1. What's the Use of Cryptologic History?
- Author
-
Budiansky, Stephen
- Subjects
- *
ACCESS to information , *INTELLIGENCE service -- History , *ELECTRONIC intelligence , *SECURITY classification (Government documents) , *SECRECY , *FREEDOM of information , *CRYPTOGRAPHY , *MILITARY historians , *COLD War, 1945-1991 , *GOVERNMENT policy - Abstract
Continued secrecy surrounding signals intelligence during the Cold War has profoundly distorted the historical record, making a full and accurate military, diplomatic, and presidential history of the last half century impossible for now. Not only history, but the ongoing intelligence enterprise itself, would be better served by significantly greater openness. This article is adapted from the Schorreck Memorial Lecture in Cryptologic History, presented by the author at the National Cryptologic Museum, Ft. Meade, Maryland, 24 May 2010, and the National Security Agency, 26 May 2010. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF