Gobsmacked. There's no other word to describe my reaction to Trump's latest assertion of the power to disclose intelligence information from other countries to the Russians. And to do it from the hip.
This is just one more example of Trump's apparent belief that he was elected emperor or dictator. No wonder he likes the Russians so much. Before the 1917 revolution, Russian Tsars ruled by issuing decrees (Ukase) on any subject they wanted to. Putin follows similar procedures, even to the point of having his opponents assassinated.
So when Donald J. Trump tweets that he has the "absolute right" to declassify anything he wants to, that sounds an awful lot like the assertion of an absolute monarch. He apparently is under the impression that there are no limits to his power.
That isn't in keeping with our patriotic traditions.
There is a reason that officers of the United States swear to "support and defend the Constitution of the United States," rather than an oath of loyalty to the president.
We also had an early dispute over how to address the president. An early candidate phrase was "Your Highness." That didn't fly. Quite rightly.
Every day in every way we learn yet again that when other candidates declared Donald J. Trump unfit to serve as president, they were absolutely correct.
Showing posts with label intelligence. Show all posts
Showing posts with label intelligence. Show all posts
Tuesday, May 16, 2017
Are there any Patriots in the Republican Party?
Topic Tags:
democracy,
intelligence,
international,
national security
Wednesday, February 3, 2016
Flip Flops
I get a bit tired of candidates accusing each other of "flip-flops."
I suppose no one remembers Ralph Waldo Emerson, who penned perhaps the last word on the subject:“A foolish consistency is the hobgoblin of little minds, adored by little statesmen and philosophers and divines. ”
― Ralph Waldo Emerson, Self-Reliance
Mahatma Gandhi also touched on the subject; he often changed his mind publicly. An aide once asked him how he could so freely contradict this week what he had said just last week. The great man replied that it was because this week he knew better.
--- Gandhi
"When the facts change, I change my mind. What do you do, sir?"
--- John Meynard Keynes
Topic Tags:
intelligence,
management
Saturday, November 7, 2015
May Day, 1960
May Day, 1960, CIA pilot (former Air Force officer) Francis Gary Powers, flying alone at more than 70,000 feet, was on his 27th U-2 mission, flying over Sverdlovsk in the Soviet Union. The CIA estimated the altitude of the U-2 was above the reach of any Soviet missile or aircraft. That estimate proved to be too optimistic, and Gary Powers was shot down on one of the biggest Soviet holidays.
Contrary to the CIA's expectations in such an event, Powers survived and was captured.
Stephen Spielberg captures much of the drama of that time in the Cold War in his new movie,Bridge of Spies, starring Tom Hanks. The main hero of the story is a New York lawyer who negotiated the eventual release of Powers. A second important character is the Soviet spy, Rudolf Abel, who was offered in exchange.
It is mostly a true story, with some embellishment for effect. Here is a useful comparison of the true events with the fictional movie version: http://www.historyvshollywood.com/reelfaces/bridge-of-spies/
Go see Bridge of Spies.
Contrary to the CIA's expectations in such an event, Powers survived and was captured.
Stephen Spielberg captures much of the drama of that time in the Cold War in his new movie,Bridge of Spies, starring Tom Hanks. The main hero of the story is a New York lawyer who negotiated the eventual release of Powers. A second important character is the Soviet spy, Rudolf Abel, who was offered in exchange.
It is mostly a true story, with some embellishment for effect. Here is a useful comparison of the true events with the fictional movie version: http://www.historyvshollywood.com/reelfaces/bridge-of-spies/
Go see Bridge of Spies.
Topic Tags:
diplomatic,
history,
intelligence,
international,
military
Thursday, July 17, 2014
Ukraine, Russia, Malaysia: Fools Act And People Die
I just listened to the tapes released by Ukraine of separatist militiamen talking to Russian military officers about the shooting down of the Malaysian airliner. It helped that Ukraine provided a transcription in Russian, but the Russian was clear and not hard to understand. I didn't get a hint of remorse or even much excitement when they reported it was a civilian passenger liner.
Here is a link. It is worth listening to, even if you don't understand Russian. Pretty cold-blooded.
