Code words, euphemisms and what they can tell us about us about

advertisement
This is an Accepted Manuscript of an article published by Taylor & Francis in
Intelligence and National Security in December 2012, available online:
http://www.tandfonline.com/ DOI: 10.1080/02684527.2012.699288
Code words, euphemisms and what they can tell us about us about Cold
War Anglo-American Communications Intelligence.
David Easter
ABSTRACT This study examines the code words and euphemisms which
protected Anglo-American Communications Intelligence (Comint) during the
Cold War. It explains how the code word security system operated and identifies
the main Comint code words and euphemisms in effect from 1946 to 1999. The
paper then uses these code words and euphemisms to interpret declassified
American documents and reveal more information about Anglo-American
Comint on the Congo, Bolivia, Indonesia, South Vietnam and China in the 1960s.
The great barrier to researching Cold War Anglo-American communications intelligence
(Comint) has always been official secrecy. The American and British governments have only
released a tiny proportion of the historic records held by their main Comint agencies, the
National Security Agency (NSA) and Government Communications Headquarters (GCHQ).
NSA and GCHQ Comint also has exemptions from the American and British Freedom of
Information Acts. The records of other bodies which handled Comint in the Cold War, like
the Central Intelligence Agency (CIA) or the Britain’s Joint Intelligence Committee (JIC), are
more open but Comint material is still often retained or heavily redacted before public
1
release. Human sources are problematic as well because current and former government
employees on both sides of the Atlantic can be prosecuted for disclosing Comint secrets. The
secrecy barrier is not insuperable: recent major works by Matthew Aid and Richard Aldrich
on the NSA and GCHQ respectively, have shown what can be achieved through meticulous
research and careful analysis, but it does hamper progress and there remain big gaps in our
knowledge, such as the extent of Anglo-American Comint on sub-Saharan Africa, Latin
America and communist China during the Cold War.1
One way to approach this problem of secrecy is to exploit features of the security procedures
that protected Anglo-American Comint in the Cold War. Britain and the United States,
together with their Comint partners, Canada, Australia and New Zealand, had common
procedures for handling and disseminating Comint. As part of these procedures, documents
containing Comint were marked with special code words in addition to the standard security
classifications (top secret, secret and confidential). These code words signified to the initiated
the presence of Comint and helped control access to Comint material. Documents carrying
the code words were only issued to people with Comint security clearances and were stored
more securely than government papers merely classified as ‘top secret’ or ‘secret’. Officials
were also forbidden to discuss Comint in their normal correspondence and instead employed
euphemisms to refer to it.2
These procedures and practices were designed to secure and conceal Comint but they create
opportunities for researchers. Once the code word system and the different euphemisms for
Comint are understood, it is possible to reinterpret already released documents and discover
more about NSA and GCHQ Comint. This article will explain how the security system was
set up and operated, describe the various Comint code word categories and identify the main
code words and euphemisms. The article will then demonstrate how these terms can be used
2
to analyse declassified American documents and reveal information about Anglo-American
Comint, including intelligence on the Congo, Bolivia, Indonesia, South Vietnam and China.
In March 1946 Britain and the United States formally inaugurated a post war Comint
partnership by signing the British-US Communication Agreement (BRUSA). 3 Under the
terms of the agreement the British and American Comint agencies would work together to
intercept and decrypt foreign communications and share all raw traffic and Comint items. It
was essential to protect the fruits of this cooperation and at meetings in 1946 and 1948
American and British officials devised joint security arrangements to control and limit access
to Comint, drawing upon their experiences in the Second War World. These arrangements
were laid out in Appendix B to BRUSA which formed the basis of all national regulations for
the security and dissemination of Comint.4
Appendix B divided Comint into two security categories: Special Intelligence and Traffic
Intelligence. Special Intelligence broadly consisted of Comint obtained from the decryption
of encrypted foreign messages. Traffic Intelligence was Comint derived from means other
than decoding or deciphering messages, such as the study of procedure signals, call signs,
direction finding bearings and other externals of communications. These boundaries were not
completely rigid, however, and the two types of Comint could sometimes cross over. Traffic
Intelligence could be regarded as Special Intelligence if it disclosed successes in gaining
intelligence
from
encrypted
communications.
Conversely,
low
level
decrypted
communications could sometimes be downgraded to the Traffic Intelligence category.
Unencrypted, plain language messages would normally be categorised as Traffic Intelligence,
although there were some exceptions.5
After defining the terms, Appendix B set out general security and dissemination procedures
for Anglo-American Comint.
6
It assigned the two categories of Comint security
3
classifications and code words that would change over time. The most sensitive form of
Comint, Special Intelligence, was classified as ‘top secret’ and given the code word ‘Cream’,
which replaced the wartime high level Comint code word ‘Ultra’.7 The classification ‘top
secret’ and the code word were to appear on every sheet of paper which contained Special
Intelligence. 8 The same phrase was to be written on documents which revealed success,
progress or processes in the production of Special Intelligence, even if the document did not
contain actual intelligence. This rule extended to the 1946 edition of Appendix B which had
the words ‘TOP SECRET CREAM’ written on the top right hand corner of every page. By
1948 the Special Intelligence code word had changed and a revised version of Appendix B
was marked ‘TOP SECRET GLINT’.9 The Special Intelligence code words were themselves
classified as ‘top secret’ and were not to be used in their code word sense in the presence of
people who did not have Comint clearance. Traffic Intelligence was given a lower level of
security – it was classified as ‘secret’ - and had its own series of code words. In 1946, the
code word was ‘Ivory’ and the words ‘SECRET IVORY’ were to appear on every sheet of
paper which contained or disclosed the existence of Traffic Intelligence.10
In 1953 Britain and the United States revised Appendix B and the code word categories,
putting an even greater focus on the protection of Comint while at the same time relaxing
certain elements of the system.11 In the new edition of Appendix B the nomenclature changed
as Special Intelligence was renamed ‘Crypt Intelligence’. More fundamentally, the Special
Intelligence and Traffic Intelligence security categories were replaced with a division of
BRUSA Comint into three categories based upon the required level of protection.12 In the
new system the top level was Category III Comint, defined as Comint ‘for which the
protection of source or content is the overriding consideration and which must, therefore, be
given the highest degree of security protection.’ Into Category III went Crypt Intelligence,
unless it was specifically assigned to the lower categories, Traffic Intelligence with call-signs
4
or message headings encrypted in high security codes or ciphers, and one other type of
Comint which has been redacted in the document. At the discretion of the American and
British Comint authorities, other Traffic Intelligence could also be placed in this category.
Category II Comint had less rigorous standards of security and was the default category for
Traffic Intelligence. It also included Crypt Intelligence ‘involving the solution of codes,
ciphers and special systems of lower security’. Category I Comint had the least stringent
security restrictions and consisted of low level Comint as agreed by the authorities. In
addition to these definitions, the revised Appendix B offered some general criteria to help
assign Comint to the right category. Officials would have to take into account the difficulty in
intercepting the traffic or solving the codes and ciphers, the cryptographic sophistication of
the country originating the traffic, the intelligence value of its content and the security
grading given to the content by the originator country.
The code word system previously applied to Special Intelligence and Traffic Intelligence was
transferred over to Category III and II Comint. The classification ‘top secret’ and a code
word were to appear on every sheet of paper which contained or disclosed Category III
Comint, including maps and charts. Category II material would carry the classification
‘secret’ and have a different code word. However, notes to the revised Appendix B did allow
some exceptions to these rules.13 JIC appreciations and CIA National Intelligence Estimates
containing Comint could be issued without the code words if the statements in the papers
were so generalised that they could not be traced back to Comint. Any specific Comint detail
would have to go in supporting documents carrying the Comint code word. Category I
Comint had no code word and would be given a security classification no lower than
‘confidential’.
