Book Read Free

Code Warriors

Page 44

by Stephen Budiansky


  Andrew, Christopher, and Oleg Gordievsky. KGB: The Inside Story of Its Foreign Operations from Lenin to Gorbachev. New York: HarperCollins, 1990.

  Andrew, Christopher, and Vasili Mitrokhin. The Sword and the Shield: The Mitrokhin Archive and the Secret History of the KGB. New York: Basic Books, 1999.

  Antal, Eugen, and Pavol Zajac. “Key Space and Period of Fialka M-125 Cipher Machine.” Cryptologia 39, no. 2 (2015): 126–44.

  Baker, William O. Papers. Mudd Manuscript Library, Princeton University, Princeton, NJ.

  Baker Panel. Scientific Judgments on Foreign Communications Intelligence. Special Intelligence Panel of the Science Advisory Committee to the President, January 23, 1958. DNSArch.

  Ball, Desmond. Soviet Signals Intelligence (SIGINT). Canberra Papers on Strategy and Defence No. 47. Canberra, Australia: Australia National University, 1989.

  Bamford, James. The Puzzle Palace: A Report on America’s Most Secret Agency. Boston: Houghton Mifflin, 1982.

  “Before SuperComputers: NSA and Computer Development.” Cryptologic Almanac, May–June 2002. NSAD.

  Bennett, Ralph. “The Duty Officer, Hut 3.” In Codebreakers: The Inside Story of Bletchley Park, edited by F. H. Hinsley and Alan Stripp. 1993. Reprint, Oxford: Oxford University Press, 1994.

  Benson, Robert Louis. The Venona Story. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency. n.d. CCH.

  ———. A History of U.S. Communications Intelligence During World War II: Policy and Administration. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1997. NSAD.

  Benson, Robert Louis, and Cecil J. Phillips. History of VENONA. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1995. NCM.

  Bernard, Richard L. Electronic Intelligence (ELINT) at NSA. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2009. CCH.

  Bethell, Nicholas. The Great Betrayal: The Untold Story of Kim Philby’s Greatest Coup. London: Hodder & Stoughton, 1984.

  Bissell, Richard M. Review of Selected NSA Cryptanalytic Efforts. February 18, 1965. Document 4, The National Security Agency Declassified, National Security Archive Electronic Briefing Book No. 24. George Washington University, Washington, DC. Web.

  Blight, James G., and David A. Welch. On the Brink: Americans and Soviets Reexamine the Cuban Missile Crisis. 1989. 2nd ed., New York: Noonday Press, 1990.

  Blight, James G., Bruce J. Allyn, and David A. Welch. Cuba on the Brink: Castro, the Missile Crisis, and the Soviet Collapse. 1993. Revised ed., Lanham, MD: Rowman & Littlefield, 2002.

  Boone, James V. “Applying Advanced Technology to Cryptologic Systems: Some Special Management Challenges.” Paper presented at the 2013 Cryptologic History Symposium, Johns Hopkins Applied Physics Laboratory, Laurel, MD, October 17–18, 2013.

  Bower, Tom. The Red Web: MI6 and the KGB Master Coup. 1989. Reprint, London: Mandarin, 1993.

  ———. The Perfect English Spy: Sir Dick White and the Secret War, 1935–90. 1995. Reprint, London: Mandarin, 1996.

  Brooker, Graham, and Jairo Gomez. “Lev Termen’s Great Seal Bug Analyzed.” IEEE A&E Systems Magazine, November 2013, 4–11.

  Brown, Anne S. The National Security Agency Scientific Advisory Board, 1952–1963. Ft. George G. Meade, MD: NSA Historian, Office of Central Reference, 1965. Government Attic, Web.

  Brownell Committee Report. June 13, 1952. SRH-123, Studies on Cryptology, RG 457, NARA.

  Budiansky, Stephen. “A Tribute to Cecil Phillips—and Arlington Hall’s ‘Meritocracy.’ ” Cryptologia 23, no. 2 (1999): 97–107.

