01.07.2014 Views

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

American Cryptology during the Cold War - The Black Vault

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ib) (1)<br />

Ib) (3) -50 USC 403<br />

(3) -P.L. 86-36<br />

Chapter 4: <strong>The</strong> Soviet Problem<br />

<strong>The</strong> Early Days • . . . . . . . . . . . .. . .<br />

<strong>The</strong> Advent ofBOURBON .•............... . .<br />

VENONA ....•......... , ...•.....................................<br />

"<strong>Black</strong> Friday" ........•....•............. . .<br />

ASA and AFSA Turn to Radioprinter . .<br />

<strong>The</strong> Soviet Strategic Threat .•....•............... . .<br />

How It Began .......•.....•................. . .<br />

<strong>The</strong> <strong>American</strong> Response . .<br />

<strong>The</strong> Soviet Atomic Bomb Project . .<br />

<strong>The</strong> Chinese Threat •.......................... . .<br />

<strong>The</strong> Early Days ofOverhead . .<br />

<strong>The</strong> Attack on Soviet Ci her S stems . .<br />

Trackin Submarines .<br />

157<br />

158<br />

160<br />

168<br />

169<br />

170<br />

171<br />

174<br />

176<br />

178<br />

179<br />

184<br />

187<br />

188<br />

189<br />

Chapter 5: Building <strong>the</strong> Internal Mechanism<br />

<strong>Cryptology</strong> is Automated - <strong>The</strong> Story ofEarly Computerization 195<br />

Antecedents ..........•.......................................... 195<br />

Postwar Developments .•.......................................... 197<br />

NSA Communications in <strong>the</strong> Pre-Criticomm Era 205<br />

<strong>The</strong> COMINT Comnet 207<br />

Securing <strong>American</strong> Communications 211<br />

<strong>The</strong> Era of<strong>the</strong> Wired Rotor 211<br />

<strong>The</strong> Early Years ofSecure Speech 214<br />

Organizing for COMSEC in <strong>the</strong> PostwarWorld 215<br />

AFSAM-7 ..........•............................................ 217<br />

<strong>The</strong> Push for On-line Encipherment 218<br />

From SIGSALy to Modern Voice Encryption 220<br />

TEMPEST ...............•.......................................................... 221<br />

Chapter6: <strong>Cryptology</strong> at Mid-decade<br />

<strong>The</strong> Early Assessments ...•.............................................<br />

<strong>The</strong> Robertson Committee .<br />

<strong>The</strong> Hoover Commission .<br />

<strong>The</strong> Killian Board .•..............................................<br />

<strong>The</strong> Jackson Report •..............................................<br />

1956<br />

Suez ............•...............................................<br />

Hungary ........•...............................................<br />

I<br />

I···············································<br />

Lebanon,1958 .<br />

1956 in History .<br />

227<br />

227<br />

228<br />

229<br />

231<br />

232<br />

232<br />

235<br />

236<br />

237<br />

239<br />

IIANBU VIA 'H.cFlP''f IEElYllabEl CaMIN'f CaN'fRaL S-"fSTEMSJ6II('fL'l<br />

NUl RELEASABLE 10 F"ltEIGl'4' Nit'fI6f4'1rLS<br />

v

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!