01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

TOP SECRET liM8RA<br />

Preface<br />

What It Is and What It Is Not<br />

This book is intended to be a general overview of U.S. government<br />

cryptology since <strong>the</strong> end of World <strong>War</strong> II. It is projected to be a four-book<br />

study carrying <strong>the</strong> story to <strong>the</strong> end of <strong>the</strong> <strong>Cold</strong> <strong>War</strong>, symbolized by <strong>the</strong> fall of<br />

<strong>the</strong> Berlin Wall.<br />

I have attempted to include <strong>the</strong> entire effort, which includes <strong>the</strong> Service<br />

Cryptologic Agencies (as <strong>the</strong>y were once called), as well as certain CIA<br />

programs. <strong>The</strong>se organizations comprised almost t-pe totality of <strong>the</strong><br />

cryptologic efforts of <strong>the</strong> federal government, although o<strong>the</strong>r organizations<br />

(FBI is a good example) have occasionally dabbled in <strong>the</strong> discipline. Because it<br />

is comprehensive ra<strong>the</strong>r than strictly organizational, it contains information<br />

about <strong>the</strong> field sites, intermediate headquarters and <strong>the</strong> SCA headquarters<br />

<strong>the</strong>mselves. It does not cover in detail <strong>the</strong> organizational aspects of <strong>the</strong><br />

creation of <strong>the</strong> National Security Agency. That is covered in good detail in<br />

Thomas L. Burns's book, <strong>The</strong> Origins of <strong>the</strong> National Security Agency: 1940­<br />

1952, published in 1990. Thus <strong>the</strong> coverage of events between 1945 and 1952<br />

is sketchy and simply tries to fill in blanks in <strong>the</strong> record that <strong>the</strong> Burns book<br />

did not cover.<br />

This is not a history of private or nongovernmental cryptology. Although<br />

it covers relationships with our Second and Third Party partners, it does not<br />

focus on that aspect ei<strong>the</strong>r, except as it contributed to <strong>the</strong> development of our<br />

own effort. Our long-standing debt to <strong>the</strong> British cryptologic effort at GCHQ<br />

should not go unnoticed, however. It deserves a separate book.<br />

If you are looking for a history of your specific organization, you will not<br />

find it. This is a history of events, not organizations. <strong>The</strong> importance of <strong>the</strong><br />

cryptologic contribution to <strong>American</strong> security is so broad as to obscure<br />

individual organizations and, often, <strong>the</strong> specific people involved. In certain<br />

cases, however, I have identified major individual contributors to cryptologic<br />

history or those who were, by chance, thrown into momentous events.<br />

Two overarching <strong>the</strong>mes characterized <strong>American</strong> cryptology from <strong>the</strong> end<br />

of World <strong>War</strong> II to <strong>the</strong> end of <strong>the</strong> first Nixon administration: centralization<br />

and expansion. <strong>The</strong> SIGINT system underwent a period of almost unbroken<br />

expansion from 1945 to <strong>the</strong> <strong>American</strong> retreat from Sou<strong>the</strong>ast Asia. <strong>The</strong>se<br />

<strong>the</strong>mes dominate <strong>the</strong> first two books in <strong>the</strong> set.<br />

<strong>The</strong> end of <strong>the</strong> Vietnam <strong>War</strong> and <strong>the</strong> era of <strong>the</strong> Watergate scandals that<br />

followed marked a watershed, and new <strong>the</strong>mes of retrenchment and<br />

decentralization marked <strong>the</strong> period that followed. <strong>The</strong>se will be <strong>the</strong> <strong>the</strong>mes<br />

that open Book III.<br />

THOMAS R. JOHNSON<br />

HANDLE VIA TALENT KEYHOLE COMINT<br />

E TO FOREIGN NATIONALS<br />

xiii<br />

INTbY<br />

TOP SECRET liMBRA<br />

--_.-

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!