Misplaced Pages

Operation Arc Light

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.

American intervention 1965

#912087

131-517: 1966 1967 Tet Offensive and aftermath Vietnamization 1969–1971 1972 Post- Paris Peace Accords (1973–1974) Spring 1975 Air operations Naval operations Lists of allied operations During Operation Arc Light (sometimes Arclight ) from 1965 to 1973, the United States Air Force deployed B-52 Stratofortresses from bases in the U.S. Territory of Guam to provide battlefield air interdiction during

262-578: A Viet Cong stronghold. During this mission two B-52Fs were lost in a mid-air collision on June 19, 1965, while circling over the South Pacific Ocean, approximately 250 miles (400 km) offshore at the point of the Demilitarized Zone (DMZ), unable to conduct mid-air refueling in awaiting arrival of KC-135A tankers for pre-strike air refueling. Missions were commonly flown in three-plane formations known as "cells". Releasing their bombs from

393-636: A "privacy mechanism"; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. ThinThread was canceled when Michael Hayden chose Trailblazer , which did not include ThinThread's privacy system. Trailblazer Project ramped up in 2002 and was worked on by Science Applications International Corporation (SAIC), Boeing , Computer Sciences Corporation , IBM , and Litton Industries . Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and

524-695: A 2010 article in The Washington Post , "every day, collection systems at the National Security Agency intercept and store 1.7  billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases." Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple , Venona project , and JN-25 ). In 2004, NSA Central Security Service and

655-641: A CIA plot (ordered by the administration of President John F. Kennedy ) to assassinate Fidel Castro . The investigation also uncovered NSA's wiretaps on targeted U.S. citizens. After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 was passed. This was designed to limit the practice of mass surveillance in the United States . In 1986, the NSA intercepted

786-669: A U.S. Special Forces border outpost at Lộc Ninh , in Bình Long Province . This attack sparked a ten-day battle that drew in elements of the U.S. 1st Infantry Division and the ARVN 18th Division and left 800 PAVN troops dead at its conclusion. The most severe of what came to be known as "the Border Battles" erupted during October and November around Dak To , another border outpost in Kon Tum Province . The clashes there between

917-555: A U.S. bombing raid on COSVN after having been evacuated from Cambodia. After cementing their position during the Party crackdown, the militants sped up planning for a major conventional offensive to break the military deadlock. They concluded that the Saigon government and the U.S. presence were so unpopular with the population of the South that a broad-based attack would spark a spontaneous uprising of

1048-446: A compromise: The CIA would drop its insistence on including the irregulars in the final tally of forces and add a prose addendum to the estimate that would explain the agency's position. George Allen, Carver's deputy, laid responsibility for the agency's capitulation at the feet of Richard Helms , the director of the CIA. He believed that "it was a political problem ... [Helms] didn't want

1179-605: A conventional conflict might draw China in, as had happened in the Korean War . They also resisted the idea of negotiating with the allies. Moscow, on the other hand, advocated negotiations, but simultaneously armed Hanoi's forces to conduct a conventional war on the Soviet model. North Vietnamese foreign policy therefore consisted of maintaining a critical balance between war policy, internal and external policies, domestic adversaries, and foreign allies with "self-serving agendas." To "break

1310-596: A countrywide assault on the cities, conducted primarily by VC forces. Concurrently, a propaganda offensive to induce ARVN troops to desert and the South Vietnamese population to rise up against the government would be launched. If outright victory was not achieved, the battle might still lead to the creation of a coalition government and the withdrawal of the Americans. If the general offensive failed to achieve these purposes, follow-up operations would be conducted to wear down

1441-406: A dawning realization that if current trends continued, Hanoi would eventually lack the resources necessary to affect the military situation in the South. As a result, there were more strident calls by the moderates for negotiations and a revision of strategy. They felt that a return to guerrilla tactics was more appropriate since the U.S. could not be defeated conventionally. They also complained that

SECTION 10

#1733086312913

1572-582: A file xkeyscorerules100.txt, sourced by German TV stations NDR and WDR , who claim to have excerpts from its source code) reveal that the NSA tracks users of privacy-enhancing software tools, including Tor ; an anonymous email service provided by the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) in Cambridge, Massachusetts; and readers of the Linux Journal . Linus Torvalds ,

1703-658: A major North Vietnamese military buildup. In addition to captured documents (a copy of Resolution 13 , for example, was captured by early October), observations of enemy logistical operations were also quite clear: in October, the number of trucks observed heading south through Laos on the Hồ Chí Minh Trail jumped from the previous monthly average of 480 to 1,116. By November this total reached 3,823 and, in December, 6,315. On 20 December, Westmoreland cabled Washington that he expected

1834-399: A major cryptography conference was J. Solinas' presentation on efficient Elliptic Curve Cryptography algorithms at Crypto 1997. The IAD's cooperative approach to academia and industry culminated in its support for a transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau attributes

1965-590: A physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence team) inserts eavesdropping devices in high-value targets (such as presidential palaces or embassies). SCS collection tactics allegedly encompass "close surveillance, burglary, wiretapping, [and] breaking". Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage ,

2096-423: A preliminary phase, during which diversionary attacks would be launched in the border areas of South Vietnam to draw American attention and forces away from the cities. The general offensive and uprising would then commence with simultaneous actions on major allied bases and most urban areas, and with particular emphasis on the cities of Saigon and Huế. Concurrently, a substantial threat would have to be made against

