RICHARD HELMS TO RECEIVE BAKER AWARD

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP89G00720R000600820006-9
Release Decision: 
RIFPUB
Original Classification: 
K
Document Page Count: 
8
Document Creation Date: 
December 22, 2016
Document Release Date: 
September 20, 2011
Sequence Number: 
6
Case Number: 
Publication Date: 
April 1, 1987
Content Type: 
MISC
File: 
AttachmentSize
PDF icon CIA-RDP89G00720R000600820006-9.pdf1021.2 KB
Body: 
Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 v o 80 West Street Annapolis, Maryland 21401 a publication of SECURITY AFFAIRS SUPPORT ASSOCIATION Volume 8, Number 2 April 1987 RICHARD HELMS TO RECEIVE BAKER AWARD With special pride SASA is pleased to announce that the Honorable Richard McGarrah Helms will receive the 1987 William Oliver Baker Award for "his enduring contributions to National Security and Freedom". The award ceremony will take place at the SASA Annual Testimonial Dinner which will be held at the Fort Myer Officers Club, Arlington, VA, on Wednesday 20 May 1987. Ambassador Helms is the fourth distinquished American to receive the coveted SASA Medal of Achievement. Previous awardees were Dr. William O. Baker (1984), Senator Barry Goldwater (1985) and Ambassador Vernon Walters (1986). A native son of Pennsylvania, upon graduating in 1935 from Williams College where he was elected to Phi Beta Kappa in his junior year, Ambassador Helms entered the fourth estate as a staff correspondent with the United Press in London where he served for several months before being transferred to the Berlin Bureau. There he remained until 1937 when he returned to the United States. He continued his journalistic career with the Indianapolis Times until July 1942 when he was commissioned as a Lieutenant (jg) in the U.S. Navy. In August 1943, he embarked on his distinguished three decade intelligence career as a member of the Office of Strategic Services, Washington, D.C., later serving with the OSS in London, Paris, Wiesbaden and Berlin. Upon his relief from active duty in 1946, Mr. Helms joined the successor organization to the OSS and subsequently on 18 September 1947 became one of the first members of the new Central Intelligence Agency. Rising through the ranks of the CIA, Mr. Helms was appointed as the Deputy Director of Central Intelligence in April 1965 by President Johnson who subsequently appointed him as the Director in June 1966. He was reappointed to the post by President Nixon in 1969, serving in that position until his Senate confirmation as Ambassador to Iran in February 1973. His ambassadorial service continued until his retirement from the government in January 1977. Ambassador Helms has continued his devoted service in the national interest as a member of the President's Commission on Strategic Forces. He is also chairing the Advisory Committee of the Nancy Reagan Drug Abuse Fund and is a member of the Board of Directors of the Middle East Institute. In 1983, Mr. Helms was awarded the William J. Donovan Medal and subsequently during that same year received our country's highest recognition in the national security field, the National Security Medal, presented by President Ronald Reagan. SASA is proud to join the honored assembly of those who have previously paid tribute to Ambassador Richard Helms. Plan to join us at the Award Dinner which will be attended by members of the President's Foreign Intelligence Advisory Board, the Congressional Intelligence Committees and other key military and civilian representatives of the Intelligence Community. Invitations to the SASA membership are in the mail. ? Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 SASA AWARD PROGRAM This years SASA Award Program is the fourth in the annual series which was inaugurated in May 1984. The first to be honored in the program was the distinguished scientist, Dr. William O. Baker, former President and Chairman of the Board, Bell Laboratories. In July 1985, the award was presented to another of monumental stature, Senator Barry Goldwater. Pres- entations to both of those former honorees were made by then Director-of _Central-Intelligence, Mr. William J. -Casey. Last year, on 21 May, another towering U.S. intelli- gence figure, Ambassador Vernon (Dick) Walters, received the award from the Honorable James R. Schle- singer, former Secretary of Defense and Director of Central Intelligence. The SASA Medal of Achievement, now designated "the William Oliver Baker Award" in honor of its first recipient, was created "to recognize service or accomp- lishment of an extraordinary or highly exceptional nature, whether to the Intelligence Community, or a component thereof, which benefits the community as a whole". The award is intended to serve as public recog- nition of service to the nation and at the same time, to encourage and acknowledge service on behalf of the national intelligence endeavor by those outside of government whose contributions to the national secur- ity have become increasingly important. ? THE WILLIAM OLIVER BAKER AWARD PURPOSE The award has been inaugurated by SASA in order to promote excellence in the quality of the intelligence and national security activities of the United States government and associated endeavors in the private sector by recognizing exceptional achievement by individuals contributing to these affairs. ELIGIBILITY Members of the government, or private industry, and of the academic community are eligible