American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
'(b) (3) -P.L. 86-36<br />
TOP SECAr, tJMBR";:- (b) (1)<br />
_ (b) (3)<br />
OGA<br />
Acknow-Iedgements<br />
My debt to o<strong>the</strong>rs 1)egins with. <strong>the</strong> staff Of <strong>the</strong> NSA Archives, who dropped whatever<br />
<strong>the</strong>y were doing whenever I needed\material.l<br />
~n <strong>the</strong> Archives helped<br />
with photographs, and <strong>the</strong> staffin L32 produced.hundreds of black and white prints to go<br />
into <strong>the</strong> publication....} / ;;;; FE31 (Gedl\'.;f.·.·.··.hiCS) did most of<strong>the</strong> map work. My<br />
debt also includes <strong>the</strong> CIA staffhistorians, especiall \ lan~ I<br />
who guided my work and opened doors to CIA material.<br />
My thanks also go to <strong>the</strong> editorial staffofBarry car1een~<br />
andl<br />
IWho, for days on end, did nothing but edit tis history. It was <strong>the</strong> longest<br />
work that <strong>the</strong> Center for Cryptologie History has attempted, and I am sure it taxed <strong>the</strong>ir<br />
patience, although <strong>the</strong>y never said so., Also owing to <strong>the</strong> unusual length and complexity of<br />
<strong>the</strong> book, <strong>the</strong> NSA photo laboratory (E23) and NSA's printingservices (Y19), which did <strong>the</strong><br />
photo reproduction. and printing ofthis book, should b.e recognized for <strong>the</strong>ir major efforts to<br />
get out <strong>the</strong> publication.1<br />
~eserves praise for <strong>the</strong> cover graphics.<br />
In <strong>the</strong> Service Cryptologic Agencies, James Gilbert and Jack Finnegan, <strong>the</strong> INSCOM<br />
historians, were very responsive to my need for Army cryptologic materials. A special debt<br />
is also owed <strong>the</strong>/historical staffat <strong>the</strong> Air Intelligence Agency. Everyone on <strong>the</strong> staff, from<br />
James Pierson: (now retired) to Jo Ann Himes to Joyce Horns to Juan Jimenez, responded<br />
almost instantly to my many requests for information. <strong>The</strong>ir help resulted in a ra<strong>the</strong>r<br />
more thorough treatment of Air Force cryptology than would have been possible<br />
o<strong>the</strong>rwise.<br />
<strong>The</strong> history itselfhas had a large number of"readers" who plowed through<strong>the</strong> various<br />
drafts and revisions offering helpful comments and additional information. Everyone in<br />
<strong>the</strong> Center for Cryptologic History (CCH) had a hand in its improvement, as well as a list<br />
of o<strong>the</strong>r readers who critiqued various portions. Among <strong>the</strong>m, David Gaddy ~ndl<br />
I ~eserve special note for <strong>the</strong>ir help with <strong>the</strong> chapter on Vietnam. ...l<br />
<strong>The</strong> history also had a group of"general readers," senior Agency officials who agreed<br />
to read <strong>the</strong> entire work in draft state. Milton Zaslow, Cecil Phillips, Donald Parsons,<br />
Eugene Becker, and David Boak spent long hours poring over various drafts, offering<br />
comments and encouragement and correcting information.<br />
Finally, I wish to thank all those who, over <strong>the</strong> years, volunteered <strong>the</strong>ir time to sit for<br />
oral history interviews. NSA owes <strong>the</strong>m all a debt of gratitude for <strong>the</strong>ir contributions to<br />
retrieving o<strong>the</strong>rwise vanished information.<br />
I<br />
THOMAS R. JOHNSON<br />
HANDLE VIA TALENT KEYHOLE COMINT CON<br />
NOT RELE<br />
EIGN NATIONALS<br />
xv<br />
JOINTLY<br />
TOP SF'RH tJMBkA<br />
-