{"id":18794,"date":"2023-11-22T12:48:44","date_gmt":"2023-11-22T12:48:44","guid":{"rendered":"https:\/\/www.theblackvault.com\/documentarchive\/?p=18794"},"modified":"2023-11-22T12:57:43","modified_gmt":"2023-11-22T12:57:43","slug":"american-cryptology-during-the-cold-war-1945-1989","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/american-cryptology-during-the-cold-war-1945-1989\/","title":{"rendered":"American Cryptology during the Cold War, 1945-1989"},"content":{"rendered":"<p>This book is intended to be a general overview of U.S. government cryptology since the end of World War II. It is projected to be a four-book study carrying the story to the end of the Cold War, symbolized by the fall of the Berlin Wall.<\/p>\n<h3>Document Archive<\/h3>\n<p><strong>Book I: The Struggle for Centralization 1945-1960<\/strong><\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\" name=\"acwwii\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><\/a><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cold_war_i.pdf\">\u00a0American Cryptology During the Cold War<\/a> 1945-1989, Book I [299 Pages, 14.87MB]<\/p>\n<p><strong>Book II: Centralization Wins, 1960-1972<\/strong><\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<\/a><a href=\"https:\/\/documents2.theblackvault.com\/documents\/nsa\/MDR-113301.pdf\">American Cryptology During the Cold War\u00a0<\/a>1945-1989, Book II [371 Pages, 73MB] &#8211; This version was after an MDR case filed in November 2021 and released in January 2023.<br \/>\n<strong>ARCHIVED VERSION PREVIOUSLY RELEASED &#8211; Date Unknown and more redacted than the above:<\/strong> <a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<\/a><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cold_war_ii.pdf\">American Cryptology During the Cold War\u00a0<\/a>1945-1989, Book II [369 Pages, 17.31MB]<\/p>\n<p><strong>Book III: Retrenchment and Reform, 1972-1980<\/strong><\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<\/a><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cold_war_iii.pdf\">American Cryptology During the Cold War\u00a0<\/a>1945-1989, Book III [271 Pages, 11.77MB]<\/p>\n<p><strong>Book IV: Cryptologic Rebirth, 1981-1989<\/strong><\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/history_comsec_ii.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<\/a><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cold_war_iv.pdf\">American Cryptology During the Cold War\u00a0<\/a>1945-1989, Book IV [233 Pages, 9.21MB]<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This book is intended to be a general overview of U.S. government cryptology since the end of World War II. It is projected to be a four-book study carrying the story to the end of the Cold War, symbolized by the fall of the Berlin Wall. Document Archive Book I: The Struggle for Centralization 1945-1960<\/p>\n","protected":false},"author":1,"featured_media":18798,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,40],"tags":[],"class_list":{"0":"post-18794","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-history","8":"category-national-security-agency-nsa-collection"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2023\/11\/b.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/18794","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=18794"}],"version-history":[{"count":1,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/18794\/revisions"}],"predecessor-version":[{"id":18796,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/18794\/revisions\/18796"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/18798"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=18794"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=18794"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=18794"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}