Book Description
The first scholarly book to present an in-depth exploration of the historical relationships between covert intelligence work and information/computer science. The book first examines the pivotal strides made during World War II to utilize technology in the gathering and dissemination of government/military intelligence. Next, it traces the evolution of the relationship between spymasters, computers, and systems developers through the years of the Cold War-a period notable for the parallel development of high-tech spyware and powerful systems for encoding, decoding, storing, and manipulating intelligence data.