National Cryptologic Museum
   HOME

TheInfoList



OR:

The National Cryptologic Museum (NCM) is an American museum of cryptologic history that is affiliated with the
National Security Agency The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA). The first public museum in the U.S. Intelligence Community, NCM is located in the former Colony Seven Motel, just two blocks from the NSA headquarters at Fort George G. Meade in
Maryland Maryland ( ) is a U.S. state, state in the Mid-Atlantic (United States), Mid-Atlantic region of the United States. It borders the states of Virginia to its south, West Virginia to its west, Pennsylvania to its north, and Delaware to its east ...
. The motel was purchased, creating a buffer zone between the high security main buildings of the NSA and an adjacent highway. The museum opened to the public on December 16, 1993, and now hosts about 50,000 visitors annually from all over the world. The NCM is open Tuesday through Saturday, 10am–4pm. It is closed on Sundays and all federal holidays, and operates on NSA's emergency/weather closure schedule (i.e. if NSA is closed, the museum is closed as well). The NCM includes a gift store whose operational hours coordinate with the museum's operational schedule (i.e., if the museum is closed altogether, opens late, or closes early, the gift shop does likewise) and an unclassified library with weekday-only operating hours that also represent the museum's weekday operational schedule. The library includes over a dozen boxes of the files of Herbert Yardley, declassified Enigma messages, technical reports, and books including how to crack the
Data Encryption Standard The Data Encryption Standard (DES ) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryp ...
using Deep Crack. The National Vigilance Park (NVP) was next to the museum, where three reconnaissance aircraft were displayed. A U.S. Army Beechcraft RU-8D Seminole reconnaissance plane represents the Army Airborne
Signals Intelligence Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly u ...
contribution in the
Vietnam War The Vietnam War (1 November 1955 – 30 April 1975) was an armed conflict in Vietnam, Laos, and Cambodia fought between North Vietnam (Democratic Republic of Vietnam) and South Vietnam (Republic of Vietnam) and their allies. North Vietnam w ...
. A
Lockheed C-130 Hercules The Lockheed C-130 Hercules is an American four-engine turboprop military transport aircraft designed and built by Lockheed Corporation, Lockheed (now Lockheed Martin). Capable of using unprepared runways for takeoffs and landings, the C-130 w ...
transport, modified to look like a reconnaissance-configured C-130A, memorialized a U.S. Air Force aircraft shot down over Soviet
Armenia Armenia, officially the Republic of Armenia, is a landlocked country in the Armenian Highlands of West Asia. It is a part of the Caucasus region and is bordered by Turkey to the west, Georgia (country), Georgia to the north and Azerbaijan to ...
during the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
. Finally, the park also contained a U.S. Navy Douglas EA-3B Skywarrior, commemorating a mission in the
Mediterranean The Mediterranean Sea ( ) is a sea connected to the Atlantic Ocean, surrounded by the Mediterranean basin and almost completely enclosed by land: on the east by the Levant in West Asia, on the north by Anatolia in West Asia and Southern ...
on January 25, 1987, in which all seven crew members died. The NCM is open to the public, and admission is free. Donations to the NCM Foundation are accepted. Photography is allowed inside the museum but flash photography is prohibited due to the age of some of the artifacts. The museum temporarily closed in 2020 due to the
COVID-19 pandemic The COVID-19 pandemic (also known as the coronavirus pandemic and COVID pandemic), caused by severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2), began with an disease outbreak, outbreak of COVID-19 in Wuhan, China, in December ...
. Later in 2020, new museum director Vince Houghton used the opportunity to have the museum renovated. It reopened on October 8, 2022.


