U.S. Naval Cryptologic Veterans Association

Get Adobe Reader

Cryptology in History

These files relate to the history of cryptology in our nation’s history.

Traffic Analysis from Word War I through Vietnam
(500 Downloads)

This brochure — prepared by the National Security Agency, Center for Cryptologic History — defines and explains traffic analysis when used in this context, as part of the broader discipline of signals intelligence. It describes the elements of traffic analysis and explains how traffic analysis has been used to produce intelligence information, to aid cryptanalysis, and to support the collection of additional data. It presents examples of intelligence contributions made by traffic analysis during World War I, World War II, and the Cold War through the Vietnam War.

04-13-2016 Download ( pdf, 2.25 MB )
Station CAST - Tip of the Lance
(401 Downloads)

This article, authored by Timothy J. Mucklow and published online by the Society for History in the Federal Government, describes the politics and engineering behind the establishment of Station CAST on Corregidor Island — a project that began in 1934 with a proposal by then-LT Joseph Wenger and ended in 1940 when U.S. Navy cryptologic personnel began operations in the Navy Tunnel at Monkey Point.

04-13-2016 Download ( pdf, 374.09 KB )
Silent Warriors - The U.S. Naval Security Group Reserve, 1945 - 2005
(435 Downloads)

This booklet, produced by the Center for Cryptologic History at the National Security Agency, describes the establishment and history of the U.S. Naval Reserve Security Group (U.S. Navy Security Group Reserve) from 1945 through 2005.

04-13-2016 Download ( pdf, 418.47 KB )
Journey to a Far Sea
(393 Downloads)

This article, authored by CAPT William D. O’Neil (USNR) and published by the U.S. Naval Institute Proceedings in February 1982, describes the unclassified operation of a U.S. Navy ship, the USS FAIRFAX COUNTY (LST 1193), in the Barents Sea in the spring of 1981.

04-13-2016 Download ( pdf, 1.85 MB )

Naval Security Group Command  Cryptology - Information WarfareCenter for Information Dominance