Professional Documents
Culture Documents
American Cryptology During Korean War
American Cryptology During Korean War
Thomas H. Johnson
Frederick Winterbothams The Ultra (www nsagov) listed five papers related to
Dr. Thomas R. Johnson is a
Korea Jill Frahm, so Power Can be Brought
Secret. The world had waited
35-year veteran of cryptology into Play, SIG1NT and the Pusan Perimeter.
almost 30 years for the beginning David A. Hatch and Rohen L. Benson, The
operations. Currently associated
of a declassification program for Korean War. The SIGINT Backgroond; Tho
with CIAs Center for the Study of the
mas W Johnson, General Essay on
historical accounts written during 1989, Book / The stntggfe for Cent ral:za non.
American cryptology during the
1945-1960 (Fort Meade NSA, 1995), pp- 36-
Cold War. and immediately after the war rep SIGINT and Cold-
56, Patrick D. Weadon,
resented most of what the National SEC Help Save the Day at Pusan, and cryp
rologic Background to the Chinese
Security Agency (NSA) and the UK
Intervention, by an anonymous retired NSA
Government Communications officer.
3Clay Blair. The Forgotten War America ii,
This article is unclassified in its New York
Frederick Winierboihani, The (litre
W, secret Korea, 7950-1953 (New York
(New York~ Harper and Row, 1974) Times Books, 1987)
entirety.
29
Cryptology
Postwar Letdown would continue into the trackless year, the lights went out. The USSR
future. changed everythingits codes and
Korea can best he understood in ciphers, its communications proce
terms of World War II, which has Within years of the end of World dures, and the very equipment that
been described as a SIGINT sig War II. however, American cayptol it used. The cryptologic commu
nals intelligence] War.5 By the end ogy was a hollow shell of its former nity referred to what had happened
of the war, the Americans and Brit self. When the soldiers and sailors as Black Friday. In fact, it didnt
graphic systems that the Axis Lewis F. Powell, Edwin 0. Reis ofexploitable messages disap
nations employed. Harry Hinsely, chauer, Alfred Friendly, and Telford peared and Washington was caught
the British intelligence historian and Taylor, as well as mathematicians short.
direct participant in matters crypto Joe Eachus, Andrew Gleason, and a
logic, has written that the war was host of others. And this was just on Woe piled upon woe. In 1949,
probably shortened by six months the American side. The British lost, Chiang Kai-shek fled to Taiwan,
as a result of SIGINT successes. I among others, Alan Turing, cred and Mao and the Communists came
would put the number at four to six ited by some as the inventor of the to power on mainland China. Their
months. Even if it were only four modern digital computer. The loss communications were no more
months, try cunning the numbers of talentwas accompanied by a cat exploitable than those of the Soviet
on likely additional Allied casual astrophic budgetary collapse. Union.
ties over that period. Or. looking at
the issue in another way, if the Rus The lack of resources was com In 1949, the feuding cryptologic
sian troops were on the Elbe in pounded by bureaucratic infighting. agencies attempted a union of
Among the generals and admirals groupthe Air Force Security Ser control its nominal subordinates.
who benefited from COMINT, Vice (USAFSS). established on Instead of one umbrella agency
expectations rose. knowing or Not 20 October 1948joined the fray. overseeing three military service
understanding the black arts by Although the USAFSS began as a departments, four more-or-less
which these things were done, they weak sister, it benefited from the coequal organizations competed for
Air Forces ability to get money resources in a shrinking pool.
4Marihew M, Aid, u.s. Humint and Comini
from Congress and soon became Moreover, as a creation of the Joint
in the Korean War From the Approach of
War the chinese
the largest of the three service cryp Chiefs of Staff (JCS), AFSA gave pri
to iniervenuon, InteIl~gence
and National Secants Vol 14, No 4, Winier tologic agencies. It also became the ority to military requirements,
1999
most parochial, separating itself resulting in bitter complaints from
Waiter Laqucur. A World of Secrets The Uses
and L,niits
from the cryptologic community by civilian customers, especially the
of iiztellige#zcu (New York Basic
Books. 1985), physical as well as psychic CIA and the State Department. At
Cryptology
work to keep it busy. Even worse, dent Truman ordered Gen. Douglas Donald Nichols. A murky figure,
AFSA had no technical expertise on MacArthur in Japan to Nichols lived in Seoul, had a
scrape
Korea. It had only one self-taught together a defensive force and send reserve commission as an Air Force
Korean linguist, no Korean dictio it to Korea. American forces began major, and headed the local Office
naries, no Korean typewriters, and arriving the South Korean port of
at of Special Investigations. Quite on
no books on Korea. Until April Pusan in late June, and Gen. Wal his own, he had set up a hip-
1950, it had no Korean communica ton Walker, commander of the US pocket SIGINT intercept and
tions collection of any kind. As it 8ih Army, hastily assembled Ameri reporting service using native Kore
happened, late in 1949 one of its can forces and remnants of the ans The most prominent of these
units in the Far East had collected ROK Arm) to try to hold a line.
