The Secret Sentry

Read The Secret Sentry Online

Authors: Matthew M. Aid

BOOK: The Secret Sentry
13.36Mb size Format: txt, pdf, ePub

The Secret Sentry

THE SECRET SENTRY

The Untold History of the

National Security Agency

MATTHEW M. AID

Copyright © 2009 by Matthew M. Aid

All rights reserved. No part of this book may be used or reproduced in any manner whatsoever without written permission from
the publisher except in the case of brief quotations embodied in critical articles or reviews. For information address Bloomsbury
Press, 175 Fifth Avenue, New York, NY 10010.

Published by Bloomsbury Press, New York

All papers used by Bloomsbury Press are natural, recyclable products made from wood grown in well-managed forests. The manufacturing
processes conform to the environmental regulations of the country of origin.

LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA

Aid, Matthew M., 1958–

The secret sentry : the untold history of the

National Security Agency / Matthew M. Aid.

p. cm.

Includes bibliographical references and index.

eISBN: 978-1-60819-179-6

1. United States. National Security Agency— History. 2. Intelligence service— United States. 3. Electronic surveillance—United
States. 4. United States— History—1945– I. Title. II. Title: Secret sentry, the untold history of the NSA. III. Title: Untold
history of the National Security Agency.

UB256.U6A53 2009

327. 1273—dc22

2008037442

First U.S. Edition 2009

1 3 5 7 9 10 8 6 4 2

Typeset by Westchester Book Group

Printed in the United States of America by Quebecor World Fairfield

To Harry, Rita, and Jonathan Aid

My Family, My Best Friends, and My Staunchest Supporters

Gratis eternum

Know your enemy and know yourself, find
naught in fear for 100 battles.

Know yourself but not your enemy, find level of
loss and victory.

Know thy enemy but not yourself, wallow in
defeat every time.

—SUN TZU

There are no secrets except the secrets that keep
themselves.

—GEORG BERNARD SHAW,

BACK TO METHUSELAH

Contents

Prologue

The Origins of the American Cryptologic

Effort Against Russia

1. Roller-Coaster Ride:

The Travails of American Communications

Intelligence: 1945–1950

2. The Storm Breaks:

SIGINT and the Korean War: 1950–1951

3. Fight for Survival:

The Creation of the National Security

Agency

4. The Inventory of Ignorance:

SIGINT During the Eisenhower

Administration: 1953–1961

5. The Crisis Years:

SIGINT and the Kennedy Administration:

1961–1963

6. Errors of Fact and Judgment:

SIGINT and the Gulf of Tonkin Incidents

7. The Wilderness of Pain:

NSA and the Vietnam War: 1964–1969

8. Riding the Whirlwind:

NSA During the Johnson Administration:

1963–1969

9. Tragedy and Triumph:

NSA During the Nixon, Ford, and Carter

Administrations

10. Dancing on the Edge of a Volcano:

NSA During the Reagan and Bush

Administrations

11. Troubles in Paradise:

From Desert Storm to the War on Terrorism

12. Snatching Defeat from the Jaws of Victory:

9/11 and the Invasion of Afghanistan

13. A Mountain out of a Molehill:

NSA and the Iraqi Weapons of Mass

Destruction Scandal

14. The Dark Victory:

NSA and the Invasion of Iraq:

March–April 2003

15. The Good, the Bad, and the Ugly:

SIGINT and Combating the Insurgencies

in Iraq and Afghanistan

16. Crisis in the Ranks:

The Current Status of the National Security

Agency

Acknowledgments

Notes Glossary

Notes

PROLOGUE

The Origins of the American Cryptologic Effort Against Russia

Another man’s soul is darkness. Does anybody
ever really know anybody else?

