Summer 2005: "Gen. Alexander USA, New NSA Director"

Total Page:16

File Type:pdf, Size:1020Kb

Summer 2005: The Link bulletin of the national cryptologic museum foundation, inc. VOLUME 8, NUMBER 2 Summer 2005 Gen. AleXander, USA, New NSA Director LTG K e i t h B. Assessments and Doctrine, J-2, for the Joint Chiefs of Staff. Alexander, USA, In a variety of assignments in Germany and the United former Deputy States, he has been Commander of Border Field Office, Chief of Staff for 511th MI Battalion, 66th MI Group; 336th Army Security Intelligence, HQ, Agency Company, 525th MI Group; 204th MI Battalion; Department of the and 525th MI Brigade. Army, and prior to that Commanding He held key staff assignments as Deputy Director and General of the U.S. Operations Officer, Army Intelligence Master Plan, for the Army Intelligence Deputy Chief of Staff for Intelligence; S-3 and Executive a n d S e c u r i t y Officer, 522nd MI Battalion, 2nd Armored Division; G-2 for C o m m a n d the 1st Armored Division both in Germany and Operation (INSCOM— DESERT SHIELD/DESERT STORM in Saudi Arabia. which had earlier In addition to a Bachelor of Science degree from the U.S. incorporated Military Academy, Gen. Alexander has earned Master the former Army LTG Keith B. Alexander of Science degrees from Boston University (Business Security Agency— Administration), the Naval Post Graduate School (Systems ASA) was named Director, NSA and Chief, Central Security Technology-Electronic Warfare) and in Physics, also from Service (DIRNSA-CHCSS) in July 2005. He became the 16th the NPGS. He also holds a fourth MS degree (National military officer (and the fourth Army officer) to hold that Security Strategy) from the National Defense University. position, replacing Air Force General Hayden, who was selected in February 2005 to be the first Principal Deputy His military education includes the Armor Officer Basic Director of National Intelligence. (Mr. Bill Black, Acting Course, the Military Intelligence Officer Advanced Director, NSA, for nearly Course, the U.S. a half-year, reverted to his in this issue A r m y C o m m a n d position as Deputy Director, Gen. aleXander, new nsa director ........................................................1 and General Staff NSA.) overview ...................................................................................................................2 C o l l e g e , a n d First day cover .....................................................................................................2 the National War Gen. Alexander, a native of asa oki lives! ..........................................................................................................3 College. Syracuse, N.Y., was graduated acquisition committee report .................................................................3 bletchley park post office visits ............................................................4 f ro m t h e U.S. M i l i t a r y kami seya disaster recalled.......................................................................5 H i s b a d g e s Academy at West Point. last wwii comanche code-talker ..........................................................5 include the Senior He has served as Director victory commemoration at bp .................................................................5 Parachutist Badge, of Intelligence, United For the Bookshelf .............................................................................................6 noted in passing (budenbach, klar, neff, wilson) ..............................8 t h e A r m y S t a f f States Central Command, Corrections ...........................................................................................................9 Identification Badge MacDill Air Force Base, Fla., Safford papers found, donated ...........................................................10 and the Joint Chiefs and Deputy Director for Message center .................................................................................................11 of Staff Identification Requirements, Capabilities, memorial registry ...........................................................................................11 Badge. The Link Page 1 Overview Following the turnover of administration in Foundation goals supported by these