Purple Dragon: the Origin and Development of the United States OPSEC Program, NSA Center for Cryptologic History, 1993

Total Page:16

File Type:pdf, Size:1020Kb

Purple Dragon: the Origin and Development of the United States OPSEC Program, NSA Center for Cryptologic History, 1993 Description of document: National Security Agency: Purple Dragon: The Origin and Development of the United States OPSEC Program, NSA Center for Cryptologic History, 1993 Requested date: 25-December-2007 Released date: 17-January-2008 Posted date: 06-February-2008 Date/date range of document: Viet Nam War era Source of document: NSA FOIA Requester Service Center: National Security Agency Attn: FOIA/PA Office (DJ4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Telephone: (301) 688-6527 Fax: (443) 479-3612 Notes: Previously Released by NSA in Freedom of Information Act In Case #: 8481 The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 MDR Case 54496 17 January 2008 This responds to your Mandatory Declassification Review (MDR) request of 25 December 2007, Purple Dragon: The Origin andDevelopment ofthe United States OPSEC Program. Centerfor Cryptologic History, 1993. The document that you have requested was recently reviewed and released under the Freedom of Information Act (FOIA) requirements. Therefore, the material is enclosed and is being released to you just as it was released in FOIA Case 8481. Certain information, however, has been deleted from the document. Some ofthe information deleted from the document was found to be currently and properly classified in accordance with Executive Order 12958, as amended. This information meets the criteria for classification as set forth in subparagraphs (c) and (g) ofSection 1.4 and remains classified TOP SECRET as provided in Section 1.2 ofthe Executive Order. The information is classified because its disclosure could reasonably be expected to cause exceptionally grave damage to the national security. Because the information is currently and properly classified, it is exempt from disclosure pursuant to the first exemption ofthe FOIA (5 U.S.C. Section 552(b)(l». In addition, this Agency is authorized by various statutes to protect certain information concerning its activities. We have determined that such information exists in this document. Accordingly, those portions are exempt from disclosure pursuant to the third exemption ofthe FOIA which provides for the withholding ofinformation specifically protected from disclosure by statute. The specific statutes applicable in this case are Title 18 U.S. Code 798; Title 50 U.S. Code 403-l(i); and Section 6, Public Law 86-36 (50 U.S. Code 402 note). Information regarding other individuals has also been deleted from the enclosures in accordance with 5 U.S.c. 552 (b)(6). This exemption protects from disclosure information which would constitute a clearly unwarranted invasion ofpersonal privacy. In balancing the public interest for the information you request against the privacy interests involved, we have determined that the privacy interests sufficiently satisfy the requirements for the application of the (b)(6) exemption. Since your request for declassification has been denied in part, you are hereby advised of this Agency's appeal procedures. You may, within 60 days after notification ofthe denial, file an appeal in writing to the NSAlCSS MDR Authority (DJP5), National Security Agency, 9800 Savage Road, STE 6884, Fort George G. Meade, MD 20755-6884. The appeal shall reference the initial denial ofaccess and shall contain, in sufficient detail and particularity, the grounds upon which you believe the release of information is required. The NSNCSS Appeal Authority will endeavor to respond to the appeal within 60 working days after receipt of the appeal. The CIA has asked that we protect information pursuant to 5 USC 552(b)(3) and DIA, Air Combat Command and Navy have asked that we protect information pursuant to 5 USC 552(b)(l). Those deletions have been marked with the code OGA (Other Government Agency). Any appeal of the denial of CIA, DIA, or Air Combat Command information should be directed to those agencies. In the case of Navy information, refer to case number 02-068, and address the appeal to the Judge Advocate General, (code 14), Department ofthe Navy, Building 33, Washington Navy Yare, 1322 Patterson Avenue, SE, Suite 3000, Washington, DC 20374-5066. The letter of appeal and the envelope both should bear the notation "Freedom of Information Act Appeal." Sincerely, RHEA D. SIERS Deputy Associate Director for Policy End: a/s This monograph is a product of the National Security Agency history program. Its contents and conclusions are those of