American Cryptology During the Cold War, 1945-1989, Book IV: Cryptologic Rebirth, 1981-1989, National Security Agency, 1999

American Cryptology During the Cold War, 1945-1989, Book IV: Cryptologic Rebirth, 1981-1989, National Security Agency, 1999

Description of document: United States Cryptologic History, Series VI, Volume 5, American Cryptology during the Cold War, 1945-1989, Book IV: Cryptologic Rebirth, 1981-1989, National Security Agency, 1999 Appeal date: 04-July-2009 Released date: 14-January-2011 Posted date: 28-February-2011 Source of document: National Security Agency Declassification Services (DJ5) Suite 6884, Bldg. SAB2 9800 Savage Road Ft. George G. Meade, MD, 20755-6884 Note: Partial release upon appeal of a Mandatory Declassification Review Request The governmentattic.org web site (“the site”) is noncommercial and free to the public. The site and materials made available on the site, such as this file, are for reference only. The governmentattic.org web site and its principals have made every effort to make this information as complete and as accurate as possible, however, there may be mistakes and omissions, both typographical and in content. The governmentattic.org web site and its principals shall have neither liability nor responsibility to any person or entity with respect to any loss or damage caused, or alleged to have been caused, directly or indirectly, by the information provided on the governmentattic.org web site or in this file. The public records published on the site were obtained from government agencies using proper legal channels. Each document is identified as to the source. Any concerns about the contents of the site should be directed to the agency originating the document in question. GovernmentAttic.org is not responsible for the contents of documents published on the website. NATIONAL SECURITY AGENCY FORT GEORGE G . MEADE, MARYLAND 20755--6000 Case No. 54492/Appeal No. 3463 14 January 2011 I am writing in response to your letter, dated 4 July 2009, appealing the National Security Agency's (NSA) decision to partially deny your Mandatory Declassification Review (MDR) request. You had requested an MDR of the NSA publication "American Cryptology during the Cold War, 1945-1989" (Book IV). I have reviewed your original request, the document at issue, the response to you from the Deputy Chief of Declassification Services, and your appeal letter. As a result of that review, I have determined that certain information can now be released on appeal. Those pages containing the additional released information are enclosed. However, the remaining withheld information continues to warrant protection as described below. The information withheld continues to meet the standards for classification set forth in Executive Order 13526 and falls under the classification categories contained in Sections 1.4(c) and (d) of the Order. Furthermore, the information remains currently and properly classified at the TOP SECRET, SECRET, and CONFIDENTIAL levels in accordance with the criteria of Section 1.2 of Executive Order 13526. Certain information is also exempt from disclosure pursuant to Section 3.5(c) of Executive Order 13526, which allows for the protection of information when authorized and warranted by law. Specifically, Section 6 of the National Security Agency Act of 1959, Public Law 86-36 (50 U.S.C. § 402 note) protects NSA/Central Security Service (CSS) functions and activities as well as the names ofNSA/CSS employees from disclosure. In addition, certain information has been withheld in accordance with the seventh exemption of the Freedom of Information Act (FOIA). This exemption pertains to records or information compiled for law enforcement purposes and includes information that, ifreleased, could cause an unwarranted invasion of personal privacy or would reveal law enforcement techniques and procedures. The information withheld under (b)(7)(C) and (b)(7)(E) meets the threshold requirements for withholding under exemption 7 of the FOIA. The information you seek on appeal pertains to such information, and, therefore, it is protected from disclosure by these statutes. Case No. 54492/Appeal No. 3463 You may consider this final Agency decision to be a denial of your appeal. You are hereby advised that under the MDR process, you may appeal a final agency decision in writing, within 60 days from the date of this letter, to the Interagency Security Classification Appeals Panel (ISCAP) at the following address: Executive Secretary, Interagency Security Classification Appeals Panel ATTN: Classification Challenge Appeals c/o Information Security Oversight Office National Archives and Records Administration 7th and Pennsylvania Avenue, NW, Room 500 Washington, DC 20408 Additional information regarding the ISCAP's appeal process can be found at: http://www.archives.gov by typing "ISCAP" in the search field. Sincerely, ~ DEBORAH A. BONANNI Mandatory Declassification