The procedures set out in the 1953 revision of Appendix B set the template for the rest of the
Cold War. Although BRUSA was superseded by the UK-US Communications Intelligence
5
Agreement (UKUSA) in 1956, the division of Comint into three main security categories
remained.14 The only innovation was that by the 1960s Category I Comint had been given its
own code word, creating a system where there were three categories of UKUSA Comint, all
identified and protected by a separate code word which changed over time.15 As the AngloAmerican Comint partnership expanded to include Australia, Canada and New Zealand, these
countries used the same code words.
The other field of Signals Intelligence (Sigint),
Electronic Intelligence or the interception and processing of non-communications
transmissions such as radar signals, was not covered by the BRUSA/UKUSA code word
system.
The BRUSA/UKUSA code words and security procedures controlled and limited access to
Comint. Ministers, officials and service personnel had to undergo special security checks, be
‘indoctrinated’ into the rules of Comint security and given specific clearances before they
were authorised to see documents marked with the Comint code words. 16 Possession of a
security clearance to see top secret documents did not on its own entitle a policymaker to
view Special Intelligence or Category III Comint. In effect, the BRUSA/UKUSA code word
system created a special compartment for Comint, separating it out from other types of secret
and top secret information. Material in the Comint code word compartment was also subject
to more stringent security measures.17 In the State Department documents containing special
intelligence were not allowed to circulate freely in the building. Instead they were held in a
double locked vault on the 6th floor and one other secure location. If a special intelligence
document was required by a Comint indoctrinated State Department official, it would be
brought to him or her by a security officer. Once the official had read the document, it would
be immediately returned to the vault.18 Similar rules operated in the Foreign Office.19 These
security procedures gave Comint a certain mystique. One State Department official recalled
that:
6
[State Department] Offices dealing with low priority countries benefited by
exploiting the policymakers' compulsion to look at codeword material. The
bearers of intercepts got favored treatment. The texts were placed between special
covers, handled under lock and key, and hand delivered by special carriers. The
latter enjoyed almost immediate access to the highest levels of the government,
and these policymakers, in turn, often found NSA tidbits dramatic, entertaining,
and juicy.20
Following the end of the Cold War the UKUSA nations scrapped the main elements of the
code word system. In 1999 the three current Comint code words were abolished along with
the terms Comint Category I, II and III, although the material they covered still remained
secret.21 Comint would henceforth be controlled and protected in different ways. This change
in procedure opened the way for the declassification of the previously secret Cold War
Comint code words. A 2008 American National Reconnaissance Office (NRO) guide for
reviewing and redacting declassified documents listed the following ‘SIGINT product code
words’ which could be released:
ACORN
CREAM
FLARE
KIMBO
PIXIE
THUMB
AMBLE
KRONE
FROTH
LARUM
SABRE
TRINE
BASTE
DAUNT
GAVEL
MAGIC
SAPPY
TWEED
CANOE
DENIM
GLINT
MORAY SAVIN
ULTRA
CHEER
DINAR
HERON
PEARL
SPOKE
UMBRA
CHUTE
EIDER
HYSON
PINUP
SPRIG
USHER
COPSE
BOOTY
IVORY
PIVOT
SUEDE
WITCH22
Some of these words are recognisable as high level Comint code words. Ultra and Magic
were famously used in the Second World War and as seen above, Cream was a late 1940s
code word for Special Intelligence. Three other words in the list, Dinar, Trine and Umbra,
have previously been identified by writers and historians as high level Comint code words,
starting with David Wise in his 1973 book The Politics of Lying.23 Wise, who based his work
7
on unattributable interviews with former American government officials, claimed that top
secret special intelligence had been marked with the code words Dinar, Trine and Umbra.
NSA documents released subsequently confirm his claims. A declassified internal history of
the NSA referred to Dinar as a ‘Category III COMINT codeword’ and in a court affidavit in
1980 a senior NSA official revealed that Umbra was the ‘codeword applicable to Category III
(the highest category) COMINT.’24 An internal NSA journal implied that Umbra was the
replacement for Trine.25
It can be deduced that eight of the other ‘SIGINT product code words’ on the NRO list were
also BRUSA/UKUSA Special Intelligence or Category III code words. These eight words
(Acorn, Canoe, Copse, Daunt, Eider, Froth, Glint and Suede) appear on American and British
Comint material classified as ‘top secret’ and which at other times carried known Special
Intelligence or Category III code words. Good examples of this are the approximately 3,000
NSA Venona decrypts and analyses of 1940s Soviet intelligence messages which were
painstakingly produced between 1946 and 1980. A Venona special analysis report from 1947
has the phrase ‘TOP SECRET CREAM’ on every page and Venona decrypts issued in the
1960s are marked ‘top secret’ with the code words Dinar, Trine or Umbra. 26 Venona
documents and decrypts produced in the intervening period, from 1949 to 1960, still carry the
classification ‘top secret’ but also one of the eight NRO code words used in the following
chronological sequence: Glint, Copse, Acorn, Suede, Canoe, Froth, Eider and Daunt.27 These
eight code words cannot be specific to Venona (‘Venona’ itself was one of several special
code words for the programme) because they also appear and follow the same sequence on
other top secret Comint documents. The BRUSA appendices in 1946 have the code word
Cream but later versions and notes issued at intervals between 1948 and 1956 are marked
with the code words Glint, Acorn, Suede, Canoe, Froth, and Eider.28 GCHQ intercepts of
Soviet Bloc communications in the late 1940s carry the code word Cream in August 1947 but
8
Glint, Copse and Acorn from September 1947 to 1950.29 It should be added that when the
eight code words from the NRO list appear on any Comint related material prefixed with a
security classification, it is always with the classification ‘top secret’ and never ‘secret’ or
‘confidential’. It seems safe to assume that they are Special Intelligence or Category III
Comint code words.
By tracking the appearance of the code words on the Venona documents, the GCHQ Soviet
Bloc decrypts and CIA Korean War Freedom of Information Act releases, and by using other
sources, it is possible to reconstruct the sequence of Special Intelligence and Category III
Comint code words and the approximate time period for which they were in use:
Cream: March 1946 – August 1947.30
Froth: October 1953 – December 1954.31
Glint: September 1947 – June 1949.32
Eider: January 1955 – June 1959.33
Copse: July 1949 – July 1950.34
Daunt: July 1959 – December 1960.35
Acorn: August 1950 – June 1951.36
Dinar: January 1961 – August 1965.37
Suede: July 1951 – June 1952.38
Trine: September 1965 – November 1968.39
Canoe: July 1952 – September 1953.40
Umbra: December 1968 – 1999.41
Looking at this series, it is apparent that the high level code words were changed much more
frequently in the late 1940s and early 1950s than during the later Cold War. In their revision
of Appendix B in 1953 American and British officials had begun to move away from an
annual change over, directing that the Category III and II code words should be replaced
every two years or earlier if required. 42 This rule was soon relaxed. The 1956 edition of
Appendix B merely stated that the code words should be replaced when in the opinion of the
Comint authorities, ‘a requirement exists for a change.’. 43
9
The principle reason for
persevering with existing code words, with the security risks that this entailed, was the cost
and effort involved in replacing them. With Australia, Canada and New Zealand members of
the Comint partnership and the NSA and GCHQ producing ever greater amounts of Comint
material, changing code words became an expensive and laborious task. For each change
over the UKUSA Comint agencies had to produce thousands of rubber stamps and sheets of
pre-printed paper bearing the new code word and securely distribute them to all posts.44
Several times though the UKUSA agencies had to replace a Category III code word because
it had been compromised. For example, McGeorge Bundy, the President’s Special Assistant
for National Security Affairs between 1961 and 1966, once accidently exposed a Category III
code word to the American public and forced a code word change.45 In 1965 the New York
Times Magazine published a photograph of Bundy talking to President Lyndon Johnson on
the White House lawn. Bundy was holding a copy of the CIA Daily Bulletin on which was
clearly visible the words ‘TOP SECRET DINAR’.46 An NSA internal history recalled that
‘This produced numerous press references to “a codeword so secret the very existence is
classified”’ and the UKUSA agencies were compelled to change the Category III code word
to Trine, a process which cost around $250,000.