Collections

The NCM collection contains thousands of artifacts, including numerous working
World War II World War II or the Second World War (1 September 1939 – 2 September 1945) was a World war, global conflict between two coalitions: the Allies of World War II, Allies and the Axis powers. World War II by country, Nearly all of the wo ...
German
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
s (two of them are available for visitors to try out), and a Navy Bombe used to break it. Displays discuss the history of American cryptology and the
people The term "the people" refers to the public or Common people, common mass of people of a polity. As such it is a concept of human rights law, international law as well as constitutional law, particularly used for claims of popular sovereignty. I ...
,
machines A machine is a physical system that uses power to apply forces and control movement to perform an action. The term is commonly applied to artificial devices, such as those employing engines or motors, but also to natural biological macromolec ...
, techniques, and locations concerned. Initially housing NSA artifacts for viewing by employees, the museum quickly developed into a collection of U.S. cryptologic history, with some artifacts dating back to pre-
American Revolutionary War The American Revolutionary War (April 19, 1775 – September 3, 1783), also known as the Revolutionary War or American War of Independence, was the armed conflict that comprised the final eight years of the broader American Revolution, in which Am ...
times. In addition to exhibits covering equipment used to encrypt, decrypt, and secure information, the museum features exhibits on the people who contributed to cryptography in America, such as
George Washington George Washington (, 1799) was a Founding Fathers of the United States, Founding Father and the first president of the United States, serving from 1789 to 1797. As commander of the Continental Army, Washington led Patriot (American Revoluti ...
(who integrated military intelligence tactics, including coded messaging, into the Continental Army during the Revolutionary War), the Native American code talkers (who protected U.S. communications during both World Wars by using their native languages to encode message traffic), and the Navy WAVES (who, like the WRENS of the British Royal Navy, operated the
Bombe The bombe () was an Electromechanics, electro-mechanical device used by British cryptologists to help decipher German Enigma machine, Enigma-machine-encrypted secret messages during World War II. The United States Navy, US Navy and United Sta ...
to decrypt German military traffic during WWII). Collections are divided into four major groupings: * Early Cryptology, which deals with cryptologic history prior to the formation of NSA, with exhibits dating back to the 16th century (the Renaissance-era book ''Polygraphiae'') forward to the early 1950s, focusing on artifacts from the
Founding Fathers of the United States The Founding Fathers of the United States, often simply referred to as the Founding Fathers or the Founders, were a group of late-18th-century American Revolution, American revolutionary leaders who United Colonies, united the Thirteen Colon ...
, the
American Civil War The American Civil War (April 12, 1861May 26, 1865; also known by Names of the American Civil War, other names) was a civil war in the United States between the Union (American Civil War), Union ("the North") and the Confederate States of A ...
, the
United States Army The United States Army (USA) is the primary Land warfare, land service branch of the United States Department of Defense. It is designated as the Army of the United States in the United States Constitution.Article II, section 2, clause 1 of th ...
Code talkers,
World War I World War I or the First World War (28 July 1914 – 11 November 1918), also known as the Great War, was a World war, global conflict between two coalitions: the Allies of World War I, Allies (or Entente) and the Central Powers. Fighting to ...
, and World War II. * Cold War/Information Age, which deals with cryptology and
cryptanalysis Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
on both sides of the
Cold War The Cold War was a period of global Geopolitics, geopolitical rivalry between the United States (US) and the Soviet Union (USSR) and their respective allies, the capitalist Western Bloc and communist Eastern Bloc, which lasted from 1947 unt ...
, the early years of NSA, and the rise of the modern age of computers, including the development of
supercomputer A supercomputer is a type of computer with a high level of performance as compared to a general-purpose computer. The performance of a supercomputer is commonly measured in floating-point operations per second (FLOPS) instead of million instruc ...
s * Information Assurance, which deals with the rise of
satellite A satellite or an artificial satellite is an object, typically a spacecraft, placed into orbit around a celestial body. They have a variety of uses, including communication relay, weather forecasting, navigation ( GPS), broadcasting, scient ...
technology, secure voice communications,
tamper-evident Tamper-evident describes a device or process that makes unauthorized access to the protected object easily detected. Seals, markings, or other techniques may be tamper indicating. Tampering Tampering involves the deliberate altering or adulterat ...
technologies, nuclear command and control, and cyberdefense. * Memorial Hall, one side of which features the NSA Hall of Honor, and the other side of which features exhibits honoring those who lost their lives in cryptologic missions represented by the aircraft at NVP as well as others who lost their lives in cryptologic service to America ( USS ''Pueblo'', USS ''Liberty'', and a replica of NSA's National Cryptologic Memorial) In addition, there are galleries throughout NCM focusing on the roles of women and African-Americans in cryptologic history, and the variety of languages in use throughout the world. The NCM includes an unclassified library of books, papers, and other materials relating to the history of cryptography and cryptology as well. The library is open on days when the museum is open. The library is non-circulating (that is, material cannot be borrowed or checked out by the public), but photocopying and photography are allowed. Patrons needing extensive or rare materials for research are encouraged to contact the museum to schedule an appointment with the librarian. The size of NCM's library nearly doubled with the donation of an extensive collection of papers, books, and other artifacts related to codes and ciphers from cryptologic historian and author David Kahn. The donation was formally dedicated by the NCM during a recognition ceremony for Dr. Kahn on October 26, 2010.