  ———. Battle of Wits: The Complete Story of Codebreaking in World War II. New York: Free Press, 2000.

  ———. Air Power: The Men, Machines, and Ideas that Revolutionized War, from Kitty Hawk to Gulf War II. New York: Viking, 2004.

  ———. “Colossus, Codebreaking, and the Digital Age.” In Colossus: The Secrets of Bletchley Park’s Codebreaking Computers, edited by B. Jack Copeland. Oxford: Oxford University Press, 2006.

  Buffham, Benson. Oral History. NSA-OH-51-99. National Security Agency, 1979. NSAD.

  Burke, Colin B. It Wasn’t All Magic: The Early Struggle to Automate Cryptanalysis, 1930s–1980s. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2002. NSAD.

  ———, ed. “From the Archives: The Last Bombe Run, 1955.” Cryptologia 32, no. 3 (2008): 277–78.

  Burns, Thomas L. The Origins of the National Security Agency, 1940–1952. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1990. NSAD.

  ———. The Quest for Centralization and the Establishment of NSA: 1940–1952. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2005. NSAD.

  Callimahos, Lambros D. “Introduction to Traffic Analysis.” NSA Technical Journal, April 1958, 1–11. NSAD.

  ———. “The Legendary William F. Friedman.” Cryptologic Spectrum, winter 1974, 6–17. NSAD.

  Campaigne, Howard. Oral History. NSA-OH-20-83. National Security Agency, 1983. NSAD.

  Canine, Ralph J. Oral History. Part I, OH-2012-80. Part II, OH-2012-81. Part III, OH-2012-82. National Security Agency, ca. 1965. NSAD.

  ———. Papers. National Cryptologic Museum Library, Ft. George G. Meade, MD.

  Central Intelligence Agency. The Berlin Tunnel Operation, 1952–1956. Clandestine Services History. Washington, DC: 1967. CIAL.

  Churchhouse, Robert. Codes and Ciphers: Julius Caesar, the Enigma, and the Internet. Cambridge: Cambridge University Press, 2002.

  “The Civilianization of Harrogate.” Cryptologic Spectrum, summer 1970, 8–16. NSAD.

  Clark, Ronald W. The Man Who Broke Purple: The Life of the World’s Greatest Cryptologist, William F. Friedman. London: Weidenfeld & Nicolson, 1977.

  Clay, Lucius D. Decision in Germany. Garden City, NY: Doubleday, 1950.

  Coffey, Donald F. Oral History. NSA-OH-23-82. National Security Agency, 1982. NSAD.

  Colley, David. “Shadow Warriors: Intelligence Operatives Waged Clandestine Cold War.” VFW Magazine, September 1997, 24–30.

  Collins, Charles P. The History of SIGINT in the Central Intelligence Agency, 1947–1970. Washington, DC: CIA History Office, 1971. CIAL.

  “COMINT Satellites—A Space Problem.” NSA Technical Journal, October 1959, 39–48. NSAD.

  Cook, Earle F. Oral History. National Security Agency, 1982. NCM.

  Copeland, B. Jack. “Turingery.” In Colossus: The Secrets of Bletchley Park’s Codebreaking Computers, edited by B. Jack Copeland. Oxford: Oxford University Press, 2006.

  Craig, Bruce. “A Matter of Espionage: Alger Hiss, Harry Dexter White, and Igor Gouzenko—The Canadian Connection Reassessed.” Intelligence and National Security 15, no. 2 (2000): 211–24.

  Croner, Andrew. “Snake in the Grass?: Section 798 of the Espionage Act and Its Constitutionality as Applied to the Press.” George Washington Law Review 77, no. 3 (2009): 766–98.

  Davis, Carol B. Candle in the Dark: COMINT and Soviet Industrial Secrets, 1946–1956. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2008. NCM.

  Day, Dwayne A. “Ferrets Above: American Signals Intelligence Satellites During the 1960s.” International Journal of Intelligence and Counterintelligence 17, no. 3 (2004): 449–67.