colleagues of the Museum, noted in our past two issues, and the the past. Their donation was earmarked for the New departure of Gen. Hayden, to become the first Museum. Principal Deputy to the newly created post of Director V-E Day—Victory in Europe, sixty years ago— of National Intelligence (DNI) we welcome the was recalled in England in an impressive service arrival of LTG Keith Alexander as the new Director, recounted here by Dr. Hamer, our “liaison with NSA. The hiatus between Directors was lengthy, but Bletchley Park.” He also reports the visit here of ably filled by Bill Black as Acting Director. The office representatives of BP’s modern Post Office. of Director of Central Intelligence (DCI) is being You’ll see that our small but powerful Acquisition abolished, replaced by the DNI. After decades Committee has been busy. They have also advertised of having one person head both the Intelligence on the Internet and in other publications our desire Community and the CIA, only that “second hat” will to solicit other such items suitable for display or use remain – Director, CIA. After years of serving the at the National Cryptologic Museum. DCI, we will have to see the exact nature of change In this issue’s book review, we hail the and how duties will be re-assigned. (Presumably publication of A Brief History of Cryptology,” by our DCIDs—DCI Directives—pronounced “dee-skids” former Acquisition Committee Chairman (and will become “NIDs,” – National Intelligence Directives former NSA Deputy Director for Research and -- or the like.) Gen. Alexander is no stranger to NSA Engineering), Jim Boone. We have followed Jim’s and its products and services. We look forward to work on this project and his early drafts as it matured, acquainting him with the work of the Foundation in but what an exciting thing to finally hold a copy, support of the magnificent Museum he inherits. thanks to the United States Naval Institute Press, We’re especially appreciative of the donation its publisher. In an unprecedented, but deeply received from the Army Security Agency veterans appreciated gesture, Jim has informed us that his of “Torii Station” (Okinawa). Memorializing their royalties will be donated to the NCMF for support service, and that of their comrades at what was a of the Museum. major field facility, we recognize the sacrifice it John E. Morrison represents, but it also encourages us to see our President The first day cover For the Sixtieth Anniversary of V-E Day, and the issue of new US Postal Service and Royal Mail stamps, BPPO (page 4) de- signed a first day cover based on a “Waves and Wrens” theme. The design features both museums, and the 3-wheel British and 4-wheel US-built Bombes that were operat- ed, respectively during World War Two, by Britain’s WRNS (Women’s Royal Navy Ser- vice) and the US Navy’s WAVES (Women Accepted for Voluntary Emergency Service). The stamps were cancelled with special postmarks on the first day of issue at the show. For added interest a British diplomatic courier also flew them in and out of the US. Page 2 Summer 2005 The Link ASA Oki Lives! Thanks to the U.S. Army Security Agency Okinawa Association, the NCMF Building Fund became the recipient of a $5,000 check at a 1 July 2005 ceremony held at the Museum. And the Museum itself became NCMF Acquisition Committee the repository of a plaque commemorating Torii Station (Okinawa) and the ASA/INSCOM personnel In its report to the Foundation Board of Directors, Dave and associates who worked there over the years. D’Auria (Chairman) and David Hamer (Vice Chairman), The achievement of this goal—led by past president summarized acquisitions on behalf of the Museum, including William “Bill” Overholt and announced in The Torii items suitable for background use in exhibits. These included, Tribune, the association’s newsletter, in March 2003— in addition to books, an audiotape, and other action items: represented both support of the National Cryptologic - an original World War II security poster (with the message, Museum and dedication to shared memories of “The Only ‘Secret’ is the One Never Told”); the veterans, who raised the amount through membership contributions. Hosting a reception for - a WW II “Gibson Girl” radio transmitter, the standard lifeboat the occasion, attended by Acting Director