Author: John Greenewald

The Venona project was a long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union, mostly during World War II. There were known to be at least 13 code words for this effort used by the U.S. and UK. “Venona” was the last one used. It has no known meaning. (In the decrypted documents issued from the National Security Agency, ‘VENONA’ is written in full capitals; authors writing on the subject generally capitalize only the first letter.) Entire collection of…

Read More

The following documents have been released by the National Security Agency. 1996 Rosman Tracks on to the End August 1996 1998 Baron Oshima’s Contributions September 1998 2002 AFSAM-7 January – February 2002 Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization January – February 2002 The Central Security Service January – February 2002 The Creation of NSA – Part 1: JOP January – February 2002 The Creation of NSA – Part 1: AFSA January – February 2002 The Creation of NSA – Part 1: The Brownell Committee January – February 2002 The Effort to Create a Smokefree NSA January…

Read More

The following documents detail the use of Cryptology inside the United States Intelligence Community. Declassified Documents A History of U.S. Communications Security Volume I [94 Pages, 3.18mb] A History of U.S. Communications Security Volume II [61 Pages, 2.37mb] American Cryptology During the Cold War 1945-1989, Book I-IV The Cryptology of the German Intelligence Services [38 Pages, 2.01mb] German Clandestine Activities in South America in World War II [78 Pages, 4.80mb] In the Shadow of War The Origins of the National Security Agency 1940-1952 [155 Pages, 9.83mb] Purple Dragon Spartans in Darkness Working Against the Tide

Read More

John Forbes Nash, Jr. (born June 13, 1928) is an American mathematician whose works in game theory, differential geometry, and partial differential equations have provided insight into the forces that govern chance and events inside complex systems in daily life. His theories are used in market economics, computing, evolutionary biology, artificial intelligence, accounting, politics and military theory. Serving as a Senior Research Mathematician at Princeton University during the latter part of his life, he shared the 1994 Nobel Memorial Prize in Economic Sciences with game theorists Reinhard Selten and John Harsanyi. Nash is the subject of the Hollywood movie A…

Read More

The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.  Special thanks and courtesy of GovernmentAttic.org  for allowing The Black Vault to post it here as well. Excerpt INTRODUCTION: I am one of those “outsiders” I talk about so much in the later chapters of this book. I was fortunate to be brought into the National Security Agency as one of the Center for Cryptologic History’s first Scholars in Residence. I was borrowed from my university because I had spent a decade working on the history of computers at NSA’s predecessors.…

Read More