Skip About Menus
Leadership Mission Strategy Mission, Vision, Values Core Values Q&A with NSA's Deputy Director Core Values Brochure Cryptologic Heritage NSA 60th Anniversary National Cryptologic Museum Map and Directions Museum Tour Information Exhibit Information National Vigilance Park Center for Cryptologic History Cryptologic History News Cryptologic Almanac Historical Publications History of the Insignia Pre-1952 Historical Timeline Pearl Harbor Review Voices from the Past National Cryptologic Memorial Cryptologic Hall of Honor Women in American Cryptology African Americans in Cryptologic History Equal Employment Opportunity(EEO) and Diversity Office of Disability Affairs EEO and Diversity Education Special Emphasis Programs No FEAR Act Central Security Service (CSS) Office of the Inspector General (OIG) OIG Hotline Information Contact the OIG Hotline NSAAB (NSA Emerging Technologies Panel) Photo Gallery FAQs
by Patrick D. Weadon
The Need for Secure Communications
Washington, D.C., 1941: The morning of December 7 found General George Marshall, the U.S. Army Chief of Staff, facing a difficult decision. American codebreakers had deciphered Japanese diplomatic traffic that indicated Japan had given up on a political solution to its problems with the United States. This meant that the prospect of war with that nation was now a distinct possibility. With this critical information in mind, Marshall was determined that a general warning to his Pacific commands, including Hawaii, was in order; however, the quickest way to relay this potentially vital and classified information was by secure phone. At the time, the only available secure communications technology was the A-3 Scrambler system operated in New York by the American Telegraph and Telephone Co. Although the device was considered state of the art, it was based on 1920s technology and many, including Marshall, were concerned that it was not secure. Marshall's suspicions were more than on the mark. Unbeknownst to him at the time, in the fall of 1941, The Deutsche Reichspost, the German organization tasked with handling telephone and telegraph traffic, had broken the A-3.
Through the use of an intercept site located in a former youth hostel on the Dutch coast, the Third Reich had become adept at intercepting and breaking A-3 calls between President Franklin Roosevelt and other prominent political and military leaders, including Prime Minister Winston Churchill. Fearful that his warnings could fall into Japanese hands, Marshall declined to use the A-3 and decided to send the fateful message to Hawaii by coded radiotelegraph. It arrived after the attack had concluded.
Marshall's communications predicament was a clear illustration of the challenges facing U.S. military and political leaders in their attempts to communicate securely. Persistent communication problems convinced the United States and its allies that in order to prevail against the Axis powers, they must develop not only the means to read their adversaries' communications, but also the means to protect their own. With this in mind, efforts were begun to construct a safe and secure worldwide voice communications system for use by Allied military and political leaders.
Efforts to create a secure voice system had existed since the 1920s. Some progress had been made, but as with the A-3, no device was able to offer complete security. In the early 1940's however, the situation began to improve. Bell Telephone Laboratories, under the direction of A. B. Clark (who later headed up the research and development effort at the fledgling NSA), and assisted by British mathematician Alan Turing, began work on what would become known as "the Green Hornet." The design of the system was based on earlier 1930s-era research on the transforming of voice signals into digital data. The device earned the nickname for the buzzing noise heard by someone attempting to eavesdrop on the conversation. The "buzz" closely resembled the theme song of the popular serial radio show of the time that went by the same title. In time, however, it acquired the more formal moniker of SIGSALY.
The device's success in protecting voice communications was due to a new development known as "pulse code modulation," the predecessor of such present-day innovations as digital voice, data and video transmission. It also was one of the earliest applications of spread spectrum technology, which was key to its effective operation. The U.S. Army awarded the first contract for the device in 1942; formal deployment followed in 1943. The SIGSALY terminal was massive. Consisting of 40 racks of equipment, it weighed over 50 tons, and featured two turntables which were synchronized on both the sending and the receiving end by an agreed upon timing signal from the U.S. Naval Observatory. (For a more detailed explanation of the engineering aspects of SIGSALY, see J.V. Boone and R.R. Peterson's work, The Start of the Digital Revolution: SIGSALY Secure Digital Voice Communications in World War II, NSA Center for Cryptologic History, Ft. George G. Meade, Md.)
The creation of SIGSALY was only part of the challenge required to construct a secure worldwide voice system. A cadre of highly skilled individuals was required to run the newly created device effectively. This requirement was fulfilled in 1942 by the formation of the 805th Signal Service Company. Their mission was to maintain and operate the SIGSALY communications secure network between army headquarters in Washington and overseas locations throughout the world. All personnel were hand-picked for their special talents and qualifications; the group included individuals with extensive backgrounds in electronics and telephony. Classes were originally held in New York City to allow instructors from Bell Labs easy access to the school and the students. In July 1944, both the school and the headquarters of the 805th were moved to the Pentagon in Washington. By that time, a total of 193 officers and men had been trained. The unit would eventually reach a total of 356 individuals: 81 officers and 275 enlisted men. These individuals were assigned to 12 separate detachments, each consisting of 5 officers and 10 enlisted men. Each detachment was expected to operate on a 24-hour basis.
The SIGSALY system was inaugurated on 15 July 1943 in a conference between London and the Pentagon (the original plan had called for one of the terminals to be installed in the White House, but Roosevelt, aware of Churchill's penchant for calling at all hours of the night, had decided to have the Washington terminal moved to the Pentagon with extensions to the White House and the Navy Department building.) In London, the bulk of the SIGSALY equipment was stored in the basement of Selfridges Department Store, with an extension to Churchill's war room, approximately a mile away. With the coming of SIGSALY, the shortcomings of the less than effective A-3 were now a thing of the past. The Deutsche Reichspost began to notice that the Allied signals on the A-3 system had been drastically reduced, prompting the chief engineer of the Dutch intercept site to conclude that "there was another telephone connection in use between the United States and England." The two-pronged "provide and protect" strategy of the Allied cryptologic services was slowly beginning to produce results. Both sides of the effort began to sense that the goal of intercepting and decoding Axis traffic, while at the same time protecting their own communications from exploitation, was in reach.
Eventually a dozen SIGSALY terminals were distributed to the far corners of the globe, to include Washington; London; Algiers; Australia; Hawaii; Oakland, California; Paris (after its liberation); Guam; and, after VE Day, in Frankfurt and Berlin. Most interesting perhaps was the installation of the device on a 250-ton ship, an ocean lighter dubbed OL-31. This floating communications network tracked General Douglas MacArthur in his island hopping campaign in the Pacific, and would have been a vital communications link if had it been necessary to conduct a full fledged invasion of Japan. Most importantly, the network provided both military and civilian leaders access to secure voice communications. The SIGSALY was vital in protecting both discussions of significant issues and day-to-day administrative details of the war. All told, over 3,000 top-secret conferences were held using SIGSALY, a truly impressive statistic. Once again, Allied ingenuity and hard work had won the day. The best proof perhaps is a telling 1943 statement by the once successful Deutsche Reichspost on the future possibilities of intercept of high-level Allied communications, "there is not much to be gotten from them now."
Historical Document | Date Posted: Jan 15, 2009