were Cho Yong II, a former North
some traffic that looked like Soviet
Korean Army radio operator and
communications, but, when finally ASA, the Armys cryptologic organi
cryptanalyst, and Kim Se Won, a
analyzed months later, turned out zation, was caught just as flat
captain in the ROK navy. Kim had
to be Korean. On 21 April 1950, footed everyone else. Initially,
as
served with the Japanese SIGINT
AFSA tasked an Army Security Walker had little or no SIGINT sup
service in World War II and, hav
Agency (ASA) unit near Kyoto, port The first ASA contingent did
ing been interned in Hawaii for a
Japan, to collect more Korean traf not arrive until 9 September, six
fic. By mid-June, however, Kyoto days before the US behind period of time, had a good grasp of
landing
had collected virtuatly nothing. enemy lines at Inchon. This contin English. Together, they had a going
advance unit from concern. Nichols, in turn, reported
gent was an
Following World War II, Korea had Hawaii, with minimal the material as thinly disguised
capability
been teft outside the American HUMINT. The 5h Air Force didnt
ASAs plan was to support 8t1 Army
defensive perimeter in the Far East. with one communications recon want Murray. After taking posses
When the North Koreans invaded naissance battalion sion of his
badly needed
at Army level,
the South in June 1950, they met lit and a battalion assigned to each of equipment, they sent him back to
tle opposition. Republic of Korea the three subordinate corps; Japan.
Cryptology
The SIGINT
improvements came just
in time for Gen. Walkers
This development did not accord the attack, permitting him to shift
defense of the Pusan
with either the plans of Mac his forces in time.
32
Cryptology
Manchuria, near the Korean bor modern American Camp Pendleton in California, but
der. Ferries at Anshan (on the Yalu did deploy Korea because it
military history. not to
river) were being reserved for mili lacked the necessary equipment
tary use. Maps of Korea being
were and was not considered combat
ordered in quantities large enough The system of tactical inter
ready.
to equip 30 divisions. On 7 Novem cept support to Marine units that
Committee had changed its
ber, inradiotelephone
a
had been established so labori
conversation intercepted and pub
opinion, saying that, although there
was convincing evidence that star
ously in World War II had almost
lished by AFSA, an East European
tling numbers of Chinese forces disappeared. It took the entire
ambassador in Beijing stated, We
were in Manchuria, the time for Korean war to reestablish a sem
are already at war here
intervention had blance of what had been available
passed. They con
coastal provinces near Taiwan. By the retreat of the P Marine Divi unit. Cho and his unit hooked up
mid-October, however, the Watch sion, which had been trapped at with USAFSS and provided stellar
Cryptology
Another critical need was for Chi ratio in the air war. front north of Seoul. They were
nese linguists. The SIGINT organized into small tactical sup
services partially solved the prob port units, mostly with manual
1cm by hiring Nationalist Chinese Morse positions. Morse communica
officers from Taiwan. This pro tions proved difficult to exploit and
cess was slow, however. Korean communications, with a were of little value in the tactical
problem. Russian air forces had messages related to the war. As UN establish an order of battle for ihe
established a communications net troops fled south in December North Korean army.
-
in China to serve military and 1950, evenPyongyang was out of
civilian aircraft at airfields in the question, and the Air Force Most of ASAs value in Korea
Korea and Manchuria by July eventually set up its operations in stemmed from its intercept of Chi
1950. Early the following year, Pyongtaek, well south of the nese and Korean voice
COMINT intercepts showed 35thparallel. Here the Air Force communications. Much of that
Soviet control offighter activity in attempted, with limited success, to came from the detection of Chi
the northernmost regions of support American ground control nese telephone conversations being
Korea, and Soviet pilots were lers with SIGINT. carried through the ground and
noted frequently in air-to-air and picked up by sensors originally
air-to-ground conversations. Once the UN forces had regained designed to detect the tramp of
the initiative, Seoul was safe, and advancing enemy troops. (Such
Before the Chinese intervention. both Air Force and Army cryptolo ground-wave intercept techniques
the Air Force had dreamed of set gists moved their headquarters to had been pioneered during World
ting up a cryptologic outpost in the western suburbs of Seoulthe War I.) This serendipitous discov
Sinanju, far to the north, for North Air Force to Chosen Christian ery resulted in the formation of
low-level voice intercept (LLVI)
units. Later, ASA units also inter
ment to success.