—RUSSIAN PROVERB

The consensus of historians (and the overwhelming burden of evidence) dates the initial stages of the Cold War to well before
the end of World War II. The United States would emerge from the war as a superpower with arguably the world’s strongest armed
forces, sole possession of the atomic bomb, a vastly expanded industrial base, and an infrastructure untouched by the ravages
of war. But on the negative side, the country had at best a rocky relationship with one of its war time allies, the Soviet
Union. By the time Nazi Germany and Japan had surrendered, Russia was on a collision course with both the United States and
Britain. It was not long before the Soviet Union was regarded as “the main enemy” by the Western nations. Since it remained
a rigidly closed society under Joseph Stalin’s regime, the lack of transparency was a major factor driving the Cold War. Because
the United States had only a very limited idea of what was going on in the Soviet Union, its satellite countries in Eastern
Eu rope, and communist China, the emerging confrontation became all the more dangerous. But one of the most secret resources
that had greatly contributed to the victory of the Allied Powers—the United States and Britain’s ability to intercept and
read the communications of our former enemies Germany, Japan, and Italy, both in the clear and encoded—would be quickly redirected
to the task of gathering communications intelligence about the new Sino-Soviet threat.

It is difficult to imagine, many decades later, just how mortal that threat was perceived to be, particularly after the Soviet
Union detonated its first atomic device in the summer of 1949. The prospect of a “nuclear Pearl Harbor” meant that the United
States would rely heavily on an increasingly large and expensive communications intelligence effort.

Carter Clarke Declares War on Russia

In a certain sense, Brigadier General Carter Clarke was the founding father of the National Security Agency (NSA). A blunt,
often profane, hard-drinking, and demanding individual, Clarke lacked the polish of his fellow officers who had gone to West
Point. He began his career as an enlisted man and worked his way up through the ranks. Despite a lack of previous intelligence
experience and a file drawer full of bad fitness reports (Clarke was a real maverick), he was the man the U.S. Army selected
to run the analytic side of SIGINT Army G-2, the Special Branch. A college dropout (he joined the army and served under General
John Pershing chasing Pancho Villa in Mexico), he was a highly intelligent man and an autodidact.

Clarke was described by many who worked with him as being a tough, impatient, no-nonsense workaholic who abhorred conformity
and was intolerant of bureaucracy. When things did not get done to his satisfaction, Clarke’s volatile temperament usually
took over. Former colleagues recall that his temper tantrums were legendary. A former army officer said, “I knew that Clarke
had an explosive temper. Although quite a decent person, he laced his language with frequent bursts of profanity.” His detractors,
who were many, described him as loud, uncouth, brash, and argumentative, with a tendency toward overstatement when trying
to make a point or win an argument. And yet, despite his brashness, gruff talk, and stern demeanor, Clarke earned the respect
(and fear) of virtually all the U.S. Army intelligence officials he dealt with. A former senior NSA official, Frank B. Rowlett,
described Clarke as “a very unconventional man and a man of considerable moral courage [who] would spit in your face and laugh
at you.”
1

Clarke’s Special Branch was a component of Army G-2 in the Pentagon created after Pearl Harbor, the unit to which all intercepts
were sent for analysis and reporting to consumers. It only worked on SIGINT materials, while the rest of Army G-2 worked on
more mundane materials, like military attaché reports. The army’s SIGINT organization, the Signal Security Agency (SSA), commanded
by Brigadier General W. Preston Corderman, was a separate field agency that was (until 1944) part of the Army Signal Corps.
As noted above, all its intercept material went to Clarke’s G-2 Special Branch.

When Clarke took command of the Special Branch of Army G-2 (intelligence) in May 1942, the United States was able to read
the top Japanese diplomatic and military encoded communications (which enabled U.S. forces to win the Battle of Midway in
1942, the turning point of the war in the Pacific) and the British were reading the German codes generated by the Enigma machine.
Despite his rough edges, Clarke worked well with his British counterparts in the Bletchley Park code-breaking center. Deep
down, however, he trusted no man and no nation. According to Rowlett, “Clarke was a good man to have in the intelligence business
in our line of command [the communications intelligence, or COMINT, field] because he didn’t trust any nation. He just said,
‘They’re your friends today and they’re your enemies tomorrow, and when they’re on your side find out as much as you can about
them because you can’t when they become your enemy.’ ”
2