47
Unfortunately, Trine itself was
compromised three years later in a much more dramatic fashion, when the North Koreans
seized the American Sigint spy ship USS Pueblo and captured on board a considerable hoard
of Comint material.48 North Korea displayed on national television Sigint tasking documents
from the Pueblo marked with Trine and other code words and later published pictures of
them in a propaganda book.49 Although the heads of the NSA were reluctant to change the
code words at that time, believing that it ‘would be more trouble, more expense, and cause
more confusion that would be worthwhile from a security standpoint’, Trine was replaced by
Umbra in December 1968. 50 In spite of its own later exposure Umbra would remain the
Category III code word for the rest of the Cold War.
10
Some of the other words on the NRO list can be identified as lower level Comint code words.
Ivory was a Traffic Intelligence code word and Moray and Spoke were the Category I and II
code words accompanying Umbra.51 They were preceded by Larum and Savin from 1965 to
1968 and probably by Sabre and Kimbo in the first half of the 1960s. 52 Pearl, Pinup and
Thumb were low level code words used in the Second World War, although Pearl also
appeared on late 1940s GCHQ documents classified as ‘secret’ relating to Soviet Bloc
communications.53 The remaining 16 words in the NRO guide are not known but presumably
some of them were Traffic Intelligence and Category I and II code words from 1947 to 1960.
Apart from these main BRUSA/UKUSA Comint code words, there were many others which
further compartmentalised information and restricted access to it. 54 Probably the most
important of these subsidiary code words was ‘Gamma’, which was introduced at some point
between 1956 and 1967.55 Gamma was used to give extra protection to particularly sensitive
Comint such as intelligence on the Soviet Union, intercepts of South Vietnamese government
communications and messages of American anti-Vietnam War activists.56 Gamma documents
carried the caveat ‘GAMMA CONTROLLED ITEM’ on the cover, first and title pages and
Gamma markings on all the internal pages as well as the normal Category III Comint code
words.57 In the early 1970s Gamma contained approximately 20 sub-compartments which
protected particular operations, methods or sources, such as information about Soviet-Arab
communications.58 These sub-compartments were designated by four letter long code words
which always began with the letter ‘G’, producing such oddities as Gabe, Gant, Gart, Gilt,
Gout, Grol, Gult, Gupy and Gyro. ‘Gamma Gupy’ was the term for Comint obtained by
intercepting the car phone conversations of Soviet leaders in the 1960s and early 1970s while
from autumn 1968, intercepts of South Vietnamese cable traffic were marked ‘Gamma
Gout’. 59 On documents the code words were compounded, so that a State Department
intelligence note on the Soviet role in the May 1967 Middle East Crisis had the words ‘TOP
11
SECRET TRINE/GAMMA (GART-GROL) CONTROLLED’ written at the top and bottom
of every page. 60 Policymakers would need clearance for all of these separate code word
compartments before they could see the document.
Perhaps because there were so many changing code words, ‘code word’ and ‘codeword’
themselves seem to have become generic terms for Comint. The warning ‘This document
contains code word material’ was printed on the front of CIA reviews and memoranda
containing Comint and it also appeared on the front page of a 1972 NSA ‘Comint Report’ on
India.61 In the 1970s the top secret edition of the CIA’s regular Central Intelligence Bulletin
carried the statement that it was
published in both a Top Secret Codeword and a Secret edition. Recipients of the
more tightly held Codeword version should not discuss it or its Codeword
contents with recipients of the Secret edition.62
Given that the top secret edition of the Bulletin included Comint, almost certainly
‘Codeword’ here referred to communications intelligence.63 It is possible though, that ‘code
word’ and ‘codeword’ did not always mean Comint. From the mid-1950s the United States
had developed another code word control system for intelligence gathered by high level aerial
reconnaissance and later satellites, using code words such as Talent and Keyhole.64 ‘Code
word’ and ‘codeword’ might sometimes refer to these code words and imagery intelligence.
The BRUSA/UKUSA procedures created an interlocking system for controlling and referring
to Comint and the combined markings and different terms can be seen on issues of the CIA’s
Current Intelligence Weekly Review. The review was published by the CIA’s Office of
Current Intelligence every Friday and issued to American officials in Comint or non-Comint
versions. 65 A Comint version of the weekly review of 30 August 1956 had the security
classification and the Category III Comint code word, ‘TOP SECRET EIDER’, printed on the
top of its interior pages.66 Its cover page was emblazoned with the customary phrase ‘THIS
12
DOCUMENT CONTAINS CODE WORD MATERIAL’, followed by the stern instructions
that the document
is to be seen only by US PERSONNEL especially indoctrinated and authorised to
receive Special Intelligence information. The security of this document must be
maintained in accordance with SPECIAL INTELLIGENCE SECURITY
REGULATIONS. No action may be taken by any person on the Special
Intelligence presented herein, regardless of any advantage which may be gained,
unless such action is first approved by the Director of Central Intelligence.
Editions of the Weekly Review from the late 1950s and 1960s had a similar format but
substituted the phrase ‘communications intelligence’ for ‘special intelligence’ in the front
page instructions.67
The influence of the BRUSA/UKUSA security and dissemination system spread beyond
these formal markings on documents. Indoctrinated American and British policymakers
sometimes used the different control terms as euphemisms for Comint in their internal
correspondence. Rather than write ‘Comint’ or ‘Sigint’ they wrote ‘special intelligence’,
‘code word material’ or the current high level Comint code word. Examples of this usage can
be seen in British documents from the Suez War of 1956. In a minute to the JIC in November
1956 a British official explained how intelligence would be coordinated during the conflict
with Egypt. He noted that the staff would ‘check for the exclusion of codeword material from
the daily report prepared...for circulation to the Cabinet.’ 68 In another minute, an official
described the early morning daily intelligence briefings in the War Room in Whitehall as
being only for ‘those officers who are cleared to receive Eider information’.69 Despite the
introduction of the term ‘Crypt Intelligence’ and the triple category system, the phrase
‘special intelligence’ seems to have been the euphemism most commonly used in
correspondence. This practice may even have been an approved part of UKUSA security
procedure, for the NRO review and redaction guide defined ‘Special Intelligence’ as ‘the
unclassified term which is used to identify COMINT in the unclassified environment.’70
13
Understanding the BRUSA/UKUSA security system and identifying the various code words
and euphemisms is important because they can help pierce some of the secrecy surrounding
Comint. Although the Special Intelligence and Category III code words and Comint
euphemisms were originally intended to protect and conceal intelligence, once their meanings
are known they can signal the presence of Comint in a document and reveal information
about it. They can indicate NSA and GCHQ Comint targets, show what intelligence the
agencies were providing American and British policymakers and give clues to code breaking
successes. Yet there are limits to using the code words in this way. In the past American
government reviewers often redacted the high level Comint code words on documents prior
to their public release; on CIA intelligence reports it is common to see the classification ‘top
secret’ with the following word deleted. Indeed, reviewers sometimes overlooked a code
word and inadvertently revealed what they were trying to hide. On a 106 page long CIA
report about Soviet defence spending from 1955, a reviewer has carefully deleted the word
following ‘TOP SECRET’ on top and bottom of every page, except for the top of page 23,
where the tell-tale phrase ‘TOP SECRET EIDER’ can be seen.71
It should also be borne in mind that the Special Intelligence and Category III code words
were not exclusively for intelligence derived from code breaking. The guidance in BRUSA
Appendix B suggests that the high level code words were sometimes used for Comint based
on traffic analysis and perhaps plain text and speech intercepts. They could also protect
documents which contained information on Comint collection methods or the handling of
Comint instead of actual Comint. There is an element of uncertainly as well, because parts of
Appendix B relating to Special Intelligence and Category III Comint are redacted and
procedures may have been amended after 1956. Nonetheless, if a specific intelligence report
was marked with a Special Intelligence or Category III code word it does indicate that some
of the information in that report came from Comint. Furthermore, it will have come from
14
Comint requiring the highest degree of security protection. On most occasions this would be
decrypted or deciphered communications rather than traffic analysis or plain text.
