Author: John Greenewald

The following are documents from the Cryptologic Quarterly, declassified by the NSA. Disclaimer John H. Tiltman: A Reminiscence – Summer/Fall 1982-Vol. 1, Nos. 2-3 Computer Virus Infections: Is NSA Vulnerable? – Fall 1985-Vol. 4, No. 3 The Origination and Evolution of Radio Traffic Analysis: The World War I Era – Spring 1987-Vol. 6, No. 1 What Every Cryptologist Should Know About Pearl Harbor – Summer 1987 – Vol. 6, No. 2 Influence of US Cryptologic Organizations on the Digital Computer Industry – Fall/Winter 1987-1988 Vol. 8, Nos. 3-4 Third Party Nations: Partners and Targets – Winter 1989 – Vol. 7,…

Read More

The Venona project was a long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union, mostly during World War II. There were known to be at least 13 code words for this effort used by the U.S. and UK. “Venona” was the last one used. It has no known meaning. (In the decrypted documents issued from the National Security Agency, ‘VENONA’ is written in full capitals; authors writing on the subject generally capitalize only the first letter.) Entire collection of…

Read More

The following documents have been released by the National Security Agency. 1996 Rosman Tracks on to the End August 1996 1998 Baron Oshima’s Contributions September 1998 2002 AFSAM-7 January – February 2002 Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization January – February 2002 The Central Security Service January – February 2002 The Creation of NSA – Part 1: JOP January – February 2002 The Creation of NSA – Part 1: AFSA January – February 2002 The Creation of NSA – Part 1: The Brownell Committee January – February 2002 The Effort to Create a Smokefree NSA January…

Read More

The following documents detail the use of Cryptology inside the United States Intelligence Community. Declassified Documents A History of U.S. Communications Security Volume I [94 Pages, 3.18mb] A History of U.S. Communications Security Volume II [61 Pages, 2.37mb] American Cryptology During the Cold War 1945-1989, Book I-IV The Cryptology of the German Intelligence Services [38 Pages, 2.01mb] German Clandestine Activities in South America in World War II [78 Pages, 4.80mb] In the Shadow of War The Origins of the National Security Agency 1940-1952 [155 Pages, 9.83mb] Purple Dragon Spartans in Darkness Working Against the Tide

Read More

John Forbes Nash, Jr. (born June 13, 1928) is an American mathematician whose works in game theory, differential geometry, and partial differential equations have provided insight into the forces that govern chance and events inside complex systems in daily life. His theories are used in market economics, computing, evolutionary biology, artificial intelligence, accounting, politics and military theory. Serving as a Senior Research Mathematician at Princeton University during the latter part of his life, he shared the 1994 Nobel Memorial Prize in Economic Sciences with game theorists Reinhard Selten and John Harsanyi. Nash is the subject of the Hollywood movie A…

Read More