to receive the award provided that a substantial portion of their professional activity is devoted to national security affairs. No time limit will be set for the period of such service as is being recognized. Recipients of departmental or community awards should be considered but it is not intended that the Baker Award duplicate in any way an existing award or award system. In the event that justification for a nomination rests primarily upon classified infor- mation, special arrangements will be made to accommodate it, but an unclassified version will be required for the accompanying citation. SELECTION CRITERIA Awardees will be selected on the basis of the following: - Sustained excellence in their contribution to national security affairs over a considerable period of time, or a single achievement of extraordinary merit. - Contributions in the scientific and technical disciplines or in other fields essential to the enhancement of national security interest. - Technical enhancements of unusual significance, management proficiency of a high order, or the development or application of techniques that permit cost savings of substantial magnitude. SELECTION PROCEDURES Annually, the President of SASA will invite the departments and agencies of the Intelligence Community, the President's For- eign Intelligence Advisory Board and the Scientific, Industrial and Academic communities to nominate individuals considered best qualified for the award. The nominations will be reviewed by an awards panel selected by the SASA Board of Directors. Representatives of the Secretary of State, Secretary of Defense, the PFIAB and the Director of Central Intelligence will be asked to participate with the SASA panel annually in the final selection of awardee/s. PRESENTATION The awardee/s will be honored at an annual dinner meeting of the Association at which the "William Oliver Baker" medal will be presented. Mr. Casey presents SASA Award -2- COLLOQUY, April 1987 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 SASA SYMPOSIUM OPENS 21 APRIL DR. LEW ALLEN TO SPEAK The opening session of the SPRING'87 SYMPOSIUM is only a few days away. You still have time to register. For SASA, the theme "TRADING WITH THE COMMUNIST BLOC" is an f ied, non-intelligence/security uncharted area. It is the only unclassi oriented program we have ever presented---a program being cooperatively conducted with the Deputy Assistant Secretary of Commerce for Europe, Mr. Frank Vargo. Why are we doing it? Because the theme is timely. It affords an unusual opportunity to examine international developments beyond our traditional intelligence and security involvements-- developments which relate to our national security in the broadest sense. The credentials of the professionals who will explore the theme with us are second to none. Among them are key figures from government, industry and academe. An address by Dr. Lew Allen "The National Security Implications of the Export Program" will be one of the many highlights of the program. Also to speak are Mr. James Moore, Senior Deputy Assistant Secretary of Commerce for International Economic Policy; Dr. Jan Various, Director Plan Econ; Dr. Gary Hufbauer, Institute for International Economics, Georgetown University; Mr. Paul McCarthy, Vice President,Eastern Europe Group, Chemical Bank, N.Y.; Jeffrey A. Burt, Esq., Arnold & Porter; Mr. Roger Majak, Manager, Federal Government Affairs, TEKTRONIX, Inc.; Ms. Leyla Woods, International Econo- mist, National Trade Administration; Mr. John Kiser, President, Kiser Research, Inc.; Dr. Elliott Hurwitz, President, Elliott Hurwitz and Co.; Mr. George Holliday, International Trade and Finance, Congressional Research Services; and Mr. Anatoli Welihozkiy, Director, Foreign Technology Assessment Division, Department of Commerce. For those of our members who may not likely become involved in a mercantile relationship with any communist country (probably most) we hasten to point out that they will still find attending the symposium to be a valuable experience. We believe also that there are many, particularly non-- members, who would avail themselves of the opportunity to participate if made aware of the program.---So please pass the word along. If you or they need further information, April, Naval Surface Weapons Center, Silver Spring, Maryland. Both days, Registration opens 0730 -- Program starts 0900).? please contact SASA Headquarters. Our Spring '87 Symposium should be a winner! We hope you will be able to join us' at White Oak (21-22 COLLOQUY, April 1987 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 MAY - BUSY FORUM MONTH Mr. Charles A. Hawkins, Jr. Deputy Asst. Secretary of Defense (I) Mr. Robert L. Prestel Deputy Director, R&E NSA After a lapse of two years, the Assistant Secretary of Defense C'I has announced that the Seventh Defense Intelligence Technical Forum (DIT- FORVII) will be held on 11-12 May 1987 at The Defense Intelligence Analysis Center, Bolling AFB. The National Security Agency has announced that it will hold its Fifth Research and Engineering Industrial Symposium (REIS V) at the agency headquarters on 13-14 May 1987. In his letter announcing DITFOR VII, Mr. Latham, said that"DITFOR's objective is to bring together representatives of military commands, DoD technical organizations, and representatives from industry to improve the coordination and implementation of the U.S. technological response to the