NSA) Cryptologic History Series: Southeast Asia, SIGINT Applications in U
Total Page:16
File Type:pdf, Size:1020Kb
Description of document: National Security Agency (NSA) Cryptologic History Series: Southeast Asia, SIGINT Applications in U. S. Air Operations, Part One: Collecting the Enemy's Signals, February 1972 Requested date: 27-December-2007 Released date: 28-March-2012 Posted date: 23-April-2012 Source of document: National Security Agency Attn: FOIA/PA Office (DJP4) 9800 Savage Road, Suite 6248 Ft. George G. Meade, MD 20755-6248 Fax: 443-479-3612 (attention of the FOIA/PA Office) Online FOIA Request Form The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755-6000 Serial: MDR-54497 28 March 2012 This responds to your request of 27 December 2007 for a declassification review of the document which you described in your letter ofthat date as follows: "SIGINT Applications in U.S. Air Operations, Part One, Collecting the Enemy's Signals, by Thomas N. Thompson, William D. Gerhard and Jesse E. ???. Cryptologic History Series, Southeast Asia, Fort George G. Meade, MD National Security Agency, February 1972." You received an interim response in 2008 which informed you that the material had been requested in a Freedom of Information Act (FOIA) case and would be held in abeyance until final processing ofthe document was completed in the FOIA case. This document was recently released in response to a FOIA request on 30 September 2011. If you wish, you may request a re-review of this document as a mandatory declassification request after 30 September 2013. The material that you requested was recently reviewed and released under the FOIA requirements ofExecutive Order (E.O.) 13526. Therefore, the material is enclosed and being released to you just as it was released in FOIA Case 8907. We have determined that some of the information in the material requires protection. Some portions deleted from the document were found to be currently and properly classified in accordance with E.O. 13526. The information denied meets the criteria for classification as set forth in Section 1.4 subparagraph(c) and remains classified TOP SECRET, SECRET and CONFIDENTIAL as provided in Section 1.2 ofE.O. 13526. The information is classified because its disclosure could reasonably be expected to cause exceptionally grave damage to the national security. The information is exempt from automatic declassification in accordance with Section 3.3(b)(l) ofthe E.O. Because the information is currently and properly classified, it is exempt from disclosure pursuant to the first exemption of the FOIA (5 U.S.C. Section 552(b)(l)). Section 3.5 (f) ofE.O. 13526, allows for the protection afforded to information under the provisions of law. Therefore, the names ofNSA/CSS employees and information that would reveal NSA/CSS functions and activities have been protected in accordance with Section 6, Public Law 86-36 (50 U.S. Code 402 note). In addition, information regarding other individuals has been deleted from the enclosure in accordance with the sixth exemption of the Freedom of Information Act. This exemption protects from disclosure information that would constitute a clearly unwarranted invasion of personal privacy. In balancing the public interest for the information you request against the privacy interests involved, we have determined that the privacy interests sufficiently satisfy the requirements for the application of the sixth exemption. Sincerely, KRISTINA M. GREIN Chief Declassification Services Encl: a/s 'fOP SECRET ?IOFO:Ri>'t SOUTHEAST ASIA , SIGINT APPLICATIONS IN U. S. AIR OPERATIONS ~~;:~ ~-~- 21. 3.. ; : _l~~- .~····- ·~-;- - -~~- ~ ~-=-~-~;.:.: ·-= . ---- -:-:-..~~ --.....:~-. ·--··--···---- Part One ry1s DQ(!!M&Ni CONTAIN§ CQD&'NQR9 MATERIAL · TQP e~CRET ~OFOR.,- CRYPTOLOGIC HISTORY SERIES Tl4lNAtiON,...•, ~CRYPiOLOGIC SCHOOL SOL:THEAST ASL\ ') DIGTRillUTlOtl NOTE: di •tri bution of l- \le c"n stil-l- mal<e so'"::us~ed in this series ii ations previousl-y pu Titl-es of. these t=Ubif youc shoul-d desire, copies • .. publicntl.ons were. ns to SIGINT Applications in \la.r (SEA cryptol.ogic op In the Shadow 9.£ - 1\U(l 64) f U.S. Air Operations ---- (SIGINT and the battl-e o Focus!!!!