Despite the best efforts of the reviewers, high level code words and Comint euphemisms
appear on declassified American intelligence reports relating to many different countries
during the Cold War: Bolivia, China, the Congo, France, Greece-Turkey, India-Pakistan,
Indonesia, Laos, North Vietnam, South Africa, South Vietnam and the Soviet Union.72 This
article will take the examples of the Congo, Bolivia, Indonesia, South Vietnam and China to
demonstrate how code words and euphemisms can be used with other evidence to pick out
NSA and GCHQ intelligence targets and uncover Comint. For simplicity’s sake, the article
will treat the NSA as being the producer of Comint in American intelligence reports but
because of the BRUSA/UKUSA cooperation arrangements, GCHQ may actually have been
the source for some countries in Africa and Asia. For example, Comint on China in a CIA
memorandum might have originated in a GCHQ intercept from Britain’s listening post in
Hong Kong. Equally, NSA intercepts, solutions to foreign codes and decrypted Comint
would have been shared with GCHQ.
Firstly, Category III code words and Comint euphemisms on documents can identify little
known targets of the NSA, such as the Congo in the 1960s. After independence in 1960, the
Congo went through a prolonged and complex crisis, with multiple secessions, civil war,
military coups and intervention by Belgian and United Nations’ troops. Amidst the chaos and
instability, the United States was determined to deny the USSR a foothold in the Congo and it
opposed Soviet-learning Congolese leaders, such as Patrice Lumumba, the prime minister,
and Antoine Gizenga, Lumumba’s deputy, who later established a rebel regime based in the
city of Stanleyville.
15
It is clear from code word documents that the NSA supplied Comint on the Congo to
American policymakers. On 11 August 1960 the Congo featured in a ‘Synopsis of
Intelligence Material Reported to the President’ written by John Eisenhower, Assistant Staff
Secretary to President Dwight Eisenhower. 73 The short synopsis carried the classification
‘TOP SECRET DAUNT’, marking it out as containing Category III Comint, but frustratingly
the text on the Congo has been completely redacted. The following month, the CIA sent the
Director for Intelligence for the Joint Chiefs of Staff an analysis of Soviet Bloc aid to the
Congo that was also stamped with the words ‘TOP SECRET DAUNT’.74 The paper, which
is partially redacted, gave details of Bloc supply flights into the Congo and the numbers of
Bloc personnel in the country. Other evidence points to the NSA being able to read the
communications of Gizenga’s rebel government in Stanleyville. Gizenga was in contact with
the President of Ghana, Kwame Nkrumah, who had recognised the Stanleyville regime and
secretly agreed to funnel it Soviet supplied arms.75 The Comint edition of the CIA’s Current
Intelligence Weekly Review reported on 25 May 1961 that
Although there is no firm information that Gizenga plans any major offensive
action, intercepted messages from Gizenga to Nkrumah have urged that the
Ghanaian President expedite the airlifting of Soviet arms to Stanleyville.76
A veiled reference to Comint implies that Bolivia was another target of the NSA in the 1960s.
Bolivia was governed by the pro-American President Rene Barrientos and during 1966-67 he
successfully defeated a Marxist guerrilla insurgency led by Ernesto ‘Che’ Guevara. Yet in
1968, NSA Comint on Bolivia was connected to more mundane matters of taxation and
American financial aid. In July Barrientos was due to visit the United States for talks,
including a meeting with President Johnson at his ranch in Texas. Ahead of the visit
Barrientos delayed a surtax on imports into Bolivia which was an agreed condition for an
American loan. Walt Rostow, the Special Advisor for National Security Affairs, advised
Johnson that
16
From our special intelligence, we have the distinct impression the delay is related
to Barrientos’ visit to the Ranch. We suspect his advisors have told him that by
talking to you, he can probably get the budget support money without imposing
the surtax.77
These documents do not conclusively prove that the NSA could read encrypted Bolivian and
Congolese communications - the Comint on Bolivia and the Congo could have come from
intercepted plain text or voice - but it does seem likely. In the 1950s and 1960s noncommunist developing countries like Bolivia and the Congo frequently used codes and
ciphers which were vulnerable to attack by the NSA and GCHQ.78
Indonesia and South Vietnam are already known to have been targeted by the NSA during the
Cold War and there is evidence that the agency broke their codes and read their
communications. In these two cases, code word documents substantiate the existing evidence
and illustrate what kind of information the NSA was passing on to the White House.
Indonesia was a country of interest to the United States because of American hostility to the
radical, left wing Indonesian leader, Sukarno. In 1958 the CIA covertly supported rebellions
against Sukarno on the Indonesian islands of Sumatra and Celebes.79 The United States soon
had to stop aiding the rebels but code word documents suggest that in 1959 the NSA was
monitoring the Indonesian authorities’ response to the rebellions. According to two ‘Synopsis
of Intelligence material reported to the President’, President Eisenhower was informed in
March 1959 that rebel action had forced the Indonesian government to send air and ground
reinforcements from Java to North Celebes. 80 He was also told that an Indonesian army
mission trying to procure arms abroad was authorised to investigate Czech and Polish offers
to build an arms factory in Indonesia. These two very brief synopses on Indonesia were
marked ‘TOP SECRET EIDER’, implying that the information for the president had come
from Comint. This Comint was probably obtained through reading encrypted Indonesian
traffic for in September 1960, two defectors from the NSA announced at a press conference
17
in Moscow that the agency collected intelligence and decoded messages from Indonesia,
along with six other countries.81
Claims that the NSA was spying on South Vietnamese communications first surfaced during
the Vietnam War.82 In 1971, the well informed Washington Post columnist Jack Anderson
alleged that the agency was intercepting and decoding South Vietnamese messages.83 This
operation had in fact been going on for several years and in 1968 it had become entangled
with American domestic politics.84 In the closing stages of the American presidential election
campaign NSA intercepts showed that Richard Nixon’s camp was secretly encouraging the
South Vietnamese government not to commit to peace talks in Paris. 85 Lyndon Johnson
confided to a Democrat senator in November 1968 that ‘intercepted telegrams revealed that
the South Vietnamese were being told “that Nixon is going to win: therefore they ought to
wait on Nixon.”’ 86 Defense Secretary Clark Clifford, complaining about the Republican
Party’s efforts, referred to ‘the intercepts of messages from Bui Diem [the South Vietnamese
Ambassador in Washington] to Saigon’.87
Checking for Category III code words on documents uncovers direct evidence of this NSA
eavesdropping on South Vietnam. On 21 October 1968 the Director of the NSA sent the
White House a telegram which contained a report about a meeting in Paris on 19 October
between American and South Vietnamese officials. 88
The content of the report was
unremarkable: the Americans and South Vietnamese negotiators had disagreed about the
involvement of the communist National Liberation Front at the Paris peace talks. What is
interesting is that the NSA telegram was marked ‘TOP SECRET TRINE’, indicating that the
report was high level Comint. The report has been partially redacted to hide the author’s
identity but the phrasing of the text and the point of view of the author suggests that it was
written by a South Vietnamese rather than an American participant at the meeting. Taking the
Comint code word into account, it appears to be an intercepted South Vietnamese message
18
(presumably this was before these intercepts were given the additional Gamma Gout code
words).
