Author: John Greenewald

The following documents have been released by the National Security Agency. 1996 Rosman Tracks on to the End August 1996 1998 Baron Oshima’s Contributions September 1998 2002 AFSAM-7 January – February 2002 Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization January – February 2002 The Central Security Service January – February 2002 The Creation of NSA – Part 1: JOP January – February 2002 The Creation of NSA – Part 1: AFSA January – February 2002 The Creation of NSA – Part 1: The Brownell Committee January – February 2002 The Effort to Create a Smokefree NSA January…

Read More

The following documents detail the use of Cryptology inside the United States Intelligence Community. Declassified Documents A History of U.S. Communications Security Volume I [94 Pages, 3.18mb] A History of U.S. Communications Security Volume II [61 Pages, 2.37mb] American Cryptology During the Cold War 1945-1989, Book I-IV The Cryptology of the German Intelligence Services [38 Pages, 2.01mb] German Clandestine Activities in South America in World War II [78 Pages, 4.80mb] In the Shadow of War The Origins of the National Security Agency 1940-1952 [155 Pages, 9.83mb] Purple Dragon Spartans in Darkness Working Against the Tide

Read More

John Forbes Nash, Jr. (born June 13, 1928) is an American mathematician whose works in game theory, differential geometry, and partial differential equations have provided insight into the forces that govern chance and events inside complex systems in daily life. His theories are used in market economics, computing, evolutionary biology, artificial intelligence, accounting, politics and military theory. Serving as a Senior Research Mathematician at Princeton University during the latter part of his life, he shared the 1994 Nobel Memorial Prize in Economic Sciences with game theorists Reinhard Selten and John Harsanyi. Nash is the subject of the Hollywood movie A…

Read More

The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.  Special thanks and courtesy of GovernmentAttic.org  for allowing The Black Vault to post it here as well. Excerpt INTRODUCTION: I am one of those “outsiders” I talk about so much in the later chapters of this book. I was fortunate to be brought into the National Security Agency as one of the Center for Cryptologic History’s first Scholars in Residence. I was borrowed from my university because I had spent a decade working on the history of computers at NSA’s predecessors.…

Read More

Originally published in 2009 By John Greenewald, Jr. “We have been exploring the fabric of America, telling the story of her citizens by visiting the workplace… While in the Huntsville, [Alabama] area, we would be honored to film with the Alabama National Guard.  You are a strong and proud organization that carries out your challenging duties with bravery and class.” Sounds like a legitimate request to chronicle the actions of the Alabama National Guard.  But little did they know; the true men in uniform were about to get entangled in one of the most feared events for anyone… a visit…

Read More