~~ Khe Ganh) SEA) Worl<.ing Acyinst -the --Tide ( COMSI!X: and Deodl- ,Transmissions (COMSI!X: and SEA) PART ONE ~ Please call 465 6S or 5235S (14ll bl.Bck) for2. any distribution request. Collecting the Enemy's Signals [ P.2 IAFSS (t) :~J '--T"J -----r~~SA W olham D. Gerhard, NSA USAF Februar: 19i2 Tgp fi•~ct&l"t· •·mtllll'• T8F JEdl£ I UMBRA ~ 6£:6fliT lt'fiB:R,..._ CRYPTOLOGIC HISTORY SERIES Southeast Asia Spo,or, ) Yice .... dm N l SECURITY NOTICE M . · "" Gayler, USN "'· Gen. Charles) Dcnh I Direcror, NSA Alrhough the information contained in <his journal ranged 10 securiry Rear "dm. Chester GPh ·I~ m, US" Commancling Gcnrr.oJ, VSASA Maj. Gen C . ' tps classification from UNCLASSIFIED ro TOP SECRET CODEWORD, . arl W. Srapl<ton, USAF Commander, NAYSECGRU the overall SKUrity classification a.ssigned ro rhis issue is TOP SECRET Commander, AFSS UMBRA .. ]oint S14ff While rhe TSCW classification by tcself requires careful handling, addirional caution should be exercised with regard ro rhe ptesent journal Publisher and. others ln the K'ries because of the comprehensive treatment and broad range of the subject matter. General Ediror ASA N"VSECGRU AFSS AFss (t; r GJ (I: :11 USAF tef Jf@fi:ET t!JfiiUl ,-ep SiERET 'lt'PS 1 Foreword Cryprologic operations in support of U.S. Air Force commanders during the Kortan War provided the es5tntial bast from which tht air related SIG INT systems employed in Southeas< A..ia in the 1960 ·s developed. U.S. Air Force commanden in Korea ltarntd to make direct application of SIGINT in their operations. A; they did so, SIGINT analysts for the first time worked in the air operalions centers du~m selves to assiSt in the application of SIGINT U.S. Air Force and U.S. Naval Air commanders in Sourheast A..ta, recalling the KOr<an War, asked for SIGINT tu aid them in planning, conducting, and evaluating air operations, and they wantC'd timely service. With Korean War and Cuban missile crnis experience behind rhem, U.S. SIGINT technicoans adjusted collectioo, processing, and reporting tasks lO meet these Southeast Asian requirements. One~ aga1n, they formed a dose relationship with commanders and worktd in or near the operations cmters of PACAF and Seventh Air Fora: and Sevenrh Fleer's attack carriers and sperial mission ships. The purpose of thiscryptolog.c history on SIGJNT aspects of U.S. air operations, of which this is the first volume, is to establish a reccrd of those SIGINT operations and the use made of SIGINT by the Air Force an.J the Naval commanders concerned. The documtntation will ser\le, therefore, borh the cryprologic agencies and rhe U.S. Navy and U.S. Air Force as they look ahead to a continutd pann~hip in future air operations. ) NOEL GAYLER Vice Admiral, U_S. Navy Director, NSA I 01 SELKE I CMBRA T~P !!lEe!ft£1 UMBRA Preface In preparing this initial volume on SIGINT applications in Southeast Asi~n air operations, £he wriren used a wide variety of sourre materials. Notewonhy among these were the unit historie5 of Air F<rce Security .... Service's Pacific Region, documentary matenals from Naval Stcurity Group; operational message files, including' a major one ass<mbl<d by Mr. Delmar Lang of NSA; drafts prepared by Mr. James Thompson. B3, before he departed NSA; the technical reports of NSA's technical library; and interviews. The Writers are inddxed to many persons for ass..ina.n«_ fr rlv ~r~vPn Di!!:o_ · ;n nnP fntm._ LT. Thanas ). (Ofteen<y, USN (NFOIO). also contnbured by makmg several of our acrounu mor.e meaningful and accurate. Finally, the writers acknowledge the patient work olJ !who typed and corrected their draft manuscripts. USAF A few sourer foornotC'5 appear in text, mamly where the matenal was directly quoted. A fully documented versiOn of this volume is available- at NSA for reference. Requests for additional copic5 of thJS pubi.icuion should be addressed to Director. NSA, Fort George G. Meade. Maryland. The staff assumes sole res.pon:sibility for the use made of 50urcc ) materials and of comments otfe~d on the draft manuscripts. as well as for .1m errors of fact thar may appear in this volume. January 1972 TN. T ) M W.D G. rpp HCfll! I L.U:BICA T8F Jl!fft!T tfiiRfb; CONTENTS Chapter Page I. THE SETTING U.S. Forces . 1 U.S. Air Operations Over North Vietnam 6 Reconnaissance Programs 10 SAC Reconnaissance 14 Tarucal Reconnaissanc~ 21 II. THE NORTH VIETNAMESE AIR DEFENSE SYSTEM .. 25 The NVN Air Surveillance Network 31 SAM's and AM 34 North Vietnam's Tactical Air Force 44 III.