• EDUCATE
    EDUCATE

    ...our citizens to be cyber smart, and develop pathways for the future cyber workforce.

  • ENGAGE
    ENGAGE

    ...and convene partners to address emerging cyber and cryptologic issues.

  • COMMEMORATE
    COMMEMORATE

    ...our cryptologic history & those who served within the cryptologic community.

THE NCF VISION

Advance the nation’s interest in cyber and cryptology through leadership, education, and partnerships.

UPCOMING EVENTS

*** Remember to check out our "On This Date in History" calendar. See link below.

Saturday, May 4, 2024
8:30 am2:00 pm
TAC's TheLink, 7000 Columbia Gateway
Suite 150
Columbia, AL 21046
US

Wednesday, May 15, 2024
5:45 pm8:30 pm
Hyatt Place Ellipse Rooftop Bar
1522 K St NW
Washington, DC 20005
US

"The New York Times" Review of the National Cryptologic Museum

Security Secrets, Dated but Real
National Cryptologic Museum Is the N.S.A.’s Public Face

By EDWARD ROTHSTEIN - "The New York Times"
AUG. 1, 2014
Photos by Matt Roth for "The New York Times"
Read the FULL ARTICLE & SEE ADDITIONAL PHOTOS on "The New York Times" Web site.

ANNAPOLIS JUNCTION, Md. — Was the National Cryptologic Museum designed using a code of some kind? Something perhaps meant, cryptically, to mask its character and significance? Something that can be deciphered only by those familiar with mysterious organizations like the Black Chamber?

This is, after all, a museum created and run by the National Security Agency, a peculiar governmental body: Its existence was once scarcely acknowledged; its 1952 founding documents were once completely classified; and its finances were once buried deep in a “black budget.” But with Edward J. Snowden’s release of stolen classified files, along with reportorial histories by James Bamford, the N.S.A. is now partly revealed; it is popularly portrayed as an agency unhampered by oversight, secretly probing every aspect of our data-saturated lives.

Yet here, just down the road from that agency’s black-box buildings with their thousands of workers and immense parking lots, we come upon this quaint, slightly old-fashioned, flat-topped structure that looks like a converted motel, which it is.

And when you enter, instead of facing evidence of untrammeled technological power, you are greeted with a rack of informative booklets and children’s activity sheets, almost as if invoking tourist brochures from the building’s previous incarnation.

The quaintness continues: The first exhibit, about “hobo communication,” is a model-train-size diorama of a small New England town.

Is “hobo” perhaps the code word for a data-mining project that tracks smartphones? Does it refer to a cipher machine like Enigma? No, it means what it says: When hobos used the rails to travel the country, they would scrawl warning signs to fellow travelers on walls and walkways. A jagged line meant “barking dog here”; a circle with an X inside meant “good place for a handout.” Hobo code. We press buttons and see lights go on where the signs appear.

Maybe there really is a bit of agency coding involved, too. Just as when it opened in 1993, this museum is the agency’s only public face, so the hobo exhibit may be meant, in part, to disguise or humanize the caricature. It also sets the tone for the museum, which is stylistically dated, slightly ramshackle and cramped. But it is also thoroughly engrossing, offering a compelling survey of American cryptography.

It is redacted, of course, and its content deliberately dated. You never get close to anything redolent of classified technologies or Snowden-esque controversies. And you never quite shake the feeling that maybe if you touched a wall sconce, the cabinets would pull back, revealing a cyberwarfare lab.

But such fantasies quickly fade, because the material here spurs the imagination in so many other directions. These artifacts are as various and seemingly miscellaneous as the markings on an encoded document. Here, in 13,000 square feet, is a 16th-century copy of the first published book on cryptology, Johannes Trithemius’s “Polygraphiae,” along with a cipher disc used by the Confederacy during the Civil War; children’s school notebooks used by the Vietcong to cloak intelligence on fighting forces; and a heliograph, whose maneuverable mirrors were used in the First World War to flash sunbeams in Morse Code patterns.

There is a portion of the United States Navy Bombe, built by the National Cash Register Company in Dayton, Ohio, in 1943: an early mechanical computer, whose tangle of wires and whirring gears were used to break the German code. There are also, remarkably, two working German Enigma machines, whose intricacies led a generation of Polish, British and American code breakers into intricate explorations, with thousands of lives at stake. You can type on them now and watch the keys light up in a code once thought unbreakable.

