You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Winner of an Outstanding Academic Title Award from CHOICE MagazineMost available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the
In February of 2006, Matthew Aid's discovery of a massive secret historical document reclassification program then taking place at the National Archives made the front page of the New York Times. This discovery is only the tip of the iceberg of Aid's more than twenty years of intensive research, culled from thousands of pages of formerly top secret documents. In The Secret Sentry, he details the untold history of America's most elusive and powerful intelligence agency, the National Security Agency (NSA), since the end of World War II. This will be the first comprehensive history of the NSA, most recently in the news with regards to domestic spying, and will reveal brand new details about controversial episodes including the creation of Israel, the Bay of Pigs, the Berlin Wall, and the invasion of Iraq. Since the beginning of the Cold War, the NSA has become the most important source of intelligence in the US government: 60% of the president's daily briefing comes from the NSA. Matthew Aid will reveal just how this came to be, and why the NSA has gone to such great lengths to keep its history secret.
The following paper will examine the nature of the Soviet electronic penetration and the damage assessment of Soviet access to typewriters at the U.S. embassy in Moscow. This history of Project GUNMAN will also answer such questions as how the typewriter bugs were discovered and how they worked.
Protesters called it an act of war when the U.S. Coast Guard sank a Canadian-flagged vessel in the Gulf of Mexico in 1929. It took a cool-headed codebreaker solving a "trunk-full" of smugglers' encrypted messages to get Uncle Sam out of the mess: Elizebeth Smith Friedman's groundbreaking work helped prove the boat was owned by American gangsters. This book traces the career of a legendary U.S. law enforcement agent, from her work for the Allies during World War I through Prohibition, when she faced danger from mobsters while testifying in high profile trials. Friedman founded the cryptanalysis unit that provided evidence against American rum runners and Chinese drug smugglers. During World War II, her decryptions brought a Japanese spy to justice and her Coast Guard unit solved the Enigma ciphers of German spies. Friedman's "all source intelligence" model is still used by law enforcement and counterterrorism agencies against 21st century threats.
This official government publication investigates the impact of the Holocaust on the Western powers' intelligence-gathering community. It explains the archival organization of wartime records accumulated by the U.S. Army's Signal Intelligence Service and Britain's Government Code and Cypher School. It also summarizes Holocaust-related information intercepted during the war years.
The Center for Cryptologic History (CCH) is proud to publish the first title under its own imprint, Thomas L. Burns's The Origins of NSA.* In recent years, the NSA history program has published a number of volumes dealing with exciting and even controversial subjects: a new look at the Pearl Harbor attack, for example. Tom Burns's study of the creation of NSA is a different kind of history from the former. It is a masterfully researched and documented account of the evolution of a national SIGINT effort following World War II, beginning with the fragile trends toward unification of the military services as they sought to cope with a greatly changed environment following the war, and continui...
The first edition of this award-winning book attracted a wide audience. This second edition is both a joy to read and a useful classroom tool. Unlike traditional textbooks, it requires no mathematical prerequisites and can be read around the mathematics presented. If used as a textbook, the mathematics can be prioritized, with a book both students and instructors will enjoy reading. Secret History: The Story of Cryptology, Second Edition incorporates new material concerning various eras in the long history of cryptology. Much has happened concerning the political aspects of cryptology since the first edition appeared. The still unfolding story is updated here. The first edition of this book ...
This is the story of the U.S. Navy's communications intelligence (COMINT) effort between 1924 and 1941. It races the building of a program, under the Director of Naval Communications (OP-20), which extracted both radio and traffic intelligence from foreign military, commercial, and diplomatic communications. It shows the development of a small but remarkable organization (OP-20-G) which, by 1937, could clearly see the military, political, and even the international implications of effective cryptography and successful cryptanalysis at a time when radio communications were passing from infancy to childhood and Navy war planning was restricted to tactical situations. It also illustrates an org...
"In 1953, a man was found dead from cyanide poisoning near the Philadelphia airport with a picture of a Nazi aircraft in his wallet. Taped to his abdomen was an enciphered message. In 1912, a book dealer named Wilfrid Voynich came into possession of an illuminated cipher manuscript once belonging to Emperor Rudolf II, who was obsessed with alchemy and the occult. Wartime codebreakers tried--and failed--to unlock the book's secrets, and it remains an enigma to this day. In this lively and entertaining book, Craig Bauer examines these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret s...