Schorreck Memorial Lecture Series
The Schorreck Memorial Lecture Series is an annual program featuring historical lectures named in honor of the former NSA Historian Henry F. Schorreck who passed away in June 2004. The Series is sponsored by the Center for Cryptologic History (CCH) with support from the NCMF. The lectures included in the series are presented by preeminent scholars who address cryptologic issues with an historical perspective. Previous talks have been delivered by scholars in the field such as David Kahn, Christopher Andrew, John Ferris, and Stephen Budiansky. These talks are held in the Magic Room of the National Cryptologic Museum and are free and open to the public.
Upcoming Program - Spring 2017
THE 2016 SCHORRECK LECTURE SPEAKER SERIES took place Monday, 20 June 2016 from 0930 to 1100 at the National Cryptologic Museum.
The Lecture....Crime and Cryptology...featured History and highlights of the FBI‘s Cryptanalysis and Racketeering Records Unit, and was presented by Daniel Olson, Unit Chief, Cryptanalysis and Racketeering Records Unit, FBI Laboratory, Quantico, Virginia.
Over the past 75 years the codebreakers of the FBI Laboratory have been engaged in a high stakes battle of wits against spies, terrorists, violent criminals, gangs, and criminal syndicates. This presentation will provide a brief overview of the history, milestones, successes and failures of the FBI’s Cryptanalysis and Racketeering Records Unit. Highlights will include both solved and unsolved ciphers from notorious criminals such as the Zodiac killer of the 1960s, the BTK (Bind, Torture, Kill) serial killer Dennis Raeder, and the enciphered journal of Ted Kaczynski, the infamous UNABOMBER.
Daniel Olson is the Unit Chief of the Federal Bureau of Investigation’s Cryptanalysis & Racketeering Records Unit at the FBI Laboratory in Quantico, Virginia. From 1988 to 1997 Dan served as an intelligence analyst and cryptanalyst in the United States Army and was assigned to an electronic warfare company in Saudi Arabia and Iraq during operation Desert Shield/Storm 1990-91. From 1993 to 1997 he provided intelligence support to the Drug Enforcement Administration. In 1997 Dan transferred to the FBI as a cryptanalyst. Since that time he has been involved in the decryption of criminal codes and ciphers involving domestic and international terrorists, violent criminals, drug traffickers, street and prison gangs, and organized crime. He has been recognized as an expert in cryptology in federal and state courts throughout the United States and has been featured on the History Channel, Court TV, CNN, and NBC Nightly News. Dan holds a B.A. in Criminology from Saint Leo College in Florida and a Masters in Forensic Science from George Washington University in Washington D.C.
The Center for Cryptologic History's 2015 Henry F. Schorreck Memorial Lecture took place at the National Cryptologic Museum on 15 May 2015.
The speaker was former NSA Inspector General and Senior Counsel Joel F. Brenner with a presentation titled: “Forty Years after Church-Pike: What’s Different Now?” Mr. Brenner, from his unique perspective as NSA’s former IG (2002-2006) and DNI’s head of counterintelligence (2006-2009), discussed the impact of Church-Pike and what has changed during the past four decades. He has written about intelligence oversight and presidential authorities and is often quoted in the national media on data security, privacy, and intelligence issues. He recently authored an influential book titled America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime and Warfare.
The Schorreck Lecture speaker in 2013 was Dr. Peter W. Donovan of the Department of Mathematics, University of New South Wales, Australia. A renowned expert in several fields of mathematics, as well as on cryptologic history, Dr. Donovan has conducted some of the most innovative and path-breaking work to date on the Allied effort to break Japanese encryption systems in use during WWII. He presented two separate lectures detailing the cipher war in the Pacific, including revelations about the weaknesses in the Japanese naval codes that the Allies exploited, all of which led to dramatic successes on the battlefield.
To read the full text of the Lecture given by David Kahn on May 24, 2007 titled, “The Future of the Past: Questions in Cryptologic History," visit David Kahn's Web site.