Bill Black, transmitter for distress signals, with hand-cranked generator, NCMF President John E. Morrison commended a built-in Morse keyer and a long-wire antenna and reel; the Association representatives—including former - a U.S. Civil War era telegraph key, to replace the one on dis- commanders, Colonels Bill Vernau, Dave Wisyanski, play in the Museum (determined by visiting expert, Profes- and Walter Cressler—for their past service and sor Thomas Perera, to have been a mis-identified early 20thC thanked them, on behalf of the Foundation and the French Postal Service key); Museum, for their generous donation and memorial - arranged to receive for the Museum a DVD version of a new- plaque. An open letter to “Fellow Soldiers, Families ly produced documentary, Dayton Codebreakers, recounting the and others who served at Field Station Okinawa” from story of Joe Desch and his team at National Cash Register, NCMF Board Member, MG Thomas J. Flynn, USA Dayton, Ohio, in developing the Navy “bombe;” (Ret) commended the action and the past
Recommended publications
  • Work Load of the Maintenance Branch
    HEADQUARTERS ARMY SECURITY AGENCY WASHINGTON 25, D. C. WDGSS-85 15 May 1946 SUBJECT: Work Load of the Maintenance Branch TO: Chief, Security Division 1. The Repair Section of Maintenance Branch is .faced with an ex­ tremely heavy backlog of' work due to the large amounts of' cryptographic equipment returned from overseas for rehabilitation. Awaiting rehabili­ tation by the Repair Section is the followi~g list of equipment and the man hours estimated to complete the work required.: EQUIPMENT MAN HOURS REQUIRED TOTAL 1808 SIGABA 36 65,088 1182 SIGCUM 12 14,184 300 SIGNIN 4 1,200 2297 SIGIVI 4 9,188 533 SIGAMUG 4, 2,132 Total man hours 91,792 These figures represent the number of equipments on hand as of 1 May 1946 and will be continually increased by the arrival of additional equipment . from overseas. 2. It is considered probable that the SIGABA will be modified along the lines proposed by the Navy. It is proposed that all SIGABA 1s be modi­ fied at this Headquarters before shipment is made to the field, thus in­ creasing the work load as follows: EQUIPMENT MAN HOURS REQUIRED 3241 SIGABA 12 The above figure of' twelve hours per machine is an estimate based on preliminary studies of' the proposed change. It may be possible to greatly reduce this total af'ter the changes have been f inaJ.ly agreed on by the .Army and the Navy, and time studies can be made under actual conditions. ,3. In order to properly preserve these equipments while in extended storage, it is recommended that the proposals set .forth in a memorandum to the Chief, Security Division, 4 December 1945, subject "Preparation of Declassified and approved for release by NSA on 01-16-2014 pursuantto E .0.
    [Show full text]
  • Communication Intelligence and Security, William F Friedman
    UNCLASSIFIED DATE: 26 April 1960 NAME: Friedman, William F. PLACE: Breckinridge Hall, Marine Corp School TITLE: Communications Intelligence and Security Presentation Given to Staff and Students; Introduction by probably General MILLER (NFI) Miller: ((TR NOTE: Introductory remarks are probably made by General Miller (NFI).)) Gentleman, I…as we’ve grown up, there have been many times, I suppose, when we’ve been inquisitive about means of communication, means of finding out what’s going on. Some of us who grew up out in the country used to tap in on a country telephone line and we could find out what was going on that way—at least in the neighborhood. And then, of course, there were always a few that you’d read about in the newspaper who would carry this a little bit further and read some of your neighbor’s mail by getting at it at the right time, and reading it and putting it back. Of course, a good many of those people ended up at a place called Fort Leavenworth. This problem of security of information is with us in the military on a [sic] hour-to-hour basis because it’s our bread and butter. It’s what we focus on in the development of our combat plans in an attempt to project these plans onto an enemy and defeat him. And so, we use a good many devices. We spend a tremendous amount of effort and money in attempting to keep our secrets in fact secret—at least at the echelon where we feel this is necessary.
