Class Note


Ms. Hilda Faust Mathieu

Hilda Faust Mathieu Inducted into NSA Hall of Honor

Class of 1957

(Submitted on: January 25, 2019)

Hilda Faust Mathieu '57 was inducted into the National Security Agency (NSA) Hall of Honor on November 28th, 2018.

Hilda received her Bachelors of Science in Mathematics from Marywood. A "pioneer of computer network exploitation," she was "one of the driving forces developing security controls for network protection," according to her biography on the NSA's website.

The following excerpt is from the NSA's Hall of Honors description of Hilda and her achievements.


Based on earlier work evaluating conventional cryptomachines, Ms. Mathieu’s review of the security of the U.S. Department of Defense (DoD) record communication system in the 1960s led her to conclude that the government’s computer networks were vulnerable to attack. One of the first to try to convince the government of the vulnerabilities, she was a major contributor to the 1970 Rand Report and to the U.S. Air Force Computer Technology Planning Study of 1972.  Both addressed alarming security problems in government computer data.

When the Director of NSA established the Department of Defense Computer Security Center in 1981, he appointed Ms. Mathieu Chief of Research and Development for Computer Security. In the mid-1980s, Ms. Mathieu formulated the then-controversial concept that computer network exploitation was a feasible and worthwhile goal. She also recruited the first engineers to begin target development and exploitation. Her vision evolved into a major operational component of NSA.

Hilda Faust Mathieu was instrumental in beginning one of present-day NSA’s largest and most critical operational components. Despite internal opposition, she and a small team convinced senior leadership to acknowledge an innovative new target area.

Ms. Mathieu retired in 1992, before seeing full-scale implementation of her vision and the benefits it would bring to our nation’s security.  Her visionary ideas and practical applications underlie much of what is done today at NSA and United States Cyber Command.