American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
American Cryptology during the Cold War - The Black Vault
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
jib) (3) -P.L. 86-36<br />
Ib) (1)<br />
Ib) (3)<br />
OGA<br />
I<br />
10. "NSA Review of <strong>the</strong> U.S[Cryptologic Effort, 1952-54," in CCH Series Vl.EE.1.3.; interview, Lpuis W.<br />
Tordella, 28 June 1990,by RoQert Farley, NSA OH8-90~<br />
1"Glimpses ofa Man: <strong>The</strong> LifeofRalph<br />
J. Canine," Cryptologic Quarterly, Vol. 6, No.2, Summer 1987; Burns, <strong>The</strong> Origins of <strong>the</strong> National Security<br />
Agency, 61.<br />
11. Interview with AbrahamSinkov by Arthur Zoebelein~ IDale Marston andSam Snyder, May<br />
1979, NSA OH 2-79 through14L'79.<br />
12.1 fTraining in AFSNNSA, 1949-1960," unpublished manuscript inCCH Series V.F.4.1.<br />
13. "NSA Review ofU.S. Cryptologic Effort....<br />
14. Howe, "<strong>The</strong> NarrativeHistoryofAFSNNSA" Part V.<br />
15. NSNCSS Archives, ACC10460, CBRI51.<br />
16. Howe, "Narrative History," Part V.<br />
17. NSA oral history with Hugh Erskine, by Vince Wilson, 1972; oral history with Dr. Robert J. Hermann, 2<br />
September 1994, by Charles Baker and Tom Johnson, NSA OH 45-94.<br />
18. George F. Howe, "A llistory of U.S. Civilians in Field COMINT Operations, 1953-1960," Cryptologic<br />
Quarterly, Spring 1973, 5~9; and correspondence file in NSNCSS Archives, ACC 26430, CBOM22.<br />
19. NSNCSS ArchiveS, ACe 1664N,G14-0207-7.<br />
20. File ofsample COMIN'I' Reports for 1948-1953, in CCH8eries Vl.M.2.1.<br />
21. CCH Series VI.M.2.1.<br />
22. Production melilW 37/53, in "COMINT Reporting Responsibilities, Reports and Translations," in CCH Series<br />
VI.M.1.2.<br />
23. NSA 901 PubHcatipns Precedures Memo #6,6 October 1953, in CCH Series VI.M.1.7.<br />
24. See "Reporting Policy" memoes in CCH Series Vl.M.1.7.<br />
25. Hoover Commission; report.<br />
26. <strong>The</strong> best, and pra.ctically <strong>the</strong> only; comprehensive discussion of AFSA and NSA training in <strong>the</strong> 1950s is in<br />
•• fTtaining in AFSAlNSA, 1949-1960," unpublished 1961 manuscript in CCH Series V.F.4.1.<br />
Unless mdicated o<strong>the</strong>rwise, <strong>the</strong> mliterial in this section derives from <strong>the</strong> Bauer work.<br />
27. AFSA School Catalogue 1952, in CCH Series V.F.4.2.<br />
28.1 ~Hist6rical Study: <strong>The</strong> Security Program of AFSA and NSA, 1949-1962," unpublished<br />
manuscript inCCH Serie$X.H.7. See also Interview with Herbert L. Conley, 5 March 1984, by Robert Farley,<br />
NSAOHl·84.<br />
29. c:::::=Jaistoril;:al Study: <strong>The</strong> Security Program...." See also Interview, Cecil J. Phillips, 8 July, 1993, by<br />
Charles Baker and1'om Johnson, NSA OH 23-93, and written comments by David Boak, October 1994.<br />
30. CCH SeriesVI.G.1.1.<br />
31.lri8toryofSIGINT in CIA, V. III, 158.<br />
32.c=:r<strong>The</strong>Security Program...."<br />
33. Ibid.<br />
HANDLE VIA TALENT KEYHOLE COMIN L SYSTEMS JOINTLY<br />
NOT RELE<br />
FOREIGN NATIONALS<br />
TOP SEQU:.:H::tmlllR 150