2227-419: A protracted war of attrition". In May, MACV attempted to obtain a compromise from the CIA by maintaining that VC militias did not constitute a fighting force but were essentially low-level fifth columnists used for information collection. With the groups deadlocked, George Carver, CIA Special Assistant for Vietnam Affairs, represented the CIA in the last stage of the negotiations. In September, Carver devised

2358-477: A result of the boomerang routing of Canadian Internet service providers . A document included in NSA files released with Glenn Greenwald 's book No Place to Hide details how the agency's Tailored Access Operations (TAO) and other NSA units gain access to hardware. They intercept routers , servers , and other network hardware being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they are delivered. This

2489-592: A series of coups had characterized the preceding years. Protests, campaigning and the atmosphere of elections were interpreted by the Politburo of the Communist Party of Vietnam and Lê Duẩn as signs that the population would embrace a 'general uprising' against the government of South Vietnam. The Politburo sought to exploit perceived instability and maintain political weakness in South Vietnam. During late 1967,

2620-577: A variety of measures to accomplish its mission, the majority of which are clandestine . The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II , it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013 indicates that

2751-520: A very public debate over military strategy took place in print and via radio between Thanh and his rival for military power, Giáp. Giáp had advocated a defensive, primarily guerrilla strategy against the U.S. and South Vietnam. Thanh's position was that Giáp and his adherents were centered on their experiences during the First Indochina War and that they were too "conservative and captive to old methods and past experience... mechanically repeating

SECTION 20

#1733086312913

2882-445: A winter-spring offensive during 1968 had begun in early 1967 and continued until early the following year. According to American sources, there has been an extreme reluctance among Vietnamese historians to discuss the decision-making process that led to the general offensive and uprising , even decades after the event. In official Vietnamese literature, the decision to launch the Tet offensive

3013-910: Is believed by Glenn Greenwald of The Guardian to be the model for the comprehensive worldwide mass archiving of communications which NSA is engaged in as of 2013. A dedicated unit of the NSA locates targets for the CIA for extrajudicial assassination in the Middle East. The NSA has also spied extensively on the European Union, the United Nations, and numerous governments including allies and trading partners in Europe, South America, and Asia. In June 2015, WikiLeaks published documents showing that NSA spied on French companies. WikiLeaks also published documents showing that NSA spied on federal German ministries since

3144-590: Is the truncated version of the Lunar New Year festival name in Vietnamese, Tết Nguyên Đán , with the offense chosen during a holiday period as most ARVN personnel were on leave. The purpose of the wide-scale offensive by the Hanoi Politburo was to trigger political instability in a belief that mass armed assault on urban centers would trigger defections and rebellions . The offensive was launched prematurely in

3275-407: The 1967 South Vietnamese presidential election , looked increasingly stable. Rivalries between South Vietnam's generals were becoming less chaotic, and Thiệu and Kỳ formed a joint ticket for the election. Despite efforts by North Vietnam to disrupt elections, higher than usual turnouts saw a political turning point towards a more democratic structure and ushered in a period of political stability after

3406-1365: The 1st Combat Evaluation Group were lost in ground combat. On September 21, 2010, President Barack Obama presented the Medal of Honor to the sons of Chief Master Sergeant Richard L. Etchberger for his actions in the battle of Lima Site 85 . A memorial to all 1CEVG technicians is located directly behind the Arc Light memorial. Tet Offensive In Phase One: [REDACTED] South Vietnam: 4,954 killed 15,917 wounded 926 missing [REDACTED] [REDACTED] [REDACTED] [REDACTED] [REDACTED] Others: 4,124 killed 19,295 wounded 604 missing Total casualties in Phase One : 45,820 casualties: In Phase One: RVN/U.S. claimed: One PAVN source (Saigon only): Phase One, Phase Two and Phase Three : Trần Văn Trà reports (Phase One and Two): 75,000+ killed and wounded PAVN source (total for 3 phases): 111,179 casualties: American intervention 1965 1966 1967 Tet Offensive and aftermath Vietnamization 1969–1971 1972 Post- Paris Peace Accords (1973–1974) Spring 1975 Air operations Naval operations Lists of allied operations The Tet Offensive

3537-485: The Central Intelligence Agency (CIA) pulled ahead in this regard, with a budget of $ 14.7 billion. The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end. The NSA is also alleged to have been behind such attack software as Stuxnet , which severely damaged Iran's nuclear program . The NSA, alongside the CIA, maintains

3668-450: The Demilitarized Zone (DMZ). The intense shelling (100–150 rounds per day) prompted Westmoreland to launch Operation Neutralize , an intense aerial bombardment campaign of 4,000 sorties into and just north of the DMZ. On 27 October, an ARVN battalion at Sông Bé , the capital of Phước Long Province , came under attack by an entire PAVN regiment. Two days later, another PAVN regiment attacked

3799-696: The Foreign Intelligence Surveillance Court when within U.S. borders. Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage , received criticism from countries outside the UKUSA alliance. The NSA was also involved in planning to blackmail people with " SEXINT ", intelligence gained about a potential target's sexual activity and preferences. Those targeted had not committed any apparent crime nor were they charged with one. To support its facial recognition program,

3930-755: The National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand the NSA Centers of Academic Excellence in Information Assurance Education Program. As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008, by President Bush, the NSA became the lead agency to monitor and protect all of

4061-508: The People's Republic of China and called for the reunification of the nation by military means and that no negotiations should be undertaken with the Americans. This group was led by Communist Party First Secretary Lê Duẩn and Lê Đức Thọ (no relation). From the early to mid-1960s, the militants had dictated the direction of the war in South Vietnam. General Nguyễn Chí Thanh , the head of Central Office for South Vietnam (COSVN), headquarters for

