Macintyre, Ben. A Spy Among Friends: Kim Philby and the Great Betrayal. New York: Crown, 2014.
McKnight, David. “The Moscow–Canberra Cables: How Soviet Intelligence Obtained British Secrets Through the Back Door.” Intelligence and National Security 13, no. 2 (1998): 159–70.
Manchester, William. The Glory and the Dream: A Narrative History of America, 1932–1972. 1974. Reprint, New York: Bantam, 1990.
Maneki, Sharon A. “Remembering the Lessons of the Vietnam War.” Cryptologic Quarterly, spring–summer 2004, 19–36. NSAD.
———. Learning from the Enemy: The GUNMAN Project. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2012. NSAD.
Melton, H. Keith. The Ultimate Spy Book. New York: DK Publishing, 1996.
Meyer, J. A. “Computers—The Wailing Wall.” NSA Technical Journal, October 1956, 69–90. NSAD.
Moïse, Edwin E. Tonkin Gulf and the Escalation of the Vietnam War. Chapel Hill: University of North Carolina Press, 1996.
Montefiore, Simon Sebag. Stalin: The Court of the Red Tsar. New York: Random House, 2003.
Mowry, David P. “Betrayers of the Trust: Joseph Sidney Petersen.” Cryptologic Almanac, March–April 2002. NSAD.
Murphy, David E., Sergei A. Kondrashev, and George Bailey. Battleground Berlin: CIA vs. KGB in the Cold War. New Haven, CT: Yale University Press, 1997.
National Research Council. The Polygraph and Lie Detection. Washington, DC: National Academies Press, 2003. Web.
National Security Agency and Central Intelligence Agency. Venona: Soviet Espionage and the American Response, 1939–1957. Washington, DC, 1996. CIAL.
National Security Archive. The Secret Sentry Declassified. Electronic Briefing Book No. 278. George Washington University, Washington, DC. Web.
———. The CIA and Signals Intelligence. Electronic Briefing Book No. 506. Web.
Newton, Robert E. The Capture of the USS Pueblo and Its Effect on SIGINT Operations. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1992. NSAD.
Nikitin, Pavel. “Leon Theremin (Lev Termen).” IEEE Antennas and Propagation Magazine 54, no. 5 (2012): 252–57.
O’Hara, John. “Analog Recording of Telemetry Signals Prior to the Advent of Digital Processing.” Paper presented at the 2013 Cryptologic History Symposium, Johns Hopkins Applied Physics Laboratory, Laurel, MD, October 17–18, 2013.
On Watch: Profiles from the National Security Agency’s Past 40 Years. Ft. George G. Meade, MD: National Cryptologic School, National Security Agency. NSAD.
Operation REGAL: The Berlin Tunnel. Ft. George G. Meade, MD: Office of Cryptologic Archives and History, National Security Agency, 1988. NSAD.
Parker, John E. Oral History. Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota, 1986. Web.
“A Partial History of ELINT at NSA.” Cryptologic Quarterly, spring–summer 2004, 55–64. NSAD.
Pendergrass, James T. Oral History. Charles Babbage Institute, Center for the History of Information Processing, University of Minnesota, 1985. Web.
Peterson, Michael L. “Maybe You Had to Be There: SIGINT on Thirteen Soviet Shootdowns of U.S. Reconnaissance Aircraft.” Cryptologic Quarterly, summer 1993, 1–44. NSAD.
———. “Before BOURBON: American and British COMINT Efforts Against Russia and the Soviet Union Before 1945.” Cryptologic Quarterly, fall–winter 1993, 1–20. NSAD.
———. “Beyond BOURBON—1948: The Fourth Year of Allied Collaborative COMINT Effort Against the Soviet Union.” Cryptologic Quarterly, spring 1995, 1–59. Interagency Security Classification Appeals Panel Released Decisions. Web.
Pipes, Richard. The Russian Revolution. New York: Knopf, 1990.
———. Russia Under the Bolshevik Regime. New York: Knopf, 1994.
PURPLE DRAGON: The Origin and Development of the United States OPSEC Program. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 1993. NSAD.
Rezabek, Randy. “TICOM: The Last Great Secret of World War II.” Intelligence and National Security 27, no. 4 (2012): 513–30.
