• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/64

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

64 Cards in this Set

  • Front
  • Back
Dr. Edward Bancroft
• Revolutionary War
• Physician living in London
• Worked for Silas Deane and Benjamin Franklin as a spy on the British, also served on the American committee negotiating with the French
• However, was actually serving as a spy for the British on the colonists; did much damage to the American cause
Culper Spy Ring
• Revolutionary War
• American spy ring established in 1778 in NY which was a British stronghold
• Members included: Benjamin Tallmadge (leader of the spy ring), Robert Townsend, and Anna Strong
• Used a numerical substitution code (ex. NY=727)
• Set up at Washington’s request
James Lovell
• “Father of American cryptanalysis”
• Revolutionary War
• 1781 designed cipher systems used by several prominent Americans
• Also determined the encryption method that the British were using; enabled him to intercept Corwallis’s dispatch from Yorktown and lead to key victories for the Americans
Allan Pinkerton
• Head of one of the world’s first private detective agencies
• Discovered a plot to assassinate Lincoln on his way to the inauguration
• Created a cipher to be used in correspondence between him and Lincoln
• Civil War
• General McClellan’s Intelligence Chief
• Had plans for counterintelligence work in Washington
• **Pinkerton’s most important role was as intelligence chief during the Peninsula campaign of 1862. He reported on Robert E. Lee’s Confederate troop strength to General McClellan. McClellan was overestimating the number of Confederate troops defending Richmond, and Pinkerton continued to agree with McClellan, telling him what he wanted to hear. McClellan used the estimated size of Confederate forces as a reason not to attack. Lincoln became frustrated with this and relieved McClellan of command, and Pinkerton resigned soon after.
Inquiry
• Woodrow Wilson and Paris Peace Conference 1919
• A group of experts assembled by Edward House on Wilson’s instructions to study political and territorial problems likely to arise at the Paris Peace Conference
• William Wiseman saw his main intelligence role as maintaining “close touch” with the Inquiry
• The U.S. Peace Commission at the Conference, headed by Wilson, included a team of 40 members of The Inquiry
o Walter Lippmann
o Isaiah Bowman
• Later called the Territorial, Economic, and Military Intelligence Division
• Provided Wilson with the first professional intelligence staff in the history of the presidency
Black Tom Affair
• July 30, 1916 in Jersey City, NJ – at this time the U.S. had no significant national intelligence service and no code breaking agency
• German attack on American port (Black Tom Pier) to prevent the ammunition produced by the U.S. from being used by the Allies in WWI
• Resulted in the deaths of American civilians
• Created U.S. hostility toward the Germans
• Increased motivation for U.S. espionage to protect the security of the U.S.
• Example of German secret activities and covert operations
• Marked the beginning of the fight against German espionage and sabotage
• American counterintelligence agencies finally organizing themselves and taking the offensive against German networks during the final months of the war
- Paupen and Boy-ed
Sir William Wiseman
served as a liaison between the British and the Woodrow Wilson WWI; learned what the US was interested in to creat a special relationship based on what the US needed
Zimmerman Telegram
telegram sent by Germans to the Mexicans proposing Mexican gov’t to declare war on US from Germany
• Promised Mexico would get back territory lost in Mexican War – Mexicans rejected this proposal
• Intercepted by British gov’t and codebreakers got a hold of it in Room 40
• When released to the public, caused much outrage and pushed the US to declare war on Germany
Office of Navy Intelligence (ONI)
established in the United States Navy in 1882, the oldest intelligence group operating in the US
• America became more prepared after the Spanish-American War with more intelligence divisions that were created
• Played a large role in WWII with the codebreaking of Japanese advancements
Herbert Yardley
• Heads the Black Chamber, a State Department and U.S. army funded covert operation - foundations of SIGINT, 1920s
• Yardley was able to break into Japanese codes - due to his work at the Washington Naval Conference of 1921-22, the U.S. knew what the final Japanese decision would be and were thus able to manipulate the Japanese
• Yardley publishes book, "The Black Chamber," about how he successfully broke the Japanese codes - Japanese changed system, agreed to pay Yardley not to work on Japanese systems; (no espionage laws against publishing SIGINT info at that time)
• Yardley goes to work for the Chinese against Japan
• Yardley, greatest cryptographer, ends career as war starts
Virginia Hall
• One of the first women to work as an operations officer for the CIA
• In France, she operated under the code name "Marie Monin" to help organize an agent network with the French Underground system
• She was the first woman to be given the role of field officer for the SOE - played major role in organizing SOE operations in Europe during the war
William Donovan
• Coordinator of information of the Office of Strategic Services (OSS), the precursor to the CIA, during WWII
• Churchill wants Donovan to set up an intelligence system similar to the British
• Won a Medal of Honor in WWI
• Seen by the British as a bridge to the Roosevelt administration - had connections with the British
• Following WWII, the OSS was dismantled - Truman wanted to coordinate all intelligence and has conflicts with Donovan
William Friedman
after Secretary of State Stimson eliminated Black Chamber, he assigns Friedman to run Signal Intelligence Servies (SIS), a code breaking intelligence division founded in April 1930. Besides breaking foreign codes, they were responsible for just about anything to do with the War Department's code systems. The SIS initially worked on an extremely limited budget, lacking the equipment it needed to even intercept messages to practice decrypting. In the late 1930s, subordinates of Friedman led by Frank Rowlett broke Japan's PURPLE cipher, thus disclosing Japanese diplomatic secrets in the World War II era.