The missile used was apparently a Russian SA-11 GADFLY, a medium-range, semi-active, radar-guided missile using solid-rocket propulsion that provides defense against high-performance aircraft and cruise missiles. The SA-11 represents a considerable improvement over the earlier SA-6 GAINFUL system, and can engage six separate targets simultaneously, rather than the single target capability of the SA-6. Single-shot kill probability are claimed to be 60-90% against aircraft, 30-70% against helicopters, and 40% against cruise missiles, a significant improvement over the SA-6. The system is more mobile, taking only about 5 minutes to move from road march to engagement. The new system also offers significantly greater resistance to ECM than previous systems. The SA-11 system is comprised of the TELAR (9A310M1), Loader/Launcher (9A39M1), SNOW DRIFT Surveillance Radar (9S18M1), and Command and Control vehicle (9S470M1).
The Mach 3 semi-active homing 9M28M1 missile has a maximum slant range of 28 km and a minimum range of 3 km. It is capable of engaging targets between altitudes of 30 and 14000 m and can sustain 23 g maneuvers. The solid fuel missile is 5.6 meters long with a diameter is 0.4 m and a wing span is 1.2 m. The launch weight is 650 kg, which includes a 70 kg HE warhead with a 17 meter lethal radius.
More than enough to destroy a civilian airliner flying under civilian air traffic control using ICAO (International Civil Aviation Organization) procedures at normal operating altitude flying straight and level.
Ultimately, Russia is responsible for this shoot-down.
Topic Tags:
Europe,
intelligence,
international,
military
Monday, September 9, 2013
Syria And Chemical Weapons - Light At End Of Tunnel?
Today's news seems somewhat hopeful.
It isn't clear how it came about, but it sounds like Secretary of State Kerry may have proposed a settlement believing Syria would refuse - and now both Syria and Russia are jumping through hoops as fast as they can to accept it.
The proposal that Syria turn over its chemical weapons to international control is a good one. It was made even better when Russia suggested the weapons be destroyed under international supervision.
Doing this would resolve a potential dilemma: should there be a strike against Syria's chemical weapons depots? On the one hand, that would be the most justifiable target. On the other hand, attacking the chemical weapons would likely release some very nasty stuff into the Syrian countryside - possibly causing innocent deaths.
President Theodore Roosevelt is often quoted as advising that we "speak softly and carry a big stick."
George W. Bush's neocons seemed to think that meant "shout loudly and hit people over the head with the stick."
Sometimes diplomacy can accomplish wonders, but it is hard work best accomplished behind the scenes.
I hope that's what's going on here.
It isn't clear how it came about, but it sounds like Secretary of State Kerry may have proposed a settlement believing Syria would refuse - and now both Syria and Russia are jumping through hoops as fast as they can to accept it.
The proposal that Syria turn over its chemical weapons to international control is a good one. It was made even better when Russia suggested the weapons be destroyed under international supervision.
Doing this would resolve a potential dilemma: should there be a strike against Syria's chemical weapons depots? On the one hand, that would be the most justifiable target. On the other hand, attacking the chemical weapons would likely release some very nasty stuff into the Syrian countryside - possibly causing innocent deaths.
President Theodore Roosevelt is often quoted as advising that we "speak softly and carry a big stick."
George W. Bush's neocons seemed to think that meant "shout loudly and hit people over the head with the stick."
Sometimes diplomacy can accomplish wonders, but it is hard work best accomplished behind the scenes.
I hope that's what's going on here.
Topic Tags:
diplomatic,
government,
intelligence,
international,
military
Tuesday, August 13, 2013
Seventy Years Ago: WWII In The Pacific - Bombing Kiska August 12, 1943
ALASKA (Eleventh Air Force): From Adak B-24's and B-25's fly 26 bombing,
strafing, and radar and photo reconnaissance sorties over Kiska. From
Amchitka P-40's, P-38's, B-24's, B-25's, and A-24s fly 70 bombing
sorties over the island and are joined by B-24's, P-40's, and F-5A's
flying 6 reconnaissance and photo sorties. Targets included the runway,
harbor and shipping installations, army barracks, and the Rose Hill
area. Lost is B-24D 42-40309.
My friend Ray Rundle, a Navy Communications Technician expert in communications intelligence then stationed on Adak, told the Army there were no more Japanese troops on the island. The Army didn't believe him. Army pilots insisted that Japanese troops remained and had fired anti aircraft weapons against Army bombing missions.
