1,036
Views
1
CrossRef citations to date
0
Altmetric
Research Article

The impact of ‘Tempest’ on Anglo-American communications security and intelligence, 1943–1970

Bibliography

  • Agee, P. Inside the Company: CIA Diary. Harmondsworth: Penguin, 1975.
  • Aid, M. The Secret Sentry: The Untold History of the National Security Agency. New York: Bloomsbury Press, 2009.
  • Aldrich, R. GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency. London: Harper Press, 2010.
  • Aldrich, R. “Whitehall Wiring: The Communications Electronics Security Group and the Struggle for Secure Speech.” Public Policy and Administration 28, no. 2 (2012): 178–195. doi:10.1177%2F0952076712458111.
  • Anderson, R. Security Engineering: A Guide to Building Dependable Distributed Systems. New York: Wiley Computer Publishing, 2001.
  • Andrew, C., and V. Mitrokhin. The Mitrokhin Archive: The KGB in Europe and the West. London: Allen Lane, 1999.
  • Anonymous. “TEMPEST: A Signal Problem.” Cryptologic Spectrum, 2, no. 3 (1972): 26–30. https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologic-spectrum/tempest.pdf
  • Anonymous. History of the Bureau of Diplomatic Security of the United States Department of State. Washington D.C.: Global Publishing Solutions, 2011.
  • Ashley, R., R. Gehling, and T. Griffin. “Electronic Emissions Security: Danger in the Air.” Information Systems Management 22, no. 4 (2007): 305–310. doi:10.1080/10580530701586011.
  • Bamford, J. Body of Secrets. London: Arrow Books, 2002.
  • Bauer, C. Secret History: The Story of Cryptology. Boca Raton: CRC Press, 2016.
  • Blood, W., ed. The Three Wars of Lt. Gen. George E. Stratemeyer: His Korean War Diary. Washington D. C.: United States Government Printing Office, 1999.
  • Budiansky, S. Code Warriors: NSA’s Codebreakers and the Secret Intelligence War against the Soviet Union. New York: Alfred A. Knopf, 2016.
  • Donahue, T. “Static Magic: The Wonderful World of Tempest.” Cryptolog 10, no. 11 (1983): 1–2. https://www.nsa.gov/Portals/70/documents/news-features/declassified-documents/cryptologs/cryptolog_84.pdf
  • Easter, D. “Soviet Bloc and Western Bugging of Opponents’ Diplomatic Premises during the Early Cold War.” Intelligence and National Security 31, no. 1 (2016): 28–48. doi:10.1080/02684527.2014.926745.
  • Easter, D. “Protecting Secrets: British Diplomatic Cipher Machines in the Early Cold War.” Intelligence and National Security 34, no. 2 (2019): 157–169. doi:10.1080/02684527.2018.1543749.
  • Emelyanov, G., D. Larin, and L. Butyrsky. “The Transformation of Cryptology into a Fundamental Science’ [Prevrashchenie Kriptologii V Fundamentalʹnui͡u Nauku].” BIS Journal 10, no. 3 (2013). https://ib-bank.ru/bisjournal/post/228.
  • Fursenko, A., and T. Naftali. “Soviet Intelligence and the Cuban Missile Crisis.” Intelligence and National Security 13, no. 3 (1998): 64–87. doi:10.1080/02684529808432494.
  • Haseltine, E. The Spy in Moscow Station. London: Icon Books, 2019.
  • Haslam, J. Near and Distant Neighbours. Oxford: Oxford University Press, 2015.
  • Johnson, T. American Cryptology during the Cold War, 1945-1989, Book 1: The Struggle for Centralisation, 1945-1960. Fort Meade: Center for Cryptologic History, NSA, 1995.
  • Kahn, D. The Codebreakers: The Story of Secret Writing. New York: Scribner, 1996.
  • Klein, M. Securing Record Communications: The TSEC/KW-26. Fort Meade: NSA, 2003.
  • Mainwaring, S. “Division D: Operation Rubicon and the CIA’s Secret SIGINT Empire.” Intelligence and National Security 35, no. 5 (2020): 623–640. doi:10.1080/02684527.2020.1774854.
  • Martin, D. Wilderness of Mirrors. New York: Harper & Row, 1980.
  • Murphy, D., S. Kondrashev, and G. Bailey. Battleground Berlin: CIA Vs KGB in the Cold War. New Haven: Yale University Press, 1997.
  • Pröse, M. “Chiffriermaschinen und Entzifferungsgeräte im Zweiten Weltkrieg: Technikgeschichte und informatikhistorische Aspekte.” PhD diss., Leipzig University, 2004.
  • Sheymov, V. Tower of Secrets: A Real Life Spy Thriller. Annapolis: Naval Institute Press, 1993.
  • Stafford, D. Spies Beneath Berlin. London: John Murray, 2013.
  • Stockton, B. Flawed Patriot. Washington D.C.: Potomac Books, 2006.
  • Sweetman, A. “TEMPEST and the Bank of England.” Intelligence and National Security 33, no. 7 (2018): 1084–1091. doi:10.1080/02684527.2018.1499356.
  • Thompson, G. R., and D. Harris. The Signal Corps: The Outcome (Mid-1943 Through 1945). Washington D.C: Center of Military History, United States Army, 1991.
  • van Eck, W. “Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?” Computers and Security 4, no. 4 (1985): 269–286. doi:10.1016/0167-4048(85)90046-X.
  • Vogel, S. Betrayal in Berlin. London: John Murray, 2019.
  • Wright, P. Spycatcher: The Candid Autobiography of a Senior Intelligence Officer. Toronto: Stoddart Publishing, 1987.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.