01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

jib) (3) -P.L. 86-36<br />

Ib) (1)<br />

Ib) (3)<br />

OGA<br />

I<br />

10. "NSA Review of <strong>the</strong> U.S[Cryptologic Effort, 1952-54," in CCH Series Vl.EE.1.3.; interview, Lpuis W.<br />

Tordella, 28 June 1990,by RoQert Farley, NSA OH8-90~<br />

1"Glimpses ofa Man: <strong>The</strong> LifeofRalph<br />

J. Canine," Cryptologic Quarterly, Vol. 6, No.2, Summer 1987; Burns, <strong>The</strong> Origins of <strong>the</strong> National Security<br />

Agency, 61.<br />

11. Interview with AbrahamSinkov by Arthur Zoebelein~ IDale Marston andSam Snyder, May<br />

1979, NSA OH 2-79 through14L'79.<br />

12.1 fTraining in AFSNNSA, 1949-1960," unpublished manuscript inCCH Series V.F.4.1.<br />

13. "NSA Review ofU.S. Cryptologic Effort....<br />

14. Howe, "<strong>The</strong> NarrativeHistoryofAFSNNSA" Part V.<br />

15. NSNCSS Archives, ACC10460, CBRI51.<br />

16. Howe, "Narrative History," Part V.<br />

17. NSA oral history with Hugh Erskine, by Vince Wilson, 1972; oral history with Dr. Robert J. Hermann, 2<br />

September 1994, by Charles Baker and Tom Johnson, NSA OH 45-94.<br />

18. George F. Howe, "A llistory of U.S. Civilians in Field COMINT Operations, 1953-1960," Cryptologic<br />

Quarterly, Spring 1973, 5~9; and correspondence file in NSNCSS Archives, ACC 26430, CBOM22.<br />

19. NSNCSS ArchiveS, ACe 1664N,G14-0207-7.<br />

20. File ofsample COMIN'I' Reports for 1948-1953, in CCH8eries Vl.M.2.1.<br />

21. CCH Series VI.M.2.1.<br />

22. Production melilW 37/53, in "COMINT Reporting Responsibilities, Reports and Translations," in CCH Series<br />

VI.M.1.2.<br />

23. NSA 901 PubHcatipns Precedures Memo #6,6 October 1953, in CCH Series VI.M.1.7.<br />

24. See "Reporting Policy" memoes in CCH Series Vl.M.1.7.<br />

25. Hoover Commission; report.<br />

26. <strong>The</strong> best, and pra.ctically <strong>the</strong> only; comprehensive discussion of AFSA and NSA training in <strong>the</strong> 1950s is in<br />

•• fTtaining in AFSAlNSA, 1949-1960," unpublished 1961 manuscript in CCH Series V.F.4.1.<br />

Unless mdicated o<strong>the</strong>rwise, <strong>the</strong> mliterial in this section derives from <strong>the</strong> Bauer work.<br />

27. AFSA School Catalogue 1952, in CCH Series V.F.4.2.<br />

28.1 ~Hist6rical Study: <strong>The</strong> Security Program of AFSA and NSA, 1949-1962," unpublished<br />

manuscript inCCH Serie$X.H.7. See also Interview with Herbert L. Conley, 5 March 1984, by Robert Farley,<br />

NSAOHl·84.<br />

29. c:::::=Jaistoril;:al Study: <strong>The</strong> Security Program...." See also Interview, Cecil J. Phillips, 8 July, 1993, by<br />

Charles Baker and1'om Johnson, NSA OH 23-93, and written comments by David Boak, October 1994.<br />

30. CCH SeriesVI.G.1.1.<br />

31.lri8toryofSIGINT in CIA, V. III, 158.<br />

32.c=:r<strong>The</strong>Security Program...."<br />

33. Ibid.<br />

HANDLE VIA TALENT KEYHOLE COMIN L SYSTEMS JOINTLY<br />

NOT RELE<br />

FOREIGN NATIONALS<br />

TOP SEQU:.:H::tmlllR 150

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!