In fact, the Japanese troops had evacuated the island under cover of fog on July 28, two weeks earlier.
When the US Army invasion force stormed ashore on August fifteenth, the invaders found three dogs. US Navy Chief of Naval Operations Earnest King reported to Secretary of the Navy Frank Knox that all they found were some dogs and freshly brewed coffee. When Knox questioned the report, King responded that Japanese dogs were very clever and knew how to make coffee.
Descendants of the Japanese dogs still lived on Adak when I was stationed there twenty years later. And Ray Rundle, who had been commissioned and promoted to the rank of Navy Lieutenant, had also returned to Adak.
My friend Ray Rundle, a Navy Communications Technician expert in communications intelligence then stationed on Adak, told the Army there were no more Japanese troops on the island. The Army didn't believe him. Army pilots insisted that Japanese troops remained and had fired anti aircraft weapons against Army bombing missions.
In fact, the Japanese troops had evacuated the island under cover of fog on July 28, two weeks earlier.
When the US Army invasion force stormed ashore on August fifteenth, the invaders found three dogs. US Navy Chief of Naval Operations Earnest King reported to Secretary of the Navy Frank Knox that all they found were some dogs and freshly brewed coffee. When Knox questioned the report, King responded that Japanese dogs were very clever and knew how to make coffee.
Descendants of the Japanese dogs still lived on Adak when I was stationed there twenty years later. And Ray Rundle, who had been commissioned and promoted to the rank of Navy Lieutenant, had also returned to Adak.
Topic Tags:
history,
intelligence,
military,
navy
Saturday, June 15, 2013
Quis custodiet ipsos custodes?
Who watches the watchers?
Juvenal: Satires, Book VI
Juvenal: Satires, Book VI
Topic Tags:
government,
intelligence,
journalism
Friday, June 14, 2013
More On Communications Intelligence
I realize my previous post on communications intelligence might have been a bit much for some readers. My excuse is that I was personally fascinated with the case of Stanley Johnston revealing through the Chicago Tribune that the US knew in advance where and when the Japanese would attack Midway. How Johnston may have learned of this remains a bit speculative.
What I find equally interesting is that Johnston, who was embarked as a journalist aboard USS Lexington (CV-2) during the battle of the Coral Sea, seems not to have been aware of the role played by communications intelligence in that battle. How did the US fleet know to be where they were at the time they were in order to engage the Japanese?
Johnston's book, Queen Of The Flattops, about the last days and eventual loss of Lexington remains a masterpiece of war coverage.
Two movies about the war in the Pacific provide some information about the role of communications intelligence: "Tora! Tora! Tora!" and "Midway." My favorite is Tora! Tora! Tora!
A recent series on public television, "Bletchley Circle," touches on the special skills of the (mostly women) who worked on breaking German codes during WWII.
Two works by Alexander Solzhenitsyn are of interest. In August, 1914, Solzhenitsyn describes the utter disaster of the Russian army at the Battle of Tannenberg, largely due to administrative incompetence in delivering radio code books to the field in time for the attack. As a result, Russian forces could only communicate with each other in the clear. The Germans knew every Russian move in advance. Whether the code books would have been effective had they been distributed is another question.
During the Winter War of 1939 between Finland and the Soviet Union, it is said that Finnish forces intercepted encrypted Soviet radio communications, transmitted the intercepts to Swedish experts at Uppsala University. The intercepts were decrypted and the information sent back to Finland. This intelligence enabled Finnish ski troops to operate with devastating effectiveness against Soviet units.
The other related book by Solzhenitsyn is First Circle. That book describes the work of Soviet convicts in developing technical means of voice recognition to identify a dissident from a recording.
These efforts were all forerunners of today's cyberwar.
What I find equally interesting is that Johnston, who was embarked as a journalist aboard USS Lexington (CV-2) during the battle of the Coral Sea, seems not to have been aware of the role played by communications intelligence in that battle. How did the US fleet know to be where they were at the time they were in order to engage the Japanese?
Johnston's book, Queen Of The Flattops, about the last days and eventual loss of Lexington remains a masterpiece of war coverage.
Two movies about the war in the Pacific provide some information about the role of communications intelligence: "Tora! Tora! Tora!" and "Midway." My favorite is Tora! Tora! Tora!