The United States was not only reading the codes of the three Axis Powers; it was reading the encrypted diplomatic and military
traffic of more than forty other countries—including our allies and neutral states. Well before the end of the war, Clarke,
like many in the American military and government, decided that the Soviet Union would become our next “main enemy” after
the war, and he issued an order in January 1943 to begin cracking Russian codes. So secret and delicate was this operation
that very few people were allowed to even know it existed, and since virtually nothing was put in writing, the paper trail
today is virtually non existent. The U.S. Navy had its own code-breaking operation headquartered in Washington. Though the
two cryptanalytic organizations shared code-breaking responsibilities, cooperation was the exception rather than the rule.
3

The army code-breaking operation was headquartered in a former girls’ preparatory school named Arlington Hall, located in
Arlington, Virginia. The main building on its large and beautifully landscaped campus housed the administrative offices. Tacked
onto it, once the army took over and fenced it off from the world, were two wings that housed large open bays crammed with
code breakers, linguists, and analysts, crowded together and forced to endure the scorching and humid Washington summers before
the widespread use of air-conditioning. Hundreds of fans provided some relief— but unfortunately they blew working papers
all over the place. The sole air-conditioning was reserved for the noisy and noxious IBM tabulating machines.
4

Clarke had some supervisory authority over Arlington Hall Station (its official designation), but he largely worked out of
a high-security area in the Pentagon. The intercepts of enemy communications that were picked up by a far-flung network of
listening posts, some of them in remote areas like Ethiopia and Alaska, went to Arlington Hall, where they were decrypted
and translated. Then they were sent on to Clarke’s analytic organization. The intelligence product derived from intercepts
was so sensitive that its distribution was extremely limited, reaching only a few hundred people with the highest security
clearances. The paradox here is that in order to protect the sources and methods used to gather this invaluable signals intelligence
(SIGINT) and not tip off the enemy that the United States was reading virtually all of its communications, the intelligence
product often had to be “sanitized” (i.e., put in a form that would not disclose the source of the intelligence reporting)
and sometimes did not reach those who needed it most. (Both Admiral Husband Kimmel and General Walter Short, who took the
burden of blame for Pearl Harbor, were arguably deprived of information that could have made the events of December 7, 1941,
a very different story.) Throughout the war, commanders in the field below a certain level of rank and responsibility were
not furnished with this critical information, or got it in a very watered-down form, which tended to make the material not
as useful as it should have been, particularly because these officers could not know just how definitive and reliable it was.
The same complaints that were voiced back then are still heard today.

Because the British had developed a formidable code-breaking operation that was in many ways superior to the Americans’, once
the United States entered the war there was an almost complete sharing of information and coordination of efforts. But the
British were not apprised of the U.S. attack on Russian codes. In any event, they were undertaking their own effort, which
they also did not disclose to the United States.
5

Well before Germany, Japan, and Italy surrendered, the Cold War was under way, setting our quondam ally, the Soviet Union,
on a collision course with the United States, Great Britain, and, in time, the other nations that would become the North Atlantic
Treaty Organization (NATO). Accordingly, before Germany surrendered, the United States and the United Kingdom decided that
everybody’s cards had to be put on the table. Prime Minister Winston Churchill and his commanders (particularly Brigadier
General Sir Stewart Menzies, the head of the British spy agency MI-6) firmly believed that a concerted effort had to be made
to penetrate what Churchill described as a “riddle wrapped up inside an enigma”—the essentially closed society of the Soviet
Union. This belief was shared by General George Marshall, Admiral Ernest King, and just about everybody at senior levels of
the U.S. government and military— with one exception, President Franklin Delano Roosevelt. FDR wistfully believed that the
United States and Russia could “peacefully coexist” after the Allied victory. So it was decided that he not be informed that
we were spying on our Russianally. The Russians, of course, were doing the same thing to the United States and Britain and,
unfortunately, as we know now, doing a much better job. The full extent of Russian espionage was made clear when we began
to read their enciphered messages. One key early break-through came in October 1943, when a thirty-seven-year-old lieutenant
named Richard Hallock, who before the war had been an archaeologist at the University of Chicago, made the first break into
the Russian ciphers. Incredibly, the Soviets had reused the pages of their one-time pad cipher keys on a number of occasions
in different kinds of message traffic.
6

(A “one-time pad” used to encipher messages is a bound set of sheets, each one printed with randomly generated numbers—representing
both words and numbers— organized as additive “keys” and a certain number of lines of numbers in separate “groups.” No one
sheet in a pad and no pad or set of sheets duplicates any other, except for the matching pad’s sheets used for deciphering
the encoded message. The sheets are to be used once only and then destroyed. If used properly, the pad provides a virtually
unbreakable code.)