  Deane, John R. The Strange Alliance: The Story of Our Efforts at Wartime Cooperation with Russia. 1946. Reprint, Bloomington: Indiana University Press, 1973.

  Deavours, Cipher A., and Louis Kruh. Machine Cryptography and Modern Cryptanalysis. Norwood, MA: Artech, 1985.

  Denham, Hugh. “In Memoriam: Conel Hugh O’Donel Alexander.” Cryptologic Spectrum, summer 1974, 30–32. NSAD.

  Drea, Edward J. MacArthur’s ULTRA: Codebreaking and the War Against Japan, 1942–1945. Lawrence: University Press of Kansas, 1992.

  Dumey, Arnold. Oral History. Charles Babbage Institute, Center for the History of In
formation Processing, University of Minnesota, 1984.

  Eachus, Joseph, et al. “Growing Up with Computers at NSA: A Panel Discussion.” NSA Technical Journal, Special Issue, 1972, 3–14. NSAD.

  East, Don C. “A History of U.S. Navy Fleet Reconnaissance: Part I, The Pacific and VQ-1.” The Hook: Journal of Carrier Aviation, spring 1987.

  ———. “A History of U.S. Navy Fleet Reconnaissance: Part II, The European Theater and VQ-2.” The Hook: Journal of Carrier Aviation, spring 1987.

  Easter, David. “GCHQ and British External Policy in the 1960s.” Intelligence and National Security 23, no. 5 (2008): 681–706.

  “Engineering the Berlin Tunnel: Turning a Cold War Scheme into Reality.” Studies in Intelligence 48, no. 2 (2004). CIAL.

  Erskine, Ralph. “The Holden Agreement on Naval Sigint: The First BRUSA?” Intelligence and National Security 14, no. 2 (1999): 187–97.

  Exinterne, Anne [pseud.]. “A Long Hard Look at the Intern Program.” Cryptolog, September 1974, 16–18. NSAD.

  ———. “A Long Hard Look at the Intern Program, Part Three: Motivation and Morale.” Cryptolog, November 1974, 15–17. NSAD.

  Ferris, John. “The British ‘Enigma’: Britain, Signals Security, and Cipher Machines, 1906–1953.” In Intelligence and Strategy: Selected Essays. New York: Routledge, 2005.

  “Finding a Home for AFSA 1949–1952; or, Why We Don’t Have Bluegrass in Front of the Building and Mint Juleps in the Dining Parlour.” Cryptolog, April 1985, 1–3. NSAD.

  Frahm, Jill. So Power Can Be Brought into Play: SIGINT and the Pusan Perimeter. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2000. CCH.

  Friedman, William F. The Index of Coincidence and Its Applications in Cryptology. Department of Ciphers, Riverbank Laboratories, Publication 22. Geneva, IL, 1922.

  “From Chaos Born: General Canine’s First Charge to the NSA Workforce.” Cryptologic Quarterly, summer 1987, 23–29. NSAD.

  Futtrell, Robert F. “A Case Study: USAF Intelligence in the Korean War.” In The Intelligence Revolution: A Historical Perspective, edited by Walter T. Hitchcock. Proceedings of the Thirteenth Military History Symposium, U.S. Air Force Academy, Colorado Springs, CO, October 12–14, 1988. Washington, DC: Office of Air Force History, United States Air Force, 1991.

  Gaddis, John Lewis. The Cold War: A New History. New York: Penguin, 2005.

  ———. George F. Kennan: An American Life. New York: Penguin, 2011.

  Gallo, Jules. “NSA Signal Collection Equipment and Systems: The Early Years—Magnetic Tape Recorders.” Cryptologic Quarterly, spring 1996, 45–62. NSAD.

  Garthoff, Douglas F. Directors of Central Intelligence as Leaders of the U.S. Intelligence Community, 1946–2005. Washington, DC: Potomac Books, 2007.