Black Chamber
After WWI, US (in terms of State Department and others) ran a covert operation run out of NY that was headed by Herbert Yardley. It was called Black Chamber. He decided that signals intelligence was so important that they’d continue it after the war. BC made arrangements with major telegraph companies in US to have them send the telegrams to the BC before they sent them on to EU. Yardley was probably the greatest cryptographer in US history. He could break into Japanese system and allow US officials to read their diplomatic traffic. That helped US big time in the Washington Naval Conference of 1922 since they knew Japan’s position. It accelerated Navy build-up. The Japs wanted superiority in Far East and wanted to build ships, which Americans feared. That is why they called for the conference. They discovered through this intelligence that Japs would demand 5-5-4 and their final position was 5-5-3 (ratio of ships from US-UK-Japs, pretty sure). Knowing their poker hand, US just said no until Japs offered final position (5-5-3). They operate through most of the 20s. Herbert Hoover, as President, selects Henry Stimson as Secretary of State. Stimson didn’t approve and though it was not conducive to diplomacy. He eliminates the Black Chamber so Yardley is out of a job. Yardley then publishes a book called The Black Chamber on how he successfully attacked the Japanese system. It became a best-seller in US and Japan
Joe Rochefort
After Pearl Harbor, Navy began working on JN-25 again. In command is Joe Rochert, and 2nd in command is Tommy Dwyer. They kept seeing in this traffic that the next target for Jap Navy was “AF.” Washington though this was Alluscion Islands (Spelling?) and then Midway. So Rochert says they’re attacking Midway. Rochert sends a message to Midway saying that they should broadcast in the clear so the Japs pick it up saying that they’re low on supplies. Next day, they pick up Jap traffic saying that they’ll attack Midway and Rochert sets up a trap. Midway changes the entire Pacific War. Joe Rochert is brilliant. Redmund Brothers who ran Navy intelligence in Washington denied a medal request for Rochert and removed him from Hawaii. He never worked on Jap system again.
PURPLE
• A cryptographic machine used by the Japanese before and during WWII
o Purple was the American codename for these machines
 The information Americans intercepted from Purple was codenamed Magic
o Based on switch-stepping technology
• Purple ciphers broken in 1940 by US Army Signals Intelligence Service, of which William Friedman was the head
o Purple messages being broken before Pearl Harbor
o Deciphered 14-part message from Japan ordering its ambassadors to break off diplomatic relations
• Japanese believe Purple messages to be unbreakable throughout WWII
o Despite warnings from the Germans that Americans had broken the code
Stanley Finch
• The first director of the Bureau of Investigation, later to become the FBI
o Director 1908-1912
• The Bureau of Investigation was created in 1908 by Attorney General Charles Bonaparte
o Teddy Roosevelt had charged Bonaparte with the task of creating an effective intelligence agency
 This arose from a need to regulate interstate commerce, but there were not enough investigators in the Justice Department or the Secret Service
 Bureau of Investigation created as a solution to this shortage
Palmer Raids
• Series of raids from 1919-1921 on suspected radical leftist citizens and immigrants
o Carried out by US Dept of Justice and Immigration & Naturalization Service, named for Alexander Mitchell Palmer, US Attorney General under Woodrow Wilson
• Were carried out as a result of racial, labor, and political tensions prior to WWI, as well as fear of an American version of the Russian Revolution of 1917
o Attacks on government buildings carried out by alleged immigrant anarchist groups
o Bombings were tracked and investigated by Bureau of Investigation
• Congress passed the Espionage Act, the Sedition Act of 1918, and the Anarchist Exclusion Act
o Indicative of the level of tension in the US at that time
• November 7, 1919 kicked off a series of well-publicized and violent raids against suspected radicals and foreigners
o Palmer and his agents were accused of using torture and other illegal methods of obtaining intelligence, including informers and wiretaps.