A recent series on public television, "Bletchley Circle," touches on the special skills of the (mostly women) who worked on breaking German codes during WWII.
Two works by Alexander Solzhenitsyn are of interest. In August, 1914, Solzhenitsyn describes the utter disaster of the Russian army at the Battle of Tannenberg, largely due to administrative incompetence in delivering radio code books to the field in time for the attack. As a result, Russian forces could only communicate with each other in the clear. The Germans knew every Russian move in advance. Whether the code books would have been effective had they been distributed is another question.
During the Winter War of 1939 between Finland and the Soviet Union, it is said that Finnish forces intercepted encrypted Soviet radio communications, transmitted the intercepts to Swedish experts at Uppsala University. The intercepts were decrypted and the information sent back to Finland. This intelligence enabled Finnish ski troops to operate with devastating effectiveness against Soviet units.
The other related book by Solzhenitsyn is First Circle. That book describes the work of Soviet convicts in developing technical means of voice recognition to identify a dissident from a recording.
These efforts were all forerunners of today's cyberwar.
Topic Tags:
espionage,
intelligence,
war
Thursday, June 13, 2013
Communications Intelligence: Press Disclosures In 1942 - Chicago Tribune
The Snowden affair calls to mind an earlier history of U.S. Intelligence efforts targeting communications. In the 1920's and 30's, the United States targeted foreign diplomatic and military communications. The early origins of the effort remain murky. The entire field of cryptography and cryptanalysis burgeoned after the introduction of radio communications. Intercepted radio message traffic provided intelligence analysts vast quantities of material to exploit. During World War I, the main target was Germany.
After WWI, for a time the effort continued using combined resources of the Army, Navy, State Department and Justice, under leadership of Herbert Yardley, who had headed the Army's communications intelligence effort during the Great War. This effort, known officially as the Cipher Bureau and unofficially as the American Black Chamber, continued until it was closed during the Hoover Administration in an apparent economy measure. Or, alternatively, it was closed as a result of Secretary of State Stimson's discomfort with the program. "Gentlemen don't read each other's mail," he declared.
Japan had been a major target of US communications intelligence which played a key role in US diplomatic success during the Washington Naval Conference of 1922. The Navy began its own effort at communications intelligence in 1926 (probably building on earlier efforts). Here is an account of the Navy's efforts leading up to WWII.
Something to bear in mind is that US Government efforts to intercept, decode, translate and distribute foreign message traffic was in clear violation of the Telecommunications Act of 1934. These efforts, which played a key role in US operational success in both oceans during WWII, continued to violate US law until an exception was made by statute in 1978.
In the intervening decades, there were several instances of inadvertent or unauthorized disclosure of US communications intelligence. Here is an account of what happened in 1942 concerning one such unauthorized disclosure concerning Midway:
After WWI, for a time the effort continued using combined resources of the Army, Navy, State Department and Justice, under leadership of Herbert Yardley, who had headed the Army's communications intelligence effort during the Great War. This effort, known officially as the Cipher Bureau and unofficially as the American Black Chamber, continued until it was closed during the Hoover Administration in an apparent economy measure. Or, alternatively, it was closed as a result of Secretary of State Stimson's discomfort with the program. "Gentlemen don't read each other's mail," he declared.
Japan had been a major target of US communications intelligence which played a key role in US diplomatic success during the Washington Naval Conference of 1922. The Navy began its own effort at communications intelligence in 1926 (probably building on earlier efforts). Here is an account of the Navy's efforts leading up to WWII.
Something to bear in mind is that US Government efforts to intercept, decode, translate and distribute foreign message traffic was in clear violation of the Telecommunications Act of 1934. These efforts, which played a key role in US operational success in both oceans during WWII, continued to violate US law until an exception was made by statute in 1978.
In the intervening decades, there were several instances of inadvertent or unauthorized disclosure of US communications intelligence. Here is an account of what happened in 1942 concerning one such unauthorized disclosure concerning Midway:
The Battle of Midway
continued long after the combatants retired. Because of the
confusion that surrounded the nascent and relatively unfamiliar
U.S. Navy policies governing secrecy and need to know in 1942,
the Battle of Midway was refought in the newspapers and
courthouses of three major U.S. cities - New York, Chicago, and
Washington - for several weeks after the battle actually ended.