Review Appeal Authority Encls: a/s TOP SECRETIICOMINT-tJM8ftAITAL~NT KE f"OLEI/X1 UNITED STATES CRYPTOLOGIC HISTORY (U) American Cryptology during the Cold War, 1945-1989 (U) Book IV: Cryptologic Rebirth, 1981-1989 fll-.pproved for rielease by \ISA on Appeal on J1-14-2011. FOIA Case fl: 54492 Derived From: ti&AI'Si&U 1aa a Baled !4 l"ebi aav J 1598 Declassify on: X1 X& , ill&- 1 CCH- S54-9s-o1 I OP SECRETf/COMINT tiMBRAffALENT KE¥110LEIIX1 DOCID: 3807349 lOP Uc;RiiTJKQMINT I:IMBRMALENT IEEYII8L~/f)(1 (U)Table25 Growth ofNSA Space from 1973 to 1994 N~~nnw~nu~~tiuua~~fl~~~ CALENDAR YEAR of Severna Park, Glen Burnie, Laurel and Columbia. The drive to either Severna Park or Columbia commonly took half an hour or more, much of it spent waiting in a long snake of cars twisting through the Maryland countryside. With NSA population projections going virtually through the roof, NSA began looking at an environmental overhaul. In the early 1980s the State of Maryland began widening Route 32 both toward the east and west. It was called the Patuxent Freeway project, and as sections became functional in the late :Eo 1.4. (c) 1980s and early 1990s, traffic congestion around Fort Meade declined (but didn't go away).38 (U) THE CRY~OLOGIC SYSTEM IN THE 1980s (Sf;'SI) The Army was hardest hit by the reductions of the 1970s.IL.-________. L.-----------------_.IGone were five sites in Southeast Asia and lOP i&'RiiT/tc;QMINT I:IMBRAITALEN'f KEVH8L!//X1 278 DOCID: 3801349 ~0 1.4. (c) rOP $ECR!TI/C:OMIN1"'tJMBitAfi'Atl!NT KEYH6Ll!f/JE1 ' ~Ius scattered locations inl !virginia and California. L-.-:;T;;-h-e_o_n"'Tl-y~t-ru-e-ad":"dT!ition was the INSCOM component of the cryptologic conglomerate at Kunia. To a degree this reflected the fact that Army SIGINT collection was the least technologically sophisticated of the services (see map page 280). I Security Service lost three sites in Southeast Asia, I top SECR&l.'JCOMINT l:IMBR*FFALENT l(!'f"OLS/Xi 279 DOCID: 3807349 "FQP 5ECRETNE8MINf-t:IMBitAJTALEN I KEY HOLEflXi (U)Notes 1. (U) John Ranelagh, Tlu Agency: The Rise and Decline oftlu CIA (New York: Simon and Schuster, 1986), 666- 72. 2. (U) Inman interview. 3. (U) Christopher Andrew, For tlu President's Eyes Only: Secret Intelligence and the American Presidency from Wathington to Bush (New York: HarperCollins, 1994), 501. 4. (U) DDIR files, in NSA retired rec:ords 96026, Box 10, "President Reagan." interview, Juanita M. Moody, by David Hatch 16June 1994, OH 32-94, NSA. NSA Archives 44700NZ, 015-0306-1. 5. (U) Bob Woodward, Veil: The Secret Wars oftlu CIA 1981-1987 (New York: Simon and Schuster, 1987), 41.)- 47. P.L. 86-36 6. (U) Washington Star, 3 February 1981. U.S., Congress, Senate Select Committee on Intelligence, Nomination of Admiral B. R. Inman to be Deputy Director of Central Intelligence. 97th Cong ., 1st sess.,19Sl, 1. 7. <U>CCHSeries VI.D.2.15. 8. (U Interview, Robert Rich, by Tom Johnsonl._ ________,loH 12-97, NSA. 9. (U) Interview, Sir Peter Marychurch, by Henry Sehorreck, 17-18 October 1989, OH 11-89, NSA. EO 1. 4. (c) EO 1. 4. (d) TOP SFCRET"COMINT UMIIltJ+Al:EN'f I(E'Jt18LEH~1 308 P.L. 86~36 DOCID: 3807349 feP SECREJ/IC6MINf l:JMBRAfTALENT IEEYII6LE//)(t 50. <U1"" ------------......l~n CC}I Series VII1.35. All important Soviet sources confirm that the decision was made in the Far East. See, for instance, Dobrynin;In Confidence, 538. (Dobrynin also confirms that the radar system on Kamchatka was basically inoperative that night.) copy can be found in CCH SeriesVIH.as: E:b 1. 4. (c) 51. <U L------------------...J Other facts about the incident came from Facts on File, 28 Apri11978. 52. <U> NSA/CSS message 261419Z August 1983, in CCH Series VIII.351L _____________.I 53. (U) New York Times, 7 September 1983,15, in CCH Series VIII.35. 54. (U) Washington Po8t, September 1,1996, in CCH Series VII1.35. Reagan Library, NSF, in CCH Series XVI.J, ftKAL007." 55. <U> P05 critique, undated, in CCH Series Vlll.35. Faurer interview. 56. fU) Seymour M. Hersh, The Target is Destroyed: What Really Happened to Flight 007 and What America KnewAboutlt(New York: Random House,1986). 57. (U) DIRNSA message uC:Jr March 1985;in CCH Series Vlll.35. P:'L. 86-36 58. (U) DCI memo, 21 September 1983, in CCH Series Vlll.35. 59. (U) Reagan Library, NSF, in CCH Series XVI.J, "SALT Monitoring." 60. (U) Folder on arms control and SlGINT, in CCH Series XII.D. 61. <Ul Ch A2 files, Box 3, ftRT Location Project." DEFSMAC papers, paper dated 1994. QMR, ln9. NSA Archives, ace nr 25759, CBOL 161 J"rhj t'-cquisition/' Cryptologic QJJarterly (Winter 1983), 79. 62. (U) Ch A2 files, Box 3, ftRT Location Project." 62. IU) Interview,, lby Tom Johns~m, 27 July 1998, OH 1.3-98, NSA. SISR Vol IV, Foreign Instruments tion S1gnals, June 1987, in CCH Series XII.D. .·· 63. (U) Ibid. 64~ I J Cryptologic Quarterly (Spring 1997), 7l)-89.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    18 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us