OP-20-G
"Office of Chief Of Naval Operations (OPNAV), 20th Division of the Office of Naval Communications, G Section / Communications Security"; the Navy’s SIGINT and cryptanalysis division during WWII
• Its mission was to analyze and decrypt naval communications from the Japanese, German, and Italian navies
• Was ordered to break JN-25, but had a really hard time with it.
o Meanwhile, S.I.S. (the Army’s codebreaking division) was reading Purple, Japanese diplomatic traffic.
o A rivalry developed between the two agencies since S.I.S. was getting so much attention for its accomplishments
o They settled on the Odd-Even Agreement (1940)—in which the two agencies decided to deliver Purple information to the President on alternating months
• HYPO station in Hawaii, run by Joe Rochefort, operated under the OP-20-G umbrella
• After Pearl Harbor, it was obvious that we needed to devote more resources to breaking JN-25. It was finally broken in late May of 1942.
Japanese Analog Machine
the machine developed by S.I.S. in 1939 to decode Purple traffic
• Built by William Friedman, the head of S.I.S.
• We started reading Purple (Japanese diplomatic traffic) in 1939
• Purple is the name for the machine; MAGIC is the name for the traffic coming out of the machine.
JN 25
Japanese naval code during WWII
• Significance: info from this traffic allowed us to win at the Battle of Midway (turning point for U.S. war effort)
• Most secure code they used
• Broken by OP-20-G in late May, 1942
• Frequently changed during the war, unlike Magic
• Changed just before the attack on Pearl Harbor
• Efforts to break it were stepped up after Pearl Harbor
Humint
• Abbreviation for Human Intelligence refers to intelligence gathering through interpersonal contact versus more technical methods such as SIGINT. First form of intelligence.
• HUMINT can be more up to date than SIGNIT and can have the chances of being more reliable however you can never fully trust your agents.
• FDR took close important friends and formed “the club”. He would take them out on boats and talk about world affairs and gathered Humint. (Displays his distrust for the institutionalized forms of intelligence i.e. army, navy)
• Examples include: “Cambridge 5” “Elizabeth Bentley” “Culper Spy Ring” “Double Cross Agents”
• Explanation: Cambridge 5 were a group of Cambridge educated scholars who reached high ranks of British government and intelligence institutions, However, they were actually spies or ‘sleeper agents’ for Communist Russia.
“Blinker” Hall
• British Director of Navel Intelligence from 1914 to 1919.
• Was responsible for the establishment of the Royal Navy's codebreaking operation, Room 40, which decoded the Zimmerman telegram, a major factor in the entry of the United States in World War I.
• Strengthened US-British information sharing activity
Enigma
(SIGINT) the Enigma machine is an electro-mechanical rotor machine that was used to generate ciphers for the encryption and decryption of secret messages (about the size of a typewriter).
• Invented by German engineer Arthur Scherbius at the end of World War I
o This was a revolution in technology: the enciphering of messages was no longer done by hand, but by machine
o The machine had mechanical and electric parts. The mechanical system was a series of rotors (started with 3, moved later to 4), the actual enciphering was done electrically.
 Unbreakable 3x 10 to the 18th power
• Was adopted by Nazi Germany (1928) before and during World War II. The Germans had full faith in their machine and used it throughout the war with few modifications.
o Adopted for Army, Navy, Luftwaffe, then later for the German intelligence groups as well
• The messages were decrypted by the Poles and then shared with Allied cryptologists
o Machine= Enigma
o Message=Ultra
 The intelligence gleaned from this source was a substantial aid to the Allied war effort. The exact influence of ULTRA is debated, but an oft-repeated assessment is that decryption of German ciphers hastened the end of the European war by two years.
• The Poles broke Enigma, the British formed the Government codes and Cipher School (GC & CS)—at Bletchley Park—most of work done at Hut 8, by Alan Turing (Brilliant). Begins to develop bombes---large adding machines that could go through combinations rather quickly.) The Americans turned out the bombes in mass production.
• The Allied equivalent was called Sigaba—this weighed 60-70 lbs, but had 10 rotors. As far as we know, neither the Germans nor Japanese broke into Sigaba; very secure system.