At issue was how the Navy knew of Japanese plans, how that
knowledge came into the possession of a newspaper reporter, and
how the government should handle a serious security violation. In
the end no one was ever formally punished for revealing to the
public the role communications intelligence played in the
Japanese defeat. Whether the Japanese ever discovered that U.S.
cryptologists had successfully penetrated their most secret
operational code, or even suspected the magnitude of the warning
provided by COMINT, remains a matter of conjecture to this day.
At the time, however, officials within OP-20-G were certain that
subsequent almost draconian corrections in Japanese
communications procedures and cryptography were traceable
directly to the following events.
On 17 May 1942, the
survivors of the Lexington
were en route to San Diego and San Francisco aboard the USS Barnett
and the USS Elliot.
(One account said that Admiral Fitch and Captain Sherman were
aboard the transport Chester.)
Anticipating their arrival in the United States, CINCPAC sent the
following message to Admiral Fletcher, CTF 17, with information
copies to COMINCH and the Commandants of the 11th and 12th Naval
Districts:
It is imperative that all survivors Coral Sea action being returned Mainland be instructed that they are to refrain from any mention of the action upon their arrival west coast port. Com11 is requested berth transports where debarkation can be conducted without contact with newsmen. All personnel will probably require reoutfitting. There will be no publicity regarding this matter until Navy Department release. Barnett and Elliot will stop at San Diego to discharge excess personnel en route San Francisco.
Despite these precautions
by CINCPAC, events aboard the Barnett
resulted in even more damaging revelations than those CINCPAC had
hoped to prevent. In ancillary actions, CINCPAC learned that
medical reports filed in Navy Bureau of Medicine channels
revealed the status of American carriers after the battle. In a
hasty message on 3 June 1942, CINCPAC notified COMINCH and
requested immediate action to suppress the errant reports. At 2050 on 8 June 1942, COMINCH sent the
following message to CINCPAC:
Contents of your 311221 May were published almost verbatim in several newspapers yesterday. Article originated with correspondent Stanley Johnson [sic] embarked on [USS] Barnett until June 2d. While your despatch was addressed Task Force Commanders it was sent in channel available to nearly all ships which emphasizes need of care in using channels para. Cominch investigating on Barnett and at San Diego.
CINCPAC's message of
311221 May contained his final appreciation of the Japanese order
of battle prior to Midway.
True to his word, COMINCH
immediately convened several formal inquiry panels, which began
gathering depositions from witnesses. The panels inquired into
the circumstances aboard the Barnett,
which, in addition to most of the crew, carried the executive
officer of the Lexington,
Commander Morton T. Seligman, and a newspaper correspondent, Mr.
Stanley Johnston, back to the United States, and in Chicago in
the headquarters Colonel R.R. McCormick's newspaper, the Chicago
Tribune, where the story had originated. According to Admiral King's biographer, Thomas
B. Buell in Master of Seapower,
Admiral King "was in a white fury at his headquarters while
his staff frantically tried to discover the source of the
leak."
By 11 June all of the
principals had been interviewed. Those aboard the Barnett
were interviewed more than once. Out of this work emerged a very
unpleasant picture of official neglect and confusion concerning
the safeguarding of communications intelligence both on the Barnett
and in the newspapers. Because of the perception that newsmen
accompanying U.S. forces were sworn to secrecy, indictments of
the principal employees of the Chicago
Tribune were sought on 9 June, even before
the inquiries were completed. They were returned on 7 July by a
Chicago grand jury. At this point serious snags appeared at every
turn, and the matter lay in the hands of the grand jury and a
special prosecutor for several weeks while the navy added
depositions to a record that increasingly showed that Johnston, a
British subject, had, with the help or negligence of others,
betrayed the trust placed in him.
While many in the navy
focused on finding a suitable punishment for Johnston, COMINCH
issued another memorandum on 20 June 1942 similar to those he had
originated in March and April. It was sent to CINCLANT, CINCPAC,
and CDR- SWPACFORCE bearing the subject "Control of
Dissemination and Use of Radio Intelligence." Within the
navy this would prove to be the only remedial action to come out
of the Johnston case.
On 24 June the New York
newspaper PM published a story without attribution announcing
that the Justice Department did not plan to prosecute anyone,
either in the newspapers or in the U.S. Navy, as a result of their role in the revelations.
