0% found this document useful (0 votes)
113 views3 pages

NSA Codebreakers and Cold War Insights

This book review summarizes a book titled "Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union". The review notes that the book provides extensive detail on codes, ciphers and the geopolitical contexts of the Soviet Union, Vietnam, and North and South Korea. However, the review criticizes the book for making misleading claims about the objectives and operations of the National Security Agency that are inconsistent with information available only to those with high-level security clearances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
113 views3 pages

NSA Codebreakers and Cold War Insights

This book review summarizes a book titled "Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the Soviet Union". The review notes that the book provides extensive detail on codes, ciphers and the geopolitical contexts of the Soviet Union, Vietnam, and North and South Korea. However, the review criticizes the book for making misleading claims about the objectives and operations of the National Security Agency that are inconsistent with information available only to those with high-level security clearances.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Journal of Strategic Security

Volume 10 | Number 3 Article 7

Code Warriors: NSA's Codebreakers and


the Secret Intelligence War Against the
Soviet Union. By Stephen Budiansky.
New York, NY. Borzoi Book, Published
by Alfred A. Knopf, Penguin Random
House, New York, 2016.
Ed Urie
Henley-Putnam University

Follow this and additional works at: http://scholarcommons.usf.edu/jss


pp. 94-95

Recommended Citation
Urie, Ed. "Code Warriors: NSA's Codebreakers and the Secret Intelligence War Against the
Soviet Union. By Stephen Budiansky. New York, NY. Borzoi Book, Published by Alfred A.
Knopf, Penguin Random House, New York, 2016.." Journal of Strategic Security 10, no. 3
(2017): : 94-95.
DOI: http://doi.org/10.5038/1944-0472.10.3.1641
Available at: http://scholarcommons.usf.edu/jss/vol10/iss3/7

This Book Review is brought to you for free and open access by the Journals at Scholar Commons. It has been accepted for inclusion in
Journal of Strategic Security by an authorized editor of Scholar Commons. For more information, please contact [email protected].
Urie: Book Review: Code Warriors

Code Warriors: NSA's Codebreakers and the Secret Intelligence


War Against the Soviet Union. By Stephen Budiansky. New
York, NY. Borzoi Book, Published by Alfred A. Knopf, Penguin
Random House, New York, 2016. ISBN 978-0--385-35266-
6. Pictures. Graphs. Notes. Appendices. Index. Sources Cited.
Pp. xix, 310. $30.00.

By its title, and especially its subtitle, one would expect this book to be
primarily about the National Security Agency, an in-depth history of this
major element of the US Defense Department and
Intelligence Community. In fact, the largest portions of the book, and
possibly the most interesting, provide detailed information about codes and
ciphers, which might be expected, and the many factors, histories, and
environments of the Soviet Union, Russia, Vietnam, and both North and
South Korea during critical historic periods.

The focus on codes and ciphers, both in the text and in the series of
appendices, is detailed and extensive. These portions provide everything
from the basic to the most complex analyses of code and cipher technology,
ranging from the reasonably simple to the ultimate in complexity. Some of
the processes described are of the type that would make a reader want to
encrypt any personal financial or other sensitive documents using a described
process. Others are so complex that one would expect to have advanced
degrees in mathematics and extensive experience in alphabetic manipulation
to understand. In either case these descriptions clearly show the potential
effectiveness and complexity of the use of codes and ciphers to protect
information, as well as their potential weaknesses and vulnerabilities.

The discussions about various geographic areas, nations, and


political motivations are wide-ranging, clear, and perceptive. The
perspectives of Marxist-Leninist ideologies are clearly and pointedly,
described. The information about the order from the 1948 Soviet military
administration in Germany that effectively established the wall between East
and West Berlin is extremely interesting. The map and information about the
flight path of the US Navy PB4Y-2 electronic surveillance plane shot down by
the Soviets off the coast of Latvia on April 8, 1950, is especially interesting to
those concerned with military events. The author also provides a discussion
of events that followed the end of World War II resulting in the Korean
peninsula’s division into North and South Korea, and which ultimately led to
our involvement in the Korean War. Also discussed in good detail are the
events leading to and during the Vietnam conflict.

94

Produced by The Berkeley Electronic Press, 2017


Journal of Strategic Security, Vol. 10, No. 3

The author's somewhat detailed review of the emergence of the National


Security Agency following code and cipher activities of the World Wars is very
attention grabbing, although somewhat misleading. This discussion, and that
of NSA in the present time, is clearly based on unclassified, declassified, and
open source materials, to which there are frequent and numerous references
throughout the text. Most likely the author has never held the high security
clearances that would be needed to fully understand the NSA mission,
operations, failures, and successes, as he repeatedly makes somewhat false or
misleading comments about the objectives and the intentions of NSA
operations and people. For example, the author claims that at one period
many operations personnel were so disturbed by agency activities that they
moved from operations to the personnel organization. According to reliable,
fully cleared individuals, this simply did not happen. Such incorrect
statements are only representative of an obviously negative view of the
National Security Agency apparently inspired by lack of real information on
that subject that pervades the book. What is lost is the recognition that
keeping sensitive information from the public is a necessity in order
to prevent exposure of that information to our enemies.

In short, the book is both interesting and informative in the presentations


about codes, ciphers, and national political motivations in
history. Regarding the inherent nature of the National Security Agency,
though, it is totally incorrect and misleading.

Ed Urie, Henley-Putnam University

95

http://scholarcommons.usf.edu/jss/vol10/iss3/7
DOI: http://doi.org/10.5038/1944-0472.10.3.1641

You might also like