Operation Arc Light - Misplaced Pages Continue

4192-626: The US Court of Appeals . The court also added that the US intelligence leaders, who publicly defended it, were not telling the truth. NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential, or secret government communications. According to

4323-663: The Vietnam War by providing evidence of a North Vietnamese attack on the American destroyer USS  Maddox during the Gulf of Tonkin incident . A secret operation, code-named " MINARET ", was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker , as well as key leaders of the civil rights movement , including Martin Luther King Jr. , and prominent U.S. journalists and athletes who criticized

4454-589: The Vietnam War , with about 30,000 NESTOR sets produced. However, a variety of technical and operational problems limited their use, allowing the North Vietnamese to exploit and intercept U.S. communications. In the aftermath of the Watergate scandal , a congressional hearing in 1975 led by Senator Frank Church revealed that the NSA, in collaboration with Britain's SIGINT intelligence agency, Government Communications Headquarters (GCHQ), had routinely intercepted

4585-403: The Vietnam War . However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal". The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success. The NESTOR family of compatible secure voice systems it developed was widely deployed during

4716-647: The Vietnam War . This included strikes at enemy bases, supply routes, and behind the lines troop concentrations, as well as occasionally providing close air support directly to ground combat operations in Vietnam . The conventional bombing campaign was supported by ground-control-radar detachments of the 1st Combat Evaluation Group (1CEVG) in Operation Combat Skyspot . Arc Light operations usually targeted enemy base camps, troops concentrations, and supply lines. Previously dedicated to carrying nuclear weapons ,

4847-509: The stratosphere , the B-52s could neither be seen or heard from the ground. B-52s were instrumental in destroying enemy concentrations besieging Khe Sanh in 1968, and in 1972 at An Loc and Kontum . Arc Light was re-activated at Andersen on February 8, 1972, when President Richard Nixon resumed bombing of North Vietnam in an effort to move peace talks along. Operation Bullet Shot saw over 15,000 men were sent to Andersen on temporary duty over

4978-595: The 14th Plenary session of the Party Central Committee in January 1968. The resultant Resolution 14 was a major blow to domestic opposition and "foreign obstruction". Concessions had been made to the center group, however, by agreeing that negotiations were possible, but the document essentially centered on the creation of "a spontaneous uprising in order to win a decisive victory in the shortest time possible." Contrary to Western belief, Giáp did not plan or command

5109-482: The 1990s. Even Germany's Chancellor Angela Merkel 's cellphones and phones of her predecessors had been intercepted. Edward Snowden revealed in June 2013 that between February 8 and March 8, 2013, the NSA collected about 124.8  billion telephone data items and 97.1  billion computer data items throughout the world, as was displayed in charts from an internal NSA tool codenamed Boundless Informant . Initially, it

5240-563: The AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests, such as the Department of State , the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI). In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as

5371-517: The American public still disapproved of the President's handling of the war. The American public, "more confused than convinced, more doubtful than despairing ... adopted a 'wait and see' attitude." During a discussion with an interviewer from Time magazine, Westmoreland dared the communists to launch an attack: "I hope they try something because we are looking for a fight." Planning in Hanoi for

Operation Arc Light - Misplaced Pages Continue

5502-470: The Americans would win the war. There was a discrepancy, however, between the order of battle estimates of the MACV and the Central Intelligence Agency (CIA) concerning the strength of VC guerrilla forces within South Vietnam. In September, members of the MACV intelligence services and the CIA met to prepare a Special National Intelligence Estimate that would be used by the administration to gauge U.S. success in

5633-692: The Chamber's initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson , who defended his decision by stating, "Gentlemen do not read each other's mail." During World War II , the Signal Intelligence Service (SIS) was created to intercept and decipher the communications of the Axis powers . When the war ended, the SIS was reorganized as the Army Security Agency (ASA), and it

5764-499: The Communist Party militants. For the moderates and centrists, it offered the prospect of negotiations and a possible end to the American bombing of the North. Only in the eyes of the militants, therefore, did the offensive become a "go for broke" effort. Others in the Politburo were willing to settle for a much less ambitious "victory". The PAVN official history states that the objectives of

5895-661: The January–February 1968 offensive, but it can also include the so-called " Mini-Tet " offensive that took place in May and the Phase III offensive in August, or the 21 weeks of unusually intense combat that followed the initial attacks in January. Leading up to the Tet Offensive were years of marked political instability and a series of coups after the 1963 South Vietnamese coup . In 1966,

6026-411: The NSA and DoD Inspectors General . The project was canceled in early 2004. Turbulence started in 2005. It was developed in small, inexpensive "test" pieces, rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer. It

6157-682: The NSA and other U.S. defense cryptanalysis components. To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service. The NSA's actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and

6288-487: The NSA does not publicly conduct human intelligence gathering . The NSA is entrusted with assisting with and coordinating, SIGINT elements for other government organizations—which are prevented by Executive Order from engaging in such activities on their own. As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between

6419-581: The NSA is intercepting "millions of images per day". The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by the NSA during the Iraq War that consisted of gathering all electronic communication, storing it, then searching and otherwise analyzing it. It was effective in providing information about Iraqi insurgents who had eluded less comprehensive techniques. This "collect it all" strategy introduced by NSA director, Keith B. Alexander ,

6550-447: The NSA that allowed the export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA. This strengthened the protection for users of Notes outside the US against private-sector industrial espionage , but not against spying by the US government. While it is assumed that foreign transmissions terminating in