Success Stories
Army Security Agency Direction Finding Unit in the Mountains of Korea- (NSA photo) the Chinese Communist troops to
34
Cryptology
take Hill 395 in central Korea in responsible for the enormous communications. Use of
1952, came to be known as the American kill ratio in the air war. frequencies above HF was still
Battle of White Horse Mountain. As the front lines moved farther experimentaL When USAFSS opera
Intercepted Chinese communica north, the USAFSS operation was tors in Korea could no longer hear
tions gave the Americans warning transferred to Kimpo airport to enemy pilots, however, they con
of the attack. ASA rushed an inter remain collocated with the Tactical cluded that the reason had to he a
gressed. The Chinese lost 10,000 vice unit moved again, to Pyong cided with the arrival of Lt. Delmar
troops out of the 23,000 they had Yong-Do (referred to by the GIs as Lang with the first batch of school-
committed. In March 1953, COM P-Y-Do), a small island in the East trained American Chinese linguists
INT also tipped off Chinese China Sea north of the 3~th parallel. in mid-1952. Lang took stock of the
planning for offensives at Old Here they continued the warning situation. The voice conimunica
Baldy and Pork Chop Hill. operation, called Yoke, in tandem tions that he and his people were
with the TACC. The P-Y-Do opera trained intercept were no longer
to
Air Force SIGINT operations bene tion was closed down a month later hearable. Meanwhile, the TACC had
fited from Soviet air warfare and TJSAFSS returned to Seoul. All moved from Kimpo to Cho-Do
doctrine, which called for fighter Air Force SIGINT warning was col Island, off the east coast of Korea
aircraft to be closely managed by located at Chosen Christian College, near the North Korean port of Won-
ground controllers who were where analysts had available, for son. Tactical SIGINT support now
watching the battle on radar. the first time in one geographic involved the laborious process of
USAFSS discovered Russian voice location, intercepts of North intercepting at Chosen and relay
communications in the early spring Korean, Chinese, and Soviet com ing to Kimpo, with a further relay
of 1951, and set up a mobile inter munications, both Morse and voice. to the TACC at Cho-Do. The
plots. They would call the informa communications began drying up.
tion over a landline connected to Air Force analysts suspected that
the operations building. The Ameri the enemy was starting to use very
can Air Force controller could then high frequency (VHF) ranges for
pass the information on to the transmission. VHF can only be
nificantly expanded the range of ing the end of the war, the worlds
coverage beyond American radars, military organizations had contin Deirnar Lang on cho-Do isiand In 1952
and many believe that it was partly ued to use high frequency (HF) for (NSA photo)
35
Cryptology
using VHF for communications and experience, were had considered readable high-level
that those communications were promptly forgotten. They enemy communications almost a
hearable from the island. Lang and had to be re-learned in birthright during World War II
the USAFSS contingent headed for voiced their unhappiness at the
Vietnam.
Cho-Do. They set up intercept turn of events. Two important cus
the best support that LJSAFSS mus example, had established a rule all part of a palpable decline in the
tered during the entire war. In one that it would control all resources e1fectiven~ss of American SIGINT.
which Lang described the that resided at fixed field sites,
day, as
~hile the services would control In December
great Korean turkey shoot, Ameri 1951, Walter Bedell
can F-86s downed fifteen MiGs
those that were mobile. At the Smith, the crusty Director of Cen
without a loss, even though none time, virtually all sites (except those tral Intelligence, wrote a
came, of course, from the COMINT simply reversed fixed and committee he established to sur
Cho-Do. A visiting mobile. An Air Force general A.merican COMINT. The NSC
operation on vey
ASA colonel commented that it commented wryly that the sites forwarded the letter to President
ducks were about as mobil~ as the Eiffet Truman. The that ended the
was just like shooting in a events
rain barrel. Tower. With the stroke of a pen, life of AFSA and led to the estab
however, the Air Force had lishment of the National Security
removed its collection resotirces unfold.
Agency began to
Back in Washington from AFSA control.
munications, so exploitable earlier broke out between ASA and From what we can now glimpse,
in the war, dried up in the summer USAFSS about which one would the bottom line on SIGINT in the
of 1951. The North Koreans target air-related communications Korean war paralleled the overall
adopted Soviet communications The result was that both of them American experience during that
procedures, and the communica targeted the same communications, war. There were successes and
tions nets that AFSA had been while leaving other targets unat there were failures, but the failures
exploiting earlier no longer yielded tended. This approach not only tended to overshadow the suc
useful intelligence. This develop wasted resources, but also violated cesses. The war ended in a draw, a
ment made Korean war SIGINT the sense of decorum that should highly discomfiting outcome for the
mostly a tactical
problemthere have prevailed within the Intelli American public, thegenerals and
was little strategic information avail gence Community. It had become admirals who led the fight, and the
able from AFSA in Washington an all-out food fight. men and women who fought it.
36
Cryptology
Korea, American cryptologists rose the lessons learned the hard way,
sometimes chaotic, and expertise more ready for tactical SIGINT sup
had to be acquired laboriously. port in Vietnam than it had been in
Still, SIGINT did make a difference Korea. Delmar Lang had to be sent
not quite what had been achieved how to do tactical warning. But that
in \Vorld War 11, hut it did establish is a story for a future article.
37