09.01.2015 Views

spartans_in_darkness

spartans_in_darkness

spartans_in_darkness

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

'FOP SEeREli'/eOMIN'FH*1 P.L. 86-36<br />

(TS//SI) United States Army Security Agency<br />

History Advisory Group CSEAHAG), United<br />

States Army Security Agency Southeast Asia<br />

Cryptologic History. Arl<strong>in</strong>gton, VA: CI&H<br />

Division, ODCSSEC, Headquarters, Army<br />

Security Agency, 1 March 1968. Draft.<br />

(TS//~H) Howe, George. "Historical Study of<br />

U.S. Cryptologic Activities <strong>in</strong> Southeast Asia,<br />

1960-1963."<br />

(TS//SI)<br />

. Narrative History of<br />

AFSA and NSA. Fort George G. Meade, MD:<br />

National Security Agency, 1959-1964.<br />

3. (D) Oral Histories<br />

OH 1995-38, Ralph Adams<br />

OH-72, Lieutenant General Gordon A. Blake,<br />

USAF,1972<br />

OH 1988-01,1L....- 1<br />

OH 1999-74,1 1<br />

OH1982-25, Wilma Davis<br />

OH 1981-95,11.....-__<br />

OH 1993-::26,11....-__......<br />

OH 1999-66, Thomas Fogarty<br />

OHi984:c12,1'--__.....I<br />

OH 1986~04,1.........,,.....-__.....J<br />

OH1999-77, Jack Gur<strong>in</strong><br />

OH 1997-07,iL....-<br />

OH 1980-22,1"--<br />

OH 1988-09, Colonel Delmar Lang, USAF<br />

_<br />

_<br />

OH 1995-08,1"--<br />

OH 1987-33,1<br />

OH 1994-38, 1""---<br />

_<br />

....l<br />

OH 1993-17, Milton Zaslow<br />

4. (D) Secondary Sources (Books and<br />

Articles)<br />

(8//80 In the late 1960s, as the war <strong>in</strong><br />

Indoch<strong>in</strong>a began to de-escalate, the National<br />

Security Agency and the three Service Cryptologic<br />

Agencies jo<strong>in</strong>tly started a series of histories of the<br />

cryptologic aspects of the conflict, titled the<br />

Cryptologic History Series, Southeast Asia. A<br />

multivolume, chronological narrative was to be<br />

the centerpiece of the effort, along with studies of<br />

special events and parts of the war, such as the air<br />

campaign. The first volumes were published <strong>in</strong><br />

1969 and cont<strong>in</strong>ued until 1971, when the effort<br />

was abruptly ended. Five volumes were published,<br />

while a few others reached manuscript<br />

form. S<strong>in</strong>ce 1971, only two books have been published<br />

on the c tolo ic art of the war:<br />

1....-__.... f<strong>in</strong>e recount<strong>in</strong>g of the Purple Dragon<br />

OPSEC effort and David Gaddy's excellent translation<br />

of the History of the People's<br />

Cryptographic Bureau. Why there should have<br />

been such a lack of <strong>in</strong>terest of the largest s<strong>in</strong>gle<br />

cryptologic effort s<strong>in</strong>ce the Second World/War<br />

rema<strong>in</strong>s unclear.<br />

A. CU) Official and Classified Publications<br />

CU) National Security Agency:<br />

CTSIISIIINF) Betts, Donzel E.,<br />

1....- ..1 Cryptologic History Series, Southeast<br />

Asia: Work<strong>in</strong>g Aga<strong>in</strong>st the Tide (COMSEC<br />

Monitor<strong>in</strong>g and Analysis) Parts One and Two.<br />

Fort George G. Meade: National Security Agency,<br />

June 1970.<br />

_<br />

Page 476<br />

'FOP SEeREliveOMINliY*1<br />

P.L. 86-36

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!