6681-560: The NSA's Tailored Access Operations (TAO) group implant catalog, after implanting Cottonmouth, the NSA can establish a network bridge "that allows the NSA to load exploit software onto modified computers as well as allowing the NSA to relay commands and data between hardware and software implants." NSA's mission, as outlined in Executive Order 12333 in 1981, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning

SECTION 50

#1733086312913

6812-567: The NSA's ability to surveil the domestic Internet traffic of foreign countries through " boomerang routing ". The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I . A code and cipher decryption unit was established as the Cable and Telegraph Section, which was also known as the Cipher Bureau. It

6943-404: The NSA's harmonious collaboration with industry and academia in the selection of the AES in 2000—and the Agency's support for the choice of a strong encryption algorithm designed by Europeans rather than by Americans—to Brian Snow , who was the Technical Director of IAD and represented the NSA as cochairman of the Technical Working Group for the AES competition, and Michael Jacobs, who headed IAD at

7074-479: The NSA's role in economic espionage in a report entitled 'Development of Surveillance Technology and Risk of Abuse of Economic Information'. That year, the NSA founded the NSA Hall of Honor , a memorial at the National Cryptologic Museum in Fort Meade, Maryland. The memorial is a, "tribute to the pioneers and heroes who have made significant and long-lasting contributions to American cryptology". NSA employees must be retired for more than fifteen years to qualify for

7205-404: The National Security Agency. The National Security Council issued a memorandum of October 24, 1952, that revised National Security Council Intelligence Directive (NSCID) 9 . On the same day, Truman issued a second memorandum that called for the establishment of the NSA. The actual establishment of the NSA was done by a November 4 memo by Robert A. Lovett , the Secretary of Defense , changing

7336-409: The North Vietnamese had done was carry out the first stage of their plan: to fix the attention of the U.S. command on the borders and draw the bulk of U.S. forces away from the heavily populated coastal lowlands and cities. Westmoreland was more concerned with the situation at Khe Sanh, where, on 21 January 1968, a force estimated at 20,000–40,000 PAVN troops had besieged the U.S. Marine garrison. MACV

7467-476: The PAVN/VC "to undertake an intensified countrywide effort, perhaps a maximum effort, over a relatively short period of time." Despite all the warning signs, however, the allies were still surprised by the scale and scope of the offensive. According to ARVN Colonel Hoang Ngoc Lung the answer lay with the allied intelligence methodology itself, which tended to estimate the enemy's probable course of action based upon their capabilities, not their intentions. Since, in

7598-402: The South, was another prominent militant. The followers of the Chinese line centered their strategy against the U.S. and its allies on large-scale, main force actions rather than the protracted guerrilla war espoused by Mao Zedong . By 1966–1967, however, after suffering massive casualties, stalemate on the battlefield, and destruction of the northern economy by U.S. aerial bombing , there was

7729-473: The Tet casualties and the escalation of draft calls. Subsequently, the Johnson Administration sought negotiations to end the war. Shortly before the 1968 United States presidential election , Republican candidate and former vice president Richard Nixon encouraged South Vietnamese President Nguyễn Văn Thiệu to become publicly uncooperative in the negotiations, casting doubt on Johnson's ability to bring peace. The term "Tet offensive" usually refers to

7860-483: The Tet offensive were to: annihilate and cause the total disintegration of the bulk of the puppet army, overthrow the "puppet" (South Vietnamese) regime at all administrative levels, and place all government power in the hands of the people. Annihilate a significant portion of the American military's troop strength and destroy a significant portion of his war equipment in order to prevent the American forces from being able to carry out their political and military missions; on

7991-443: The Thiệu government in the southern press. Launching such an offensive would also finally put an end to what had been described as "dovish calls for talks, criticism of military strategy, Chinese diatribes of Soviet perfidy, and Soviet pressure to negotiate—all of which needed to be silenced." In October, the Politburo decided on the Tet holiday as the launch date and met again in December to reaffirm its decision and formalize it at

SECTION 60

#1733086312913

8122-457: The U.S. Khe Sanh Combat Base . The Khe Sanh actions would draw PAVN forces away from the offensive into the cities, but Giáp considered them necessary to protect his supply lines and divert American attention. Attacks on other U.S. forces were of secondary, or even tertiary importance, since Giáp considered his main objective to be weakening or destroying the South Vietnamese military and government through popular revolt. The offensive, therefore,

8253-539: The U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S. citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA's ability to surveil the domestic Internet traffic of foreign countries. Boomerang routing occurs when an Internet transmission that originates and terminates in a single country transits another. Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as

8384-442: The U.S. Air Force began to train strategic bomber crews in 1964 to deliver conventional munitions flying the B-52F. The B-52Fs were deployed to Andersen Air Force Base on Guam and U-Tapao Royal Thai Navy Airfield in Thailand , southeast of Bangkok . To add conventional bomb capacity, Project Big Belly modified all B-52Ds to enable them to carry 30 tons of conventional bombs. By mid-April 1966, all B-52Fs were redeployed back to

8515-417: The U.S. and were replaced by Big Belly-modified B-52Ds. Later in the Vietnam War , the B-52G was also deployed with the B-52D. B-52Ds were also used from the 376th Strategic Wing of Kadena Air Base , Okinawa , Japan . The 96th Strategic Air Wing from Dyess AFB , Texas , deployed for Arc Light in June 1970 for 180 days. Upon completion of the Arc Light deployment, the 376th SW B-52Ds either returned to