intelligence challenges posed by modern warfare. Sharing the knowledge and experience in this area will aid in the identification of complementary activity, enhance the mission performance of existing technology, and highlight key areas for new technology applications and initiatives." In separate correspondence, Mr. Charles Hawkins, Deputy Assistant Secre- tary of Defense (I), observed that the last DITFOR had been held two years ago and added that "since then significant changes have occurred in both national and tactical intelligence support capabilities for military operational forces. Further, we are currently undergoing a significant change with regard to the organizational structure of the Department of Defense. The Unified and Speci- fied Commands will have a more direct voice and influence over the direction that the development of future intelligence support capabilities takes." Mr. Hawkins continued by describing the program. "With this as a basis, DITFOR VII will present a program on "NATIONAL AND TACTICAL INTELLIGENCE SUPPORT FOR MILITARY OPERATIONS". The program will specifically address the present and future means that are and will be available for supporting U.S. operational forces. Collection, processing, and production capabilities will be examined as well as the means to disseminate information across the battlefield. We will also develop a notional example of how national and tactical support capabilities may tie together. Further, we will present an overview of new technologies and research and development trends to show where we are going with technology and what technology has to offer. We will highlight areas of serious concern where we do not have solutions so that a dialogue can be established among interested government and industry representatives to solve these critical problems. The overall DITFOR VII program will also be structured to highlight how the new DoD reorganization will impact on the manner by which such problems will be addressed in the future." The NSA letter announcing REIS V stated that "The nuturing of a strong, close relationship with industry is increasingly important in the current high technology environment. Toward this end, we must increase government and corporate research in mutually beneficial areas, and simultaneously increase the breadth and depth of the national technology base....." Both DITFOR VII and REIS V are classified forums for which all govern- ment and industry attendees must have the necessary security clearances. ? 4 COLLOQUY, April 1987 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 SNIDER RETURNS TO THE HILL After serving almost 10 years as "Number Two" in the office of the Deputy Under Secretary of Defense (Policy),BRITT SNIDER has returned from whence he came in October 1977--Capitol Hill. Mr. Snider, an attorney by profession, has assumed the position of Minority Counsel with the staff of the Senate Select Committee on Intelligence. Prior to serving as the Assistant Deputy Under Secretary of Defense for Counterintelligence and Security under General Dick Stilwell and subsequently under Craig Alderman, the present Deputy Under Secretary of Defense (Policy), Mr. Snider performed counselor services for the House Government Operations Subcommittee on Govern- ment Information; the Senate Intelligence Committee; and the Senate Judiciary Subcommittee on Constitu- tional Rights. During his tenure at the Pentagon, Mr. Snider had principal policy cognizance of counterintelligence, security classification, industrial security as well as per- sonnel, physical and operations security. He also chaired the interagency National Disclosure Policy Committee which passes upon sales of classified mil- itary systems to foreign governments. In 1985, he served as the Staff Director of the OSD Commission to Review Security Practices and Procedures (The Stil- well Commission). SASA wishes Mr. Snider well in his new role. His replacement has not yet been named. ? HERE WE GO AGAIN Almost a year and a half ago, in our December 1985 issue of Colloquy, SASA published an editorial "LET'S GET ON WITH IT". Unfortunately, it con- tinues to be relevant. Apparently from newspaper accounts, still chafing over National Security Decision Directive No. 145 which the President signed 17 September 1984, the House Science and Technology Committee and the House Government Operations Committee are again sponsoring a bill which would have the effect of markedly altering the arrangements provided for in the cited Presidential directive. Their first sortee against NSDD 145 was launched in the 99th Congress as HR 2889. It failed to pass. The newest and similar version of the former bill is coincidentially designated HR 145, the "Computer Security Act of 1987". Were it not for the fact that the President in 1984, established realistic organizational mechanisms to address the modern day computer security threat con- fronting all elements of government, HR 145 might be a start in that direction. But the point is that the President has and it is fair to observe that two and a half years after the signing of NSDD 145, those mechanisms are in place and are working. This is not to say that enormous strides have been made and the computer security barn door is now securely closed. It will take-several years before substantial protection for our massive govern- ment data handling and storage activities is realized. It will take longer if those who have been commissioned by the President to cope with the problem have to deal with the inertia created by proposals that the task be accomplished in some other way. In his NSDD 145, the President made available to all elements of government the very best of this nation's expertise in computer security.