Finally, Category III code words and Comint euphemisms can offer insights into AngloAmerican Comint on China, demonstrating the sort of intelligence the NSA and GCHQ could
produce on this primary Cold War target. Close reading of an American document suggests
that during the 1960s the NSA was able to read some Chinese military traffic. A CIA
intelligence memorandum from 1965 on Taiwan’s capability to attack the mainland included
a map of the communist order of battle in southern China. 89 The map gave the locations of
Chinese army divisions, border defence divisions and air and naval bases and provided
figures for the local and national strength of the Chinese army, navy and air force. It was
marked ‘TOP SECRET DINAR’, indicating that some of the information on the map had
come from Comint (by contrast, an accompanying map of the Taiwanese order of battle was
only classified ‘secret’ and had no Comint code word). This implies that the CIA was using
intercepted Chinese military communications, along with other forms of intelligence, to work
out the location, organisation and strength of the Chinese armed forces. Some of the Comint
might have come from plain text and speech transmissions and traffic analysis but it is
possible that the NSA could solve at least low level Chinese military codes
Comint markers and other evidence show that the NSA could use this intelligence to track the
movements of the Chinese military. For example, in June 1962 Beijing secretly sent six
infantry divisions and one artillery division into Fukien province, raising the battle strength
opposite Taiwan from 194,000 to 311,000 men.90 Although the Chinese government initially
made this move without any publicity, Washington was aware of it, partly through Comint.
From 1962 until 1966, the noted Asia scholar Allen Whiting was head of Far East division of
the State Department’s Bureau of Intelligence and Research (INR) and he was responsible for
collating and assessing information on the Chinese build up. 91 Whiting had access to
19
intelligence from the NSA and he subsequently wrote that American ‘signal intelligence
[was] monitoring [Chinese] headquarters deployment in advance of the total force.’92 Roger
Hilsman, the Director of the INR, assessed the intentions behind the deployment by
examining ‘the limited collateral evidence and some aspects of the special intelligence on
Chinese Communist activities in the East China area’. 93 Another map in the CIA’s 1965
memorandum plotted the build up of Chinese forces in Fukien in 1962 and was also classified
‘TOP SECRET DINAR’, betraying the presence of Category III Comint.
In a similar way, the NSA eavesdropped on China’s military response to the escalating war in
Vietnam. Whiting described how after the Tonkin Gulf crisis in August 1964, the US
followed Chinese deployments through the use of ‘signals intelligence, drone reconnaissance
planes and Chinese Nationalist piloted U-2s’. 94 American ‘communication intercepts
monitored the movement of [Chinese] air units from one point to another.’ 95 Code word
material supports Whiting’s claims. In February 1965 the CIA produced a special report on
China’s post Tonkin Gulf military deployments.96 The report has been partially redacted but
the phrase ‘TOP SECRET DINAR’ is still visible on one section entitled ‘Military
Preparations in Communist China’. This section stated that since August 1964, Beijing had
transferred the headquarters of its South Sea Fleet to Fort Bayard (now Zhanjiang), moved
the 7th Air Army nearer the Vietnamese border area and established Sino-Vietnamese air
warning liaison facilities. The Chinese air force had boosted its strength in southern China,
building new airfields, improving existing ones and bringing in an extra 200 fighter planes as
reinforcements. The CIA paper also reported a secret meeting between Chinese and North
Vietnamese military leaders in June 1964. Books based on Chinese sources have since
confirmed that this meeting and many of the military deployments did in fact take place.97
These are only a few examples but they illustrate how Comint code words and euphemisms
can help interpret documents and extract more information about Anglo-American Comint.
20
During the Cold War the BRUSA/UKUSA states developed a comprehensive system to
secure and manage Comint. The security categories and code words were an integral part of
the system, with the code words always meant to mark out the documents that contained
Comint. Security officers could then ensure that these papers were kept under lock and key
and only seen by staff indoctrinated into Comint. Now that the code words have been
declassified and identified, they can expose Comint in American and British (and Canadian,
Australian and New Zealand) documents. Euphemisms were also intended to protect Comint
by disguising the source of information in minutes and letters. Yet euphemisms are very
weak form of security because once the meaning of the euphemism is known, the information
immediately becomes apparent to the reader. This works to the advantage of researchers, for
government reviewers seem to let the euphemisms ‘special intelligence’ or ‘codeword
material’ pass unaltered on documents while assiduously redacting mentions of ‘Comint’ or
‘Sigint’.
The net result is that the code words and euphemisms act as Comint markers and enable
researchers to discover more about Anglo-American Comint, even when documents have
been heavily redacted before public release. These markers can flag up papers containing
Comint and thereby reveal little known targets of the NSA and GCHQ, like the Congo and
Bolivia in the 1960s. They can reveal what type of intelligence the NSA and GCHQ was able
to supply on countries such as Indonesia, South Vietnam and China during the Cold War.
Comint markers on documents also hint at cryptanalytic successes. For example, they suggest
that the NSA and GCHQ could read Congolese and Bolivian codes and cyphers and perhaps
some Chinese military codes. In short, they lift some of the veil of secrecy over AngloAmerican Cold War Comint and provide a useful research tool which can be used more
widely in the future.
21
1
Matthew Aid, The Secret Sentry: the untold history of the National Security Agency, (New
York: Bloomsbury Press 2009); Richard J. Aldrich, GCHQ: The Uncensored Story of
Britain’s Most Secret Intelligence Agency, (London: Harper Press 2010).
2
Richard J. Aldrich, The Hidden Hand: Britain, America and Cold War Secret Intelligence
(London: John Murray 2001), pp. 541.
3
British National Archive (TNA), HW 80/4, British-US Communication Intelligence
Agreement, 5 March 1946; HW 80/6, Technical Conference for the implementation of the
US-British Communications Intelligence Agreement, 11th-27th March, 1946, Introduction,
not dated.
4
TNA, HW 80/6, Technical Conference for the implementation of the US-British
Communications Intelligence Agreement, 11th-27th March, 1946, Appendix B, not dated;
HW 80/7, Technical Conference for the implementation of the US-British Comint
Agreement, 15th July – 26th July, 1948, Appendix B, not dated.
5
TNA, HW 80/9, Introduction to the Appendices to the US-British Comint Agreement,
Appendix B, Annexure B1, 1 June 1951.
6
TNA, HW 80/6, Technical Conference for the implementation of the US-British
Communications Intelligence Agreement, 11th-27th March, 1946, Appendix B, not dated
7
Ibid; National Security Agency (NSA), Joint Meeting of State-Army-Navy Communication
Intelligence Board and State-Army-Navy Communication Intelligence Coordinating
Committee, 15 February 1946.
http://www.nsa.gov/public_info/_files/communication_intel_board/army_navy_19460215_m
tg.pdf, (Accessed 11 January 2011).
22
8
TNA, HW 80/6, Technical Conference for the implementation of the US-British
Communications Intelligence Agreement, 11th-27 March, 1946, Appendix B, not dated.
9
TNA, HW 80/7, Technical Conference for the implementation of the US-British Comint
Agreement, 15th July – 26th July, 1948, Appendix B, not dated.
10
TNA, HW 80/6, Technical Conference for the implementation of the US-British
Communications Intelligence Agreement, 11th-27 March, 1946, Appendix B, not dated.
11
TNA, HW 80/10, BRUSA Planning Conference 1953, Final Report, Appendix B,
BPC53/B/Final, 19 March 1953.
12
The wording of Appendix B suggests the categories may already have been in use when the
Appendix was written in March 1953.
13
TNA, HW 80/10, BRUSA Planning Conference 1953, Final Report, Notes to Appendix B,
BPC53/B/Final, 19 March 1953.
14
TNA, HW 80/11 UK-US Communications Intelligence Agreement, Appendix B, Not
dated.
15
Jeffrey Richelson, The US Intelligence Community, (Boulder: Westview Press 2008) pp.
512-513; National Security Agency (NSA), Cryptologic Almanac, 50th Anniversary Series,
‘Quiz’, July/August 2002.
http://www.nsa.gov/public_info/_files/crypto_almanac_50th/Quiz.pdf, (Accessed 3 February
2011).