8646-451: The U.S. command in Saigon was perplexed by a series of actions initiated by the PAVN/VC in the border regions. On 24 April a U.S. Marine Corps patrol prematurely triggered a PAVN offensive aimed at taking Khe Sanh Combat Base, the western anchor of the Marines' defensive positions in Quảng Trị Province . For 49 days during early September and lasting into October, the PAVN began shelling the U.S. Marine outpost of Con Thien , just south of

8777-470: The U.S. perspective was summed up by an MACV intelligence analyst: "If we'd gotten the whole battle plan, it wouldn't have been believed. It wouldn't have been credible to us." The Tet offensive would later be used in a textbook at West Point as an example of "an allied intelligence failure to rank with Pearl Harbor in 1941 or the Ardennes offensive in 1944." Lieutenant Colonel Dave R. Palmer: Current Readings in Military History . From early to late 1967,

8908-431: The United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO). This memo appears to give credence to previous speculation by cryptographers at Microsoft Research . Edward Snowden claims that the NSA often bypasses encryption altogether by lifting information before it is encrypted or after it is decrypted. XKeyscore rules (as specified in

9039-409: The VC with new AK-47 assault rifles and B-40 rocket-propelled grenade launchers, which granted them superior firepower over the ARVN. To pave the way and to confuse the allies as to its intentions, Hanoi launched a diplomatic offensive. Foreign Minister Trinh announced on 30 December that Hanoi would rather than could open negotiations if the U.S. unconditionally ended Operation Rolling Thunder ,

9170-454: The VC. General Bruce Palmer Jr. , one of Westmoreland's three Field Force commanders, claimed that "the Viet Cong has been defeated" and that "He can't get food and he can't recruit. He has been forced to change his strategy from trying to control the people on the coast to try to survive in the mountains." Westmoreland was even more emphatic in his assertions. At an address at the National Press Club on 21 November, he reported that, as of

9301-447: The ability to monitor a large proportion of the world's transmitted civilian telephone, fax, and data traffic. During the early 1970s, the first of what became more than eight large satellite communications dishes were installed at Menwith Hill. Investigative journalist Duncan Campbell reported in 1988 on the " ECHELON " surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT , and detailed how

9432-486: The administration to launch a so-called "success offensive", a concerted effort to alter the widespread public perception that the war had reached a stalemate and to convince the American people that the administration's policies were succeeding. Under the leadership of National Security Advisor Walt W. Rostow , the news media then was inundated by a wave of effusive optimism. Every statistical indicator of progress, from "kill ratios" and "body counts" to village pacification,

9563-491: The agency ... contravening the policy interest of the administration." During the second half of 1967 the administration had become alarmed by criticism, both inside and outside the government, and by reports of declining public support for its Vietnam policies. According to public opinion polls, the percentage of Americans who believed that the U.S. had made a mistake by sending troops to Vietnam had risen from 25 percent in 1965 to 45 percent by December 1967. This trend

9694-500: The agency's participation in economic espionage . In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden , a former NSA contractor. According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens. The documents also revealed that the NSA tracks hundreds of millions of people's movements using cell phones metadata . Internationally, research has pointed to

9825-402: The allied estimation, the communists hardly had the capability to launch such an ambitious enterprise: "There was little possibility that the enemy could initiate a general offensive, regardless of his intentions." The answer could also be partially explained by the lack of coordination and cooperation between competing intelligence branches, both South Vietnamese and American. The situation from

9956-478: The allied intelligence collection apparatus in Saigon. During the late summer and fall of 1967 both South Vietnamese and U.S. intelligence agencies collected clues that indicated a significant shift in communist strategic planning. By mid-December, mounting evidence convinced many in Washington and Saigon that something big was underway. During the last three months of the year intelligence agencies had observed signs of

10087-488: The army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley. After the disbandment of the U.S. Army cryptographic section of military intelligence known as MI-8, the U.S. government created the Cipher Bureau, also known as Black Chamber , in 1919. The Black Chamber

10218-571: The attacks and inflicted heavy casualties on PAVN/VC forces. The popular uprising anticipated by Hanoi never materialized. During the Battle of Huế , intense fighting lasted for a month, resulting in the destruction of the city. During its occupation, the PAVN/VC executed thousands of people in the Massacre at Huế . Around the American combat base at Khe Sanh , fighting continued for two more months. The offensive

10349-466: The authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems . The NSA relies on

10480-434: The basis, crush the American will to commit aggression and force the United States to accept defeat in South Vietnam and end all hostile actions against North Vietnam. In addition, using this as the basis, they would achieve the immediate goals of the revolution, which were independence, democracy, peace, and neutrality in South Vietnam, and then move toward achieving peace and national unification. The operation would involve

10611-676: The bombing campaign against North Vietnam. This announcement provoked a flurry of diplomatic activity (which amounted to nothing) during the last weeks of the year. South Vietnamese and U.S. military intelligence estimated that PAVN/VC forces in South Vietnam during January 1968 totaled 323,000 men, including 130,000 PAVN regulars, 160,000 VC and members of the infrastructure, and 33,000 service and support troops. They were organized into nine divisions composed of 35 infantry and 20 artillery or anti-aircraft artillery regiments, which were, in turn, composed of 230 infantry and six sapper battalions. Signs of impending communist action were noticed among

10742-582: The communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing . The White House asserted that the NSA interception had provided "irrefutable" evidence that Libya was behind the bombing, which U.S. President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya . In 1999, a multi-year investigation by the European Parliament highlighted

10873-419: The conflict. Provided with an enemy intelligence windfall accrued during Operations Cedar Falls and Junction City , the CIA members of the group believed that the number of VC guerrillas, irregulars, and cadre within the South could be as high as 430,000. The MACV Combined Intelligence Center, on the other hand, maintained that the number could be no more than 300,000. Westmoreland was deeply concerned about

