Ike and His Spies in The

Total Page:16

File Type:pdf, Size:1020Kb

Ike and His Spies in The Ike and his Spies Skyin the Eisenhower, Fearing a Surprise Soviet Attack, Pushed for Better Intelligence, Approved U­2 Flights By David Haight s Supreme Allied Commander in Europe in World It was important to pierce the Soviets’ curtain of A War II, Dwight D. Eisenhower ordered one of secrecy, but information about their military capabili­ the biggest surprise attacks in world history—the D­ ties was proving elusive to the techniques of tradi­ day landing on the coast of France on June 6, 1944, tional espionage. which marked the beginning of the end for the Ger­ Records in the holdings of the Eisenhower Presi­ man Third Reich. But before making the final decision dential Library in Abilene, Kansas, reveal how the 34th to launch the attack, he wanted the best intelligence President dealt with his desire for quality intelligence available, and he got it. about the Soviets’ military activities while balancing Nearly a decade later, as President of the United the risks involved in getting that information against States, Eisenhower was still concerned about surprise those of setting off a full­scale war with the former attacks—but this time he was worried about a Pearl World War II ally. Harbor–style attack on the United States by a nuclear­ Balancing those risks presented him with a armed Soviet Union. And again, Eisenhower wanted dilemma, as depicted by the record of the 157th meet­ the best available intelligence. But getting it and man­ ing of the National Security Council on July 31, 1953, aging it proved to be more difficult than it had been just over six months after he took office. the decade before. The director of the Central Intelligence Agency,Allen Eisenhower understood that knowledge based on Dulles, reported that the Soviet Union had recently reliable intelligence is power and that the Soviet developed a new heavy bomber with an estimated Union posed a grave threat to America’s security. He range of 6,000 miles and capable of reaching any point knew that the Soviets were testing nuclear weapons in the United States and returning to the USSR.At this and developing long­range bombers to deliver them. same meeting, Gen. Omar Bradley, chairman of the 14 Prologue Winer 2009 President Dwight D. Eisenhower appreciated the importance of aerial intelligence­ gathering. U­ 2 reconnaissance aircraft (opposite page) began flying over the USSR in 1956. Title Prologue 15 Joint Chiefs of Staff, briefed the President Nevertheless, through varying levels of 1953, included an expansion of U.S. intel­ and the council on the loss of a U.S. Air archival processing and researcher­gener­ ligence collection and analysis. Force plane, an RB­50, in the Sea of Japan. ated declassification requests, a large vol­ The President placed top priority on The ensuing discussion revealed that the ume of the historical record of Eisen­ this, and to drive home a sense of urgency, United States also shot down Russian planes hower’s management and employment of he told the military service chiefs in late that approached U.S. ships too closely.The intelligence has been made available to 1954 that for the first time the United President said that both the Americans and researchers at the Eisenhower Library. States had reason to be frightened for its the Russians knew that if U.S. planes flew Anyone familiar with 20th­centur y safety because an enemy armed with the toward Vladivostok, they were not on train­ records is aware that declassifying intel­ new (nuclear) weapons could knock out ing missions. As Eisenhower said, this shoot­ ligence information is often difficult and the nation within 30 days. down was not as unprovoked as it might time consuming. Despite the fact that cer­ Eisenhower authorized aerial intelligence­ have seemed. In this case, the former five­ tain intelligence­related documents in the collecting programs in order to better assess star general could see the matter from the library are likely to remain security clas­ the military capability of the Soviet Union, Soviet viewpoint and appeared to play it sified for years to come, significant China, and other Communist­bloc nations to down not only to avoid public discussion of progress has been achieved in releasing launch a surprise attack on the United States. sensitive intelligence operations but also to information on many intelligence topics. He approved overflights of the Soviet Union avoid domestic pressure to retaliate against The declassified records, in their original by military aircraft in a highly compartmen­ the Soviets. context, are dependent upon historians talized intelligence program labeled Were these aerial missions worth the to give narrative perspective to their SENSINT (Sensitive Intelligence).Despite the risk, loss, and expense invested in them? archival existence. risks of Soviet retaliation,U.S. military aircraft Many writers have attempted to answer flew directly over the Soviet territory from • • • this question by studying the available evi­ early 1954 until late 1956. dence. These f lights were hidden in a To counter the menace of Soviet mili­ The U.S. Air Force developed balloons cloak of secrecy, and even now many tary might, the Eisenhower administration equipped with cameras and f lew them details are unclear either because of con­ developed a strategic posture policy, over Soviet bloc countries under the guise tinuing security protection or because of known as the “New Look.” This basic of meteorological research. The balloon the lack of written documentation. national security policy, approved in late program, which Eisenhower approved with misgivings in 1955, yielded more protests from the Kremlin than it did use­ ful intelligence information. Eisenhower ordered balloon f lights over Russia stopped in 1956, but various schemes for launching balloons floated as late as 1958. When the President at Geneva in 1955 sought Soviet agreement to a mutual exchange of military information with the United States, First Secretary of the Com­ munist Party Nikita Khrushchev and the Soviet delegation rejected his initiative. Eisenhower, therefore, relied on covert or black operations, emphasizing overhead intelligence collection as a major part of the United States’ effort to meet this threat of surprise attack. Meanwhile, in 1956, U­2 aircraft began f lying over the Soviet Union. Unlike the SENSINT program, the U­2 program was directed by the CIA, a civilian agency, and piloted by civilians. Eisenhower, while real­ izing the provocative nature of military air­ craft f lown by military personnel over or James R. Killian, being sworn in here as special assistant to the President for science and technology, was a around the Soviet Union, continued key adviser to the President on organizing and developing U.S. intelligence capabilities to warn of a possible throughout his administration to approve Soviet surprise attack. 16 Prologue Winter 2009 dangers posed by aircraft flying over and advice and oversight on U.S. intelligence around the Soviet Union. programs. In creating the board, the Presi­ Although Killian and Land helped con­ dent sought advice from selected citizens vince the President to embark on many with experience in government service, sci­ technologically advanced programs, the ence and technology, or other executive man primarily responsible for assisting the responsibilities. Eisenhower picked Killian President manage these programs was as the first chairman of PBCFIA, which also Andrew Jackson Goodpaster. included World War II hero Gen. James Upon assuming the post of White House Doolittle, another of the President’s key staff secretary in the fall of 1954, Colonel advisers on intelligence. Goodpaster served as the President’s liaison While Eisenhower continued to use aer­ with the executive agencies responsible for ial reconnaissance to acquire strategic intel­ intelligence, military, and international ligence aimed at reducing the threat of a affairs. He was the President’s “go­to” man, Soviet surprise attack on the United States, Andrew Goodpaster,White House staff secretary, was the person Eisenhower counted on to help he endeavored, with only limited success, to the President’s right­hand man in managing overhead oversee the Cold War aerial reconnaissance implement the PBCFIA’s recommendations intelligence collection programs. programs. His records contain a treasure for better administrative control of these trove of documentation pertaining to high­ diverse intelligence operations. missions conducted on the periphery of altitude balloons, the U­2 aircraft and its mis­ On August 22, 1956, the Chinese shot the Soviet Union and mainland China. sions, other aerial missions flown along the down a Navy plane in the Sea of Japan, These flights, begun under President periphery of the USSR, and plans for the resulting in the loss of the entire 16­man Harry S. Truman, increased tensions development of reconnaissance satellites. crew. In an August 30 meeting with Adm. between the United States and the Soviet In November 1954, the President acted Arthur Radford, chairman of the Joint Chiefs Union and led to many attacks on these on one of the TCP proposals by approving of Staff, Eisenhower, the man who had planes with the loss of planes and person­ funding for“thirty special high performance ordered tens of thousands of men to storm nel. Nevertheless, Eisenhower permitted aircraft”as described by Goodpaster’s mem­ the beaches of Normandy, talked not about such missions to collect communications orandum of a conference with the Presi­ the lost personnel but instead about the fail­ and electronic intelligence and photograph dent. The first successful mission of these ure of the involved U.S. agencies to develop Soviet air and naval facilities while ferreting “special high performance aircraft,” also a cover plan for such situations. He went on out the Soviet radar systems. known as the U­2, flew over the Soviet to state his concern over the apparent lack The Eisenhower administration’s over­ Union in July 1956.
Recommended publications
  • Massive Retaliation Charles Wilson, Neil Mcelroy, and Thomas Gates 1953-1961
    Evolution of the Secretary of Defense in the Era of MassiveSEPTEMBER Retaliation 2012 Evolution of the Secretary OF Defense IN THE ERA OF Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Special Study 3 Historical Office Office of the Secretary of Defense Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Evolution of the Secretary of Defense in the Era of Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Cover Photos: Charles Wilson, Neil McElroy, Thomas Gates, Jr. Source: Official DoD Photo Library, used with permission. Cover Design: OSD Graphics, Pentagon. Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Evolution of the Secretary OF Defense IN THE ERA OF Massive Retaliation Charles Wilson, Neil McElroy, and Thomas Gates 1953-1961 Special Study 3 Series Editors Erin R. Mahan, Ph.D. Chief Historian, Office of the Secretary of Defense Jeffrey A. Larsen, Ph.D. President, Larsen Consulting Group Historical Office Office of the Secretary of Defense September 2012 ii iii Cold War Foreign Policy Series • Special Study 3 Evolution of the Secretary of Defense in the Era of Massive Retaliation Contents Opinions, conclusions, and recommendations expressed or implied within are solely those of the authors and do not necessarily represent the views of the Department of Defense, the Historical Office of the Office of Foreword..........................................vii the Secretary of Defense, Larsen Consulting Group, or any other agency of the Federal Government. Executive Summary...................................ix Cleared for public release; distribution unlimited.
    [Show full text]
  • Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜Naki Navarrete† & Russell Buchan‡
    \\jciprod01\productn\C\CIN\51-4\CIN403.txt unknown Seq: 1 8-APR-19 15:07 Out of the Legal Wilderness: Peacetime Espionage, International Law and the Existence of Customary Exceptions I˜naki Navarrete† & Russell Buchan‡ This Article demonstrates that peacetime espionage does not benefit from permissive customary international law exceptions. The mainstream view contends that, though peacetime espionage may contravene interna- tional law, developments in customary international law (CIL) nevertheless undercut State responsibility for such conduct. The gist of this view is that acts of espionage benefit from permissive CIL exceptions because its prac- tice is widespread and accepted within the international society. However, the mainstream literature has rarely— if ever— meaningfully engaged with the practice of espionage in an effort to tease out the objective and subjec- tive elements supportive of customary espionage exceptions. This Article closes this gap and debunks the mainstream view. We show that, although widespread, most acts of espionage are committed in secret and, as such, they cannot qualify as State practice for the purpose of CIL formation. We further demonstrate that States have failed to issue expressions of the sub- jective element in support of customary espionage exceptions. We con- clude by suggesting that, while States are entitled to develop customary espionage exceptions in the future, for now they have yet to come out of the legal wilderness. Introduction ..................................................... 898 R I. International Law and Peacetime Espionage............... 901 R A. Principle of Territorial Sovereignty ..................... 905 R B. Law of the Sea ........................................ 909 R C. Diplomatic and Consular Law ......................... 910 R II. Customary Exceptions and Peacetime Espionage .........
    [Show full text]
  • How Should the United States Confront Soviet Communist Expansionism? DWIGHT D
    Advise the President: DWIGHT D. EISENHOWER How Should the United States Confront Soviet Communist Expansionism? DWIGHT D. EISENHOWER Advise the President: DWIGHT D. EISENHOWER Place: The Oval Office, the White House Time: May 1953 The President is in the early months of his first term and he recognizes Soviet military aggression and the How Should the subsequent spread of Communism as the greatest threat to the security of the nation. However, the current costs United States of fighting Communism are skyrocketing, presenting a Confront Soviet significant threat to the nation’s economic well-being. President Eisenhower is concerned that the costs are not Communist sustainable over the long term but he believes that the spread of Communism must be stopped. Expansionism? On May 8, 1953, President Dwight D. Eisenhower has called a meeting in the Solarium of the White House with Secretary of State John Foster Dulles and Treasury Secretary George M. Humphrey. The President believes that the best way to craft a national policy in a democracy is to bring people together to assess the options. In this meeting the President makes a proposal based on his personal decision-making process—one that is grounded in exhaustive fact gathering, an open airing of the full range of viewpoints, and his faith in the clarifying qualities of energetic debate. Why not, he suggests, bring together teams of “bright young fellows,” charged with the mission to fully vet all viable policy alternatives? He envisions a culminating presentation in which each team will vigorously advocate for a particular option before the National Security Council.
    [Show full text]
  • AIR POWER History / WINTER 2015 from the Editor
    WINTER 2015 - Volume 62, Number 4 WWW.AFHISTORICALFOUNDATION.ORG The Air Force Historical Foundation Founded on May 27, 1953 by Gen Carl A. “Tooey” Spaatz MEMBERSHIP BENEFITS and other air power pioneers, the Air Force Historical All members receive our exciting and informative Foundation (AFHF) is a nonprofi t tax exempt organization. Air Power History Journal, either electronically or It is dedicated to the preservation, perpetuation and on paper, covering: all aspects of aerospace history appropriate publication of the history and traditions of American aviation, with emphasis on the U.S. Air Force, its • Chronicles the great campaigns and predecessor organizations, and the men and women whose the great leaders lives and dreams were devoted to fl ight. The Foundation • Eyewitness accounts and historical articles serves all components of the United States Air Force— Active, Reserve and Air National Guard. • In depth resources to museums and activities, to keep members connected to the latest and AFHF strives to make available to the public and greatest events. today’s government planners and decision makers information that is relevant and informative about Preserve the legacy, stay connected: all aspects of air and space power. By doing so, the • Membership helps preserve the legacy of current Foundation hopes to assure the nation profi ts from past and future US air force personnel. experiences as it helps keep the U.S. Air Force the most modern and effective military force in the world. • Provides reliable and accurate accounts of historical events. The Foundation’s four primary activities include a quarterly journal Air Power History, a book program, a • Establish connections between generations.
    [Show full text]
  • The Ethics of Intelligence Collection Ross W. Bellaby
    What’s the Harm? The Ethics of Intelligence Collection Ross W. Bellaby Thesis submitted in fulfilment of the requirements for the degree of PhD Department of International Politics Aberystwyth University June 13th, 2011 DECLARATION This work has not previously been accepted in substance for any degree and is not being concurrently submitted in candidature for any degree. Signed ...................................................................... (Ross W. Bellaby) Date ........................................................................ STATEMENT 1 This thesis is the result of my own investigations, except where otherwise stated. Where *correction services have been used, the extent and nature of the correction is clearly marked in a footnote(s). Other sources are acknowledged by footnotes giving explicit references. A bibliography is appended. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ [*this refers to the extent to which the text has been corrected by others] STATEMENT 2 I hereby give consent for my thesis, if accepted, to be available for photocopying and for inter- library loan, and for the title and summary to be made available to outside organisations. Signed ..................................................................... (Ross W. Bellaby) Date ........................................................................ I hereby give consent for my thesis, if accepted, to be available for photocopying
    [Show full text]
  • Cryptography
    Cryptography From Wikipedia, the free encyclopedia Jump to: navigation, search "Secret code" redirects here. For the Aya Kamiki album, see Secret Code. German Lorenz cipher machine, used in World War II to encrypt very-high-level general staff messages Cryptography (or cryptology; from Greek κρυπτός, kryptos, "hidden, secret"; and γράφ, gráph, "writing", or -λογία, -logia, respectively)[1] is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce. Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread. Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved. Contents [hide] • 1 Terminology • 2 History of cryptography and cryptanalysis o 2.1 Classic cryptography o 2.2 The computer era • 3 Modern cryptography o 3.1 Symmetric-key cryptography o 3.2 Public-key cryptography o 3.3 Cryptanalysis o 3.4 Cryptographic primitives o 3.5 Cryptosystems • 4 Legal issues o 4.1 Prohibitions o 4.2 Export controls o 4.3 NSA involvement o 4.4 Digital rights management • 5 See also • 6 References • 7 Further reading • 8 External links [edit] Terminology Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext).[2] Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext.
    [Show full text]
  • Aerial Survellance-Reconnaisance Field Army
    <3 # / FM 30-20 DEP/KRTMENT OF THE ARMY FIELD MANUAL SURVEILLANCE NAISSANCE ARMY ^SHINGTONXC K1££ orti HEADQUARTERS, DEPARTMENT DiF THE ARMY APRIL 1969 TAGO 7075A # 9 * *FM 30-20 FIELD MANUAL HEADQUARTERS DEPARTMENT OF THE ARMY No. 30-20 WASHINGTON, D.C., 25 April 1969 AERIAL SURVEILLANCE-RECONNAISSANCE, FIELD ARMY Paragraph Page CHAPTER 1. INTRODUCTION 1-1—1-4 1-1 2. G2 AIR ORGANIZATION AND FUNCTIONS Section I. Organization 2-1 2-1 2-1 II. Functions 2-3, 3-4 2-1 CHAPTER 3. CONCEPT OF AERIAL SURVEILLANCE AND RECONNAISSANCE EMPLOYMENT 3-1—3-6 3-1 4. AERIAL SURVEILLANCE AND RECONNAIS- SANCE MISSIONS Section I. Type missions 4_i 4_g 4-1 II. Collection means 4_7_4_n 4-2 CHAPTER 5. AERIAL SURVEILLANCE AND RECONNAIS- SANCE PLANNING, OPERATIONS, AND COORDINATION Section I. General planning 5-1—5-5 5-1 II. Specific planning 5-6, 5-7 5-4 III. Request prccedures 5-8—5-10 5- 6 IV. Aircraft and sensor capabilities 5-11,5-12 5-10 V. Operational aids 5-13—5-26 5-12 VI. Coordination 5-27—5-30 5-21 CHAPTER 6. COMMUNICATIONS 6-1—6-5 6- 1 7. MILITARY INTELLIGENCE BATTALION, AIR RECONNAISSANCE SUPPORT, FIELD ARMY Section I. Mission, organization, and functions •_ 7-1—7-3 7-1 II. Concept of employment 7_4 7_g 7-3 III. Planning and operations _ 7_9, 7-10 7-5 CHAPTER 8. AVIATION AERIAL SURVEILLANCE COMPANY Section I. Mission, organization, capabilities, and limitations __ g_i g-6 8-1 II. Command, control, and communication g_7 8-10 8-4 III.
    [Show full text]
  • The Merchants of Death
    THE MERCHANTS OF DEATH The Military-Industrial Complex and the Influence on Democracy Name: Miriam Collaris Student number: 387332 Erasmus University Rotterdam Master thesis: Global History & International Relations Supervisor: Prof. Wubs Date: June 12th, 2016 Merchants of Death Miriam Collaris Erasmus University Rotterdam June 12, 2016 PREFACE This is a thesis about the Military-industrial Complex in the United States of America, a subject, which has been widely discussed in the 1960s, but has moved to the background lately. I got inspired by this subject through an internship I have done in Paris in 2012. Here I was working for an event agency that organized business conventions for the defense and security sector, and in particular the aerospace industry. This was the first time I got in touch with this defense industry and this was the first moment that I realized how much money is involved in this sector. Warfare turned out to be real business. At the conventions enormous stands emerged with the most advanced combat vehicles and weaponry. These events were focused on matchmaking between various players in this sector. Hence, commercial deals were made between government agencies and the industry, which was very normal and nobody questioned this. When I read about this Military-industrial Complex, years later, I started to think about these commercial deals between government and industry and the profits that were gained. The realization that war is associated with profits, interested me in such a way that I decided to write my master
    [Show full text]
  • BATTLE-SCARRED and DIRTY: US ARMY TACTICAL LEADERSHIP in the MEDITERRANEAN THEATER, 1942-1943 DISSERTATION Presented in Partial
    BATTLE-SCARRED AND DIRTY: US ARMY TACTICAL LEADERSHIP IN THE MEDITERRANEAN THEATER, 1942-1943 DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Steven Thomas Barry Graduate Program in History The Ohio State University 2011 Dissertation Committee: Dr. Allan R. Millett, Adviser Dr. John F. Guilmartin Dr. John L. Brooke Copyright by Steven T. Barry 2011 Abstract Throughout the North African and Sicilian campaigns of World War II, the battalion leadership exercised by United States regular army officers provided the essential component that contributed to battlefield success and combat effectiveness despite deficiencies in equipment, organization, mobilization, and inadequate operational leadership. Essentially, without the regular army battalion leaders, US units could not have functioned tactically early in the war. For both Operations TORCH and HUSKY, the US Army did not possess the leadership or staffs at the corps level to consistently coordinate combined arms maneuver with air and sea power. The battalion leadership brought discipline, maturity, experience, and the ability to translate common operational guidance into tactical reality. Many US officers shared the same ―Old Army‖ skill sets in their early career. Across the Army in the 1930s, these officers developed familiarity with the systems and doctrine that would prove crucial in the combined arms operations of the Second World War. The battalion tactical leadership overcame lackluster operational and strategic guidance and other significant handicaps to execute the first Mediterranean Theater of Operations campaigns. Three sets of factors shaped this pivotal group of men. First, all of these officers were shaped by pre-war experiences.
    [Show full text]
  • Jungle Operations International Course – Guidelines to Candidates
    Jungle Operations International Course – Guidelines to Candidates ANNEX E – STUDENTS’S PREPARATION FOR THE DOCTRINAL INTERACTION GENERAL GUIDELINES FOR THE STUDENTS’S PREPARATION – CIOS 2018 The Doctrinal Interaction will take place on 03 (three) distinct days, and each day a specific block of issues will be dealt with in the jungle environment. During the selection process, still in the country of origin, the future student should receive, through the Military Attaché of his country, the subjects that will be addressed in the Doctrinal Interaction. Each subject contains requests with questions that must be answered and presented by the student in the Doctrinal Interaction. The requests, requisites, maps, letters and information required to resolve the requests are contained in the body of this document. Each student must answer all the questions of the requests in a single document in the ".doc" format and also in a single file in the ".ppt" format. These files must be recorded in a flash drive or CD – Rom and brought to CIGS with the student. A military from the Doctrinal and Research Division will collect the files on the first day of the Mobilization Week at CIGS. During the Doctrinal Interaction each student should present the answers to the questions as follows: - On the 1st day the student will have 30 min to present the requests 1, 2, 3 and 4. - On the 2nd day the student will have 30 min to present 5, 6, 7 and 8. - On the 3rd day the student will have 30 minutes to present the requests 9 and 10.
    [Show full text]
  • Aerial Reconnaissance (Pennsylvania Military Museum, T
    PMM BLOG ARCHIVE December 16, 2020 Aerial Reconnaissance (Pennsylvania Military Museum, T. Gum, Site Admin.) Even though the Korean War had come to a standstill a new form of warfare was being lit off between the United States and the USSR. To remain ahead of the curve, the ability to deliver substantial payloads of ordinance and conduct aerial reconnaissance was critical. The history of the B-47 is relatively well known, and on this day in history (17 DEC 1947) it completed its first flight. The related, and subsequent, iterations of this six-engine subsonic long-range flyer are perhaps lesser known by the general public; the “B” standing for bomber/bombing and others based on this platform carrying various lettering respective to design or purpose. DAYTON, Ohio -- Boeing RB-47H at the National Museum of the United States Air Force. (U.S. Air Force photo) The RB-47H being a (r)econnaissance outfitting of the B-47E platform, was a crucial option when dealing with an adversary well accomplished in deception and misinformation. The role played was quite simple – gather intelligence on the size, location, and capability of the Russian air defense and radar networks. From 1955 to the mid 1960s the RB-47H filled this role until being replaced by the RC-135… arguably a more capable option. The RB-47H was capable of long range missions due to it’s base-design, and successfully operated out of countless airfields and bases. The positioning of these airfields of course played a strategic role in staging and coordinating defensive measures when an RB was intercepted.
    [Show full text]
  • Rhetoric and Reality
    History Studies Volume 13 History Studies Volume 13 information on Walsh, but he was still dismissed by the Catholic Church. After his sacking Jimmy Walsh was Rhetoric and Reality -A History of the Formation employed as a hospital porter, but spent the rest of his life of the 'Domino Theory' trying to enter various religious orders, becoming a novice in a Luke Butterly Benedictine Monastery. He was unsuccessful in these attempts Gaps between rhetoric and reality in U.S. foreign however because he had once been married and was now policy have often been large; indeed such gaps might be said to constitute a defining characteristic of this separated. Jimmy Walsh died after a prolonged illness on 12 nation's diplomacy. I March 1977. and was buried in Sydney. He had never returned 76 to treland. When U.S. President Dwight D. Eisenhower announced the 'domino theory' at a news conference in 1954, he was not announcing a radical departure in Washington's understanding of the emerging situation in Indochina. Rather, he was making public aspects of U.S. foreign policy that had been in the making since the end of World War ll, which in turn interacted with older themes. This essay will first situate this 'theory' in the historiography of the Vietnam War in order to contextualise what follows. It will then map the formation of the domino theory from 1945 to 1954, and will briefly look at the broader implications of such an approach in foreign policy. This will be achieved by examining the secondary literature on the various historical events covered and reviewing the relevant primary sources.
    [Show full text]