The German invasion of Russia in June 1941 and the chaos that followed had created a severe shortage of cipher materials at
Russian overseas diplomatic establishments, leading the NKVD’s* cryptographic department in Moscow, which produced all code
and cipher materials, to take shortcuts to fill the increasing demand for cryptographic materials. As the German army drew
ever closer to Moscow in the winter of 1941, the Russians apparently panicked, printing duplicates of twenty-five thousand
pages of one-time pad keys during the first couple of months of 1942, then binding them into onetime pad books and sending
them not only to their diplomatic and commercial establishments, but also to the various NKVD
rezidenturas
(or “stations”) around the world, thus unwittingly compromising the security of all messages encrypted with these duplicated
pads. Then, to make matters worse, the Russians could not get new cipher materials to their diplomatic establishments in the
United States and elsewhere because of German U-boat activity in the North Atlantic, which hampered Soviet merchant shipping
traffic between Murmansk and the United States.
7

SIGINT Comes of Age

Beginning in early 1943, the U.S. Army’s SIGINT collection effort slowly began to shift from Axis military communications
targets to the pre–Pearl Harbor focus on foreign diplomatic communications traffic, largely because of dramatic changes taking
place in the global geopolitical balance of power, with the United States rapidly emerging as the world’s top superpower.
Senior U.S. government and military policy makers and intelligence officers alike fully understood that while military decrypts
(Ultra) might be helping win World War II on the battlefield, diplomatic COMINT (Magic) would be essential to help the U.S.
government “win the peace.” There was a determination within the U.S. government that this time around America would not be
bullied or manipulated by its now less powerful European allies or the Russians at the peace talks that would inevitably follow
the end of the war. It would soon become clear that Clarke’s suspicions about Soviet long-term intentions were not only widely
shared by others in the military and the government—they would also become key factors in how the nations of the West would
respond to and then counter Russia’s postwar strategy.
8

To achieve these goals, however, the United States had to become as self-sufficient as possible in the realm of SIGINT. This
meant that it had to put some distance between itself and Great Britain and begin spying on those countries or organizations
that might conceivably constitute a threat in the future. The secrecy of the Russian effort was particularly intense. When
Corder-man inquired whether Russian traffic had been deliberately omitted from a target list just received by his agency,
he was told that “[reference to] Russian traffic was intentionally omitted with Clarke’s approval.”
9
But the accumulating intercepts of Russian traffic from 1943 on would yield one of the greatest U.S. COMINT harvests ever—the
program code-named Venona. Begun immediately after the end of World War II, the decoding and analysis would stretch over many,
many years (until the program formally ended in 1980). Venona material gradually and retrospectively revealed the astounding
extent of Soviet intelligence activity in America and Mexico. (Among other things, it made clear why Stalin was not surprised
by Truman’s carefully vague reference to the atomic bomb at Potsdam.) As we will see, the ultimate irony was that Venona’s
access was so valuable that it could not be compromised by using the material gathered as evidence (or even for counterintelligence
measures) against those Soviet sources (and methods) revealed by decryption over many years.

Other books

The Dark City by Catherine Fisher
Royal 02 - Royal Passion by Jennifer Blake
Once Upon a Summer Day by Dennis L. Mckiernan
Swish by E. Davies
B005GEZ23A EBOK by Gombrowicz, Witold
Lyn Cote by The Baby Bequest
When You Come to Me by Jade Alyse
Ice Whale by Jean Craighead George
Anton and Cecil by Lisa Martin
Buried Prey by John Sandford