11004-578: The continental U.S. or were sent to U-Tapao. The 376th SW then ceased bomber operations, but continued flying Young Tiger tanker missions. Congressional investigations of secret CIA activities in Laos revealed that B-52s were used to systematically bomb targets within Laos and Cambodia. The bombers were first used in Southeast Asia on June 18, 1965. Flying from Andersen AFB, Guam, 27 aircraft dropped 750-pound (340 kg) and 1,000-pound (455 kg) bombs on

11135-523: The decrypted traffic of many of the conference delegations, including the Japanese . The Black Chamber successfully persuaded Western Union , the largest U.S. telegram company at the time, as well as several other communications companies, to illegally give the Black Chamber access to cable traffic of foreign embassies and consulates. Soon, these companies publicly discontinued their collaboration. Despite

11266-429: The early morning hours of 30 January in large parts of the I and II Corps Tactical Zones of South Vietnam. This early attack allowed allied forces some time to prepare defensive measures. When the main operation began during the early morning hours of 31 January, the offensive was countrywide; eventually more than 80,000 PAVN/VC troops struck more than 100 towns and cities, including 36 of 44 provincial capitals, five of

11397-526: The eavesdropping operations worked. On November 3, 1999, the BBC reported that they had confirmation from the Australian Government of the existence of a powerful "global spying network" code-named Echelon, that could "eavesdrop on every single phone call, fax or e-mail, anywhere on the planet" with Britain and the United States as the chief protagonists. They confirmed that Menwith Hill was "linked directly to

11528-407: The economic viability of North Vietnam should come before support of a massive and conventional southern war and they generally followed the Soviet line of peaceful coexistence by reunifying Vietnam through political means. Heading this faction were party theorist Trường Chinh and Minister of Defense Võ Nguyên Giáp . The militant faction, on the other hand, tended to follow the foreign policy line of

11659-528: The effectiveness of the campaign. According to Stephen Budiansky, "Despite NSA 's occasional success in tightening up particularly leaky communication practices, the problems continued throughout the war. On Andersen the Vietcong were given as much as eight hours' warning and often revealing exact launch times and likely targets, because of a Soviet trawler stationed off the island listening to conversations and seeing actual B-52 launches." Nineteen technicians of

11790-425: The end of 1967, the communists were "unable to mount a major offensive ... I am absolutely certain that whereas in 1965 the enemy was winning, today he is certainly losing...We have reached an important point when the end begins to come into view." By the end of the year the administration's approval rating had indeed crept up by eight percent, but an early January Gallup poll indicated that forty-seven percent of

11921-509: The enemy and lead to a negotiated settlement; Phase II was scheduled to begin on 5 May and Phase III on 17 August. Preparations for the offensive were already underway. The logistical build-up began in mid-year, and by January 1968, 81,000 tons of supplies and 200,000 troops, including seven complete infantry regiments and 20 independent battalions made the trip south on the Ho Chi Minh Trail . This logistical effort also involved re-arming

12052-516: The equivalent agencies in the United Kingdom ( Government Communications Headquarters ), Canada ( Communications Security Establishment ), Australia ( Australian Signals Directorate ), and New Zealand ( Government Communications Security Bureau ), otherwise known as the UKUSA group, was reported to be in command of the operation of the so-called ECHELON system. Its capabilities were suspected to include

12183-513: The federal government's computer networks from cyber-terrorism . A part of the NSA's mission is to serve as a combat support agency for the Department of Defense. Operations by the National Security Agency can be divided into three types: "Echelon" was created in the incubator of the Cold War . Today it is a legacy system , and several NSA stations are closing. NSA/CSS, in combination with

12314-544: The following month. Thanh was then ordered to the capital to explain his concept in person to the Military Central Commission. At a meeting in July, Thanh briefed the plan to the Politburo. On the evening of 6 July, after receiving permission to begin preparations for the offensive, Thanh attended a party and died of a heart attack after drinking too much. An alternative account is that Thanh died of injuries sustained in

12445-410: The founder of Linux kernel , joked during a LinuxCon keynote on September 18, 2013, that the NSA, who is the founder of SELinux , wanted a backdoor in the kernel. However, later, Linus' father, a Member of the European Parliament (MEP), revealed that the NSA actually did this. When my oldest son was asked the same question: "Has he been approached by the NSA about backdoors?" he said "No", but at

12576-618: The four regiments of the PAVN 1st Division , the U.S. 4th Infantry Division , the 173rd Airborne Brigade and ARVN infantry and Airborne elements, lasted for 22 days. By the time the fighting was over, between 1,200 and 1,600 PAVN and 262 U.S. troops had been killed. MACV intelligence was confused by the possible motives of the North Vietnamese in prompting such large-scale actions in remote regions where U.S. artillery and aerial firepower could be applied indiscriminately, which meant that tactically and strategically, these operations made no sense. What

12707-607: The headquarters of the US National Security Agency (NSA) at Fort Meade in Maryland". NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about "... U.S. persons , entities, corporations or organizations...." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or

12838-471: The international communications of prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock . The NSA tracked these individuals in a secret filing system that was destroyed in 1974. Following the resignation of President Richard Nixon , there were several investigations into suspected misuse of FBI, CIA and NSA facilities. Senator Frank Church uncovered previously unknown activity, such as