———. “TICOM and the Search for OKW/Chi.” Cryptologia 37, no. 2 (2013): 139–53.
———. “The Russian Fish with Caviar.” Cryptologia 38, no. 1 (2014): 61–76.
Rhodes, Richard. Dark Sun: The Making of the Hydrogen Bomb. 1995. Reprint, New York: Simon & Schuster, 2005.
Robertson Committee. The Potentialities of Comint for Strategic Warning. Special Study Group of the NSA Scientific Advisory Board, October 20, 1953. Government Attic, Web. (Another partially released version of this report, with different passages redacted, is in Friedman Documents, NSAD.)
Rosenberg, David Alan. “The Origins of Overkill: Nuclear Weapons and American Strategy, 1945–1960.” International Security 7, no. 4 (1983): 3–71.
Rowlett, Frank B. Oral History. National Security Agency, 1974, 1976. NCM.
———. The Story of MAGIC: Memoirs of an American Cryptologic Pioneer. Laguna Hills, CA: Aegean Park Press, 1998.
Schindler, John R. A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency. CCH.
Schlesinger, Stephen. “Cryptanalysis for Peacetime: Codebreaking and the Birth and Structure of the United Nations.” Cryptologia 19, no. 3 (1995): 217–35.
Shannon, C. E. “Prediction and Entropy of Printed English.” Bell System Technical Journal 30, no. 1 (1951): 50–64.
Sheehan, Neil. A Bright Shining Lie: John Paul Vann and America in Vietnam. New York: Random House, 1998.
Sheldon, Rose Mary. The Friedman Collection: An Analytic Guide. George C. Marshall Research Library, Lexington, VA.
Sinkov, Abraham. Oral History. NSA-OH-02-79 through 04-79. National Security Agency, 1979. NSAD.
Smith, Michael. New Cloak, Old Dagger: How Britain’s Spies Came In from the Cold. London: Victor Gollancz, 1996.
———. Station X: The Codebreakers of Bletchley Park. London: Channel 4 Books, 1998.
Snider, Britt L. “Unlucky SHAMROCK: Recollections from the Church Committee’s Investigation of NSA.” Studies in Intelligence, winter 1999–2000. CIAL.
Snyder, Samuel S. History of NSA General-Purpose Electronic Digital Computers. Washington, DC: Department of Defense, 1964.
———. “Influence of US Cryptologic Organizations on the Digital Computer Industry.” Cryptologic Quarterly, fall 1987–spring 1988, 65–82. NSAD.
Stamp, Mark, and Wing On Chan. “SIGABA: Cryptanalysis of the Full Keyspace.” Cryptologia 31, no. 3 (2007): 201–22.
Steury, Donald P., ed. On the Front Lines of the Cold War: Documents on the Intelligence War in Berlin, 1946 to 1961. Washington, DC: Center for the Study of Intelligence, Central Intelligence Agency, 1999. CIAL.
The Suez Crisis: A Brief Comint History. Ft. George G. Meade, MD: Office of Cryptologic Archives and History, National Security Agency, 1988. NSAD.
Taubman, William. Khrushchev: The Man and His Era. New York: Norton, 2003.
“TEABALL: Some Personal Observations of SIGINT at War.” Cryptologic Quarterly, winter 1991, 91–97. NSAD.
“TEMPEST: A Signal Problem.” Cryptologic Spectrum, summer 1972, 26–30. NSAD.
Thomas, Evan. The Very Best Men: Four Who Dared; The Early Years of the CIA. New York: Simon & Schuster, 1996.
Tomash, Erwin, and Arnold A. Cohen. “The Birth of an ERA: Engineering Research Associates, Inc., 1946–1955.” Annals of the History of Computing 1, no. 2 (1979): 83–97.
Treadwell, Mattie E. The Women’s Army Corps. Washington, DC: Office of the Chief of Military History, Department of the Army, 1954.
Turner, Stansfield. Secrecy and Democracy: The CIA in Transition. Boston: Houghton Mifflin, 1985.
“The 2,000-Year-Old Transcriber.” Cryptolog, October 1979, 16–19. NSAD.
