Army

April 5, 2013

Military Intelligence — this week in history: April 5, 2013

The Signal Intelligence Service (SIS) was established in 1929 to control all Army cryptologic activity. In this photo are Friedman (center, standing) and the SIS staff in 1935. This small but talented group ultimately broke the Japanese diplomatic machine cipher.

April 5, 1929

The business of solving codes and ciphers had been an active field in the U.S. government since World War I when Ralph Van Deman realized he needed a cipher bureau as part of his newly organized Military Intelligence Division. Van Deman picked a State Department code clerk and amateur cryptologist named Herbert Yardley to head up his newly created Codes and Ciphers division, or MI-8. Yardley was commissioned a lieutenant in 1917, and tasked with setting up MI-8. The fledgling Cipher Bureau had quite a few remarkable successes.

After the war, however, the business of cryptology took on a more sensitive nature. What was the role of such an invasive method of warfare during peacetime? Herbert Yardley believed it was critical, and he convinced the State and War Department Chiefs to set him up in a peacetime, strategic cryptologic operation so that that the United States could keep up with the rest of the world in decoding diplomatic messages. In a secret, bi-lateral agreement, the State Department and War Department jointly funded MI-8, which became known as The Black Chamber, with an initial budget of $100,000 per year. This all ended when Herbert Hoover, or more accurately, his new Secretary of State Henry L. Stimson, took over. Shocked at the impropriety of “gentlemen reading one another’s mail,” Stimson immediately withdrew all State Department funding and closed down the Black Chamber, leaving Yardley without a job, a family to feed, and a grudge to nurse.

Meanwhile, the Army had developed its own Code and Cipher section under the Signal Corps. Mr. William Friedman, who had served in a radio intelligence section during the War, was hired as the chief cryptographer for the Signal Corps. Friedman was charged with code and cipher development for the Army, and to plan for wartime signals intelligence operations. However, the budget crises of post war cutbacks combined with the passage of a law in 1927 making radio communications intercept illegal in America, brought the code and cipher effort nearly to a halt. To save the effort from extinction, in April 1929, the Secretary of War directed “That the Signal Corps be charged with the duties pertaining to the solution of enemy codes and ciphers and the detection of secret inks in War, in addition to those duties with which they are now charged by the Army and to the interception of enemy radio and wire traffic in war.” The War Department was, in effect, tasking its Signal Corps to break the law. Needless to say, the Signal Corps maintained the utmost secrecy regarding these efforts.

Friedman,-William-F

Despite Mr. Stimson’s outrage at the Black Chamber’s work, and his direction that the State Department cease and desist all intercept and cryptography efforts, that decree never made it to the U.S. military. After the Black Chamber closed, all cryptographic work became the sole responsibility of the War Department, by both the Army and the Navy. In May 1929, all War Department operational functions pertaining to cryptography and cryptanalysis were brought together under the Army’s Chief Signal Officer. Two months later, the Signals Intelligence Service (SIS) was officially organized with Mr. Friedman as its chief. He remained in this position until 1935 when an Army major was assigned as officer-in-charge.

In 1943, the SIS was redesignated the Signal Security Service and later the Signal Security Agency. Responsibility for the SSA was divided between the Military Intelligence Service (MIS) for operations, and the Signal Corps for administration. On 15 September 1945, the Signal Security Agency was reunited again under the Director of Military Intelligence as the Army Security Agency at Arlington Hall, Virginia.




All of this week's top headlines to your email every Friday.


 
 

 
Maci Hidalgo

Army makes significant strides in energy programs

Maci Hidalgo Steven Lyman, a worker with Triad, a company working on the utility-owned solar array at Fort Huachuca, welds a part onto a support shaft for a solar panel at the 68-acre solar array park adjacent to the Thunder Mo...
 
 
David Kamm, NSRDEC

Natick studies link between body armor fit, performance

David Kamm, NSRDEC Rachel Terveer measures a Soldier’s forward reach extension as part of a study at the Natick Soldier Research, Development and Engineering Center that seeks to understand the link between body armor fit and...
 
 
SFL-TAP_logo_Color

Transition Assistance Program is for spouses, too

Spouses of transitioning and retiring service members are eligible for all Transition Assistance Program services. This means everything available to the transitioning service member is also available to his or her spouse. This...
 

 
Department of Defense photos

Military Intelligence – Moment in MI history

Intelligence plays role in Operation URGENT FURY On Oct. 19, 1983, Grenada’s pro-Communist Prime Minister Maurice Bishop and several other leaders were murdered by a faction led by Deputy Prime Minister Bernard Coard. The sub...
 
 
Airman 1st Class Krystal Ardrey

Air Force: Airmen train for ‘new wild, wild west’ in cyber domain

Airman 1st Class Krystal Ardrey Staff Sgt. Alek Albrecht participates in a Network War Bridge Course at the 39th Information Operations Squadron Sept. 19, at Hurlburt Field, Fla. Albrecht is practicing to hack into a simulated ...
 
 
U.S. Army photo

Aviation Restructure Initiative allows UAS workhorses to remain aloft

U.S. Army photo Pvt. Kenneth Lewis and Pvt. Austin Morrison assemble a Shadow unmanned aircraft system during training at 2-13th Aviation Regiment, 1st Aviation Brigade, based at Fort Huachuca, in July. FORT RUCKER, Ala. — In...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin