Congressional Record—Senate S8293

Total Page:16

File Type:pdf, Size:1020Kb

Congressional Record—Senate S8293 July 12, 1999 CONGRESSIONAL RECORD Ð SENATE S8293 Now, Marine Lieutenant Colonels, even The power brokers in Washington, who ered that some messages could be those of us no longer on active service, favor ``yes men'' over honest men, probably paired as having been ``randomized'' by aren't in the habit of referring to Generals as won't miss Chuck Krulak very much. But his the same pad and page carrying ran- friendsÐparticularly when the General in Marines will. And I willÐmostly because I dom additive digits (and hence were question is the top Marine. And we sure remember him as a young Captain of Infan- don't offer a public critique of his perform- try, thirty years ago, when we served to- solvable). ance as Commandant of all Marines. It just gether in a corner of hell called Vietnam. He Such mixed pairs were worked on by isn't done. was then, as he is today, a warrior and a man a small group of women led by Katurah But in this case, somebody needs to do it. of principle, integrity and character. He em- ``Katie'' McDonald. This group had al- Because when Chuck Krulak takes off his bodied then, as he does today, the guiding ready produced a remarkable amount Dress Blues with those four stars on the ethos of the MarinesÐSemper FidelisÐAl- of code text, and the code-groups that shoulders for the last time as he will at the ways Faithful. end of this month, the conscience of the had appeared so far had even been in- Mr. BURNS. Mr. President, I believe dexed in context by a card machine. Joint Chiefs of Staff will have retired. And in you can see how fitting it is that this this town, that kind of moral authority is The material was just awaiting the ap- going to be missed more than most people re- article be included in the RECORD.· pointment of a linguist, and Gardner alize. f ``appointed himself'' to be it. It was the For four years, Chuck Krulak has been MEREDITH GARDNER easy stage, but without it all the pre- ``the General who tells it like it is''Ðin pub- paratory work would have been for lic and in private. Whether in testimony on · Mr. MOYNIHAN. Mr. President. I rise nothing. Capitol Hill, in the Pentagon's ``tank'' where today to pay tribute to Meredith Gard- the Joint Chiefs of Staff meet, or at the Gardner's reconstruction of the for- ner, long unsung contributor to the eign intelligence (VENONA) code book White House, Chuck Krulak could be counted identification of spies. Described by upon to tell the truthÐwhether they wanted was slow at first, but gained momen- to hear it or not. His reputation for integrity the FBI's Robert Joseph Lamphere as tum. Because some recruits were in a city that too little values this virtue is ``the greatest counter-intelligence tool named in the messages and given cover unparalleledÐand a credit to the Corps of this country has ever known,'' Gardner names, it became obvious that the FBI Marines he has led through some of the most was the National Security Agency's ought to receive translations of the ca- tumultuous events in our history. His stead- leading enabler of the reading of thou- bles. Special agent Robert Joseph fast devotion to his 174,000 Marines is evident sands of enciphered cables intercepted in all that he has said and done as Com- Lamphere was assigned to be the (very from Soviet foreign intelligence in the efficient) link between the NSA and mandant. And very little of it endeared him 1940's. The NSA, under its various to an administration hell bent on FBI. The next is history. downsizing, feminizing, and de-``moralizing'' names, spent four decades deciphering Gardner spent 27 years working on America's Armed Forces. what Moscow intended to be an un- the ``Russian problem'' before retiring When General Krulak was appointed Com- breakable Soviet cipher. Gardner and in 1972. He and his wife of 56 years, mandant in 1995, the Clinton White House his team painstakingly worked on Blanche, who also worked for the Army was busy taking an axe to America's defense these messages in a project which came establishment. By the time these draconian Security Agency, now spend part of to be known eventually as ``VENONA.'' their time teaching Latin to a small cuts were done, the Army would lose eight The resulting VENONA decrypts, active combat divisions. The Air Force and group of students. I commend Mr. Navy would lose 20 air wingsÐand 2,000 com- which were finally revealed publicly in Gardner for the invaluable assistance bat aircraft. Another 232 strategic bombers, 1995, detail the Soviet's espionage ef- he has given to our country, which we 13 ballistic missile submarines, four aircraft forts in the United States during and are only now beginning to realize and carriers, all of our battleships, and more after World War II. understand. I salute Mr. Gardner for than 100 other combat vessels would be sent Gardner has a genius for learning his dedicated and important service.· to the boneyard. Only the Marine Corps was languages, and is fluent in German, f able to withstand Commander-in-Chief Clin- Spanish, French and Russian and has ton's quest for a mothballed military. had courses in Old High and Middle TRIBUTE TO MR. LARRY STOLTE, And it didn't stop there. The Marines were ON HIS RETIREMENT badgered to make their boot camps co-ed. High German, Old Norse, Gothic, Lith- General Krulak said no. The Corps was told uanian, and Sanskrit. He taught lan- · Mr. SMITH of New Hampshire. Mr. that it should put women in ground combat guages at the Universities of Texas and President, I rise today to acknowledge assignments in their expeditionary forces. Wisconsin before being recruited by the and commend Mr. Larry Stolte as he Again, the top Marine said no. When the U.S. Army's Signals Intelligence Serv- retires from the United States Fish and Pentagon started talking about relaxing the ice (the precursor to the National Se- Wildlife Service. standard on sexual misconduct, Chuck curity Agency) shortly after the Japa- Larry's career in New England began Krulak just said, no. And when a Clinton po- litical appointee responsible for ``femi- nese bombed Pearl Harbor. The Army as a fisheries biologist in 1969 with the nizing'' the military decried the Marines as wanted people fluent in many lan- New Hampshire Fish and Game Depart- ``extremists,'' the Commandant fired back a guages to work on breaking German ment, working on the introduction of blistering response that yes, they were, ``ex- and Japanese codes. Until 1955 Gardner Coho salmon in the Great Bay area. In tremely fit, extremely faithful and ex- worked at Arlington Hall, a former 1975, he joined the United States Fish tremely patriotic.'' In every case he was girl's school located 10 miles outside and Wildlife Service and became the right. Washington, which served as the Atlantic Salmon Planner for New Eng- And he didn't give an inch when the Army's headquarters for code-breaking vaunted Clinton ``National Security Team'' land. Larry took the lead in developing acted as though the Marines had done so operations. Gardner soon added Japa- an Atlantic salmon strategic plan for much for so long with so little that they nese to his repertoire of languages. By southern New England, and chaired the could continue to do everything with noth- chance, he became the first American state committee that developed the At- ing forever. Faced with unprecedented global to read in an intercepted message the lantic salmon plan for Maine's rivers. commitments and the prospect of declining Japanese word for atom bomb, ``genshi- While working to restore Atlantic readiness, Krulak pulled no punches. He told bakudan.'' salmon to New England's waterways, the House and Senate Armed Services Com- When the war with Japan ended, the Larry began researching the ``king of mittees that the Marines were ready to per- NSA phased out its Japanese section. form Mission ImpossibleÐbut that they gamefish'' in the Merrimack River. He needed to be better armed and equipped. He Gardner learned that there was a sec- documented his research in a book ti- got what he wanted. tion working on Soviet Union messages tled ``The Forgotten Salmon of the While the other branches of our Armed (its existence was kept secret) and he Merrimack,'' which was published in Forces struggle to meet recruiting and re- transferred into it. Gardner insists 1981 and is recognized by many as the tention goals, lower their entrance stand- that the most arduous efforts to make most accurate record of the history of ards, ease training requirements and try to the messages readable had already been the Atlantic salmon in the Merrimack make military service less ``military''Ðthe done before he came along. First, the Corps has done exactly the opposite. Krulak River. extended boot campÐadding his ``Crucible messages had to be sorted into at least For the past 15 years, Larry has been Training'' to the already rigorous initiation four varieties, each used by representa- the Fish and Wildlife Service's coordi- into the Corps. His Marines loved him for it, tives of separate Soviet government nator for anadromous fish restoration and the Corps has thrived. departments. It had also been discov- in the Merrimack River. He has also.
Recommended publications
  • SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM
    SPYCATCHER by PETER WRIGHT with Paul Greengrass WILLIAM HEINEMANN: AUSTRALIA First published in 1987 by HEINEMANN PUBLISHERS AUSTRALIA (A division of Octopus Publishing Group/Australia Pty Ltd) 85 Abinger Street, Richmond, Victoria, 3121. Copyright (c) 1987 by Peter Wright ISBN 0-85561-166-9 All Rights Reserved. No part of this publication may be reproduced, stored in or introduced into a retrieval system, or transmitted, in any form or by any means (electronic, mechanical, photocopying, recording or otherwise) without the prior written permission of the publisher. TO MY WIFE LOIS Prologue For years I had wondered what the last day would be like. In January 1976 after two decades in the top echelons of the British Security Service, MI5, it was time to rejoin the real world. I emerged for the final time from Euston Road tube station. The winter sun shone brightly as I made my way down Gower Street toward Trafalgar Square. Fifty yards on I turned into the unmarked entrance to an anonymous office block. Tucked between an art college and a hospital stood the unlikely headquarters of British Counterespionage. I showed my pass to the policeman standing discreetly in the reception alcove and took one of the specially programmed lifts which carry senior officers to the sixth-floor inner sanctum. I walked silently down the corridor to my room next to the Director-General's suite. The offices were quiet. Far below I could hear the rumble of tube trains carrying commuters to the West End. I unlocked my door. In front of me stood the essential tools of the intelligence officer’s trade - a desk, two telephones, one scrambled for outside calls, and to one side a large green metal safe with an oversized combination lock on the front.
    [Show full text]
  • Venona Special Studies
    - 1 - Venona Project Special Studies Transcribed by Students of the Mercyhurst College Institute for Intelligence Studies Arranged by John Earl Haynes, Library of Congress, 2010 COVER NAMES IN NEW YORK TRAFFIC p. 2 UNIDENTIFIED COVER NAMES IN NEW YORK TRAFFIC p. 86 COVER NAMES IN SAN FRANCISCO TRAFFIC p. 92 COVER NAMES IN WASHINGTON TRAFFIC p. 123 ADDITIONAL COVERNAMES AND RELATED INFORMATION IN DIPLOMATIC TRAFFIC p. 127 REVISED TRANSLATION OF MESSAGE ON ANTENNA-LIBERAL'S WIFE ETHEL p. 135 THE COVERNAMES "ANTENNA" AND "LIBERAL" IN . MESSAGES p. 139 ESSAGES IN . INVOLVING THE COVERNAME"ENORMOZ" AND THE NAMES OF NUCLEAR PHYSICISTS, ETC. p. 147 UNDATED REPORT OF MEREDITH GARDNER p. 155 DEVELOPMENT OF THE “G--“HOMER” [“GOMER”] CASE p. 158 THE KOMAR (KRAVCHENKO) AFFAIR IN . MESSAGES p. 161 REVISED TRANSLATION OF TWO . MESSAGES ON CHANGES IN COVERNAMES p. 170 THE COVERNAME "KARAS" IN. TRAFFIC p. 178 THE COVERNAMES "TÉNOR", "BAS", AND "CHETÁ" (? IN . TRAFFIC p. 181 - 2 - Special Study Cover Names in New York Traffic - 3 - cover-name Message number Date Publication reference S/ or 3/NBF/ 19 N.Y. to M. 812 29053 JKI 06 T1022 1B-1910 0027A ABRAM N.Y. to M. 992 24063 JKR 14 T872√ 1B-7518 0005A JACK SOBLE 1086 06073 JKV 48 T873√ 2A-0011 1957 29113 NNNNNN T939√ 625 04054 JHD 48 T916√ 851 15064 JIJ 40 T10.1√ 1146 10084 JHM 41 T123√ 1251 02094 JHN 12 T301√ (to ChEKh) 0005B 1353 23094 JHO 42 T289√ 1449 12104 JIL 37 T106√ 1754 14124 JHZ 49 T6√ 48 11015 JHV 37 (NSA)T1941 AVGUR 2A-0013 1638 (AUGUR) N.Y.
    [Show full text]
  • VENONA: an Overview
    DOCID: 3575728 Cryptologic Almanac 50th Anniversary Series VENONA: An Overview (U) "Spy catching" is an alluring phrase more often connected with James Bond than with a cryptanalyst. However, during the Cold War, a group ofcryptanalysts assisted the spy catchers in their efforts to stop Soviet espionage in the United States and other allied countries. Their decrypts revealed, among other things, the extent ofthe KGB operations in the United States and furthered the FBI's and other agencies' efforts in tracking down these spies. (U) VENONA was the final in a series ofcover names for the project to exploit cryptosystems used to protect what was initially believed to be Soviet diplomatic communications. The messages were encrypted using a complicated code that was then superenciphered by adding a numeric key stream from a one-time pad to the code. After some analysis, the cryptanalysts discovered they were really attacking five different systems being used by five different entities instead ofone as originally thought. The five users for the five versions ofVENONA were Soviet trade representatives, Soviet diplomats, and three Soviet spy agencies (the KGB, the Soviet Army General Staff Intelligence Directorate (GRU), and the Soviet Naval Intelligence, Staff(GRU-Naval)). ~ Although American cable companies, at the direction ofthe U.S. Army, had been collecting VENONA messages since 1939, there was no serious effort against the traffic until 1 February 1943. Prior to that time the system was believed unbreakable and thus not worth the cryptanalytic effort. One-time pads were and are still considered one ofthe most difficult manual cryptosystems to exploit; properly used, a one-time pad is virtually unbreakable.
    [Show full text]
  • Compiled Fall 2018 Binder
    Recent Writings and Press Coverage for Howard Gardner and Project Zero September 2018 Prof. Howard Gardner Harvard Graduate School of Education 13 Appian Way Longfellow Hall 234 Cambridge, MA 02138 Phone: 617-496-4929 Fax: 617-496-4855 [email protected] www.howardgardner.com www.multipleintelligencesoasis.org www.pz.harvard.edu www.thegoodproject.org Table of Contents I. The App Generation “Getting smart about smartphones” The Atlantic “You should talk about politics this Thanksgiving” Salon.com II. Education “Celebrating Every Learner: Activities and Strategies for Creating a Multiple Intelligences Classroom” Amazon “Visible Learners: Promoting Reggio-Inspired Approaches in All Schools” Amazon “Learning lessons, the fun way” The Hindu “Harvard Fellows deliver inspiring testimony during MCSB meeting” Ledger-Enquirer “Can science change the culture of education?” The Frederick News-Post “Contra-disciplinary - the best model of artscience education” The Hindu “The 2018 RHSU Edu-Scholar Public Influence Rankings” American Enterprise Institute “Education must be more than mere consumption of knowledge, says Saikat Majumdar” The Hindu “So your preschooler can’t sit still? Don’t worry, it’s normal” Momaha “Safari Kid: enabling children in perfect learning environment” Digital Learning “Back to Leonardo’s notebooks” Outlook “Learn to unlearn” The Hindu “On creativity” The Brooklyn Rail “Riverview charter school recognized for closing education gap” Bloomingdale Patch “Urgent memo to Malaysia’s new Minister of Education” Eurasia Review “Sole
    [Show full text]
  • Project VENONA: Breaking the Unbreakable Code
    Georgia Southern University Digital Commons@Georgia Southern University Honors Program Theses 2020 Project VENONA: Breaking the Unbreakable Code Cassandra Hankin Georgia Southern University Follow this and additional works at: https://digitalcommons.georgiasouthern.edu/honors-theses Part of the History Commons Recommended Citation Hankin, Cassandra, "Project VENONA: Breaking the Unbreakable Code" (2020). University Honors Program Theses. 471. https://digitalcommons.georgiasouthern.edu/honors-theses/471 This thesis (open access) is brought to you for free and open access by Digital Commons@Georgia Southern. It has been accepted for inclusion in University Honors Program Theses by an authorized administrator of Digital Commons@Georgia Southern. For more information, please contact [email protected]. Project VENONA: Breaking the Unbreakable Code An Honors Thesis submitted in partial fulfillment of the requirements for Honors in History. By Cassandra Hankin Under the mentorship of Dr. Bill Allison ABSTRACT Project VENONA was a top-secret counterintelligence program initiated by the United States Army Signals Intelligence Service during World War II. VENONA was established to decipher intercepted Soviet communications and break the “unbreakable” Soviet code system. Examining Project VENONA and its discoveries is vital to understanding the history of the early Cold War. Thesis Mentor:________________________ Dr. Bill Allison Honors Director:_______________________ Dr. Steven Engel April 2020 Department of History University Honors Program Georgia Southern University 2 Acknowledgements There are many people I’d like to thank for helping me during the year and a half I worked on this project. For helping me through the research and writing process, I would like to thank Dr. Bill Allison, who never gave up on me or my project.
    [Show full text]
  • William Weisband from AFIO's the INTELLIGENCER
    Association of Former Intelligence Officers From AFIO's The Intelligencer 7700 Leesburg Pike, Suite 324 Falls Church, Virginia 22043 Journal of U.S. Intelligence Studies Web: www.afio.com * E-mail: [email protected] Volume 26 • Number 1 • Fall 2020 $15 single copy price In practice, maintaining such secrecy proved impossible. The use of the one-time pad necessitated When Intelligence Made a Difference the creation of hundreds of thousands of unique, non-repeating key pages during World War II when the Soviets were sending out thousands upon thousands — Cold War — of messages. Moreover, digital computers that could quickly create one-time pads in large quantities did not exist yet. As a result, Soviet cryptographers resorted to replicating the pads, turning them from one-time use pads to two-time pads or more. In order to mitigate the William Weisband increased risks, the Soviets did not reproduce whole pads. Rather, they copied individual pages, which were inserted into different pads.2 While not as secure as by Naiomi Gonzalez the one-time use pad system, the Soviets assumed that the resources needed to decode the message would be too time-consuming. An enemy power would need to uring the Cold War, the United States and the have the resources to gather enough of the duplicate Soviet Union engaged in a frantic cat-and- keys and hire a large number of cryptanalysts, who mouse game: both struggled to gather the D would then need to spend years trying to break Soviet intelligence to parse the other nation’s political and encryptions.3 military weaknesses, strengths, and intentions, while However, members of the Army’s Signal Intelli- working to insure their own information remained gence Service (SIS) Venona Project, a highly classified secure.
    [Show full text]
  • Staff Picks a P R I L 2 0 1 8
    Readers’ Advisory Committee STAFF PICKS A P R I L 2 0 1 8 Libraries To find on the web go to www.nccde.org/libraries and click on “What Do I Read Next” FICTION ONLY CHILD BY RHIANNON NAVIN (PICKED BY SM) Squeezed into a coat closet with his classmates and teacher, first grader Zach Taylor can hear gunshots ringing through the halls of his school. A gunman has entered the building, taking nineteen lives and irrevocably changing the very fabric of this close-knit community. While Zach's mother pursues a quest for justice against the shooter's parents, holding them responsible for their son's actions, Zach retreats into his super-secret hideout and loses himself in a world of books and art. Armed with his newfound understanding, and with the optimism and stubbornness only a child could have, Zach sets out on a captivating journey towards healing and forgiveness, determined to help the adults in his life rediscover the universal truths of love and compassion needed to pull them through their darkest hours. (304 pages) WINTER SISTERS BY ROBIN OLIVEIRA (PICKED BY SLH & SH) New York, 1879: After an epic snow storm ravages the city of Albany, Dr. Mary Sutter, a former Civil War surgeon, begins a search for two little girls, the daughters of close friends killed by the storm who have vanished without a trace. Mary's mother and niece Elizabeth, who has been studying violin in Paris, return to Albany upon learning of the girls' disappearance--but Elizabeth has another reason for wanting to come home, one she is not willing to reveal.
    [Show full text]
  • Introduction to Cybersecurity 4
    First Edition: MAJ THOMAS A. OWENS, CAP 2019 Revision: MAJ DEREK RUSTVOLD, CAP DIRECTOR OF CYBER PROGRAMS, MID-ATLANTIC REGION Editing: SUSAN MALLETT, CAP NHQ DR. JEFF MONTGOMERY, CAP NHQ Published by NATIONAL HEADQUARTERS CIVIL AIR PATROL AEROSPACE EDUCATION DIRECTORATE MAXWELL AFB, ALABAMA 36112 REVISED SEPTEMBER 2019 Contents AN INTRODUCTION TO CYBERSECURITY 4 CAP Cybersecurity Module 4 Summary of Recent Attacks and Motivation for Action 5 Activity Group One: Codes, Ciphers and Encryption Awareness 8 Unit Profile: Room 40 and Bletchley Park 15 Biography: Alan Turing 15 CONCEPTS IN INFORMATION ASSURANCE AND CYBER WARFARE 16 Activity Group Two: Vulnerabilities and Basic Defense Skills 19 Patriot Bio: Maj. Gen. Robert J. Skinner 25 CONCEPTS OF OPERATING SYSTEMS AND NETWORKING 26 Activity Group Three: Basic Probing Skills 27 th Unit Profile: 24 Air Force 38 th Unit Profile: 67 Network Warfare Wing 38 Patriot Bio: Brig. Gen. Kevin B. Wooton 38 EXPLORING CAREERS IN CYBERSECURITY 39 Unit Profile: USCYBERCOM 43 Patriot Bio: General Keith B. Alexander 43 Bonus Graphic: USCYBERCOM 44 CONCLUSION AND NEXT STEPS 45 APPENDICES 51 A: Motivational Chronology of Cyber Warfare 51 B: Glossary of Terms, Threats, and Countermeasures 55 C: Toolbox of Promotional Resources 68 D: Toolbox of Technical Resources 72 E. Solutions to Module Activities 74 3 An Introduction to Cybersecurity Our Nation's Cyber Dependency At all its various levels, the United States has become a “cybernation.” Aviators will be amused to discover the prefix “cyber-” is derived from the word cybernetic, which comes from a Greek word κυβερνητικός (kybernētēs) which means pilot, rudder, steersman, or governor.
    [Show full text]
  • Introduction Background How It Works the VENONA Breakthrough
    By Cindy Flores, Hyeok Jung Kim, Dalia Moradi, Abanob Saleh, Xi Ye You Seminar 3: Science & Technology of NYC, Professor Kent D. Boklan Introduction Significance How It Works On February 1, 1943, a small group of code breakers of the U.S. Army’s Importance of the Venona Project The Code (Vernam Cipher) and How it Works Signal Intelligence Service (SIS) launched the VENONA Project, a secret • Exposed the Soviet spy ring and information about the atomic bomb • Proven to be mathematically secure under ideal implementation by counterintelligence program to decrypt and exploit communication by the • Lasted from 1943 to 1980, declassified in 1995- from World War 2 Claude Shannon Soviet Union. throughout the Cold War (1947-1991) 1) Represent plain text into numbers (alphabet positioning.. ie: A=1) • Exposed Julius and Ethel Rosenberg for espionage and conspiracy to 2) Create a randomly generated key that is the same length as the plain Background provide atomic secrets to the USSR. As a result, they were executed text by electric chair in 1953. 3) Combine the plaintext and random key using XOR or modular addition History • They were implicated by their in-laws Ruth and David Greenglass, 4) Convert the numbers back into cipher text • The code breakers were named “Arlington Hall” after their communists who were also Soviet spies 5) To get back to the plain text, XOR the key again or subtract using headquarters in Virginia • Alger Hiss was a former U.S. State Department official who was modular arithmetic to get the ciphertext. • “Venona” was the code word for the project convicted of perjury in 1950 for involvement in a communist • The SIS led to creation of the National Security Agency (NSA) espionage ring.