12969-525: The leadership in South Vietnam, represented by the Head of State Nguyễn Văn Thiệu and Prime Minister Nguyễn Cao Kỳ were persuaded to commit to democratic reforms in an effort to stabilize the political situation at a conference in Honolulu . Prior to 1967, the South Vietnamese constituent assembly was in the process of drafting a new constitution and eventual elections. The political situation in South Vietnam, after

13100-412: The memorial. NSA's infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals. On January 24, 2000, NSA headquarters suffered a total network outage for three days caused by an overloaded network. Incoming traffic was successfully stored on agency servers, but it could not be directed and processed. The agency carried out emergency repairs for $ 3  million to get

13231-409: The name of the AFSA to the NSA, and making the new agency responsible for all communications intelligence. Since President Truman's memo was a classified document, the existence of the NSA was not known to the public at that time. Due to its ultra-secrecy, the U.S. intelligence community referred to the NSA as "No Such Agency". In the 1960s, the NSA played a key role in expanding U.S. commitment to

13362-572: The next 90 days. With limited barracks and other facilities, tents were set up for use by men working 80-hour weeks. Bullet Shot included B-52-D and B-52-G aircraft. Arc Light missions continued until the cessation of hostilities by U.S. forces on August 15, 1973. Between June 1965 and August 1973, 126,615 sorties (B-52D/F/G) were flown over Southeast Asia. During those operations, the U.S. Air Force lost 31 B-52s; 18 were lost from hostile fire over North Vietnam and 13 from operational causes. The typical full bomb loads were: Communication leaks undermined

13493-486: The offensive himself. Thanh's original plan was elaborated on by a party committee headed by Thanh's deputy, Phạm Hùng , and then modified by Giáp. The Defense Minister may have been convinced to toe the line by the arrest and imprisonment of most of the members of his staff during the Revisionist Anti-Communist Party Affair. Although Giáp went to work "reluctantly, under duress", he may have found

13624-507: The past." The arguments over domestic and military strategy also carried a foreign policy element, as North Vietnam, like South Vietnam, was largely dependent on outside military and economic aid. The vast majority of North Vietnam's military equipment was provided by either the Soviet Union or China. Beijing advocated that North Vietnam conduct a protracted war on the Maoist model, fearing that

13755-560: The policy of rejecting negotiations was in error. The Americans could only be worn down in a war of wills during a period of "fighting while talking". During 1967 things had become so bad on the battlefield that Lê Duẩn ordered Thanh to incorporate aspects of protracted guerrilla warfare into his strategy. During the same period, a counter-attack was launched by a new, third grouping (the centrists) led by President Hồ Chí Minh , Lê Đức Thọ, and Foreign Minister Nguyễn Duy Trinh , who called for negotiations. From October 1966 through April 1967,

13886-594: The population, which, if the offensive was successful, would enable the North Vietnamese to sweep to a quick, decisive victory. Their basis for this conclusion included: a belief that the South Vietnamese military was no longer combat-effective; the results of the 1967 presidential election (in which the Thiệu/Kỳ ticket had only received 24 percent of the popular vote); the Buddhist crises of 1963 and 1966 ; well-publicized anti-war demonstrations in Saigon; and continuous criticism of

14017-523: The position of the militants as Hanoi's strategy: the rejection of negotiations, the abandonment of protracted warfare, and the focus on the offensive in the towns and cities of South Vietnam. More arrests followed in November and December. The operational plan for the general offensive and uprising had its origin as the "COSVN proposal" at Thanh's southern headquarters in April 1967 and had then been relayed to Hanoi

14148-401: The possible perceptions of the American public to such an increased estimate since communist troop strength was routinely provided to reporters during press briefings. According to MACV's chief of intelligence, General Joseph A. McChristian , the new figures "would create a political bombshell", since they were positive proof that the North Vietnamese "had the capability and the will to continue

14279-476: The post-September 11 era, Snow was replaced as Technical Director, Jacobs retired, and IAD could no longer effectively oppose proposed actions by the offensive arm of the NSA. In the aftermath of the September 11 attacks , the NSA created new IT systems to deal with the flood of information from new technologies like the Internet and cell phones. ThinThread contained advanced data mining capabilities. It also had

14410-539: The question whether the U.S. strategy of attrition was working in South Vietnam weighed heavily on the minds of the American public and the administration of President Lyndon B. Johnson . General William C. Westmoreland , the commander of the Military Assistance Command, Vietnam (MACV), believed that if a "crossover point" could be reached by which the number of communist troops killed or captured during military operations exceeded those recruited or replaced,

14541-556: The same time he nodded. Then he was sort of in the legal free. He had given the right answer, everybody understood that the NSA had approached him. IBM Notes was the first widely adopted software product to use public key cryptography for client-server and server–server authentication and encryption of data. Until US laws regulating encryption were changed in 2000, IBM and Lotus were prohibited from exporting versions of Notes that supported symmetric encryption keys that were longer than 40 bits. In 1997, Lotus negotiated an agreement with

14672-474: The six autonomous cities, 72 of 245 district towns and the southern capital. The offensive was the largest military operation conducted by either side up to that point in the war. Hanoi had launched the offensive in the belief that it would trigger a popular uprising leading to the collapse of the South Vietnamese government. Although the initial attacks stunned the allies, causing them to lose control of several cities temporarily, they quickly regrouped, repelled

14803-488: The system running again. (Some incoming traffic was also directed instead to Britain's GCHQ for the time being.) Director Michael Hayden called the outage a "wake-up call" for the need to invest in the agency's infrastructure. In the 1990s the defensive arm of the NSA—the Information Assurance Directorate (IAD)—started working more openly; the first public technical talk by an NSA scientist at

