the means for protecting and the means of<br />

exploiting intercepted communications.<br />

Perception of threat depends upon a<br />

number of considerations, such as the<br />

estimated degree of risk, or the damage that<br />

might occur, should an unintended recipient<br />

become privy to the contents of the<br />

communication.<br />

The perception of threat rises naturally in<br />

war, but it also pertains in international<br />

relations, in business competition, in politics,<br />

and even in personal matters, including<br />

financial transactions. Applying technology<br />

to protect communications (to "mask" them,<br />

to use Thomas Jefferson's term) or to exploit<br />

those of another party introduces other<br />

variables, not the least of which is cost. Cost<br />

can involve dollars of time, including<br />

personal inconvenience. Sometimes the risk<br />

is discounted, if the cost seems too great;<br />

conversely, faced with the consequences of<br />

compromised information, what seemed<br />

Foreword<br />

earlier too great a cost may well be dismissed<br />

in favor of security.<br />

America was born out of revolutionary<br />

conspiracy. One of the principal concerns for<br />

conspirators is communication, keeping in<br />

touch, and doing so in confidence. As rebels<br />

and conspirators, the young nation's leaders<br />

had turned to codes and ciphers in an effort<br />

to prescrve the confidentiality of their<br />

communications. The technology of the time<br />

was that of messenger or hand-written<br />

correspondence, hand delivered, or by<br />

prearranged signals, such as Revere's fabled<br />

lanterns, "one if by land, two if by sea." The<br />

risk was that a dispatch might fall into enemy<br />

hands through capture of a courier, and this<br />

did happen. Intercepted cryptograms yielded<br />

to cryptanalysis of an elementary sort,<br />

producing communication intelligence,<br />

COMINT. But there was no COMINT effort as<br />

we would understand the term today. The<br />

technology of the time would not have<br />

supported such a concept. (How many enemy<br />

couriers could be scheduled for systematic<br />

and regular capture, to justify thought of a<br />

sustained effort?) Nor was cryptography an<br />

organized bureaucracy; rather, it depended<br />

upon the interest, knowledge, and<br />

imagination of a few men. America was lucky<br />

to have such men when it needed them. Some<br />

were "civilians in uniform," volunteer<br />

soldiers; most were learned men, clergy<br />

(familiar with Greek, Latin, Hebrew),<br />

mathematicians, scholars - some were<br />

statesmen. Their involvement in cryptology<br />

was generally brief, but it constituted the<br />

seeds of American cryptology.<br />

With the successful end of the<br />

Revolutionary War, the occasion for<br />

COMINT disappeared, as did the perceived<br />

need for secrecy, in the absence of an<br />

adversary. When the need subsequently<br />

arose, particularly in the case of foreign

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!