16
TNA, HW 80/10, BRUSA Planning Conference 1953, Final Report, Notes to Appendix B,
BPC53/B/Final, 19 March 1953.
17
Richelson, op. cit., pp. 511.
18
Foreign Relations of the United States (FRUS), 1964-68, Volume XXXIII, Organization
and Management of Foreign Policy: United Nations, Document 270, 16th Report of the
Intelligence Organization of the Department of State, October 1967, pp, 592; David Wise,
23
The Politics of Lying: Government Deception, Secrecy and Power, (New York: Random
House 1973) pp. 55-56, 61.
19
Richard Aldrich, The Hidden Hand: Britain, America and Cold War Secret Intelligence,
(London: John Murray 2001) pp. 541.
20
Interview with Thomas L. Hughes. The Library of Congress, The Foreign Affairs Oral
History Collection of the Association for Diplomatic Studies and Training.
http://memory.loc.gov/cgi-bin/query/D?mfdip:1:./temp/~ammem_PpXI:: (Accessed 29
December 2011).
21
The National Security Archive, Electronic Briefing Book No. 24, ‘The National Security
Agency Declassified’, ed. by Jeffery Richelson, Document 23, SSO (Special Security Office),
DIA, ‘Implementation Guidance for Elimination of Codewords’, 22 October 1999,
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa23.pdf, (Accessed 12 February
2011).
22
National Reconnaissance Office (NRO) Review and Redaction Guide for Automatic
Declassification of 25-Year-Old Information (2008), pp. 8,
http://www.nro.gov/foia/docs/foia-rrg.pdf, (Accessed 14 January 2011).
23
Wise, op. cit., pp. 57.
24
NSA, Thomas Johnson, American Cryptology during the Cold War, 1945-1989, Book II
Centralization Wins, 1960-1972, (Centre for Cryptologic History, NSA 1995), pp. 473,
http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_ii.pdf (Accessed 19
December 2010); NSA, In Camera Affidavit of Eugene F. Yeates, Citizens Against
Unidentified Flying Saucer Secrecy v. National Security Agency, Civil Action 80-1562, 9
October 1980, http://www.nsa.gov/public_info/_files/ufo/in_camera_affadavit_yeates.pdf,
(Accessed 21 December 2010).
25
NSA, Cryptologic Almanac, 50th Anniversary Series, ‘Quiz’, July/August 2002.
24
26
NSA, Venona Documents, I.D. Special Analysis Report 1., ‘Covernames in diplomatic
traffic’, by ASA I.D., 30 August 1947,
http://www.nsa.gov/public_info/_files/venona/1947/30aug_special_analysis_report1.pdf,
(Accessed 4 January 2011); Intercept 3/NBF/T1201, ‘1. Query about a sample sent by Arthur
2. Taylor’s information about guns’, (8 June 1943), 3 January 1961,
http://www.nsa.gov/public_info/_files/venona/1943/8jun_tech_queries.pdf (Accessed 4
January 2011); Intercept 3/PPDT/101, ‘1. Barch’s Meeting 2. Fuch’s and probable reference
to atomic energy project’, (10 August 1941), 11 October 1968,
http://www.nsa.gov/public_info/_files/venona/1941/10aug_barch_mtg.pdf, (Accessed 4
January 2011); Intercept 3/PPDT/T106, ‘London Addressee Artur’, (24 July 1941), 29 May
1969, http://www.nsa.gov/public_info/_files/venona/1941/24jul_artur.pdf, (Accessed 5
January 2011).
27
Central Intelligence Agency (CIA) Venona, Part 1: The American Response to Soviet
Espionage, Minute Lamphere to Gardner, ‘FLORA DON WOYSCHIN with alias’, 9 May
1949, https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/booksand-monographs/venona-soviet-espionage-and-the-american-response-1939-1957/25.gif
(Accessed 21 December 2010); Minute Lamphere to Gardner, ‘EMIL JULIUS KLAUS
FUCHS, aka: Karl Fuchs’, 26 September 1949, https://www.cia.gov/library/center-for-thestudy-of-intelligence/csi-publications/books-and-monographs/venona-soviet-espionage-andthe-american-response-1939-1957/28.gif (Accessed 21 December 2010); NSA Venona
Documents, Intercept S/NBP/T87, ‘References to a promise of Soviet citizenship to “Lily”
and “Aleksandrov” and to Beck’s embarrassment’, (12 November 1944), 11 June 1951,
http://www.nsa.gov/public_info/_files/venona/1944/12nov_kgb_officers.pdf (Accessed 5
January 2011); Intercept S/NBF/T94, ‘The failure of Albert to reply to the “office”’, (25
August 1944), 4 July 1951,
25
http://www.nsa.gov/public_info/_files/venona/1944/25aug_failure_albert_reply.pdf
(Accessed 5 January 2011); Intercept S/NBF/T380, ‘Recommendation by “Greek” of certain
Germans’, (29 January 1944), 22 September 1953,
http://www.nsa.gov/public_info/_files/venona/1944/29jan_greek.pdf (Accessed 26 December
2010); Amendment to intercept S/NBF/T328, ‘Gustav’, (31 January 1944), 19 October 1953,
http://www.nsa.gov/public_info/_files/venona/1944/30jan_gustav_p2.pdf (Accessed 26
December 2010); Intercept 6/NBF/T224 Reissue, ‘References to “The Polecats”’, (20 May
1944), 11 January 1955,
http://www.nsa.gov/public_info/_files/venona/1944/20may_trotskyites.pdf (Accessed 26
December 2010); Intercept 3/NBF/T1147 ‘Alex’s absence in Portland’, (23 June 1943), 9
July 1959, http://www.nsa.gov/public_info/_files/venona/1943/23jun_code_clerk.pdf
(Accessed 26 December 2010)
28
TNA, HW 80/7, Technical Conference for the implementation of the US-British Comint
Agreement, 15th July – 26th July, 1948, Appendix B, not dated; HW 80/9, ‘Introduction to
the Appendices to the US-Comint Agreement, 1 June 1951; ‘Amendment No. 1 to
Appendices to US-British Communications Intelligence Agreement (Third Edition), 27 July
1951; HW 80/10, ‘BRUSA Planning Conference 1953, Final Report’, 25 March 1953; HW
80/9, Appendix G, Exchange of Collateral Material and Comint material, 1 October 1953;
HW 80/11, UKUSA Agreement, 10 October 1956.
29
TNA, HW 75/49, Intercept S/AAL/T24 ‘Albanian Security Message’, 19 August 1947;
Intercept S/AAL/T23 ‘Albanian Security Reports concerning fugitives and persons
attempting to escape into Greece’, 2 September 1947; HW 75/23, Intercept, S/ACK/T65
‘Mention of decree concerning official relations of Czech offices with foreign consular
offices’, 6 July 1949; HW 75/24, Intercept, S/ACK/T104 ‘Granting of Leave to SNB Units’,
1 August 1950.
26
30
Guy R. Vanderpool, ‘COMINT and the PRC Intervention in the Korean War’, Cryptologic
Quarterly, 15/2 (1996) endnote 13, pp. 22.
31
NSA Venona Documents, Amendment to intercept S/NBF/T328, ‘Gustav’, (31 January
1944), 19 October 1953,
http://www.nsa.gov/public_info/_files/venona/1944/30jan_gustav_p2.pdf (Accessed 26
December 2010); Intercept S/NBF/T662, ‘Reference to “the distant neighbour’s line”’, (19
February 1946), 10 December 1954,
http://www.nsa.gov/public_info/_files/venona/1946/19feb_distant_neighbor.pdf (Accessed
26 December 2010)
32
HW 75/49, Intercept, S/AAL/T24 ‘Albanian Security Reports concerning fugitives and
persons attempting to escape into Greece’, 2 September 1947; HW 75/23 Intercept,
S/ACK/T64 ‘State Security Organisation’, 29 June 1949.
