The Nsa and Gchq

Topics: National Security Agency, Cryptography, World War II Pages: 9 (3038 words) Published: June 19, 2005
The Development of Monitors
By:

Professor

If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States' National Security Agency (NSA) and United Kingdom's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins. NSA

Although the National Security Agency is only forty-five years old (established by order of President Harry S. Truman in 1952), the functions it performs have been part of human history for thousands of years. The need to safeguard one's own communications while attempting to produce intelligence from foreign communications has long been a recognized part of governmental activity. In the American experience, cryptologic efforts can be traced to the very beginnings of the American nation. George Washington employed Elbridge Gerry (later Vice President of the United States) to solve the suspected cryptograms of a Tory spy, Dr. Benjamin Church. Thomas Jefferson included the making of codes and ciphers among his many interests, putting his efforts to use in both private correspondence and public business. One of his inventions, the cipher wheel, has been described as being in "the front rank" of cryptologic inventions. The American Civil War created a new urgency for techniques in both cryptography (the manufacture of codes and ciphers) and cryptanalysis (the breaking of codes and ciphers). It also introduced new elements into both processes -- telegraphy and significant advances in the use of signal flags and torches. These methods of transmitting information permitted rapid communication from one outpost to another or from a commander to his subordinates, but also brought with them new dangers of the loss of that information to an enemy. Both sides considered telegraph lines major targets and attempted either to cut or tap them. Cryptology again proved to be of great significance in the First World War, as evidenced by British decryption of the famous Zimmermann Telegram. In an effort to keep the United States from playing an effective role in the war in Europe, Germany offered Mexico the opportunity to regain Texas and other territories lost to the United States during the nineteenth century, in return for a Mexican declaration of war against the U.S. The telegram backfired, as its release by British authorities brought the U.S. closer to war with Germany. Tactically, the First World War introduced wireless communications to the battlefield, increasing flexibility but making codes and ciphers even more essential in guaranteeing security. After the armistice of 1918, the United States maintained modest but significant cryptologic establishments in the Navy and War Departments, along with an interdepartmental effort conducted in New York and headed by Herbert O. Yardley. HERBERT O. YARDLEY

Born in 1889 in Indiana, Herbert O. Yardley began his career as a code clerk in the State Department. He accepted a Signal Corps Reserve commission and served as a cryptologic officer with the American Expeditionary Forces in France during the First World War. In the 1920s he was chief of MI-8, the first U.S. peacetime cryptanalytic organization, jointly funded by the U.S. Army and the Department of State. In that capacity, he and a team of cryptanalysts exploited nearly two dozen foreign diplomatic cipher systems. MI-8 was disbanded in 1929 when the State Department withdrew its share...

Cited: Aubrey, C ,1981, Who 's Watching You? Britain 's Security Services & The Official Secrets Act. 1st ed. Pelican
Bamford, J.,1983, The puzzle palace: America 's National Security Agency and its special relationship with Britain 's GCHQ. Sidgwick & Jackson
Bamford, J., 2001, Body of secrets: anatomy of the ultra-secret National Security Agency: from the Cold War through the dawn of a new century. Doubleday
Brownell, G.,1981, The origin and development of the National Security Agency. Aegean Park Press
Hinsley, H., and Stripp, A., 1993, 1994, Codebreakers: The Inside Story of Bletchley Park Oxford University Press
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • The NSA Essay
  • NSA leaked Essay
  • NSA Scandal Research Paper
  • NSA surveillance Essay
  • Essay on NSA Spying
  • Nsa Deep Packet Inspection Essay
  • NSA VS. AMERICA Research Paper
  • The Truth About the NSA Essay

Become a StudyMode Member

Sign Up - It's Free