  “Glimpses of a Man: The Life of Ralph J. Canine.” Cryptologic Quarterly, summer 1987, 31–38. NSAD.

  Goldman, Eric F. The Crucial Decade—and After: America, 1945–1960. New York: Vintage, 1960.

  Goldstine, Herman H. The Computer from Pascal to von Neumann. Princeton, NJ: Princeton University Press, 1972.

  Good, I. J. “Studies in the History of Probability and Statistics. XXXVII. A. M. Turing’s Statistical Work in World War II.” Biometrika 66, no. 2 (1979): 393–96.

  ———. “Enigma and Fish.” In Codebreakers: The Inside Story of Bletchley Park, edited by F. H. Hinsley and Alan Stripp. 1993. Reprint, Oxford: Oxford University Press, 1994.

  Gouzenko, Igor. The Iron Curtain. New York: Dutton, 1948.

  Gray, George. “Engineering Research Associates and the Atlas Computer (UNIVAC 1101).” Unisys History Newsletter, June 1999.

  Greenwald, Glenn. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Metropolitan, 2014.

  Gurin, Jacob. “Ralph J. Canine.” Cryptologic Spectrum, fall 1969, 7–10. NSAD.

  ———. “Let’s Not Forget Our Cryptologic Mission.” Cryptolog, February 1979, 16–17. NSAD.

  Hagelin, Boris C. W. “The Story of Hagelin Cryptos.” Cryptologia 18, no. 3 (1994): 204–42.

  Halberstam, David. The Best and the Brightest. New York: Random House, 1972.

  ———. The Coldest Winter: America and the Korean War. 2007. Reprint, New York: Hachette, 2008.

  Hannah, Theodore M. “Frank B. Rowlett.” Cryptologic Spectrum, spring 1981, 4–21. NSAD.

  Hanyok, Robert J. “Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2–4 August, 1964.” Cryptologic Quarterly, winter 2000–spring 2001, 1–55. NSAD.

  ———. Spartans in Darkness: American SIGINT and the Indochina War, 1945–1975. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2002. NSAD.

  Hatch, David A. In Memoriam Dr. Louis Tordella. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency. NSAD.

  ———. “The Berlin Tunnel, Part II: The Rivals.” Cryptologic Almanac, March–April 2002. NSAD.

  ———. “Juanita Moody.” Cryptologic Almanac, March–April 2002. NSAD.

  Hatch, David A., and Robert Louis Benson. The Korean War: The SIGINT Background. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2000. CCH.

  Hayden, Michael V. “Overseeing an Era of Change: An Interview with NSA Director Lt. Gen. Michael V. Hayden.” Studies in Intelligence 44, no. 1 (2000). CIAL.

  Haynes, John Earl, and Harvey Klehr. Venona: Decoding Soviet Espionage in America. New Haven, CT: Yale University Press, 1999.

  ———. “Alexander Vassiliev’s Notebooks and the Documentation of Soviet Intelligence Activities in the United States During the Stalin Era.” Journal of Cold War Studies 11, no. 3 (2009): 6–25.

  Haynes, John Earl, Harvey Klehr, and Alexander Vassiliev. Spies: The Rise and Fall of the KGB in America. New Haven, CT: Yale University Press, 2009.

  Heath, Laura J. An Analysis of the Systematic Security Weaknesses of the U.S. Navy Fleet Broadcasting System, 1967–1974, as Exploited by CWO John Walker. Master’s Thesis, U.S. Army Command and General Staff College, Ft. Leavenworth, KS, 2005.

  Hersh, Seymour M. The Price of Power: Kissinger in the Nixon White House. New York: Summit Books, 1983.

  Hess, Sigurd. “The Clandestine Operations of Hans Helmut Klose and the British Baltic Fishery Protection Service (BBFPS), 1949–1956.” Journal of Intelligence History 1, no. 2 (2001): 169–78.

  Hinsley, F. H., et al. British Intelligence in the Second World War. 5 vols. New York: Cambridge University Press, 1979–90.