    [Show full text]
  • A Complete Bibliography of Publications in Cryptologia
    A Complete Bibliography of Publications in Cryptologia Nelson H. F. Beebe University of Utah Department of Mathematics, 110 LCB 155 S 1400 E RM 233 Salt Lake City, UT 84112-0090 USA Tel: +1 801 581 5254 FAX: +1 801 581 4148 E-mail: [email protected], [email protected], [email protected] (Internet) WWW URL: http://www.math.utah.edu/~beebe/ 04 September 2021 Version 3.64 Title word cross-reference 10016-8810 [?, ?]. 1221 [?]. 125 [?]. 15.00/$23.60.0 [?]. 15th [?, ?]. 16th [?]. 17-18 [?]. 18 [?]. 180-4 [?]. 1812 [?]. 18th (t; m)[?]. (t; n)[?, ?]. $10.00 [?]. $12.00 [?, ?, ?, ?, ?]. 18th-Century [?]. 1930s [?]. [?]. 128 [?]. $139.99 [?]. $15.00 [?]. $16.95 1939 [?]. 1940 [?, ?]. 1940s [?]. 1941 [?]. [?]. $16.96 [?]. $18.95 [?]. $24.00 [?]. 1942 [?]. 1943 [?]. 1945 [?, ?, ?, ?, ?]. $24.00/$34 [?]. $24.95 [?, ?]. $26.95 [?]. 1946 [?, ?]. 1950s [?]. 1970s [?]. 1980s [?]. $29.95 [?]. $30.95 [?]. $39 [?]. $43.39 [?]. 1989 [?]. 19th [?, ?]. $45.00 [?]. $5.95 [?]. $54.00 [?]. $54.95 [?]. $54.99 [?]. $6.50 [?]. $6.95 [?]. $69.00 2 [?, ?]. 200/220 [?]. 2000 [?]. 2004 [?, ?]. [?]. $69.95 [?]. $75.00 [?]. $89.95 [?]. th 2008 [?]. 2009 [?]. 2011 [?]. 2013 [?, ?]. [?]. A [?]. A3 [?, ?]. χ [?]. H [?]. k [?, ?]. M 2014 [?]. 2017 [?]. 2019 [?]. 20755-6886 [?, ?]. M 3 [?]. n [?, ?, ?]. [?]. 209 [?, ?, ?, ?, ?, ?]. 20th [?]. 21 [?]. 22 [?]. 220 [?]. 24-Hour [?, ?, ?]. 25 [?, ?]. -Bit [?]. -out-of- [?, ?]. -tests [?]. 25.00/$39.30 [?]. 25.00/839.30 [?]. 25A1 [?]. 25B [?]. 26 [?, ?]. 28147 [?]. 28147-89 000 [?]. 01Q [?, ?]. [?]. 285 [?]. 294 [?]. 2in [?, ?]. 2nd [?, ?, ?, ?]. 1 [?, ?, ?, ?]. 1-4398-1763-4 [?]. 1/2in [?, ?]. 10 [?]. 100 [?]. 10011-4211 [?]. 3 [?, ?, ?, ?]. 3/4in [?, ?]. 30 [?]. 310 1 2 [?, ?, ?, ?, ?, ?, ?]. 312 [?]. 325 [?]. 3336 [?, ?, ?, ?, ?, ?]. affine [?]. [?]. 35 [?]. 36 [?]. 3rd [?]. Afluisterstation [?, ?]. After [?]. Aftermath [?]. Again [?, ?]. Against 4 [?]. 40 [?]. 44 [?]. 45 [?]. 45th [?]. 47 [?]. [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?]. Age 4in [?, ?]. [?, ?]. Agencies [?]. Agency [?, ?, ?, ?, ?, ?, ?, ?, ?, ?, ?].
    [Show full text]
  • Profalanturing-Decoded-Biography
    CONTENTS Title Introduction 1. Unreliable Ancestors 2. Dismal Childhoods 3. Direction of Travel 4. Kingsman 5. Machinery of Logic 6. Prof 7. Looking Glass War 8. Lousy Computer 9. Taking Shape 10. Machinery of Justice 11. Unseen Worlds Epilogue: Alan Turing Decoded Notes and Accreditations Copyright Blue Plaques in Hampton, Maida Vale, Manchester and Wilmslow. At Bletchley Park, where Alan Turing did the work for which he is best remembered, there is no plaque but a museum exhibition. INTRODUCTION ALAN TURING is now a household name, and in Britain he is a national hero. There are several biographies, a handful of documentaries, one Hollywood feature film, countless articles, plays, poems, statues and other tributes, and a blue plaque in almost every town where he lived or worked. One place which has no blue plaque is Bletchley Park, but there is an entire museum exhibition devoted to him there. We all have our personal image of Alan Turing, and it is easy to imagine him as a solitary, asocial genius who periodically presented the world with stunning new ideas, which sprang unaided and fully formed from his brain. The secrecy which surrounded the story of Bletchley Park after World War Two may in part be responsible for the commonly held view of Alan Turing. For many years the codebreakers were permitted only to discuss the goings-on there in general, anecdotal terms, without revealing any of the technicalities of their work. So the easiest things to discuss were the personalities, and this made good copy: eccentric boffins busted the Nazi machine.