U.S. Army. “Forty One and Strong: Arlington Hall Station
.” Cryptologia 9, no. 4 (1985): 306–10.
U.S. Congress. House Un-American Activities Committee. Security Practices in the National Security Agency (Defection of Bernon F. Mitchell and William H. Martin). 87th Cong., 2nd Sess. Washington, DC: GPO, 1962.
U.S. Senate. Huston Plan. Hearings Before the Senate Committee to Study Governmental Operations with Respect to Intelligence Activities, Volume 2. 94th Cong., 1st Sess. Washington, DC: GPO, 1976.
———. The National Security Agency and Fourth Amendment Rights. Hearings Before the Senate Committee to Study Governmental Operations with Respect to Intelligence Activities, Volume 5. 94th Cong., 1st Sess. Washington, DC: GPO, 1976.
———. Supplementary Detailed Staff Reports on Intelligence Activities and the Rights of Americans. Final Report of the Select Committee to Study Governmental Operations with Respect to Intelligence Activities, Book III. Report 94-755. 94th Cong., 2nd Sess. Washington, DC: GPO, 1976.
Vanderpool, Guy R. “COMINT and the PRC Intervention in the Korean War.” Cryptologic Quarterly, summer 1996, 1–26. NSAD.
Wagoner, H. D. Space Surveillance Sigint Program. Ft. George G. Meade, Md.: History and Publications Staff, National Security Agency, 1980. NSAD.
Wiebes, Cees. “Operation ‘Piet’: The Joseph Sidney Petersen Jr. Spy Case, a Dutch ‘Mole’ Inside the National Security Agency.” Intelligence and National Security 23, no. 4 (2008): 488–535.
Wigglesworth, Donald C. “The Cuban Missile Crisis: A SIGINT Perspective.” Cryptologic Quarterly, spring 1994, 77–97. NSAD.
Wilcox, Jennifer. Solving the Enigma: History of the Cryptanalytic Bombe. Revised ed. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2004.
Williams, Jeannette. The Invisible Cryptologists: African-Americans, WWII to 1956. Ft. George G. Meade, MD: Center for Cryptologic History, National Security Agency, 2001. NSAD.
Zaslow, Milton. Oral History. September 14, 1993. Gulf of Tonkin Documents, National Security Agency. NSAD.
ILLUSTRATION CREDITS
All photographic images are courtesy of NSA with the exception of those listed below.
pai1.1 Arlington Hall: Courtesy of Arlington Public Library
pai1.2 B-211 cipher machine: Crypto AG
pai1.3 C-47s at Tempelhof Airport: U.S. Air Force
pai1.4 Truman at Wake Island: Department of Defense
pai1.5 U.S. Marines at Chosin: U.S. Navy
pai1.6 Russian Fialka cipher machine: Mark J. Blair
pai1.7 Cavity bug in the Great Seal: U.S. State Department
pai1.8 Khrushchev: CIA
pai1.9 Checkpoint Charlie: U.S. Information Agency
pai1.10 USS Pueblo: U.S. Navy
pai1.11 Khe Sanh: U.S. Air Force
pai1.12 “Rotor reader”: FBI
pai1.13 Lech Wałęsa: Government of Poland
pai1.14 Berlin Wall: Department of Defense
A NOTE ABOUT THE AUTHOR
Stephen Budiansky was the national security correspondent and foreign editor of (U.S. News & World Report, Washington editor of Nature, and editor of World War II magazine. He is the author of six books of military and intelligence history, including Blackett’s War, a Washington Post Notable Book. He has served as a Congressional Fellow and frequently lectures on intelligence and military history, and his articles have appeared in The New York Times, The Washington Post, The Wall Street Journal, The Atlantic, The Economist, and other publications. He is a member of the editorial board of Cryptologia, the leading academic journal of codes, codebreaking, and cryptologic history.
Credit pai1.1
Arlington Hall, on a prewar postcard. The U.S. Army seized the property for its signals intelligence headquarters in 1942.
The staff of the Army Signal Intelligence Service, 1935. William F. Friedman is standing in the center. Solomon Kullback (second from left) Abraham Sinkov (third from right), and Frank Rowlett (far right) all would go on to hold senior positions at NSA.