Ironically, three days later the navy discovered that Johnston's
own government had earlier declared him "unreliable" as
a correspondent.
It was the same government, however, that subsequently forged the
ultimate solution by addressing the correlation between the
Johnston revelations and safeguarding communications
intelligence.
On 14 July, the special
prosecutor, Mr. William D. Mitchell, transmitted his
comprehensive "Report on the Chicago
Tribune Case" to Attorney General
Francis Biddle and Secretary of the Navy Frank Knox. His
conclusion, after he had reviewed the law, the evidence, and the
circumstances surrounding the "leak," ended by
suggesting that "the game may not be worth the candle"
and that the national effort would be better served if the case
were dropped.
In the mind of the special
prosecutor, none of his major reasons for dropping the case
concerned the safeguarding of communications intelligence. Three
salient points concerning the merits of the government's case
were cited instead. All were related to the personal behavior of
the principals: "1) Johnston said (on 8 June) that he got
the information from a paper he found on his desk; 2) Two
officers testified seeing Seligman working at a table in his
quarters and that before him was a 'writing on Navy paper' giving
a list of Jap vessels divided into a 'striking force, support
force, etc.'; 3) If, as appears likely, some officer left a copy
of that dispatch lying around, it may fairly be said there was as
much carelessness on the ship as the Tribune
was guilty of, and the Jury may think so."
No further action was
taken until 15 August 1942, when the British Admiralty delegation
in Washington sent a letter to Admiral King expressing concern
that the Hearst revelations posed a danger to special
intelligence methods, that a trial would further compromise this
source, and that "preservation of this invaluable weapon
outweighs almost any other consideration." King's reply
reassured the British that the U.S. Navy would not do anything to
increase the harm already inflicted by the original news story. Five days later, the Chicago
Daily Tribune carried the front page story,
"U.S. Jury Clears Tribune." This story signaled the end
of the grand jury investigation, though no reasons were ever
given to the press by Mr. Mitchell, the special prosecutor.
What were the facts in the
strange case of Stanley Johnston? As noted above, CINCPAC 311221Z
May 42, was the message that passed CINCPAC's final appreciation
of the Japanese order of battle for the Battle of Midway to the
commanders of Task Forces 16 and 17, Admirals Spruance and
Fletcher, respectively. The message was passed in communications
channels available to other ships. Contrary to normal practices,
which expected communicators to ignore traffic not addressed to
their ship or commander, it was probably decoded by
communications officers from the Lexington
en route home from the loss of their ship at Coral Sea, who were
acting as watch standers aboard the transport USS Barnett
(AP11). Their reason for doing so may have been the presence of
the Lexington's
executive officer, Commander Morton Seligman. The message was
given to Commander Seligman, who, apparently under the impression
that he was authorized to do so, showed the message to Johnston,
who had been aboard the Lexington during the battle and was being
evacuated with the crew. Johnston and Seligman may have shared
the same quarters aboard the Barnett.
On 7 June 1942, five days
after Johnston's arrival in San Diego and one day after CINCPAC's
"POA Communique #3" appeared announcing "a
momentous U.S. victory," Johnston's story of U.S.
foreknowledge of Japanese forces and their plans appeared in the Chicago
Tribune and other newspapers in Washington
and New York.
The headlines that introduced the story on page 4A in the Washington
Times Herald for 7 June 1942 revealed
without a doubt that the author had been privy to secret material
concerning Japanese intentions and strategy: "U.S. KNEW ALL
ABOUT JAP FLEET. GUESSED THERE WOULD BE A FEINT AT ONE BASE, REAL
ATTACK AT ANOTHER."
Though he could not know
the extent of the duplicity involved, Walter Winchell, in his
column in the New York Daily Mirror,
characterized the Tribune
as having "tossed security out the window."
Understandably, Johnston's repeated denials that he had ever seen
CINCPAC's message were received with cynical disbelief in
Washington. Even his media superiors readily admitted they could
not otherwise account for the similarities.
