From time-to-time, the team at Station HYPO will author a blog series. Each series chronicles the ways in which Navy Cryptology played a crucial role in a time of conflict in our Nation’s history. Please find below a list of series themes and links to blog entries related to each.
The Vindication of Right: Battlespace Awareness in the Cuban Missile Crisis
A series of short vignettes and historical documents related to the signals intelligence and cryptologic efforts which provided Commanders with time-critical battle-space awareness — contributing significantly to the de-escalation of one of the potentially most dangerous stand-offs in history.
Information in Warfare: The Battle of the Atlantic
In warfare, military commanders determine what information they know, what they don’t know, what intelligence they have to fill the gaps, and then decide on a course of action accordingly. Armed with information, leadership at all levels is better poised to make informed decisions necessary to wage an effective campaign.
The Corregidor Series
This series chronicles the establishment of Station C on Corregidor, the intercept operators who were stationed in the tunnel, and subsequent evacuation of COMINT personnel.
Path to Midway
The Battle of Midway is one of the most significant historical events for the Cryptologic Warfare community and the Navy as a whole. The Path to Midway explores (1) the months prior to America’s entry into WWII as seen from within the walls of Station HYPO, (2) the December 7, 1941 Japanese attack on U.S. forces in Pearl Harbor, (3) Station HYPO’s subsequent tracking of the Imperial Japanese Navy, (4) the Battle of the Coral Sea, and (5) the Battle of Midway. This series memorializes and celebrates the remarkable efforts of CDR Joe Rochefort and his exceptional team of cryptologists in one of America’s most crucial battles.
Celebrating the WAVES
In this three-part series we chronical the Women Accepted for Volunteer Emergency Service (WAVES). Our first post discusses who the WAVES are, where they tranined, etc. We then discuss key contributions made by WAVES to Naval Communications during World War II. Finally, we conclude the series with a discussion on how the WAVES worked to recover the keys used by the German ENIGMA cipher machines.