• Cover Image

A History of U. S. Communications Security (Volumes I and Ii);1973

By: David G. Boak

... Description of document: A History of U.S. Communications Security (Volumes I and II); ... ...: 23-December-2007 Released date: 10-December-2008 Posted date: 24-December-2008 Source of document: National Security Agency Attn: FOIA/PA ... ...Ft. George G. Meade, MD 20755-6248 Phone: (301)-688-6527 Fax: (443)-479-3612 Note: The meat of the material left after redaction starts at (PDF) ... ...of them. Let's look at a couple of codes: 1. The simplest kind, called a "one-part code", simply lists the plaintext meanings alphabeti­ cally (so tha... ...velop some interim suppreBlicm measures for their product liDes, and the Committee published two lists: one contaiDing equipments which were for· bidd... ...in land, sea, and air letivity. Ground attacks at dawn were the rule not the exccption; bospitaJ ships were pre-positioned oft' amphibious landilll ar... ...ination between launch and recovery assets, including the plannina messaae excbanaed. The mother ships staged out of Bien 80a in the southern part of ... ...ed, and reassessed tbe problem. This time they concluded that the unique caD siBns of the Motber Ships were being exploited. The call sigas were chang... ...h and breadth of South Vietnam were many cryptoppbica1ly unique NESTOR nets (i.e., different key lists) to comply with doctrioa1 rules Iimitiq net siz...

...This publication consists of a series of lectures prepared and given to interns and other employees by Mr. David G. Boak in 1966. Mr. Boak is uniquely qualified to discuss the history of the US COM_SEC because he has participated significantly in most...

Read More