Army

April 5, 2013

Military Intelligence — this week in history: April 5, 2013

The Signal Intelligence Service (SIS) was established in 1929 to control all Army cryptologic activity. In this photo are Friedman (center, standing) and the SIS staff in 1935. This small but talented group ultimately broke the Japanese diplomatic machine cipher.

April 5, 1929

The business of solving codes and ciphers had been an active field in the U.S. government since World War I when Ralph Van Deman realized he needed a cipher bureau as part of his newly organized Military Intelligence Division. Van Deman picked a State Department code clerk and amateur cryptologist named Herbert Yardley to head up his newly created Codes and Ciphers division, or MI-8. Yardley was commissioned a lieutenant in 1917, and tasked with setting up MI-8. The fledgling Cipher Bureau had quite a few remarkable successes.

After the war, however, the business of cryptology took on a more sensitive nature. What was the role of such an invasive method of warfare during peacetime? Herbert Yardley believed it was critical, and he convinced the State and War Department Chiefs to set him up in a peacetime, strategic cryptologic operation so that that the United States could keep up with the rest of the world in decoding diplomatic messages. In a secret, bi-lateral agreement, the State Department and War Department jointly funded MI-8, which became known as The Black Chamber, with an initial budget of $100,000 per year. This all ended when Herbert Hoover, or more accurately, his new Secretary of State Henry L. Stimson, took over. Shocked at the impropriety of “gentlemen reading one another’s mail,” Stimson immediately withdrew all State Department funding and closed down the Black Chamber, leaving Yardley without a job, a family to feed, and a grudge to nurse.

Meanwhile, the Army had developed its own Code and Cipher section under the Signal Corps. Mr. William Friedman, who had served in a radio intelligence section during the War, was hired as the chief cryptographer for the Signal Corps. Friedman was charged with code and cipher development for the Army, and to plan for wartime signals intelligence operations. However, the budget crises of post war cutbacks combined with the passage of a law in 1927 making radio communications intercept illegal in America, brought the code and cipher effort nearly to a halt. To save the effort from extinction, in April 1929, the Secretary of War directed “That the Signal Corps be charged with the duties pertaining to the solution of enemy codes and ciphers and the detection of secret inks in War, in addition to those duties with which they are now charged by the Army and to the interception of enemy radio and wire traffic in war.” The War Department was, in effect, tasking its Signal Corps to break the law. Needless to say, the Signal Corps maintained the utmost secrecy regarding these efforts.

Friedman,-William-F

Despite Mr. Stimson’s outrage at the Black Chamber’s work, and his direction that the State Department cease and desist all intercept and cryptography efforts, that decree never made it to the U.S. military. After the Black Chamber closed, all cryptographic work became the sole responsibility of the War Department, by both the Army and the Navy. In May 1929, all War Department operational functions pertaining to cryptography and cryptanalysis were brought together under the Army’s Chief Signal Officer. Two months later, the Signals Intelligence Service (SIS) was officially organized with Mr. Friedman as its chief. He remained in this position until 1935 when an Army major was assigned as officer-in-charge.

In 1943, the SIS was redesignated the Signal Security Service and later the Signal Security Agency. Responsibility for the SSA was divided between the Military Intelligence Service (MIS) for operations, and the Signal Corps for administration. On 15 September 1945, the Signal Security Agency was reunited again under the Director of Military Intelligence as the Army Security Agency at Arlington Hall, Virginia.




All of this week's top headlines to your email every Friday.


 
 

 
Maranda Flynn

EPG celebrates 60 years, new small arc structure dedicated

Maranda Flynn From left, Rob Reiner, former Electronic Proving Ground technical director, Eddie Flores, EPG’s youngest employee, and Maj. Gen. Peter Utley, commanding general, U.S. Army Test and Evaluation Command, cut the ca...
 
 
Gordon Van Vleet

NETCOM gains new commander during ceremony here Wednesday

Gordon Van Vleet Brig. Gen. Peter A. Gallagher, outgoing NETCOM Commanding General, passes the NETCOM flag to Lt. Gen. Edward C. Cardon, Army Cyber Command/2d U.S. Army Commanding General, while incoming NETCOM commanding gener...
 
 

Army tightens personal appearance, tattoo policy

WASHINGTON — The number, size and placement of tattoos have been dialed back under revised Army Regulation 670-1, which governs the Army’s grooming standards and proper wear of the uniform. The revised regulation was published Monday, along with Department of the Army Pamplet 670-1, outlining the new standards. Effective dates for the various changes can...
 

 
Courtesy of Hitt Family

Military Intelligence – Moment in MI history

Army wife ‘does her bit’ in World War I – story of Genevieve Young Hitt Courtesy of Hitt Family The Hitts are pictured at home in Virginia. From left, Genevieve Hitt, daughter Mary Lueise Hitt and Col. Parker Hitt are dep...
 
 
Maranda Flynn

Fort celebrates women of character, courage, commitment

Maranda Flynn A display in the lobby of Thunder Mountain Activity Centre highlighted the historical contributions of women in the Army, during the Women’s History Month Observance March 20. In honor of Women’s History Month...
 
 
Courtesy photo

Drill sergeants, Soldiers set sights on success during competition here

Courtesy photo Soldiers from across the 108th Training Command (Initial Entry Training) prepare for a run during the Best Warrior and Drill Sergeant of the Year Competition held on Fort Huachuca this week. A U.S. Army Reserve u...
 




0 Comments


Be the first to comment!


Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


Directory powered by Business Directory Plugin