the author, based on original research, and do not necessarily represent the official views of the National Security Agency. Please address divergent opinion or additional detail to the Center for Cryptologic History (E324). Contents 01 this publication should not be ~produt:ed or further disseminated outside the V.S. Intelligence Community without the pennission of the Director, NSA. Inquiries about reproduction and dissemination should be directed to the Center for Cryptologic History, National Security Agency, Fort Geor-ge G. Meade, MD 20755·6000, ATTN: E324. i OP SI!Cft!'f t:/M8ftA UNITED STATES CRYPTOLOGIC HISTORY Series VI The NSA Period Volume 2 PURPLE DRAGON: The Origin and Development of the United States OPSEC Program _______1 (b) (3)-P.L. 86-36 .->' -, ~ ..~ CENTER FOR CRYPTOLOGIC HISTORY NATIONAL SECURITY AGENCY 1993 PleT RSbl!L'tS"tBUl Te P8R1318U HNi'I8!lhbB lOP SECRE i UMBRA - 'f6P SECRET ~MBRJIc Table of Contents Page Foreword v Acknowledgment Vll Southeast Asia Map IX . :. '~~-".: ',.", Part I: Introduction 1 Part II: The Beginnings OfOPSEC 7 Part III: Pl;RPLE DRAGON at War 35 Part IV: NSA and Pl;RPLE DRAGON 57 Part V: What Charlie Knew ................................. 65 Part VI: OPSEC Goes Worldwide . 75 Part VII: PURPLE DRAGON at Peace 89 Author's Biography 94 Abbreviations and Covernames 95 Bibliography 99 .:';" :;~ -.:-: ~ ..... -'. .. ~TgT RiibS/zSABI:JB 'fa F8ftBIBff hA'l'I6hAL~ . "~:~'.. -. iii i UP SECRET t:J MaRA .,.' H '," «b) (3)-P.L. Foreword !86-36 .. .', ... Operations Security (OPSEC) as a concept is probably a.s6id as/war ¥tself. Nevertheless, the fact that poor OPSEC practices have been costly in loss of human life and lost objectives in every American war demonstrates. that, despite its venerated age, Operations Security as a doctrine needs ito be learned afresh by each generation. ... .. It is imperative that those with responsibility for military ac~ivities understand that observation of Opera.tions Security principles is as esseptial an ingredient to victory as any of the other tools of war./ To the extent possible, these lessons should be learned in peacetime - experience in recent conflicts shows there is unlikely to be a period of grace once a military eII)~rgency Occurs and troops are committed to combat. I lUi PURPLE DRAGON: The/Origin and Developmetlt of the United States OPSEC Program has given uS a superb monograph about the genesis of Operations Security during the Vietnam War. I ilthorough and readable account describes the initial problems in aIr operatIons which prompted a high-level investigation, explains the weaknesses in U.S. practices which this investigation identified, shows how Operations Security principles were developed through close analysi.s of the problems and weaknesses, and, finally, tells how Operations Security at last became institutionalized. Of primary importance~ ~hows clearly that complacency is dangerous, not only before the principles of Operations Security have been a.pplied, but even after, as situations evolve, personnel change, and the adversary undertakes new intelligence initiatives. The Center for Cryptologic History believes tha~ fonograPh is an important addition to the study of cryptologic Dlstory and, Uldeed, to the literature on the Vietnam War. It has much to say to two audiences: those unfamiliar with Operations Security will find it a good introduction to the concepts and methodology of this important component. Those already familiar with Operations Security should find it an interesting study of OPSEC origins as well as a refresher on the basic principles of the discipline. This story of PURPLE DRAGON is not just for the military; its lessons apply to the civilian cryptologic professional as well. The Center for Cryptologic History hopes that this study will reinforce the importance of the doctrine and help us to exam.ine our premises and practices, military and civilian alike. DAVID A. HATCH Director, Center for Cryptologic History IfOTIt!!:Ll!:A!A!5LE iOEOitEiGN HAIIOl'4ALS v lap SEeK!T tJMBRA TOP 5ECRE I UMBRA (b) (3)-P.L. 86-36 Acknowledgments Oppo;.tilnit~totha~keve"XOne (UJ I wish to take this who contributed to the production .. of this. monograph. First, I would like to thank all those / who· graciously "....:' .::' consented to speak wi th~e conc~rnin9 their iexpet- iences with PURPLE DRAGON and OPSEC, especiallyl ; ... I -:-----:::--"""":'"~-:---....Ila11~
Recommended publications
  • Operations Security (OPSEC)