Maxwell Papurt
• Papurt Story—almost cost the Allies dearly
o Sept 1944
o Wallendorf, Luxembourg
o Maxwell Papurt, was in OSS, member of very select X-2 group
 Only part of OSS that had access to Ultra info, very sensitive info derived from SIGINT
 A bit of a playboy, liked the ladies
 Stationed in allied section of Fr, close to Luxembourg
o Margaret Bourke White, photographer (Former wife of Erskine Caldwell— Tobacco Rd)
 Papurt met her, decided to impress her, took her to front line (at this point in time it was in flux). Sensitive SIGINT was on his desk, didn’t get a chance to read it, so packed it in his briefcase and took it with him
• Turns out, the front had indeed moved, the Germans had taken control of city, they captured Margaret and his briefcase. (With the Ultra intelligence!) When he didn’t show up that night, his coworkers realized he was missing, and that the Ultra info in his office was missing.
o Margaret was released. The Germans believed that we had achieved an accidental breakthrough of their codes—they changed Enigma parts, but didn’t change entire system (cost the Allies 6 months of intelligence.)
o Maxwell was later released as well.
• The Papurt story shows the arrogance of the Germans—confronted with evidence that the Allies had broken their codes, they assumed it was “chance” and that the Enigma system was still secure.
Marian Rejewski
• Part of the Polish effort—mathematician and cryptanalyst
o 1932—discovered a method (based on properties of groups of permutations) of breaking the Enigma cipher. (The method, developed later in England, contributed significantly to the Allies' victory in World War II.)
 Pure theory (worked on pure theory to break the enigma—generally by hand—pen and pencil.)
o In Poland, there were some machine attacks—they had some success, but not timely. Could read parts of the message, but by the time they could make it out, the German Panzers were in.
o Marian Rejewski was main cryptographer—he and his team were evacuated to France to work in collaboration with the Allies when the Germans attacked Poland. When Germans overran France, he was evacuated again.
o Rejewski's contributions included devising the cryptologic "card catalog," derived using his "cyclometer," and the "cryptologic bomb"—each time the Germans manipulated the Enigma machine, Rejewski was able to recalculate to quickly respond to the challenge.
 the British bombe, the main tool that would be used to break Enigma messages during World War II, was named after the Polish bomb.
• Significance—the British reading of Enigma would have been delayed until Nov. 1941 (at the earliest,) and some have said that the Brits would never have gotten off the ground without the Polish intelligence sharing.
Feliks Dzerzhinsky
founder of the Bolshevik secret police, the Cheka, an agency that became notorious for large-scale human rights abuses, including torture and mass summary executions, carried out during the Red Terror and the Russian Civil War; regarded by Lenin as a revolutionary hero.
R V Jones
• In 1936, worked at the Royal Aircraft Establishment where he undertook the problems associated with defending Britain from an air attack.
• In 1939, assigned to the Intelligence section of the Air Ministry. First scientist working for an intelligence service, closely involved with the scientific assessment of enemy technology and the development of offensive and counter-measures technology.
• generally known today as the 'father of Science and Technology Intelligence'
• regarded the Oslo report as genuine though the three Service Ministries regarded it as a 'plant'
Sigaba
U.S. encryption machine used during WWII
• No successful cryptanalysis of the machine during its service lifetime is publicly known.
• employed a system of rotors
• similar to Enigma (which used three rotors), but employed 15 rotors and did not use a reflecting rotor.
Alan Turing
• British intelligence agent organizing attack on the Enigma
o Enigma – the German enciphering machine for messages
• Bombes – large adding machines that was able to go through combinations quickly for deciphering the messages
o US produced because only the US had the capacity to do so at that time
o National Register Company in Dayton, Ohio
o Ran by women
• Colossus – first computer
o IBM took the credit, but really Turing built it to break the Ultra messages made by the Enigma machine
• Highest level of decorations with the British but the US wouldn’t let him come here and work for us because he was a homosexual
“On the Roof Gang”
• 176 enlisted radio operators specially trained at a unique school located on the roof of the old Navy Department Building from 1928 to 1941
• Trained to intercept and analyze foreign radio communications
ULTRA
• The name for the message traffic sent by Germans using the Enigma machine
• Broken at Bletchley Park in England
• SEE ALAN TURING
• Able to know what the Germans thought and were doing
o Able to locate some U-boats in the Atlantic – avoid confrontations and attacks
• Enigma – 3 rotor machine
o Thought to be unbreakable by the Germans
o Arthur Serbius – developed first enciphering machine for business use
o Germans adapted this machine for use in enciphering messages during the war
Bletchley Park
During World War II, Bletchley Park was the site of the United Kingdom's main decryption establishment. Ciphers and codes of several Axis countries were decrypted there, most importantly ciphers generated by the German Enigma and Lorenz machines.