---expertise that has been honed sharply by first hand experience with "the threat". No mistake should be made about the quality of the threat. It is high and must, if prudence prevails, be assumed to be directed at not only national defense data targets but information which is processed and stored in computers throughout government. There is much unclassified government data which could if acquired by an adversary be used to the detriment of our national security in ways not considered in the past. The high quality threat demands the highest quality response we can make. We believe NSDD 145 makes that response possible. Any impediments to the effec- tive quest for real computer security throughout government should be removed. As we urged in December 1985--"Let's get on with it." ? COLLOQUY, April 1987 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 COMOAT APPLE REUNION SAN ANTONIO, TEXAS ? 25 -26 SEPTEMBER 1987 Committee Chairman, Major General Doyle Larson, USAF (Ret.) has announced the 25-26 September 1987 reunion of all members of the Combat Apple crews and others associated with CA operations in the Gulf of Tonkin-during the period 1967 and 1975. The event will commemorate the 20th anniversary of the first CA mission in the Southeast Asia area. San Antonio will be the focal point of reunion activities which will include a dinner at the Hilton Palacio Del Rio on 25 September, festivities at Kelly AFB during the day on 26 September and conclude that evening with an USAFSS/ESC Alumni Association Annual Banquet at the Lackland AFB Officers Club. Further information on the reunion may be obtained from General Larson (612) 890-9140 or Lt. Col. Jerry McKenna (512) 674-8189. ? HAPPY BIRTHDAY SASA! The eighth anniversary of the founding of the association will be celebrated on 17 April 1987 and despite its brief history, SASA has much to celebrate. Our membership, both group and individual has continued to grow at a healthy rate. The new SASA SPONSOR program has been even more successful than had been anticipated. We have implemented our Security Support Program and are confident that through it SASA will be able to provide significant assistance on industrial security matters to both industry and govern- ment. New forums including executive dinners and other opportunities for those in industry and govern- ment to join together to share views on issues effecting the national intelligence endeavor are being planned. All in all the 8th has been a productive year. For that happy state of affairs, our President, John McMahon, our board of directors and the SASA staff wishes to express out warmest thanks for your continued confidence and support. ? COLLOQUY 80 West Street, Suite 110, Annapolis, MD 21401 (301) 269-5424 Chairman of the Board ............................................. Vincent N. Cook President ....................................................... John N. McMahon Editor ....................................................... John E. Morrison, Jr. Associate Editor ................................................ William H. Parsons Production Coordinator .............................................. Mary Simpson COLLOQUY, April 1987 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 INTELLIGENCE AND SECURITY: HOW IT ALL BEGAN by DAVID WINFRED GADDY Guest Historian Examples of espionage, cryptography, and "cloak and dagger" work abound in ancient history, as those who have heard Rose Mary Shel- don's delightful lectures will attest. Allen Dulles drew on the Bible's accounts of scouting parties to extract some lessons for the present in his The Craft of Intelligence. It's diverting, amusing, even instructive to seek origins, to play the "who did it first" game. (Most of us have probably read, in some variation or other, the statement that "intelligence is the second oldest of the professions, but, unlike the oldest, it has fewer scruples... and it employs more amateurs"). But what of U.S. origins in this area of intelligence and security? A decade or so ago, reacting to the notion that secrecy was somehow bad--un-American--and to be dispensed with, various publications, both official and private, reminded the reading public that this nation was the result of revolutionary conspiracy, in which secrecy was an essential ingredient. Not only was secrecy not "un-American," there would have been no America without it. Statements of our Presidents were culled to show their appreciation of the need for intelligence and for security. And it added a new facet to "the father of his country" to learn that George Washington was, as Walter Fortzheimer has aptly described him, our earliest and "best intelligence officer until Bill Donovan". So our search for our American origins properly starts with our Revolution. There the cryptologist can find the use of secret writing (cryptography), the "breaking" and reading of secret writing (crypta- nalysis), and its exploitation for intelligence purposes ("crypt intelli- gence"). The names of the Rev. Mr. Samuel West (educated at Harvard), Elbridge Gerry of Massachusetts, and Colonel Elisha Porter of the Massachusetts