On 8 June, following an
inconclusive meeting between high naval and newspaper officials,
Johnston and his editor in Washington, Arthur Henning, met
privately with Vice Admiral Russell Willson, Admiral King's chief
of staff. It was during this meeting, as noted by the special
prosecutor, that Johnston may have contradicted himself (Admiral
Willson was to say that Johnston "confessed") and
admitted seeing a list of Japanese vessels. With the concurrence of the secretary of the
navy and the president, Admiral King barred Seligman from
promotion forever. Seligman retired in 1944.
OP-20-G's assessment of
the damage done by the Johnston revelations took a long time to
develop primarily because the Japanese themselves were slow to
change their procedures. Nevertheless, OP-20-G maintained it was
no mere coincidence that within a few weeks of the Johnston
expose drastic changes were made in virtually all Japanese codes
and ciphers including the Japanese Fleet General-Purpose System,
which changed on 15 August, only two months into the current
cipher. Consistent with these changes, navy monitors also noted
the omission of message serial numbers beginning on 15 August and
a major change in the Japanese callsign system on 1 October 1942.
All of the Japanese
refinements were justifiably described by OP-20-G analysts as
serious threats to their capability to produce current
intelligence.
Thus, it is difficult to say at this point that a single event
occurred that prompted Admiral King to decide what course of
action he would take. It may have been OP-20-G's concern that a
jury trial would have even more painful consequences than those
already experienced, or Admiral Willson's reading of the meeting
he had had with Johnston, or the trauma of preparing highly
classified testimony to be given before a Chicago grand jury.
Clearly, Admiral King had decided not to implement the 7 July
grand jury indictment when he responded to the British letter in
August; and the evidence suggests, albeit weakly, that as early
as 20 June he had begun to regret even seeking the indictment.
Throughout the Johnston
affair, OP-20-G consistently sought a plausible cover story to
minimize the damage already done. They appealed to King for
future safeguards to prevent the loss of a vital advantage to the
navy. King's reiteration of his restrictions on distribution on
20 June, while perhaps not all that OP-20-G wanted, strongly
suggested that these appeals were heard.
Questions concerning the
appropriate applications of communications intelligence to
wartime emergencies of all types continued to arise. One problem
addressed in December 1942 affected how newspapermen and radio
broadcasters treated information they knew originated from enemy
communications. A new paragraph was prepared for insertion in the
"Code of Wartime Practices for the American Press" by
the secretaries of war and navy and sent to the director of
censorship for implementation:
ENEMY COMMUNICATIONS
To the end that the enemy may not have information concerning any success the U.S. may attain in deciphering his encoded or enciphered communications, no mention should be made of available or captured enemy codes or enemy ciphers, or about the intelligence gained from intercepting and studying enemy radio messages.
A prestigious trade
journal gave immediate approval to the addition while at the same
time registering the idea that after the war censorship should
not continue. After citing a post-Pearl Harbor report that
"monstrously exaggerated" U.S. losses as an example of
irresponsible behavior, the editorial concluded with some ideas
that are still relevant:
As between an ethical professional requirement that a journalist hold nothing back and a patriotic duty not to shoot one's own soldiers in the back, we have found no difficulty in making a choice. Freedom of the press does not carry with it a general license to reveal our secret strengths and weaknesses to the enemy.
It was not until 1985 that
anyone from the Pacific COMINT centers received any formal
recognition for his contribution to either the Coral Sea or
Midway victories. In 1985, in response to a massive outpouring of
affection from his friends, Joseph Rochefort received the
Distinguished Service Medal posthumously from the secretary of
the navy. For the rest, their epitaph was most fittingly
expressed by a perfect stranger many years later:
History, with its
flickering lamp, stumbles along the trail of the past, trying
to reconstruct its scenes, to revive its echoes, and kindle
with pale gleams the passion of former days. What is the
worth of all this? The only guide to man is his conscience.
The only shield to his memory is the rectitude and sincerity
of his actions. It is very imprudent to walk through life
without this shield, because we are so often mocked by the
failure of our hopes and the upsetting of our calculations,
but with this shield, however the fates may play, we march
always in the ranks of honour.
Topic Tags:
history,
intelligence,
journalism,
war
Wednesday, June 12, 2013
NSA, Metadata And History
Recent disclosures that NSA has been collecting data, perhaps massive amounts of so-called meta data, on telephone, internet and social network communications calls to mind some history.