33
NSA, Venona Documents, Intercept 6/NBF/T224 Reissue, ‘References to “The Polecats”’,
(20 May 1944), 11 January 1955,
http://www.nsa.gov/public_info/_files/venona/1944/20may_trotskyites.pdf (Accessed 26
December 2010); Intercept 3/NBF/T1143, ‘1. A warning about conduct 2. Proposed transfer
of Zyryanov’, (21 February 1943), 16 June 1959,
http://www.nsa.gov/public_info/_files/venona/1943/21feb_reprimand.pdf (Accessed 26
December 2010). However, while the overwhelming majority of Eider documents from
Venona and other sources fit within this date range, there are three Venona intercepts from
January 1960 marked with Eider. This is the period when Daunt was in use as a code word
and the only occasion when two code words overlap. It is not known why this occurred.
Perhaps there was simply a shortage of paper pre-printed with the Daunt code word and NSA
officials used Eider paper instead.
27
34
HW 75/23, Intercept, S/ACK/T65 ‘Mention of decree concerning official relations of
Czech offices with foreign consular offices’, 6 July 1949; HW 75/24, Intercept, S/ACK/T103
‘Infiltration of agents into Czechoslovakia’, 17 July 1950.
35
NSA, Venona Documents, Intercept 3/NBF/T1147 ‘Alex’s absence in Portland’, (23 June
1943), 9 July 1959,
http://www.nsa.gov/public_info/_files/venona/1943/23jun_code_clerk.pdf (Accessed 26
December 2010); Intercept 3/NBF/T1334, ‘Reference to “Oleg”’, (13 May 1945), 13
December 1960, http://www.nsa.gov/public_info/_files/venona/1945/13may_oleg.pdf
(Accessed 27 December 2010).
36
HW 75/24, Intercept, S/ACK/T104 ‘Granting of Leave to SNB Units’, 1 August 1950; CIA
Freedom of Information Act (FOIA), Special Collections: Korean War, Current Intelligence
Bulletin, 28 June 1951, http://www.foia.cia.gov/KoreanWar/DailyReports/1951/1951-0628a.pdf. (Accessed 5 January 2011).
37
NSA, Venona Documents, Intercept 3/NBF/T1201 Re-issue, ‘1. Query about a sample sent
by Arthur 2. Taylor’s information about guns’, (8 June 1943), 3 January 1961,
http://www.nsa.gov/public_info/_files/venona/1943/8jun_tech_queries.pdf (Accessed 27
December 2010); Intercept 3/NBF/T1720, ‘The Despatch and Legalization of the Australian
Woman’, (31 December 1942), 24 August 1965,
http://www.nsa.gov/public_info/_files/venona/1942/31dec_naval_gru.pdf (Accessed 27
December 2010).
38
NSA, Venona Documents, Intercept S/NBF/T94, ‘The failure of Albert to reply to the
“office”’, (25 August 1944), 4 July 1951,
http://www.nsa.gov/public_info/_files/venona/1944/25aug_failure_albert_reply.pdf
(Accessed 27 December 2010).
28
CIA FOIA, Special Collections: Korean War, Current Intelligence Bulletin, 29 June 1952,
http://www.foia.cia.gov/KoreanWar/DailyReports/1952/1952-06-29.pdf (Accessed 5 January
2011).
39
NSA, Cryptologic Almanac, 50th Anniversary Series, ‘Quiz’, July/August 2002.
40
CIA FOIA, Special Collections: Korean War, Current Intelligence Digest, 1 July 1952,
http://www.foia.cia.gov/KoreanWar/DailyReports/1952/1952-07-01a.pdf (Accessed 5
January 2011); NSA, Venona Documents, Intercept S/NBF/T380, ‘Recommendation by
“Greek” of certain Germans’, (29 January 1944), 22 September 1953,
http://www.nsa.gov/public_info/_files/venona/1944/29jan_greek.pdf (Accessed 26 December
2010).
41
NSA, Cryptologic Almanac, 50th Anniversary Series, ‘Quiz’, July/August 2002; Richelson,
op. cit., pp. 513.
42
TNA, HW 80/10, BRUSA Planning Conference 1953, Final Report, Appendix B,
BPC53/B/Final, 19 March 1953.
43
TNA, HW 80/11 UK-US Communications Intelligence Agreement (UKUSA Agreement),
Appendix B, Not dated.
44
NSA, Cryptologic Almanac, 50th Anniversary Series, ‘Quiz’, July/August 2002; James
Bamford, The Puzzle Palace: A Report on America’s Most Secret Agency, (Harmondsworth:
Penguin 1983), pp. 162.
45
Wise, op. cit., pp. 57; Bamford, op. cit., pp. 161-162.
46
Ibid; NSA, Thomas Johnson, American Cryptology during the Cold War, 1945-1989, Book
II Centralization Wins, 1960-1972, (Centre for Cryptologic History, NSA 1995), pp. 473-4.
47
Ibid.
48
Aid, op. cit. , pp. 141-142.
29
49
NSA, Thomas Johnson, American Cryptology during the Cold War, 1945-1989, Book II
Centralization Wins, 1960-1972, (Centre for Cryptologic History, NSA 1995), pp. 448;
National Security Archive, Electronic Briefing Book No. 278, The Secret Sentry
Declassified, Document 24, Les Actes D’Agression Declares de L’Imperialisme U.S. Contre
Le Peuple Coreen, (Pyongyang, Editions en Langues Etrangeres 1968) (extract)
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB278/24.PDF, (Accessed 4 March 2011).
50
National Security Archive, Electronic Briefing Book No. 278, The Secret Sentry
Declassified, Document 3, Robert Newton, The Capture of the USS Pueblo and its effect on
SIGINT Operations, US Cryptologic History, Special Series, Crisis Collection, Vol. 7, (Ft.
Meade, Center for Cryptologic History 1992), pp. 124,
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB278/03.PDF, (Accessed 4 March 2011).
51
NSA, Cryptologic Almanac, 50th Anniversary Series, ‘Quiz’, July/August 2002;
52
Ibid; Kimbo: NSA, Cuban Missile Crisis, ‘Reflection of Soviet Bloc Pilots/Technicians in
Cuban Air Force Training’, 24 August 1962
http://www.nsa.gov/public_info/_files/cuban_missile_crisis/24_august_reflection.pdf,
(Accessed 5 April 2011); Sabre: NSA, Cuban Missile Crisis, ‘Cuban Air Force VHF
communications procedure’, 17 May 1962,
http://www.nsa.gov/public_info/_files/cuban_missile_crisis/17_may_cuban_air.pdf,
(Accessed 5 April 2011).
53
Bamford, op. cit., pp. 398; TNA, HW 75/30, Note ZIP/RUP/C9 ‘Note on the RUP/T
series’, 17 January 1947.
54
Richelson, op. cit., pp. 512-514.
55
In an interview with Oliver Kirby, his period in the NSA’s Office of Collection from
approximately 1954 to 1956, was described as ‘pre-GAMMA time’: NSA, Declassification
and Transparency, Oral History Interviews, Oliver R. Kirby NSA-OH-20-93, pp. 53, 55-56,
30
http://www.nsa.gov/public_info/_files/oral_history_interviews/nsa_oh_20_92_kirby.pdf,
(Accessed 4 April 2011). Gamma appears on a State Department document from 1967:
Declassified Document Reference System (DDRS), Intelligence Note, ‘The Soviet
Contribution to the Start of the Current Mid-East Crisis’, Denney to Secretary of State, 1 June
1967.
56
Aid, op. cit., pp. 144-145, 152-153; Bamford, op. cit., pp. 160.
57
Digital National Security Archive, Department of the Air Force, Administration of the
Gamma Control Program, FTD Regulation 205-9, 3 January 1989.
