American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
TOP SECRET liM8RA<br />
Preface<br />
What It Is and What It Is Not<br />
This book is intended to be a general overview of U.S. government<br />
cryptology since <strong>the</strong> end of World <strong>War</strong> II. It is projected to be a four-book<br />
study carrying <strong>the</strong> story to <strong>the</strong> end of <strong>the</strong> <strong>Cold</strong> <strong>War</strong>, symbolized by <strong>the</strong> fall of<br />
<strong>the</strong> Berlin Wall.<br />
I have attempted to include <strong>the</strong> entire effort, which includes <strong>the</strong> Service<br />
Cryptologic Agencies (as <strong>the</strong>y were once called), as well as certain CIA<br />
programs. <strong>The</strong>se organizations comprised almost t-pe totality of <strong>the</strong><br />
cryptologic efforts of <strong>the</strong> federal government, although o<strong>the</strong>r organizations<br />
(FBI is a good example) have occasionally dabbled in <strong>the</strong> discipline. Because it<br />
is comprehensive ra<strong>the</strong>r than strictly organizational, it contains information<br />
about <strong>the</strong> field sites, intermediate headquarters and <strong>the</strong> SCA headquarters<br />
<strong>the</strong>mselves. It does not cover in detail <strong>the</strong> organizational aspects of <strong>the</strong><br />
creation of <strong>the</strong> National Security Agency. That is covered in good detail in<br />
Thomas L. Burns's book, <strong>The</strong> Origins of <strong>the</strong> National Security Agency: 1940<br />
1952, published in 1990. Thus <strong>the</strong> coverage of events between 1945 and 1952<br />
is sketchy and simply tries to fill in blanks in <strong>the</strong> record that <strong>the</strong> Burns book<br />
did not cover.<br />
This is not a history of private or nongovernmental cryptology. Although<br />
it covers relationships with our Second and Third Party partners, it does not<br />
focus on that aspect ei<strong>the</strong>r, except as it contributed to <strong>the</strong> development of our<br />
own effort. Our long-standing debt to <strong>the</strong> British cryptologic effort at GCHQ<br />
should not go unnoticed, however. It deserves a separate book.<br />
If you are looking for a history of your specific organization, you will not<br />
find it. This is a history of events, not organizations. <strong>The</strong> importance of <strong>the</strong><br />
cryptologic contribution to <strong>American</strong> security is so broad as to obscure<br />
individual organizations and, often, <strong>the</strong> specific people involved. In certain<br />
cases, however, I have identified major individual contributors to cryptologic<br />
history or those who were, by chance, thrown into momentous events.<br />
Two overarching <strong>the</strong>mes characterized <strong>American</strong> cryptology from <strong>the</strong> end<br />
of World <strong>War</strong> II to <strong>the</strong> end of <strong>the</strong> first Nixon administration: centralization<br />
and expansion. <strong>The</strong> SIGINT system underwent a period of almost unbroken<br />
expansion from 1945 to <strong>the</strong> <strong>American</strong> retreat from Sou<strong>the</strong>ast Asia. <strong>The</strong>se<br />
<strong>the</strong>mes dominate <strong>the</strong> first two books in <strong>the</strong> set.<br />
<strong>The</strong> end of <strong>the</strong> Vietnam <strong>War</strong> and <strong>the</strong> era of <strong>the</strong> Watergate scandals that<br />
followed marked a watershed, and new <strong>the</strong>mes of retrenchment and<br />
decentralization marked <strong>the</strong> period that followed. <strong>The</strong>se will be <strong>the</strong> <strong>the</strong>mes<br />
that open Book III.<br />
THOMAS R. JOHNSON<br />
HANDLE VIA TALENT KEYHOLE COMINT<br />
E TO FOREIGN NATIONALS<br />
xiii<br />
INTbY<br />
TOP SECRET liMBRA<br />
--_.-