14934-455: The task easier due to the fact that he was faced with a fait accompli . Since the Politburo had already approved the offensive, all he had to do was make it work. He combined guerrilla operations into what was basically a conventional military offensive and shifted the burden of sparking the popular uprising to the VC. If it worked, all would be well and good. If it failed, it would be a failure only for

15065-405: The time. After the terrorist attacks of September 11, 2001 , the NSA believed that it had public support for a dramatic expansion of its surveillance activities. According to Neal Koblitz and Alfred Menezes , the period when the NSA was a trusted partner with academia and industry in the development of cryptographic standards started to come to an end when, as part of the change in the NSA in

15196-399: The war to admit that the current war strategy required reevaluation. The offensive had a strong effect on the U.S. government and shocked the American public, which had been led to believe by its political and military leaders that the North Vietnamese were being defeated and incapable of launching such an ambitious military operation. American public support for the war declined as a result of

15327-509: The will of their domestic opponents and reaffirm their autonomy vis-à-vis their foreign allies", hundreds of pro-Soviet, party moderates, military officers, and intelligentsia were arrested on 27 July 1967, during what came to be called the Revisionist Anti-Party Affair . All of the arrests were based on the individual's stance on the Politburo's choice of tactics and strategy for the proposed general offensive. This move cemented

15458-664: Was a major escalation and one of the largest military campaigns of the Vietnam War . The Viet Cong (VC) and North Vietnamese People's Army of Vietnam (PAVN) launched a surprise attack on 30 January 1968 against the forces of the South Vietnamese Army of the Republic of Vietnam (ARVN), the United States Armed Forces and their allies . It was a campaign of surprise attacks against military and civilian command and control centers throughout South Vietnam. The name

15589-483: Was a military defeat for North Vietnam, as neither uprisings nor ARVN unit defections occurred in South Vietnam. However, this offensive had far-reaching consequences for its effect on the views of the Vietnam War by the American public and the world broadly. General Westmoreland reported that defeating the PAVN/VC would require 200,000 more American soldiers and activation of the reserves, prompting even loyal supporters of

15720-528: Was aimed at influencing the South Vietnamese public, not that of the U.S. There is conflicting evidence as to whether, or to what extent, the offensive was intended to influence either the March primaries or the November presidential election in the U.S. According to General Trần Văn Trà , the new military head of COSVN, the offensive was to have three distinct phases: Phase I, scheduled to begin on 30 January, would be

15851-451: Was billed as a "high-level policy review". Upon their arrival, the two men bolstered the administration's claims of success. From Saigon, pacification chief Robert Komer asserted that the CORDS pacification program in the countryside was succeeding, and that sixty-eight percent of the South Vietnamese population was under the control of Saigon while only seventeen percent was under the control of

15982-488: Was convinced that the PAVN planned to stage an attack and overrun the base as a prelude to an all-out effort to seize the two northernmost provinces of South Vietnam. To deter any such possibility, he deployed 250,000 men, including half of MACV's U.S. maneuver battalions, to I Corps. NSA The National Security Agency ( NSA ) is an intelligence agency of the United States Department of Defense , under

16113-515: Was described by an NSA manager as "some of the most productive operations in TAO because they preposition access points into hard target networks around the world." Computers seized by the NSA due to interdiction are often modified with a physical device known as Cottonmouth. Cottonmouth is a device that can be inserted in the USB port of a computer to establish remote access to the targeted machine. According to

16244-483: Was fed to the press and to the Congress . "We are beginning to win this struggle", asserted Vice President Hubert H. Humphrey on NBC 's Today show in mid-November. "We are on the offensive. The territory is being gained. We are making steady progress." At the end of November, the campaign reached its climax when Johnson summoned Westmoreland and the new U.S. Ambassador, Ellsworth Bunker , to Washington, D.C., for what

16375-485: Was fueled not by a belief that the struggle was not worthwhile, but by mounting casualty figures, rising taxes, and the feeling that there was no end to the war in sight. A poll taken in November indicated that 55 percent wanted a tougher war policy, exemplified by the public belief that "it was an error for us to have gotten involved in Vietnam in the first place. But now that we're there, let's win – or get out." This prompted

16506-520: Was headquartered in Washington, D.C., and was part of the war effort under the executive branch without direct congressional authorization. During the war, it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the Navy's cryptanalysis functions in July 1918. World War I ended on November 11, 1918 , and

16637-706: Was placed under the leadership of the Director of Military Intelligence. On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA). This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff . The AFSA was tasked with directing the Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units. However,

16768-520: Was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain, and France, but later on, it became clear that those data were collected by European agencies during military missions abroad and were subsequently shared with NSA. In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that contained built-in vulnerabilities in 2006 to

16899-616: Was the United States' first peacetime cryptanalytic organization. Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it produced and sold such codes for business use. Its true mission, however, was to break the communications (chiefly diplomatic) of other nations. At the Washington Naval Conference , it aided American negotiators by providing them with

17030-417: Was to be a realization of information processing at higher speeds in cyberspace. The massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. Most of the disclosures were leaked by former NSA contractor Edward Snowden . On 4 September 2020, the NSA's surveillance program was ruled unlawful by

17161-551: Was usually presented as the result of a perceived U.S. failure to win the war quickly, the failure of the American bombing campaign against North Vietnam, and the anti-war sentiment that pervaded the population of the U.S. The decision to launch the general offensive, however, was much more complicated. The decision signaled the end of a bitter, decade-long debate within the North Vietnamese Government between first two, and then three factions. The moderates believed that

#912087