British Effort
• centers on Govt. Codes and Cipher School (GC and CS)
• Bletchley Park-where work is done
• Hut 8-work done here too
• Alan Turing***-organizes attacks on Enigma machine and makes Bombes-large atom machines, could go through combinations quickly
John Cairncross
• was the alleged 5th member of the Cambridge 5
• spy for Soviets
• worked at Bletchley Park 1940-44
• Ultra and Purple
• not found out until 1963
Arthur Serbius
German electrical engineer who patented an invention for a mechanical cipher machine, later sold as the Enigma machine.
German Adopts Enigma machine
• 1928, rotor technology-stepping devices
• think are unbreakable 3 times 10, adopt for Army, Navy, and Luftwaffe, called Enigma
XX Committee
• British spy agency that was in charge of the Operation Double Cross, in which all German agents in Britain were actually double cross British agents
• broadcast mainly disinformation to their Nazi controllers
• Agents from both of the German intelligence services, the Abwehr and Sicherheitsdienst (SD), were apprehended.
Double Cross System
• Germans created network and set up daily routine
• Radio Dbl Agents
o Daily Routine:
 control officer wrote a week’s worth of transmissions
 XX Committee vetted them
 they were returned to control officer
 The text was given to the radio officer
 the radio operator and the agent wrote the message in the agent’s language—can tell by demeanor if original source
 the agent usually transmitted his own messages
First United States Army Group (FUSAG)
fictitious Army Group invented by the Allies in World War II prior to D-Day, as part of Operation Quicksilver, which was designed to deceive the Germans about where the invasion of France would take place. To attract Axis attention, George S. Patton was placed in command of the fabricated formation. FUSAG continued to exist on paper as part of the deception of Operation Quicksilver. The deception worked so well that even long after the invasion at Normandy, German forces continued waiting for what they thought would be the true invasion force.
Jedburgh Team
• They set up Jedburgh Teams Jedburgh is a code name. consisted of a british, FR, US officer nad US radio operator. These teams dropped into occupied france and Scandinavian countires to work with resistance forces against Nazis
• Effective in teaming up with resistance forces.
• Jedburgh was an operation in World War II in which men from the British Special Operations Executive, the U.S. Office of Strategic Services joined with men from the Free French Bureau Central de Renseignements et d'Action ("Intelligence and operations central bureau"), and the Dutch or Belgian Army to parachute into Nazi occupied France, Holland, or Belgium to conduct sabotage and guerilla warfare, and to lead the local resistance forces against the Germans.
• The Jedburgh teams comprised three men: a leader, an executive officer, and a non-commissioned radio operator. One of the officers would be British or American while the other would hail from the country to which the team deployed.
• Their main function was to provide a link between the guerillas and the Allied command. They could provide liaison, advice, expertise, leadership, and -- their most powerful ability -- they could arrange airdrops of arms and ammunition.
• Operation Jedburgh represented the first real cooperation in Europe between SOE and the Special Operations branch of OSS.
Sidney Souers
• American admiral and intelligence expert.
• Rear Admiral Souers was appointed as the first Director of Central Intelligence on January 23, 1946 by President Harry S. Truman.
• He had written the intelligence chapter of the Eberstadt Report, which advocated a unified intelligence system.
• seems to have played a role in breaking the impasse
AF
This was predicted by HYPO as the next target for the Japanese Navy. HYPO was run by Joe Rochefort and Tommy Dwyer. They broke into JN-25 and read parts oof messages and they found that AF was the next target by the Japanese. Washington people thought AF stood for the Aleutian Islands, however Rochefort said it stood for Midway. Rochefort told Midway to broadcast that the plants weren’t working right and were getting ready to run out of water so the Japanese would pick it up to tell if AF actually stood for Midway. The next day they pick up Japanese saying AF is short of water. This convinces US that Japanese will attack Midway and we set up a trap for it. Midway in 1942 changes the entire Pacific War.
