• Complain

Stephen Budiansky - Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union

Here you can read online Stephen Budiansky - Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: Knopf, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union
  • Author:
  • Publisher:
    Knopf
  • Genre:
  • Year:
    2016
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A sweeping, in-depth history of NSA, whose famous cult of silence has left the agency shrouded in mystery for decades
The National Security Agency was born out of the legendary codebreaking programs of World War II that cracked the famed Enigma machine and other German and Japanese codes, thereby turning the tide of Allied victory. In the postwar years, as the United States developed a new enemy in the Soviet Union, our intelligence community found itself targeting not soldiers on the battlefield, but suspected spies, foreign leaders, and even American citizens. Throughout the second half of the twentieth century, NSA played a vital, often fraught and controversial role in the major events of the Cold War, from the Korean War to the Cuban Missile Crisis to Vietnam and beyond.
In Code Warriors, Stephen Budianskya longtime expert in cryptologytells the fascinating story of how NSA came to be, from its roots in World War II through the fall of the Berlin Wall. Along the way, he guides us through the fascinating challenges faced by cryptanalysts, and how they broke some of the most complicated codes of the twentieth century. With access to new documents, Budiansky shows where the agency succeeded and failed during the Cold War, but his account also offers crucial perspective for assessing NSA today in the wake of the Edward Snowden revelations. Budiansky shows how NSAs obsession with recording every bit of data and decoding every signal is far from a new development; throughout its history the depth and breadth of the agencys reach has resulted in both remarkable successes and destructive failures.
Featuring a series of appendixes that explain the technical details of Soviet codes and how they were broken, this is a rich and riveting history of the underbelly of the Cold War, and an essential and timely read for all who seek to understand the origins of the modern NSA.

Stephen Budiansky: author's other books


Who wrote Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union? Find out the surname, the name of the author of the book and a list of all author's works by series.

Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

A LSO BY S TEPHEN B UDIANSKY

Biography Mad Music: Charles Ives, the Nostalgic Rebel

Her Majestys Spymaster

History Blacketts War

Perilous Fight

The Bloody Shirt

Air Power

Battle of Wits

Natural History The Character of Cats

The Truth About Dogs

The Nature of Horses

If a Lion Could Talk

Natures Keepers

The Covenant of the Wild

Fiction Murder, by the Book

For Children The World According to Horses

THIS IS A BORZOI BOOK PUBLISHED BY ALFRED A KNOPF Copyright 2016 by Stephen - photo 1THIS IS A BORZOI BOOK PUBLISHED BY ALFRED A KNOPF Copyright 2016 by Stephen - photo 2

THIS IS A BORZOI BOOK PUBLISHED BY ALFRED A. KNOPF

Copyright 2016 by Stephen Budiansky All rights reserved. Published in the United States by Alfred A. Knopf, a division of Penguin Random House LLC, New York, and distributed in Canada by Random House of Canada, a division of Penguin Random House Canada Limited, Toronto.

www.aaknopf.com

Knopf, Borzoi Books, and the colophon are registered trademarks of Penguin Random House LLC.

Library of Congress Cataloging-in-Publication Data Names: Budiansky, Stephen, author.

Title: Code warriors : NSAs codebreakers and the secret intelligence war against the Soviet Union / by Stephen Budiansky.

Description: New York : Alfred A. Knopf, 2016. | Includes bibliographical references and index.

Identifiers: LCCN 2015045330

| ISBN 978-0-385-35266-6 (hardcover) | ISBN 978-0-385-35267-3 (ebook) Subjects: LCSH: United States. National Security AgencyHistory. |

CryptographyUnited StatesHistory | United StatesForeign relationsSoviet Union. | Soviet UnionForeign relationsUnited States.

Classification: LCC UB256.U6 B83 2016 | DDC 327.7304709/045dc23 LC record available at http://lccn.loc.gov/2015045330.

eBook ISBN9780385352673

Cover image: Russian M-125 Fialka Cipher Machine (detail). Courtesy of Glenn Henry, Glenns Computer Museum.