“The World’s Greatest Cryptanalytic Bowling Team,” 1946. Cecil Phillips (standing, far left) and Frank Lewis (below, left) made important contributions to solving the Russian one-time-pad systems.
A German T52 Geheimschreiber teleprinter encryption machine (known to the Allies as “Sturgeon”); the Soviets’ Bandwurm machine operated on a similar principle.
U.S. Army divers recovering records of the German high command’s cipher bureau, dropped in the Schliersee in twenty-nine sealed boxes.
Credit pai1.2
The Russian version of Boris Hagelin’s B-211 cipher machine.
Rear Admiral Joseph N. Wenger, chief of the Navy codebreaking department, Op-20-G.
Brigadier General Carter W. Clarke, who headed the War Department’s “Special Branch.”
“Goldberg,” one of the leviathan special-purpose electronic comparators built by ERA to attack Soviet ciphers in the late 1940s; it had one of the first magnetic drum memories.
A brochure for ERA’s 1101, the commercial version of the Atlas computer that the company built for Op-20-G in 1948–50.
Credit pai1.3
C-47s lined up at Tempelhof Airport unloading supplies during the Berlin Airlift, 1948.
A segregated unit at Arlington Hall. William Coffee, standing, was the first African American supervisor in the Army’s cryptologic organization.
Credit pai1.4
President Harry Truman arriving at Wake Island to confer with General Douglas MacArthur, October 1950.
Credit pai1.5
U.S. Marines at Chosin, cut off by Chinese troops that launched a massive attack in December 1950 against UN forces in Korea.
Ralph J. Canine, NSA’s first director, receiving his promotion to major general: pinning on his second stars are his wife and the Army chief of staff, General J. Lawton Collins.
A pointed cartoon about Canine’s management style, included in a book presented by NSA employees at his retirement in 1956.
Contestants in the Miss NSA pageant, held in the 1950s and early 1960s.
An NSA newsletter from the 1950s advertising one of the frequent agency events to boost employee morale.
One of the distinctive and unmissable “elephant cage” antenna arrays located at U.S. intercept sites ringing the Soviet Union.
Credit pai1.6
The Russian Fialka cipher machine.
Credit pai1.7
State Department security officials display Léon Theremin’s resonant cavity bug found inside the Great Seal replica at the U.S. embassy in Moscow.
Credit pai1.8
Soviet leader Nikita Khrushchev views items from the wreckage of a U-2 spy plane shot down over the Soviet Union in May 1960.
NSA defectors William Martin (left) and Bernon Mitchell (center), at a news conference in Moscow, September 6, 1960.
Credit pai1.9
A U.S. tank at Checkpoint Charlie during the Berlin crisis, 1961.
Credit pai1.10
The trawler-sized signals collection ship USS Pueblo, a few months before its capture by the North Koreans in January 1968.
A team from the Naval Research Laboratory with the first GRAB electronic intelligence satellite before its launch in 1960.
U.S. Army intercept operators taking down manual Morse traffic at Da Nang, South Vietnam.
Credit pai1.11
U.S. fighter-bombers providing very close air support to marines under siege at Khe Sanh during the Tet Offensive, 1968.
The electromechanical KL-7 cipher machine; the larger KL-47, used for the U.S. Navy’s Atlantic submarine forces, had the same cipher rotors but incorporated a paper tape reader and punch.
Credit pai1.12
The “rotor reader” supplied to John Walker by the KGB to record the internal wiring of the KL-47 cipher rotors.
NSA’s long-serving deputy director, Louis W. Tordella, known as “Dr. No” for his resistance to taking risks.
NSA director Admiral Bobby Inman, with Ann Caracristi, the agency’s first woman deputy dire
ctor, and Frank Rowlett.
Credit pai1.13
Lech Wałęsa in 1980 after successfully registering the Solidarity labor union, a dramatic defiance of Communist Party control in Poland.
Credit pai1.14
A German citizen chips away at the Berlin Wall following the opening of the border in November 1989.
What’s next on
your reading list?
Discover your next
great read!
*
Get personalized book picks and up-to-date news about this author.
Sign up now.
Code Warriors Page 45