58
Bamford, op. cit., pp. 160-161.
59
Aid, op. cit., pp. 144-145, 152-153.
60
DDRS, Intelligence Note, ‘The Soviet Contribution to the Start of the Current Mid-East
Crisis’, Denney to Secretary of State, 1 June 1967.
61
CIA FOIA, Current Intelligence Weekly Review, SC No. 00578/63, 8 February 1963;
Intelligence Memorandum SC No 06810/66, ‘Buildup of Vietnamese Communist forces
continues after resumption of air attacks’, 21 February 1966; National Security Archive,
Electronic Briefing Book No. 187, U.S. Intelligence and the Indian Bomb, Document 16,
NSA Comint Report, ‘Capital Projects Planned in India’, 31 August 1972,
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB187/IN16.pdf, (Accessed 2 March 2011).
62
CIA FOIA, Central Intelligence Bulletin, 6 September 1972.
63
Ibid. The top secret version was only to be seen by US personnel indoctrinated and
authorised to receive Comint; FRUS, 1969-1976, Volume II, Organization and Management
of US Foreign Policy, 1969-1972, Document 217, Memorandum Latimer to Kissinger, 1
December 1970, pp. 468.
64
Federation of American Scientists, CIA, Centre for the Study of Intelligence, Intelligence
Monograph, ‘Critique of the Codeword Compartment in the CIA’, March 1977,
31
http://www.fas.org/sgp/othergov/codeword.html, (Accessed 14 February 2011); National
Security Archive. Electronic Briefing Book No. 225, ‘Secrecy and U.S. Satellite
Reconnaissance, 1958-1976’, Document 23, Chief Special Intelligence Staff, Special Centre
Notice 6-64, ‘Classification of Talent and Keyhole Information’, 16 January 1964,
http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB225/doc23.pdf, (Accessed February 27
2011).
65
FRUS, 1969-1976, Volume II, Organization and Management of US Foreign Policy, 1969-
1972, Document 217, Memorandum Latimer to Kissinger, 1 December 1970, pp. 468.
66
CIA FOIA, Current Intelligence Weekly Review, SC No. 03826/56, 30 August 1956.
67
CIA FOIA, Current Intelligence Weekly Review, SC No. 01999/58, 3 April 1958; Current
Intelligence Weekly Review, SC No. 00578/63, 8 February 1963.
68
TNA, CAB 176/59, Minute JIC/2691/56 Atkinson to JIC, 2 November 1956.
69
TNA, AIR 19/852, Minute W.M.L MacDonald to ACAS(P), 5 November 1956.
70
NRO, Review and Redaction Guide for Automatic Declassification of 25-Year-Old
Information (2008), pp. 149.
71
CIA FOIA, CIA Report, CIA/SC/RR 122, ‘Soviet Defense Expenditures’, 27 October
1955.
72
CIA FOIA, Memorandum SC No. 00613/63B, ‘France’s Position in Tropical Africa’, 11
October 1963; DDRS, ‘Synopsis of Intelligence material reported to the President’, 16 April
1959; CIA FOIA, Intelligence Memorandum, ‘India-Pakistan: Comparative Capabilities in a
New Military Confrontation’, 13 September 1971; DDRS, ‘Synopsis of Intelligence Material
Reported to the President’, 11 August 1960; CIA FOIA, Intelligence Memorandum SC No.
09646/66, ‘The Effectiveness of the Rolling Thunder Program in North Vietnam 1 January –
30 September 1966’, November 1966; DDRS, CIA Intelligence Memorandum SC No.
03818/66, ‘South Africa on the Crest of the Wave’, 30 August 1966; CIA FOIA, Special
32
Intelligence Estimate, SIE-5, ‘The Scale and Nature of the Soviet Air Defense Effort 1952-4’,
3 December 1952.
73
DDRS, ‘Synopsis of Intelligence Material Reported to the President’ by John Eisenhower,
11 August 1960.
74
Cold War International History Project, CWIHP Document Reader, ‘The Congo Crisis,
1960-1961’, edited by Lise Namikas and Sergey Mazov, Minute Amory to Director for
Intelligence, The Joint Staff, JCS, 9 September 1960,
http://www.wilsoncenter.org/topics/docs/Congo%201960-611.pdf, (Accessed 2 March 2011)
75
Sergei Mazov, ‘Soviet Aid to the Gizenga Government in the Former Belgian Congo
(1960-61) as Reflected in Russian Archives’, Cold War History, 7/3 (2007), pp. 431.
76
DDRS, CIA Current Intelligence Weekly Review, SC No. 01165/61, 25 May 1961.
77
FRUS, 1964-1968, Volume XXXI, South and Central America; Mexico, Document 176,
Information Memorandum, Rostow to Johnson, 26 June 1968, pp. 392.
78
Bamford, op. cit., pp. 495, 497, 499.
79
Audrey R. Kahin and George McT. Kahin, Subversion as Foreign Policy: The Secret
Eisenhower and Dulles Debacle in Indonesia (New York: The New Press 1995).
80
DDRS, ‘Synopsis of Intelligence material reported to the President’ by John Eisenhower, 4
March 1959; ‘Synopsis of Intelligence material reported to the President’ by John
Eisenhower, 18 March 1959.
81
Bamford, op. cit., pp. 189-190.
82
Aid, op. cit., pp. 145-146.
83
Jack Anderson, ‘U.S. Is Forced to Spy on Saigon’, Washington Post,. April 30, 1971, pp.
19, D19
84
Aid, op. cit., pp. 145-147
33
85
Thomas Powers, The Man Who Kept The Secrets: Richard Helms and the CIA, (New York:
Alfred A. Knopf 1979) pp. 198.
86
FRUS, 1964-1968, Volume VII, Vietnam, September 1968 – January 1969, Document 186,
Editorial Note, pp. 536-537.
87
Ibid, Document 195, Notes of Meeting, 5 November 1968, pp. 566.
88
DDRS, Telegram KAB518, DIRNSA to White House, 21 October 1968.
89
CIA FOIA, Minute SC No. 10078/65/a, Cline to Bundy, 18 August 1965; Memorandum
SC No. 10078/65, ‘Probable Effects in China and Taiwan of a GRC Attack on the Mainland’,
18 August 1965.
90
Ibid; John F. Kennedy Presidential Library and Museum, Digital Archives, China:
Security, 1962-63, ‘The President’s Intelligence Checklist’, 19 June 1962.
91
Allen S. Whiting, The Chinese Calculus of Deterrence: India and Indochina, (Ann Arbor:
University of Michigan 2001), pp. xv, 261 endnote 67.
92
Ibid; Allen S. Whiting, ‘China’s Use of Force, 1950-96, and Taiwan’, International
Security, 26/2 (2001), pp. 111, footnote 31.
93
DDRS, Memorandum, Hilsman to Harriman, ‘Evidence of Peiping’s Concern over
Possible GRC-US Intentions’, 22 June 1962.
94
Allen S. Whiting, ‘China’s Use of Force, 1950-96, and Taiwan’, International Security,
26/2 (2001), pp. 114
95
Allen S. Whiting, The Chinese Calculus of Deterrence: India and Indochina, (Ann Arbor:
University of Michigan 2001), pp. 177.
96
The CIA has actually declassified two copies of the report and redacted different sections
on each copy. By comparing the two reports it possible to see the full text of the section
‘Military Preparations in Communist China’ and the code word DINAR. See CIA FOIA,
34
Special Report SC No. 00657/65C, ‘Chinese communists brace for possible spread of
Indochina War’, Copies numbered 014 and 407, 12 February 1965.
97
Chen Jian, Mao’s China and the Cold War, (Chapel Hill: University of North Carolina
Press 2001), pp. 208-209, 213-214; Jung Chang and Jon Halliday, Mao: the Unknown Story,
(London: Jonathan Cape 2005), pp 502.
35
Download