    [Show full text]
  • (U) Cryptologic Almanac Soth Anniversary Series (U) POLYGLOT: the Meredith Gardner Story
    ~t'i~GI for;9~~ ~~JSA on 12-01-2011 , Transparency Case# 63853 (U) Cryptologic Almanac soth Anniversary Series (U) POLYGLOT: The Meredith Gardner Story (U) The photograph may look "unreal" to today's viewers, but it, like many others taken during World War II at Arlington Hall Station, reflected wartime realities. The picture displays a spacious room with a large number of women sitting around tables, busily employed with their paperwork; in a comer of the room sits one male, wearing a dark suit, the only member of his sex in sight. (U) Reproduced in many recent books about codebreaking, the photograph shows a frozen moment in the wartime service of Meredith Gardner. (U) Meredith Gardner, who died on 9 August 2002 at the age of 89 (he was born in 1912 in Okalona, Mississippi), did valuable translation work in World War II, but he is today remembered as the cryptolinguist who changed the history of the nation with his high achievements on a project known by its postwar codename, VENONA. (U) After the United States entered World War II, the Army and Navy cryptologic services expanded rapidly. In accord with the slogan "Free a man to fight," both services recruited thousands of women, some for uniformed duty, some as civilian employees. The cryptologic services also recruited men who were ineligible for military service. Among those who came to the Army's Arlington Hall was Meredith Gardner. (U) Gardner could read Spanish, French, Russian, Lithuanian, Sanskrit, and -- most important for Arlington Hall -- had a master's degree in German.
    [Show full text]
  • Classified~: Compl.ITE a Facsiml..E Or Release by NSA on TOP SECRET UMBRA Declassified On: J7-03-2014 Pursuant to ::.O
    SECURITY CLASSIFICATION NSA STAFF PROCESSING FORM TO I EXREG CONTROL NUMBER I KCC CONTROL NUMBER DIR THRU ACTION EXREG SUSPENSE D/DIR __, EXEC/DIR__ D APPROVAL KCC SUSPENSE SUB.JECT Update on VENONA Ceremony D SlGNATURE ELEMENT SUSPENSE [ij INFORMATION DISTRIBUTION ExReg, DDP, A/DDP, NS, NSP, VENONA Working Group PURPOSE: To provide update on VENONA Ceremony, scheduled for 10:30 Tuesday, 11 July 1995, in the CIA HQ Bldg Lobby. DISCUSSION: The attached package provides a progress report on the VENONA Ceremony. A meeting was held at CIA on Thursday, 22 June, to lay the groundwork and a package was prepared for the DCI by his staff to update him on the event. (This package is similar to the DCl's package.) The ceremony is tentatively scheduled to last 30 minutes, to be followed by a brief Q & A session led by the DCI and then a reception for invited guests. As the guests depart the ceremony area, press will be invited to remain behind to ask questions about VE NONA; these will be 'fielded by NSA Historian Dr. David Hatch. DDIR and David Kahn may choose to remain as well. TAB A provides the details of the ceremony. A proposed list of the invited dignitaries, at TAB B, was submitted to the DCI for his review along with the text of the invitation, TAB C. The Introductory History of VENONA and Guide to the Translations is finalized and is at the printers. This document, attached at TAB D, will be included in the press kits and released to the general public upon request.
    [Show full text]
  • A Counterintelligence Reader, Volume 2 Chapter 4, VENONA
    226 CHAPTER 4 VENONA Introduction In 1943 the Army Signal Intelligence Service, the forerunner to the National Security Agency (NSA), started a project codenamed VENONA, which concentrated on cracking the Soviet Diplomatic code) Ultimately, after a series of cryptographic breakthroughs over a period of several years, a number of KGB espionage messages were broken, read, and discovered to reveal details of widespread KGB-inspired espionage efforts, including those of the atomic bomb spies) The counterintelligence payoff from VENONA was significant) It was instrumental in providing the FBI with investigative leads that contributed to the identification of the Rosenberg atomic espionage ring and a number of other agents spying on the atomic bomb program) In a ceremony at CIA headquarters in Langley, Virginia, on 11 July 1995, Director of Central Intelligence John M) Deutch announced the release of the VENONA translations of the encrypted Soviet diplomatic communications) In October 1996 a conference on VENONA, cosponsored by CIA, NSA, and the Center for Democracy was held in Washington, D)C) For the conference, CIA and NSA collaborated on producing a publication, called VENONA, Soviet Espionage and The American Response, 1939-1957, as a handbook for scholars interested in VENONA) Anyone interested in this chapter of American counterintelligence should also use the VENONA volume as well as look at the 2,900 Soviet messages on the Internet) 217 VENONA Short History of VENONA On 1 February 1943, the US Armys Signal 3) KGBthe Soviet espionage
    [Show full text]