militia might qualify for an erudite trivia quiz, yet they arguably constituted our first team of "cryppies" (interesting enough, operating on a competitive basis, West independent of Gerry and Porter). But the man nominated by David Kahn in his seminal work, The Codebreakers, as "The Father of American Cryptologists" was James Lovell (1737-1814), a Harvard-educated Bostonian, whose accomplishments as cryptographer and analyst merit his standing at the head of the list. The Revolution also offers us the origins of our military intelligence, both tactical and strategic. Here we encounter Major Benjamin Tal- Imadge of the Second Regiment, Connecticut Light Dragoons, Nathan and Enoch Hale, his brother (even those who know of Mycroft Holmes probably never heard of Enoch!), and Robert Townsend, all four class- mates at Yale. (Some day, perhaps, someone will investigate the impli- cations of Yale as our source for HUMINT and Harvard for SIGINT: could "friendly rivalry" between two giant agencies today stem from this distant origin? Donovan also came from Yale!) The execution of Nathan Hale by his captors produced our first "hero" of intelligence. Commemorated by Intelligence, his statue (hands bound, chin thrust forward, his neck awaiting the noose) observ- ing those entering and exiting CIA, Nathan Hale may seem a strange role model. "He was an amateur who `blew it', got caught, and was hanged," say some detractors. The noble ring of the last defiant words attributed to him compensates, but hardly explains Hale as a symbol. Rowan, in his The Story of Secret Service, offers a persuasive reason why Hale justly deserves memory among the professionals: "Warned by Hale's misfortune, Washington proceeded to enlist persons in a military organization who would play the deadly game gaily and with spirit and would know how to keep their work really secret. And so well was the lesson of Nathan Hale's sacrifice learned by them that one hundred and fifty years had to elapse before anybody detected the chain of his successors. " How appropriate, then, that the symbol of Nathan Hale has an even more significant "covert" implication than the `overt "one. Rowan's empha- sis on the word "organization" stresses one of two key considerations in seeking out origins. (The other one is "continuity"--we've tended as a nation to contrive a response in an emergency, then forget everything we'd learned when the emergency passes. And so it was, until 1947.) We might apply the modern term, communications intelligence, or COMINT, to the product of Lovell and his contemporaries, but it stretches the case a bit to say that there was a COMINT organization during the Revolution, other than in an ad hoc way. Dr. Kahn explains why: "...with the exception of an infrequent episode..., no cryp- tograms were intercepted. It was not until the war neared its end that enough messages were captured to make recurrent cryptanalysis possible". In other words, while cryptography can be practiced by individuals-- and even cryptanalysis, yielding "COMINT"--a COMINT enterprise depends upon captured, intercepted, messages in such volume as to prompt thought of an organization, let alone to justify it. Jumping ahead to modern times, with the World War II revelations of Colonel Winterbotham and the excellent historical studies by the late Ronald Lewin, the conclusion would seem obvious: it was the advent of wireless radio which justified COMINT organization. Knowing that radio was used in the First World War, the curious reader would find evidence of COMINT organization in that earlier war and perhaps be content to stop at that point. If intelligence (including COMINT) is not just an aspect of warfare, certainly it is harder to trace in peace time--or, at least, that was the case until the present. (As Thomas Hardy remarked, the reason he preferred war to peace is that peace made such poor reading, but war made "rattling good history". Whether the absence of information about intelligence activities in peace time means there was no activity would have to be proved, whereas "rattling good" wartime examples are handy.) So it would seem that we could satisfy ourselves by concluding that, although there were isolated, ad hoc and individual examples of today's profession at the time of the Revolution, World War I must have marked the beginning organized COMINT and the advent of "G2", and continuity between the wars, offering a bridge to the present, would confirm that belief. And we would be dead wrong. It was not radio communication which first offered the volume to justify COMINT organization. It was not British and French experience which first prompted the U.S. Army to organize for military intelligence. Both events stem from our most "popular", most romanticized, and most written about war, the one which took place within, between the years 1861 and 1865. ? (to be continued) Editors Note: Mr. David Gaddy, our guest historian, is Dean of the Department of Cryptologic Management at the National Cryptologic School. He has been a previous contributor to Colloquy and will be providing other historical insights in the future. COLLOQUY, April 1987 d 7 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9 -_. I Axavu bTj18juI Je?T1~ hY a3+' BDU26IIIa1 C--j6+ -if" COLLOQUY APRIL 1987 I o$, i Z puvlA.i 'silodEUUd 30ai3S ;saM 08 uoijeiaossd $aoddnS sipaRd A~unaaS Approved For Release 2011/09/20: CIA-RDP89GO072OR000600820006-9