Central Intelligence Group (CIG)
Truman created this as a peacetime intelligence organization to replace the OSS. The purpose of the CIG was to coordinate intelligence for the White House from the army, navy, war dept., state dept, FBI, etc. Coordinating intelligence for the White House was its sole function and it did this by means of a daily summary. The Daily Summary was like a newspaper that contained the processed information for the president. Despite its purpose, the CIG does not centralize intelligence because most people ignored it. It had little access to Sigint information, little military input and it becomes a competitor with the other agencies. Secretary of State James Burns became jealous that the president liked his daily summary that he began to have the state department produce a daily summary for the president as well. War dept. supplies an intelligence summary as well and now they have three reports when the purpose of CIG was to consolidate this information into one report. Admiral Sidney Souers becomes the 1st director of CIG and he is the first Director of Central Intelligence (DCI). Souers is replaced by Hoyt Vandenberg on June 10, 1946. He wanted to expand DCI authorities, have independent intelligence, independent research and analysis, and clandestine capabilities. The CIG replaced FBI in Latin America because it was an international intelligence organization. Hoover then pursued a “Scorched earth policy.” CIG gained in authority because it took things that nobody else wanted like the Foreign Broadcast Intelligence Service, and atomic energy matters. Roscoe Hillenkoetter replaces Vandenberg on April 30, 1947 as DCI. Under Hillenkoetter, CIG changed to the CIA. The National Security Act in 1947 created a national security council to coordinate national security policies and it also created a secretary of defense in place of secretary of war. The last paragraph of the National Security Act created the CIA with the intent to have no more Pearl Harbor’s by coordinating ALL intelligence to prevent future Pearl Harbor’s.
(Office of Strategic Services) OSS
It was run by “Wild Bill” Donovan, a New York lawyer who won the Medal of Honor in WWI. He had connections with the Eastern Establishment and the British. The British saw him as a bridge to the Roosevelt administration and someone they could use to influence the Roosevelt administration on intelligence. When Donovan went on a fact-finding tour in Britain the Churchill administration treated him very well, showing him ULTRA project and basic intelligence structure of the UK. The OSS during WWI set Donovan up as Coordinator of Operation. This was a civilian intelligence organization and had hostility from FBI, State and Military. OSS was prohibited from access to most signals intelligence materials, no presence in the Pacific/Far East etc. The OSS operated primarily in Europe and Middle East. The most important part of the entire OSS structure was its Research and Analysis Branch (R&A). This gathered together the smartest people in specific areas. Archibald MacLeish was part of the Library of Congress and he recruited the scholars from all over the country to do studies on various aspects. Some of these scholars included William Langer, Arthur Scheslinger, Gordon Craig and Walt Rosdale. Special Operations Branch (SO) was a branch of the OSS concentrating in psychological warfare. This was set up by the Jedburgh Teams. These teams were dropped into occupied France and Scandinavian countries to work with resistant forces against the Nazi’s and they were pretty successful. Virginia Hall was part of this branch and was an active operator. She made connections with French resistance and worked very effectively with them. OSS became junior partner of the British and did things the British way. OSS was not very effective, however. It played only a minor role in the entire war effort. It did conduct quiet diplomacy, which was unofficial diplomacy as a de facto representative of the US government. OSS was abolished on October 1, 1945. It was just a temporary war agency and Truman replaced this with the CIG.
Walter Bedell Smith
Eisenhour’s Chief of Staff in WWII, (Churchill called him the “American Bulldog”) Always angry (stomach ulcers)
• Served as DCI (Director of Central Intelligence) from Oct. 1950 – Feb. 1953.
• Responded to the Dulles, Jackson, Correa Report (1948) with many reforms of the CIA. The report stated that the CIA was just one more intelligence producing agency (Duplication of effort)
• Smith Reforms:
o Agreement with State Dept. 1951
o Economic research on Soviet Bloc
• Creation of the Office of Scientific Intelligence (OSI)
o Basic Science/Technology Research
o Challenged Military assumptions relating to the soviet union (ex. Bomber Gap early 50s)
Frank Wisner
Runs the clandestine Programs taken over by CIA after the OSS is terminated. Director of the Office of Policy Coordination (OPC) created in 1948.
• OPC Combat soviet activities abroad
o Unvouchered funds
o Excluded from Far East by Gen. MacArthur
o Operations in Europe
o 10/2 National Security Council gives CIA covert operations (Ex. Italian Elections 1948)
• Frank Wisner and Clandestine operations moved from Pentagon into CIA building under Bedell Smith.
National Security Act of 1947
1. Consolidate Armed Forces
2. Created Secretary of Defense (Peace time) instead of Secretary of War
3. Created National Security Council
• Intended to prevent future “Pearl Harbors”
• Coordination of Intelligence
• Intensified Intelligence competition
• Determined the Soviets as the Greatest threat
• No internal security functions (ex. Gestapo)
• Main Purposes: Created Air Force. Last paragraph creates the CIA.
o CIA: Did not give CIA ability to coordinate Intelligence, various services have their own
“NSA may assign CIA other duties as they come up” (and they did, CIA grew rapidly
Cambridge Five
A ring of Soviet spies in Great Britain during WWII through the early 1950s, including Kim Philby, Donald Maclean, Guy Burgess, Anthony Blunt, John Cairncross, and Oleg Gordievsky. There high positions within the British intelligence community made them particularly effective in passing information to the Soviets and slowing British and American efforts in counterintelligence against the USSR.