    [Show full text]
  • Scamp Iv, Lecture V; History of the Invention And
    REF ID:A38396 r I LECTURE V HISTORY OF THE INVENTION AND DEVELOHllENT OF CIPHER DEVICES AND MACHI.NF.$. Three or four years ago I was asked to give a lecture before the Communica- tions-Electronics Division of the Air University, USAF, on the subject of communications security (COMSEC). About that time there was 'hP r "o:s..ui.i.ered into our ears over the radio a slogan concerned wi+~ ~oile traffic safety rules • ..... ThE" o1iugta.n." was: "Don't learn your traffic laws by accident!" I thought the slogan useful. as the title of my talk but l modified it a little: "Don't learn your COMSEC laws by accident•" I began my talk by reading Webster's definition of the word accident. I know, of course, that this group here today is not concerned particularly with COMSEC duties of any sort. But the definition of the word accident will nevertheless be of interest 11l connection with what will be said in a moment or two, so I'll read Webster's definition if you'll bear with me. Webster: "Acc:ulent" - literally, a be:talling. ~ '\ a. An event that takes place without one's foresight or expectation, ) '\;r an undesigned, sudden, and unexpected event. @'pp roved for Release by NSA on 10-10-2013 pursuantto E .0. 1352a REF ID:A38396 b Hence, often, an undesigned and unforeseen occurrence of an afflictive or unfortunate character, a llll.Shap resulting in injury to a person or damage to a thing, a casualty, as to die by an accident Having defined the word, I'll now proceed by relating an interesting, minor, but nevertheless quite important episode of the war in the Pacific Theatre during WWII, and I will introduce the acrount of that episode by saying that: During the W'lr, the President of the United States, Chief of' Sta.ff of the Ar1ff3' 1 the Commander-in-Chief' of the U.S.
    [Show full text]
  • History of Cryptology, "Communications Security
    REF ID:A63360 / ' , .. - : - J; - -: ~ .. •.. :t. 1 .. I. •' -. .,. ;.." ....." I • of - ._ ~ .. c.-- ..· r .. -- ..-""!'~ r .... -"' - (. .... ~-! •• _ ~ju ............... ,_ -41 ~ ..,...::: ~ "- Lt-,::rza • Declassified and approved for release by NSA on 11-20-2013 pursuant to E .0. 1352e . - ·, ' . - •. - -t ... _._ REF ID:A63360 SLIDES FOR THIRD PERIOD 0' fJ~'! .M-U-l PAGE SLIDE NO. TITLE 1 " 45 Alberti disk .; 45.1 Porta , 45.4 u.s. Army disk ./ 47 Cipher disk finally patented ,48 Wheatstone 8 , 49 Wheatstone - modified .( 49.4 Bazeries Cylindrique 9 11 16~ Colonel Hitt ~ 16~.1 Hitt•s original strip I 5~.4 Hitt•s wooden strip model .1' 159 Mauborgne ... ,..,n_,...... ,...,. .; 51"6-3 M-94 lS ., 51"6 Jefferson's Wheel Cipher t 5~-1 Page 2 of sa.me ./ 5r6.11 M-138 , ./ 54 Kryha 11 I 55 Dissertation on Kryha 12 ' 171 M-161 (Sig. c. Labs machine) 12A /164.1 Hagelin 13 ~ 68 C-36 14 .; 7r6 ·3 G.I. model of M-2r69 ,c 'f.. 261"6 .1 CX-52 15 ./ 59 B-21 16 ~ 65 B-211 integrated ., 57 Enigma ./ 71 He bern 17 ~"172 First Hebern model ,. 71.1 First Hebern printing model 1( ) X. 71.2 Connectable wirings ""' 7( 71.3 ) o/ 172.1 3-cascade Hebern v'72 5-rotor Hebern I ~73 5-rotor with rotors removed ?- 2r6 165 Solution of Navy test messages I ,.. v21 "~72.lr6 Hebern•s ~t ~chine far the Navy ""i71"6 -7 Converter M-134-T2, and electrical typewriter I ----" 22 ";( 172.4 Original model of the Mark I, ECM.