    Army Regulation 530–1 Operations and Signal Security Operations Security (OPSEC) Distribution Restriction Statement. This publication contains technical or operational information that is for official Government agencies and their contractors. Requests from outside U.S. Government agencies for release of this publication under the Freedom of Information Act or the Foreign Military Sales Program must be made to HQDA (DAMO-ODL-CBT), 400 ARMY PENTAGON, WASHINGTON, DC 20310–0440. Destruction Notice. Destroy by any method that will prevent disclosure of contents or reconstruction of the document. Headquarters Department of the Army Washington, DC 27 September 2005 UNCLASSIFIED SUMMARY of CHANGE AR 530–1 Operations Security (OPSEC) This rapid action revision, dated 27 September 2005-- o Emphasizes OPSEC guidelines with which all Army personnel will comply. o Adds and removes responsibilities (chap 2). o Adds definition of OPSEC Compromise (glossary). o Redefines Sensitive Information throughout the publication. o Updates addresses and office symbols throughout the publication. o Corrects typographical errors throughout the publication. This revision-- o Implements Department of Defense Directive 5205.2, Operations Security Program policy and joint policy and doctrine in CJCS Instruction 3213.01. o Fully defines OPSEC as an element of Command and Control Warfare (C2W). o Outlines OPSEC application for on-site inspections under Intermediate-Range Nuclear Forces (INF), Strategic Arms Reduction Treaty (START), and Chemical Weapons Convention (CWC) agreements. o Requires battalion level and higher echelons to plan and implement OPSEC programs. Defines battalion level as an organization MTOE/TDA, headed by a lieutenant colonel or a civilian in the grade of GS-13 or higher.
    [Show full text]
  • Dissecting the Hack This Page Intentionally Left Blank Dissecting the Hack the F0rb1dd3n Network
    Dissecting the Hack This page intentionally left blank Dissecting the Hack The F0rb1dd3n Network Jayson E. Street Kent Nabors AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SYNGRESS SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO ® Syngress is an imprint of Elsevier Syngress is an imprint of Elsevier 30 Corporate Drive, Suite 400, Burlington, MA 01803, USA Linacre House, Jordan Hill, Oxford OX2 8DP, UK Dissecting the Hack: The F0rb1dd3n Network © 2010 ELSEVIER Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our Web site: www.elsevier.com/ permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this fi eld are constantly changing. As new research and experience broaden our understanding, changes in research methods, professional practices, or medical treatment may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information, methods, compounds, or experiments described herein. In using such informa- tion or methods, they should be mindful of their own safety and the safety of others, including parties for whom they have a professional responsibility.
    [Show full text]
  • American Intelligence Journal, Volume 32, Number 2
    AMERICAN INTELLIGENCE JOURNAL THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Denial and Deception __NMIA__________________________ Vol. 32, No. 2, 2015 American THE MAGAZINE FOR INTELLIGENCE PROFESSIONALS Intelligence Journal Vol. 32, No. 2 2015 ISSN 0883-072X NMIA Board of Directors LTG (USA, Ret) James A. Williams, Chairman Col (USAF, Ret) Joseph Keefe, President Mr. Louis Andre, Director Mr. Terrance Ford, Director Col (USAF, Ret) William Arnold, Secretary Ms. Jane Flowers, Director Brig Gen (USAF, Ret) Scott Bethel, Director Col (USAFR, Ret) Michael Grebb, Treasurer Mr. Don Bolser, Director COL (USA, Ret) David Hale, Director CDR (USNR, Ret) Calland Carnes, Chapters Director Ms. Tracy Iseler, Director Col (USAF, Ret) John Clark, Director Ms. Stephanie Leung, Director Lt Gen (USAF, Ret) David Deptula, Director Brad Moss, Esq., Director LtCol James Eden, Director Capt (USNR) Rick Myllenbeck, Director COL (USA, Ret) Jim Edwards, Awards Director Ms. Marcy Steinke, Director Mr. Roland Fabia, Director COL (USA, Ret) Napolean Stewart, Director COL (USA, Ret) Michael Ferguson, Director CDR (USNR) Louis Tucker, Director COL (USA, Ret) Gerald York, Director Editor - COL (USA, Ret) William C. Spracher, Ed.D. Production Manager - Ms. Debra Hamby-Davis LTG (USA, Ret) Harry E. Soyster, Director Emeritus COL (USA, Ret) William Halpin, Director Emeritus LTG (USA, Ret) Patrick M. Hughes, Director Emeritus Dr. Forrest R. Frank, Director Emeritus RADM (USN, Ret) Rose LeVitre, Director Emeritus Mr. Antonio Delgado, Jr., Director Emeritus MG (USA, Ret) Barbara Fast, Director Emeritus The American Intelligence Journal (AIJ) is published by the National Military Intelligence Association (NMIA), a non-profit, non-political, professional association supporting American intelligence professionals and the U.S.
    [Show full text]
  • Doe Handbook Operations Security (Opsec)
    DOE‐HDBK‐1233‐2019 June 2019 DOE HANDBOOK OPERATIONS SECURITY (OPSEC) U.S. Department of Energy AREA SANS Washington, DC 20585 DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited. This page intentionally left blank. DOE-HDBK-1233-2019 FOREWORD The protection of classified information, projects, and missions is of paramount importance in fulfilling security responsibilities in connection with the Department of Energy (DOE). Operations Security (OPSEC) involves a process of determining unclassified or controlled critical information that may be an indicator or pathway to classified or sensitive activities requiring protection, whether for a limited or prolonged time. To ensure protection, employees should know and follow the applicable procedures and processes outlined in national and departmental policies. This handbook does not establish new requirements and any existing requirements are explicitly referenced from national policy or a DOE Order using the terms “must” or “shall.” It is not intended to replace DOE Order 471.6, Information Security, other departmental rules, or national directives. This handbook describes one way to fulfill requirements for OPSEC within DOE. Section 1 identifies the purpose, history and basic understanding of OPSEC. Section 2 describes the general OPSEC Program and the specific OPSEC Program Plan and its components. Section 3 discusses the OPSEC five-step process. It provides methods to identify critical information, the potential threat, vulnerabilities, and types of countermeasures that may be used. Section 4 describes the on-going activities that keep the critical information and related information and threats up to date. Trainings, briefing and awareness activities are provided. Appendix A is a copy of National Security Decision Directive 298, National Operations Security Program.
    [Show full text]
  • PURPLE DRAGON: the Origin and Development of the United States OPSEC Program
    TOP SECRET NO. 609 united states cryptologic history i /I ~'/ I PlTRPLE DRAGO~: The {)rigin and Development of the lTnited States OPSEC Program I HIS DOCOIVIEl'\l I COl'\l IAll'JS COO~VVO~EJ l't/l:tff'E~IAL r~e'f ~EL~A~A!;LE: 'fO fiO~E:IC!ll~ r~ATIOMALS Classified by: NSA/CSSM 123-2 Declassify On: Originating Agency's Determination Required CCH-E32-93-04 This monograph is a product of the National Security Agency history program. Its contents and conclusions are those of the author, based on original research, and do not necessarily represent the official views of the National Security Agency. Please address divergent opinion or additional detail to the Center for Cryptologic History (E324). Contents of this publication should not be reproduced or further disseminated outside the U.S. Intelligence Community without the permission of the Director, NSA. Inquiries about reproduction and dissemination should be directed to the Center for Cryptologic History, National Security Agency, Fort George G. Meade, MD 20755-6000, ATTN: E324. I OP SECRET tJM8ftA UNITED STATES CRYPTOLOGIC HISTORY Series VI The NSA Period Volume2 PURPLE DRAGON: The Origin and Development of the United States OPSEC Program (b) (3)-P.L. 86-36 -_ •'. " CENTER FOR CRYPTOLOGIC HISTORY NATIONAL SECURITY AGENCY 1993 NOT REbEhSABLE TO PO REIGH HATIO?L'tLS I OP SECRE I UMBRA TeP 5EERET l:JMBRA Table of Contents Page Foreword ...................................................................... v Acknowledgment . v11 Southeast Asia Map . ix Part I: Introduction . 1 Part II: The Beginnings ofOPSEC . 7 Part III: PC'RPLE DRAGON at War ...............................................
    [Show full text]