Operation FORTITUDE
Massive deception operation by the Allies against Germany in WWII. Using the Double Cross system and Ultra to confirm the operations successes, the Allies successfully convinced the Germans that the invasion of Continental Europe and the opening of a Second Front would be in Pas de Calais, not Normandy. The Germans believed the Allied divisions in Britain were almost twice their real strength, thanks to the fake tanks and boats of FUSAG, led by General Patton, and deceptive signal traffic.
Kim Philby
committed communist and Soviet mole in the UK and Washington, D.C., Philby recruited other Birtish agents for the Soviets and passed thousands of state secrets to the USSR. Philby’s position as head of Soviet countintelligence in MI-6 and liason to the CIA made him particularly effective in sabotaging British and American efforts in counterintelligence operations against the Soviets, until he defected to the USSR in 1963 after mounting suspicion and evidence suggested he was a mole.
Redmond Brothers
WWII after Pearl Harbor- Hypo (place to decipher)- run by Joe Rochert and second in Command is Tommy Dwyer who kept saying that the next target was going to be A-F. Thinks AF stands for Midway. Rochert sends a message to Midway saying he wants you to broadcast in the clear to make sure the Japanese hear that you are short of water. Next day get traffic that says AF short of water. Midway changes the entire pacific war. Redmond brothers thought the attack was somewhere else, the Aleutian Islands. Denied the medal request for Rochert. Removed him from Hawaii and he never worked on the Japanese system again.
Capt. William Martin
WWII Mincemeat Corpse- Deception - Allies wanted to invade Italy by Sicily but needed to deceive Italy that they were going to attack Sardinia. Mounted a disinformation campaign:
o Took a corpse from London and dressed in a captain uniform and to his wrist were secret documents that identified Sardinia as the invasion site for Italy
o Took cadaver to the ocean and currents pulled cadaver into the Spanish coast
o Spain was Neutral during this period but sympathetic to the Germans.
o Knew that because Spain was a catholic country they were unlikely to do an autopsy of the body because if they did they would discover that he did not drown, but died of alcoholism. Spain gave the documents to the Germans and we knew they believed it because we were reading Ultra. They said that it was valid
William Stephenson
WWIIish, OSS- Friends with FDR and Donovan and intent is to push the US to organize an intelligence structure that would mirror the British and work closely with the British. Peace Intelligence Organization.
Special Operations Executive (SOE)
British organization developed by Winston Churchill operating from 1940 to 1946 to conduct espionage and sabotage behind enemy lines during WWII. It also served as the core of a resistance within Britain. Also known as Churchill's Secret Army and was instructed by Churchill to "set Europe ablaze", controlled over 13,000 agents.
Enemy Objectives Unit (EOU)
Allied research group during WWII that examined strategic bombing initiatives to determine "chokepoints" in the German economy such as fighter production plants, oil facilities, and bridges. This led to more efficient bombing and immediate effects in German production
Sir Arthur Harris
Led British RAF Bomber Force during WWII; he, along with Winston Churchill, supported strategic area bombing but not strategic precision bombing as recommended by the EOU primarily because he believed bombers were too inaccurate to hit precise targets. He was responsible for some of Britain's most devistating attacks on Germany's infrastructure.
Operation SUNRISE
a successful covert mission executed by the Office of Strategic Services (OSS), specifically the Secret Intelligence Branch (SI) which handled clandestine humint, near the end of World War II 1945. OSS Chief Allen Dulles met secretly with German officials and police head Karl Wolffe to arrange secret surrender of Axis forces in northern Italy. This was the first significant intelligence operation undertaken by the OSS in Europe.
X-2
the counterespionage branch of the Office of Strategic Services (OSS), established in 1943 and served as a liaison with British MI5, they had access to the Double Cross System and were the only branch with access to ULTRA information, acted more like a junior partner to British intelligence and became known as an "elite within an elite." Chief of Staff James Jesus Angleton was a notable spy catcher who doubled everything and suspected everybody but the branch still faced serious security issues with Soviet spies, particularly Kim Philby.