    [Show full text]
  • 41774259081336
    eclassifi ed and a roved for release b NSA on 06-11-2014 ursuant to E .0. 1352 • ' 1"0P :s~enr - SECURI'l'Y INfl~ON SECT!ON A. U. S. COW,fiJNICATION SECURITY ~ PART I. LITERAL CIPHER MACHINm 1 • Machines Requiring No External Source of Power a. AFSAM D17 A small keyboard-operated, tape-printing literal cipher machine designed for use where electrical poi.·ier is not available. • Operates pneumatically at approxi.ma tely 15 to 20 words per minute, all power being supplied by the depression of the keyboard keys. Crypto-uni t is a reciprocal permuting maze consisting of ten 26- point rotors and a reflector. Eight of the rotors step in a single interrupted "COM" cascade. Two of the rotors and the reflector are settable, but do not step. All rotors are identically "wired" and their order in the maze is not changed. All rotors have rotatable alphabet rings and seven of the stepping rotors have settable pin- pattern rings for motion control. Size and Weight: 8" x 8" x 4"; 10 lbs. :pevelopment Status: The first engineering model developed by a cormnercial contractor has been completed and will be de­ livered to NSA by 1 Sept. 1953. 1 'POP 9EOR£'i' • b~ AFSAM D21 The AFSAM D21 is a manually operated, tape-printing, literal cipher device using a five level one-time key tape. It is intended to replace one-time pads in some limited applications. The oase, printing irechanism, and the bar drum of the M-209 are used; the key wheels are replaced by a tape reader.
    [Show full text]
  • Notes on German High Level Cryptography and Cryptanalysis
    ~'T''l''~~-~''-''''''C-C ft:!, ,. ',,' m~:·~i':i:::;:""'::· ~OCID :3560816 ." , ARMY SECURITY AGENCY Washington, D~ c. , o o ~)eclassified and approv'ed for 'elease b'i [",jS,A. on 06-01-2009 ~:t, . ~ )ursuant to E() 12958, as c,m, ~ "'i.; . /II "":';'~ r ~.' '"""'!!Ib_ amended Declass 58017 OJ ~,. "". "''-l ~ 0<1<:1 ~ (I) ~ ~l~, . ,.,:t;.... '. EUHOPEAN AXIS SIGNAL IN'l'ELL:rGENCE IN WORLD 'of.i;ill· Ii;;' c: AS l1E1/EALED BY "TICOM" INVESTIGATIONS §~. ,;,1 ,~ 6 "'""'i/ AND BY OTHER IPRI80NER OF WAR INTERROGATIONS ;~.i, '~·· .•·"'Ii :2 . ','. " PRINCIPALLY qERMAI~- ~ '-.. ~ VOLUME 2-~NOTES ON GERMAN HIGH LEVEL CRYPTOGRAPHY AND~TAliALF;Y,=,SIF:S:;'o",-'S-ed--~1""2~7--M-IA-Y:"'1-94-1";'" . I~~I---"----'-'---:-----1 EXEMPT " !p·;~.:;'L]:. NC). i j5'4~-tlf Cla~sified/Extended by DIRNSA/CHCSS Reason: NSA Declassifi.cation Guidelines I I q (ffl e i~~~e!iew O~ :--l~~kL~ l...qJ'_~_~_'~;)M..~~~IN_S....,'P_S_N_o_,----,!_L'·.J.'/~I'-L::a:..-· -f '-, ~ate I /Indexed Prepared'under the direction of ~~e CHIEli' # AR1JIY SECURITY AGENCY 1 May 1946 WDGAS-14 DOClD: 3560816' NOTES ON GERMAN HIGH LEVEL CRYPTOGRAPHY AND CRYPTANALYSIS Chapter I The Paradox ·of German High-Level Cryptogra.phy - Chapter II The Enigma Cipher Machine ./ Chapter .III Telepr:l.nter CryptogI'aph1c Apparatus Chapter IV Cipher Device 41, the C1pher Box, the Cipher Disk, and the "Number Printer. I' Chapter V. German Ciphony Chapter VI German uI .:a.M." and Rapid' Analytic Machinery Chapter· VII. Germa.n Cryptanalytic Methods , ,'- ,- .. ..: ....... .... ,~.~ - ·1 i . ,------ ---.-~~-- ._,,--'----~.... __ :._.. :_ '•.'\:~,. __~:..i-,-"~~¥~.:-"/-_,,,,_~_.
    [Show full text]
  • Scamp Iv, Lecture V, Part Ii; Communication
    REF ID:A38400 ;;z t .,-~ communications security (COMSF.n) :.= ~ ~-~-e~w~ ,wv w~~t' i About that time there was being b8.l111!1ered into our eaJ.•s e¥e:!' =:t.M iHidi()o\ a '3 "''; ••.,.; ' si.ogan concerned with automobJ.J.e traf':f:'io sai'ety ruJ.es • ~ \AltA : "Don•t learn your traffic laws by accident!" I thought the slogan useful as the title of rq talk but I modified it a l.ittlea "Don't learn your COMSEC laws by accidentS" ~~ ~"'-O~.)OA ~1-~l ~~. I began l@" tallf.A"ay reading Webster's definitJ.on of the word accident,{~kt'\ kn01<, ot course, that this £1"0UP here today is not concerned particularly .''I c with COMS.EC duties or any sort. But the definition of the word accident wm nevertheless be or 1.nterest in connection with wbat will be said in a moment ar two; ao I'll read Webster's definition if' you'll bear with me. .( ~-~ -:If I) I Webster' ".A.c<tident - literall.y1 a befalling. ... I 0 - :t • ' t( " a. An event that takes place without one's f'at"esight or expectation, an undesigned., sudden, and unexpected event. roved for Release b NSA on 10-10 2013 REF ID:A38400 --- - - ~ < - - - :;--;;- - ~ ... '!'~ ~ .... ' S: •• 'r r \ I • Hence1 atten1 an undesigned and unforeseen occurrence or an &ti'lictive ar unfortunate cbaracter; a mishap resu.l.ting in injury to a person or .,-0_: ~:..~~ - L _ ............ daDBge to a~. a casualty; as to die:;..;: :~i ~ ~ ~ ~~ Having defined the word, I'll nov proceed by":=a.l:Md a mr !u"e!'aat 111@!', minor/ ;i-: T ......
    [Show full text]
  • Work Load of the Maintenance Branch
    HEADQUARTERS ARMY SECURITY AGENCY WASHINGTON 25, D. C. WDGSS-85 15 May 1946 SUBJECT: Work Load of the Maintenance Branch TO: Chief, Security Division 1. The Repair Section of Maintenance Branch is .faced with an ex­ tremely heavy backlog of work due to the large amounts of cryptographic equipment returned from overseas for rehabilitation. Awaiting rehabili­ tation qy the Repair Section is the followi~g list of equipment and the man hours estimated to complete the work required: EQUIPMENT MAN HOURS REQUIRED TOTAL 1808 SIGABA 36 6;,088 1182 SIGCUM 12 14,184 300 SIGNIN 4 1,200 2297 SIGIVI 4 9,188 533 SIGAMUG 4. 2,132 Total man hours 91,792 These figures represent the number of equipments on hand as of 1 May 1946 and will be continually increased b,y the arrival of additional equipment . from overseas. 2. It is considered probable that the SIGABA will be modified along the lines proposed by the Navy. It is proposed that all SIGABA 1s be modi­ fied at this Headquarters before shipment is made to the field, thus in­ creasing the work load as follows: EQUIPMENT MAN HOURS REQUIRED ~ 3241 SIGABA 12 38,892 The above figure of' twelve hours per machine is an estimate based on preliminary studies of the proposed change. It may be possible to greatly reduce this total after the changes have been f'inaJ.1y agreed on by the Army and the Navy, and time studies can be made under actual conditions. 3. In order to properly preserve these equipments while in extended storage, it is recommended that the proposals set forth in a memorandum to the Chief, Security Division, 4 December 1945, subject "Preparation of Declassified and approved for release by NSA on 01-16-2014 pursuantto E .0.