Activities

The museum offers tours for members of the public, both scheduled and walk-in, that describe cryptology's impact on history and jobs in the field. Tours are led by docents who are retired NSA employees. Groups of six persons or more are requested to contact the museum in advance to schedule tours and ensure docent availability. In addition, the NCM offers educational field trips, tours, talks, and interactive programs for students aged from 9, as well as programs for Boy Scouts and Girl Scouts of all ages to satisfy various pins, requirements, and electives. Interested educators, scoutmasters, and troop leaders are encouraged to contact the museum for more details. The NCM was the site of the 2010 activation ceremony for Marine Corps Forces, Cyberspace Command. The ceremony was attended by former CMC General Alfred M. Gray, Jr.


NSA Hall of Honor

The NSA Hall of Honor is a memorial honoring individuals with distinguished service to American cryptology. Created in 1999, the standards are high for induction; honored individuals were innovators over their entire careers, whose expertise in various NSA subject matters far surpassed any of their peers, or who made major contributions to the structure and processes of American cryptology.Photo gallery of NSA Hall of Honor
.


Photo gallery

File:Kriegsmarine_Enigma.png, Four-rotor
Kriegsmarine The (, ) was the navy of Nazi Germany from 1935 to 1945. It superseded the Imperial German Navy of the German Empire (1871–1918) and the inter-war (1919–1935) of the Weimar Republic. The was one of three official military branch, branche ...
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
File:US-bombe.jpg, US Navy Bombe used to decrypt the German
Enigma machine The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication. It was employed extensively by Nazi Germany during World War II, in all branches of the W ...
File:STU-I.jpg, STU-I secure telephone desk set (electronics were housed in a separate cabinet) File:Ky-3.jpg, KY-3 secure telephone system File:Navajo-I.jpg, Navajo I secure telephone File:STU-II.jpg, STU-II secure telephone desk set (electronics were housed in a separate cabinet) File:STU-IIcabinet.a.jpg, STU-II electronic equipment cabinet File:STU-IIIphones.nsa.jpg, STU-III secure telephone desk set File:Cray YMP M90 Ziegler 3.jpg, Cray Y-MP Ziegler NSA Supercomputer (1993)


See also

* Arlington Hall *
Bletchley Park Bletchley Park is an English country house and Bletchley Park estate, estate in Bletchley, Milton Keynes (Buckinghamshire), that became the principal centre of Allies of World War II, Allied World War II cryptography, code-breaking during the S ...
* CIA Museum * International Spy Museum * H. Keith Melton *
Moscow–Washington hotline The Moscow–Washington hotline (formally known in the United States as the Washington–Moscow Direct Communications Link; ) is a system that allows direct communication between the leaders of the United States and the Russia, Russian Federation ...


References


Notes

* Jack E. Ingram, "Ensuring the Legacy: The Story of the National Cryptologic Museum"
''Studies in Intelligence'', 47(3), 2003
* Jack E. Ingram, "The National Cryptologic Museum: The First Ten Years – A Personal Story", ''Intelligencer'' 14(1) (Winter/Spring 2004), pp. 101–10. * Louis Kruh, "A Pictorial Tour of the National Cryptologic Museum", 18(4), October 1994, pp. 381–89. doi:10.1080/0161-119491882955


External links


National Cryptologic Museum

The National Cryptologic Museum Foundation

Rosetta Stone Replicas
provider of the Rosetta Stone replica at NCM


A set of photos of the museum
by Austin Mills
A set of photos of NCM and NVP
by Mike Newton

By Rick Unland
C-SPAN American History TV tour of the National Cryptologic Museum
{{Authority control Cryptography organizations National Security Agency Telecommunications museums in the United States Science museums in Maryland Museums in Anne Arundel County, Maryland Military and war museums in Maryland Museums established in 1993 1993 establishments in Maryland Espionage museums