Item Details
Skip Navigation Links
   ActiveUsers:789Hits:19977532Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

In Basket
  Journal Article   Journal Article
 

ID100932
Title ProperWhat's the use of Cryptologic history?
LanguageENG
AuthorBudiansky, Stephen
Publication2010.
Summary / Abstract (Note)Continued secrecy surrounding signals intelligence during the Cold War has profoundly distorted the historical record, making a full and accurate military, diplomatic, and presidential history of the last half century impossible for now. Not only history, but the ongoing intelligence enterprise itself, would be better served by significantly greater openness. This article is adapted from the Schorreck Memorial Lecture in Cryptologic History, presented by the author at the National Cryptologic Museum, Ft. Meade, Maryland, 24 May 2010, and the National Security Agency, 26 May 2010.
`In' analytical NoteIntelligence and National Security Vol. 25, No. 6; Dec 2010: p.767 - 777
Journal SourceIntelligence and National Security Vol. 25, No. 6; Dec 2010: p.767 - 777
Key WordsCryptologic History ;  Cold War ;  National Cryptologic Museum ;  National Security Agency


 
 
Media / Other Links  Full Text