    [Show full text]
  • Scamp Iv, Lecture V; History of the Invention And
    REF ID:A38396 r I LECTURE V HISTORY OF THE INVENTION AND DEVELOHIIENT OF CIPHER DEVICES AND MACHINES. Three or four years ago I was asked to give a lecture before the Communica- tiona-Electronics D1vision of the A1r University, USAF, on the subJect of communications security (COMSJOO). About that time there was 'hP r "'S.uJU.ered into our ears over the radio a slogan concerned w1+~ ~o~le traffic safety rules • ..... ThE" o~iugta.n." was: "Don't learn your traffic laws by accident!" I thought the slogan usefUl as the title of ~ talk but 1 modif1ed it a little: "Don't learn your COMSEC laws by accident•" I began my ta1k by reading Webster's definition of the word accident. I know, of course, that th1s group here today is not concerned particularly with COMSEC duties of any sort. But the defin1tion of the word accident w1ll nevertheless be of interest J.ll connection with what will be said m a moment or two, so I'll read Webster's definit1on 1f you'll bear with me. Webster: "Acc:ulent" - literally, a be:talling. ~ '\ a. An event that takes pl.ace without one's foresight or expectation, ) '\;r an undes1gned, sudden, and unexpected event. 1!\pproved for Release by NSA on 1 0-1 0-2013 pursuantto E .0. 1352e REF ID:A38396 b Hence, often, an undesigned and unforeseen occurrence of an afflJ.ctive or unfortunate character, a llll.Shap resulting in injury to a person or damage to a thing, a casualty, as to die by an accident Havwg defined the word 1 I' 11 now proceed by relating an interesting, minor 1 but nevertheless quite important episode of the war J.n the PacJ.fJ.c Theatre during WWII, and I will introduce the acrount of that episode by say1.ng that: During the w~, the President of the United States, Chief of Staff of the Ar'JJJ'3' 1 the Commander-in-ChJ.ef of the U.s.
    [Show full text]
  • Scamp V Lecture; History of the Invention And
    TOP SECRETJ/SI Gentlemen, this talk this afternoon is going to be devoted to the history of the invention and development of cipher devices and cipher machines. Three or four years ago I was asked to give a talk before the Communications-Electronics Division of the Air University, USAF on the subject of communications security, COMSEC About that tune there was being hammered into our ears over the radio in Washington a slogan concerned with automobile traffic safety rules The slogan was: "Don't learn your traffic laws by accident". I thought the slogan useful as a title for my talk but I modified it a little--Don•t learn your COMSEx:: laws by accident I begin my talk by reading from Webster's Dictionary on the word "accident" I know, of course, that this group here today is not concerned particularly with COMSEx:: duties of any sort except of course when you go on active duty some of you but the definition of the word accident will nevertheless be of interest in connection with what will be said in a moment or two, so I will read Webster's definition if you will bear with me Accident. Literally a befalling, an event which takes place without one's sudden and often foresight or expectation, an undesigned/llllX unexpected event, hence,/an undesigned or unforeseen occurrence of an afflicted or unfortunate character, a mishap resulting in injury to a person or damage to a thing, a casualty as to die by accident. Having defined the word, I will now proceed by relating an interesting, .
    [Show full text]