09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

!I<br />

ț<br />

!<br />

TO" SEeftoE'fNeOMINfflXI<br />

!<br />

I<br />

Il•!!<br />

I<br />

f<br />

I•t<br />

evant context possible: American SIGI}\;T's successes<br />

and failures aga<strong>in</strong>st the technical, doctr<strong>in</strong>al,<br />

and procedural actions taken by the<br />

Vietnamese communist cryptographers and communicators.<br />

This approach may seem almost too<br />

obvious to state. Yet. <strong>in</strong> earlier cryptologic histories,<br />

communisl communications and cryptogruphy<br />

were discussed only occasionally. and usuallyas<br />

some fixed list ofobjectives, As we discussed<br />

above, this static, limited approach is mislead<strong>in</strong>g.<br />

The true targets of American cryptologists were<br />

Hanoi's communications and cryptographic systems,<br />

and they changed often to defeat our best<br />

efforts.<br />

(U) In this regard, we are fortunate to have a<br />

Vietnamese communist history oftheir own cryptographic<br />

effort dur<strong>in</strong>g the war. Essential<br />

Matters. published <strong>in</strong> the orig<strong>in</strong>al Vietnamese <strong>in</strong><br />

1990, and <strong>in</strong> translation <strong>in</strong> 1994 by David Gaddy.<br />

formerly chief of the Center for Cryptologic<br />

History. Ifthe reader can overlook the numerous<br />

faults of socialist history - the paeans to Ho Chi<br />

M<strong>in</strong>h, the tales of heroic socialist cryptographic<br />

technicians under fire deliver<strong>in</strong>g loads of codebooks,<br />

or the m<strong>in</strong>d-numb<strong>in</strong>g statistics of everhigher<br />

production levels of key lists - what<br />

emerges is a remarkably detailed history of communist<br />

cryptography and communications S('CUrity<br />

from 1945 to the fall of Saigon <strong>in</strong> 1975. TIll'<br />

narrative <strong>in</strong> Essential Mutters matches up quite<br />

closely to what Americans knew from <strong>in</strong>tercept.<br />

cryptanalysis. captured documents, and prisoner<br />

of war debriefs. '111l~ dose correlation allows the<br />

reader a rare opportunity to ObSl'I\"(' how both<br />

sides operated and reacted to each others' work.<br />

Essential Matters should be read by all thoughtful<br />

American cryptologists who want to understand<br />

how target cryptographic and CO:\;ISEC<br />

bureaus operate, and how they arc <strong>in</strong>fluenced by<br />

unique doctr<strong>in</strong>al, technical, and operational pre]­<br />

udices, Most importantly, it can be seen how an<br />

enemy's knowledge of American cryptologie<br />

capabilities is <strong>in</strong>corporated <strong>in</strong>to modifications of<br />

their own systems,"<br />

(C) History. if it is lo Ill' more than a men'<br />

chronicle, must <strong>in</strong>vestigate events and seek to<br />

expla<strong>in</strong> their significance. Hopefully, these 1\\"0<br />

approaches of scale and context will allow this<br />

history to answer the two fundamental and pert<strong>in</strong>ent<br />

questions about American SI

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!