Cover design by Chip Kidd

Maps by Dave Merrill

v4.1
a

TO DAVID KAHN,

who led the way

C ONTENTS
Arlington Hall, 1943Assembly-line cryptologyGetting everythingThe Soviet one-time-pad systemsFuture of the special relationshipSpying in peacetimeLike a deserted barn
A defector in OttawaReading depthsRussian teleprintersTICOM and the Karrenberg PartyCaviar and LongfellowLow pay and too many military bossesCable intercept and moral murkiness
NKGB messages and Soviet spycraftA Russian genius for conspiracyPlausible deniabilityThe perils of prosecution Soviet rotor machinesWho interprets signals intelligence?
Computers for cryptanalysisERAs Task 13Special-purpose comparatorsAbner, Goldberg, Demon, and SwishBlack Friday, October 1948Russian plaintext on the Plantation
Ferret flightsShootdown in the BalticTraffic analysis and ELINTLooking the other way in KoreaMacArthurs SIGINT blindnessLow-level intercept and the air warThe birth of NSAPhilby, Maclean, and Weisband
Reasonable dictator Ralph J. CanineSquare spies, obtuse securityInquisition by polygraphA Dutch moleIntercept overloadThe move to Fort Meade
Improving on EnigmaTheremins ThingThe Berlin TunnelTEMPESTHungary, Suez, and the chaos of 1956Harvest, Lightning, and IBM hegemonyInformation theory, and the changing of the cryptanalytic old guard
Martin and MitchellGlimmers of accountabilityThe Boris deal and cryptographic innocents abroadSIGINT in spaceCuban Missile CrisisCritics and Bullmeese
Lyndon Johnsons SIGINT fascinationGulf of Tonkin, 1964Learning to fight, againTet and the Ultra Syndrome USS PuebloGrowing spectrum, shrinking resources
SIGINT sclerosisDisreputable if not outright illegalBattle of the bugs, continuedThe Inman era and the last hurrah of the codebreakers, 1979Pelton, Walker, and the year of the spy, 1985
A BBREVIATION
AECAtomic Energy Commission
AFSAArmed Forces Security Agency
ASAArmy Security Agency
ASAPACArmy Security Agency, Pacific
COMINTcommunications intelligence
CSAWCommunications Supplementary Activities, Washington (U.S. Navy)
DFdirection finding
ELINTelectronic intelligence
FISCForeign Intelligence Surveillance Court
GC&CSGovernment Code and Cypher School (UK)
GCHQGovernment Communications Headquarters (UK)
GRUMain Intelligence Directorate (Soviet military intelligence)
HFhigh frequency
HUACHouse Un-American Activities Committee
KGBSoviet Committee of State Security (195491)
MGBSoviet Ministry of State Security (194654; predecessor to KGB)
MI5UK counterintelligence
MVDSoviet Ministry of Internal Affairs (194691)
NKGBPeoples Commissariat for State Security (Soviet foreign security service, 194346; predecessor to MGB and KGB)
NKVDPeoples Commissariat for Internal Affairs (Soviet internal security service, predecessor to MVD; incorporated State Security, 193443)
NSCNational Security Council
NSGNaval Security Group
ONIOffice of Naval Intelligence
Op-20-GOffice of Naval Communications cryptanalytic section
OSSOffice of Strategic Services
PFIABPresidents Foreign Intelligence Advisory Board
RAMrapid analytical machinery
SACStrategic Air Command
SCAMPSpecial Cryptologic Advisory Math Panel
SIGINTsignals intelligence
SISSecret Intelligence Service (UK)
TICOMTarget Intelligence Committee (Allied project to capture German cryptologists and cryptologic material at end of World War II)
USAFSSU.S. Air Force Security Service
USCIBU.S. Communications Intelligence Board
USIBU.S. Intelligence Board
A UTHOR S N OTE

In May 2013, a twenty-nine-year-old computer security expert who had worked for three months as a $200,000-a-year contractor for the National Security Agency in Hawaii told his employer he needed to take a leave of absence for a couple of weeks to receive treatment for the epileptic condition he had recently been diagnosed with. On May 20, Edward J. Snowden boarded a flight to Hong Kong, carrying with him computer drives to which he had surreptitiously copied thousands of classified intelligence documents. Their contents, revealing copious details about NSAs domestic surveillance of telephone and e-mail communications, would begin appearing two weeks later in a series of sensational articles in the Guardian and the Washington Post.

It was a move he had been secretly preparing for some time, having secured the job with the specific aim of gaining access to classified NSA material. (He was ultimately able to do so only by duping more than twenty coworkers into giving him their computer passwords, which he said he needed for his duties as a systems administrator; most of the colleagues whom he betrayed were subsequently fired.) Snowden would later explain that he chose Hong Kong as his place of intended sanctuary because they have a spirited commitment to free speech and the right of political dissentan assertion that would have come as a surprise to members of the citys pro-democracy movement, whose peaceful mass protests the following year would be efficiently crushed by the Hong Kong authorities at the behest of their Chinese Communist Party masters in Beijing.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union»

Look at similar books to Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union»

Discussion, reviews of the book Code Warriors: NSA’s Codebreakers and the Secret Intelligence War Against the Soviet Union and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.