Hatch David A. "Enigma and Purple: How the Allies Broke German and Japanese Codes During the War." In Coding Theory and Cryptography: From Enigma and Geheimschreiber to Quantum Theory, ed. David Joyner, 53-61. New York: Springer, 2000.
Hatch David A. "From the Archives: Friedman Takes the Stand." Cryptologia 32, no. 2 (Apr. 2008): 180-183.
Abstract: "William F. Friedman's first public appearance as a cryptologist was short, with the start of testimony at a trial of wartime German and Indian conspirators. The article quotes the short testimony verbatim and provides some commentary on it."
Hatch, David A. "The Punitive Expedition: Military Reform and Communications Intelligence." Cryptologia 31, no. 1 (Jan. 2007): 38-45.
When Gen. John J. Pershing went into Mexico after Pancho Villa in March 1916, his expeditionary force included radio-equipped trucks to provide communications with Fort Sam Houston. By June 1916, at least one truck was being used to intercept "Mexican official radio broadcasts." A year after the U.S. force left Mexico in January 1917, the Army established 14 intercept stations along the border with Mexico. These units were demobilized in August 1919.
Hatch, David A. "VENONA: An Overview." American Intelligence Journal 17, no. 1/2 (1996): 71-77.
This is an excellent overview of the Venona project, in terms of the nature of the activity and what was obtained from it and what was not. The author includes a brief but lucid section on the relation of the materials to the Rosenberg espionage case. For individuals coming to a discussion of the Venona decrypts without some background in the project, this is a good place to start.
[SpyCases/U.S./Rosenbergs & Venona][c]
Hatch, David A., with Robert Louis Benson. The Korean War: The SIGINT Background. Ft. George G. Meade, MD: National Security Agency, Center for Cryptologic History, 2000. [http://www.nsa.gov]
From the "Introduction": "This short summary of the cryptologic background to the Korean War is intended to provide only a general overview of the conflict from a cryptologic perspective and give initial answers to some of the more important questions about intelligence support. This paper has been cobbled together from summaries prepared during or immediately after the period of hostilities, some original documents, and the memories of some of the participants." See also, Laura Sullivan, "Spy's Role Linked to U.S. Failure on Korea: NSA Report Shows Why 1950 Invasion Came as Surprise," Baltimore Sun, 29 Jun. 2000.
Return to Hat-Hav