  Hodges, Andrew. Alan Turing: The Enigma. New York: Simon & Schuster, 1983.

  Höhne, Heinz, and Hermann Zolling. The General Was a Spy: The Truth About General Gehlen and His Spy Ring. New York: Coward, McCann & Geoghegan, 1972.

  Hove, Mark T. History of the Bureau of Diplomatic Security of the United States Department of State. Washington, DC: Department of State, 2011.

  Howe, George F. “A History of US Civilians in Field Comint Operations, 1953–1960. Part I.” Cryptologic Spectrum, spring 1973, 5–9. NSAD.

  ———. American Signal Intelligence in Northwest Africa and Western Europe. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2010. CCH.

  Hunter, Robert W. Spy Hunter: Inside the FBI Investigation of the Walker Espionage Case. Annapolis, MD: Naval Institute Press, 1999.

  Johnson, Thomas R. “The Move, or How NSA Came to Fort Meade.” Cryptologic Quarterly, summer 1995, 93–99. NSAD.

  ———.American Cryptology During the Cold War, 1945–1989. 4 vols. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1995–99. NSAD.

  ———. “American Cryptology During the Korean War.” Studies in Intelligence 45, no. 3 (2001). CIAL.

  ———. “Joseph N. Wenger.” Cryptologic Almanac, March–April 2002. NSAD.

  ———. “A Cryptologist Encounters the Human Side of Intelligence.” Studies in Intelligence, 2007. CIAL.
r />   ———. “In War’s Aftermath: Cryptology and the Early Cold War.” Paper presented at the 2013 Cryptologic History Symposium, Johns Hopkins Applied Physics Laboratory, Laurel, MD, October 17–18, 2013.

  Johnson, Thomas R., and David A. Hatch. NSA and the Cuban Missile Crisis. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1998. CCH.

  Kahn, David. The Codebreakers: The Story of Secret Writing. 1967. Revised ed., New York: Scribner, 1996.

  ———. “Big Ear or Big Brother?” New York Times Magazine, May 16, 1976.

  ———. “Soviet COMINT in the Cold War.” Cryptologia 22, no. 1 (1998): 1–24.

  Kirby, Oliver R. “The Origins of the Soviet Problem: A Personal View.” Cryptologic Quarterly, winter 1992, 51–58. NSAD.

  ———. Oral History. NSA-OH-20-93. National Security Agency, 1993. NSAD.

  Klein, Melville. Securing Record Communications: The TSEC/KW-26. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2003. CCH.

  Lamphere, Robert J. The FBI-KGB War: A Special Agent’s Story. New York: Random House, 1986.

  Lavington, Simon. “In the Footsteps of Colossus: A Description of Oedipus.” IEEE Annals of the History of Computing, April–June 2006, 44–55.

  Levenson, Arthur J. Oral History. NSA-OH-40-80. National Security Agency, 1980. NSAD.

  Lewis, Frank W. “Something May Rub Off!” NSA Technical Journal, winter 1965, 1–5. NSAD.

  Lilienthal, David E. The Journals of David E. Lilienthal. Vol. 2, The Atomic Energy Years, 1945–1950. New York: Harper & Row, 1964.

  Lobban, Iain. “GCHQ and Turing’s Legacy.” Speech delivered at Leeds University, October 4, 2012. GCHQ. Web.

  McConnell, J. M. “The Future of SIGINT: Opportunities and Challenges in the Information Age.” Defense Intelligence Journal 9, no. 2 (2000): 39–49.

  McCullough, David. Truman. New York: Simon & Schuster, 1992.

  MacDonald, Dwight. “The Lie-Detector Era II. ‘It’s a Lot Easier, and It Don’t Leave Marks.’ ” Reporter, June 22, 1954, 22–29.

  McDonald, Robert A., and Sharon K. Moreno. Grab and Poppy: America’s Early ELINT Satellites. Chantilly, VA: Center for the Study of National Reconnaissance, National Reconnaissance Office, 2005.

 

‹ Prev