The museum’s curator, Patrick D. Weadon, noted in a conversation that the museum’s unspecified budget was modest. You feel that, too. Acquisitions, donations and expanding ambitions have led to recently added displays about the Civil and Revolutionary Wars. But over all, the tight space jumbles the dense narrative so you have to unspool it as you maneuver.

Yet it works. The museum’s old-fashioned wall-panel style is suited to its theme. Here we see cryptology as a craft, dependent as much on insight as on technology. “They served in silence” reads one memorial to fallen agency employees, but in a series of displays, some silence falls away — at least for the retired or deceased. We see portraits of brilliant linguists who could learn languages in a weekend, along with images of female and African-American analysts whose genius also allowed them to break constraining social codes.

The historical examples of cryptologic invention are remarkable: During the Revolutionary War, a letter sent by the British general Sir Henry Clinton seemed to be supporting a particular military maneuver, unless you placed an hour-glass-shaped cutout, whose use was prearranged, over the page: The message showing through means just the opposite. Activities for children invite similar exercises, but this is no game. The pivotal 1942 Battle of Midway might have been lost if the United States hadn’t begun to break Japan’s code; the war in the Pacific could well have ended in American surrender.

There is recurring emphasis here, too, on language. We begin to understand coding as an unusual form of translation: It turns sense (the message) into non-sense (the code). The job of decryption is much harder: to discern pattern in the midst of noise, meaning in seeming chaos.

As we approach the present, those tasks become more and more daunting, keeping pace with the technology. We see sections of a supercomputer that was installed at the N.S.A. in 1993: the Ziegler, from Cray Research. It was, we read, “among the most powerful supercomputers in the world.” The piece on display weighs 7,495 pounds. It required a 60-ton refrigeration unit. And how powerful was it? Its processor speed is now dwarfed by a smartphone’s. It had just 32 gigabytes of memory, and its disk storage was 142 gigabytes. I’ll stick with my laptop.

What happens to cryptology during 20 years of such transformation? In a gallery devoted to the evolution of intelligence satellites and secure communications, we see the changes in hardware, but it is the processing that becomes extraordinary. And that we can’t see (or are not cleared to).

Still, we know enough to imagine what is happening. Contemporary cryptology leaves General Clinton’s cutout and the Enigma’s turning discs far behind. A particular message may not even be the point any longer. The larger challenge is to identify that transmission amid noisy background chatter. And more important than any single message may be the patterns and anomalies discerned as vast quantities of data are churned. A secret in this world might be best preserved by seeming not to be a secret at all.

That’s the comfort I take in recent revelations about the N.S.A.’s engorgement on communications data. It may not care much about the isolated case — the individual, say, worried about privacy. The problem is that the quantities of data are so great that anomalies are almost certain. Something may seem to have coded significance when it does not. And that would sweep even the innocent into a cryptographic world determined to discern meaning, even if, on occasion, there is none.

Follow Edward Rothstein on Twitter; twitter.com/EdRothstein.

Return to HOME PAGE.
To go to the Cryptologic Bytes archives page to see more articles such as this one, please click below on the "Return to List" link.

THIS MONTH on the

On This Day In History

Calendar

  • Station HYPO Intercepts Revealed Japanese Plans for Attack

About Us

The NCF's Vision is to strengthen trust in the digital ecosystem.

The NCF Mission: Advance the nation’s interest in cyber and cryptology as we:

Educate citizens to be cyber smart individuals, 

Develop pathways for the future cyber and cryptologic workforce, 

Engage and convene partners to address emerging cyber and cryptologic issues and, 

Commemorate our cryptologic history and those who served. 

The Foundation provides exceptional cryptologic programs, encourages young minds to learn about cryptology and to explore cyber-related career opportunities, hosts educational, cryptology-related exhibits at various community events, and honors the people— past and present—whose contributions to our national security protect and make possible our way of life.

The NCF also provides needed support to the National Cryptologic Museum (NCM), the first public museum in the U.S. Intelligence Community. Located adjacent to the National Security Agency (NSA) in Maryland, the NCM houses a unique and priceless collection of artifacts that represent our Nation's history in code making and code breaking, as well as a world class library of cryptologic media. The NCF has acquired rare and invaluable artifacts for the Museum and helps to support new educational and interactive exhibits.

The NCF is a 501(c)(3) organization.

Learn more about our MISSION, VISION, and VALUES.