Benjamin Church
chief physician of the Continental Army during the Revolutionary War. He was seized and imprisoned as a British agent. The death penalty for espionage was not considered by the Committee on Spies until 1776 and was not retroactively applied to Church's case so he escaped execution
Benedict Arnold
Arnold was a general during the American Revolution who initially fought on behalf of the United States but ultimately defected and joined on the side of the British. He was discovered to be involved in a plot to relinquish American control of West Point to the British, though the plan never actually succeeded.
By 1779, Arnold was providing the British, particularly Major John Andre, with troop locations and strengths, as well as the locations of supply depots, all the while negotiating a payment from the British for his intimate knowledge of American military intelligence. Major Benjamin Tallmadge, head of the Culper spy ring, helped detect Arnold as a traitor when Arnold attempted to convince him to defect as well. Arnold wrote to Tallmadge “As I know you to be a man of sense, I am convinced that you are by this time fully of opinion that the real interest and happiness of America consists of a reunion with Great Britain.” Arnold represents a form of HUMINT, among the earliest examples in the United States, though he was working for the British.
Thaddeus Lowe
owe was a Union inventor during the American Civil War who introduced observation balloons (hot air balloons), a technology that was used primarily by the North throughout the war. The observation balloons allowed the Union to perform aerial reconnaissance on the Confederate troops in order to determine their size and location. While airborne, Lowe used a telegraph to communicate the Confederate troop formations to Union leaders on the ground. In July 1861, Lowe was appointed Chief Aeronaut of the Union Army Balloon Corps by President Abraham Lincoln. The introduction of the observation balloons gave Union troops a significant advantage at the start of the war and represents one of the initial and most primitive forms of imagery intelligence (IMINT) in the United States.
“Trent Affair”
The Trent Affair occurred during the American Civil War. On November 8, 1861, the USS San Jacinto, commanded by Union Captain Charles Wilkes, intercepted the British steamer Trent and removed two Confederate diplomats, James Mason and John Slidell. The envoys were bound for Great Britain and France to press the Confederacy’s case for diplomatic recognition by Europe.
The initial reaction in the United States was enthusiastically in support of the capture, but many American leaders had doubts as to the wisdom and the legality of the act. In the Confederate States, the hope was that the incident would lead to a permanent rupture in Union-British relations, diplomatic recognition by Britain of the Confederacy, and ultimately, Southern independence. In Great Britain, the public expressed outrage at this apparent insult to their national honor. The British government demanded an apology and the release of the prisoners while it took steps to strengthen its military forces in Canada and in the Atlantic.
After several weeks of tension during which the United States and the United Kingdom came dangerously close to war, Lincoln released the two Confederate diplomats in order to avoid involving the Union in any further conflicts.
NSC 10/2
NSC 10/2 directed CIA to conduct "covert" rather than merely "psychological" operations, defining them as all activities "which are conducted or sponsored by this Government against hostile foreign
states or groups or in support of friendly foreign states or groups but which are so planned and executed that any US Government responsibility for them is not evident to unauthorized persons and that if uncovered the US Government can plausibly disclaim any responsibility for them."
EXECUTIVE ORDER NO. 935 (EO935)
February 28, 1984 Amending section 5(A) of the executive order no. 857 entitled Governing the remittance to the philippines of foreign exchange earnings of Filipino workers abroad and for other purposes.
NIAD-5 - National Intelligence Authority Directive (Number 5)
• Issued in 1948 under the Truman Administration
• Showed the difference between the OSS and the plans for the CIG
• Gave the CIG the power to bring all intelligence not currently being focused on into their power and allowed the Director of Central Intelligence (DCI) more power
• Also said that the DCI was to be in charge of all foreign affairs and make sure that plans were properly followed through
• Officially made the CIG the foreign intelligence agency in the US government
NSCID-1 - National Security Council Intelligence Directive (Number 1)
• Happened in 1950, under Truman
• Added to the National Security Act of 1947
• Basically states the responsibilities of the CIA and its director
• Must produce national intelligence, need to maintain relationships with other directors, such as the State Dept. and gather information on foreign affairs and the need to share information
• Essentially the Director becomes responsible for protecting the US and gives the CIA the power to start leading as the main source of gathering human intelligence
USIB - United States Intelligence Board
• 1957, Eisenhower
• The place where all of the chiefs of intelligence to go in order to give the DCI any intelligence information or guidance that they had on current programs
• Resulted after repeated critiques of the intelligence community and how it was being run and replaced the Intelligence Advisory Board
• Essentially attempted to strengthen intelligence projects (we do not know the full significance of this yet, but it seems to still be around today as part of the US intelligence structure)