From the very beginning of the Republic - and even before, intelligence played a major role in our revolution. Consider the mobilization of patriots in New England to resist and outwit the Redcoats intending to seize the arms and military provisions of the local militia. There was not only the midnight ride of Paul Revere (and others) that fateful 18th of April in '75. There was all the preparatory work.
The Concord militia removed their heavy cannon from the armory and buried the big guns in hidden locations. They relocated gunpowder and other supplies. They hid as much of the other provisions and weapons as they could. How did they know what the British intended? Intelligence. Collected by bartenders, artisans and ordinary citizens who interacted with soldiers and officers in their every day dealings. Their observations came together in time to warn militia of the British move on Lexington and Concord.
Make no mistake, the British were collecting intelligence as well. But they faced the same dilemma that occupiers throughout history have faced - whom to trust and how to evaluate the information gathered. In today's parlance - how to tell the "good guys" from the "bad guys." Even worse, how to suppress the insurrectionists without arousing animosity among those on the fence? They never solved the problem.
And what of Paul Revere?
Suppose the British had been able to uncover the role of key individuals, illuminate their relationships and round up the leaders? Could they have done this without overhearing actual conversations or intercepting letters?
Suppose all they had was a list of members of various New England organizations. What could they have learned?
As it turns out, they might have been able to arrest and interrogate the whole conspiracy. One of the keys was Paul Revere.
Last week, Kieran Healey, a Duke University Sociologist, posted a very interesting examination of how the British might have been able to use what is now called "metadata" to catch Paul Revere. Metadata is apparently what NSA is collecting from Google, Verizon and other sources. Here is his post.
Here is a more detailed article on Paul Revere's ride by political scientist Shin-Kap Han. The metadata in both articles is drawn from David Hackett Fisher's book, Paul Revere's Ride. Another of David Hackett Fisher's books, Washington's Crossing, gives a good feel for the effectiveness of Washington's intelligence networks during the campaign in New Jersey and the increasing frustration of British intelligence.
All of this preceded the U.S. Constitution.
Even the central trade offs between liberty and security - a dilemma of the present age, was apparent before the Constitution:
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin, 1775
From the very beginning of the Republic - and even before, intelligence played a major role in our revolution. Consider the mobilization of patriots in New England to resist and outwit the Redcoats intending to seize the arms and military provisions of the local militia. There was not only the midnight ride of Paul Revere (and others) that fateful 18th of April in '75. There was all the preparatory work.
The Concord militia removed their heavy cannon from the armory and buried the big guns in hidden locations. They relocated gunpowder and other supplies. They hid as much of the other provisions and weapons as they could. How did they know what the British intended? Intelligence. Collected by bartenders, artisans and ordinary citizens who interacted with soldiers and officers in their every day dealings. Their observations came together in time to warn militia of the British move on Lexington and Concord.
Make no mistake, the British were collecting intelligence as well. But they faced the same dilemma that occupiers throughout history have faced - whom to trust and how to evaluate the information gathered. In today's parlance - how to tell the "good guys" from the "bad guys." Even worse, how to suppress the insurrectionists without arousing animosity among those on the fence? They never solved the problem.
And what of Paul Revere?
Suppose the British had been able to uncover the role of key individuals, illuminate their relationships and round up the leaders? Could they have done this without overhearing actual conversations or intercepting letters?
Suppose all they had was a list of members of various New England organizations. What could they have learned?
As it turns out, they might have been able to arrest and interrogate the whole conspiracy. One of the keys was Paul Revere.
Last week, Kieran Healey, a Duke University Sociologist, posted a very interesting examination of how the British might have been able to use what is now called "metadata" to catch Paul Revere. Metadata is apparently what NSA is collecting from Google, Verizon and other sources. Here is his post.
Here is a more detailed article on Paul Revere's ride by political scientist Shin-Kap Han. The metadata in both articles is drawn from David Hackett Fisher's book, Paul Revere's Ride. Another of David Hackett Fisher's books, Washington's Crossing, gives a good feel for the effectiveness of Washington's intelligence networks during the campaign in New Jersey and the increasing frustration of British intelligence.
All of this preceded the U.S. Constitution.
Even the central trade offs between liberty and security - a dilemma of the present age, was apparent before the Constitution:
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin, 1775
Topic Tags:
history,
intelligence
Subscribe to:
Posts (Atom)