Skip Public Info MenusPublic Info Menu
|
Cryptologic Quarterly Articles
- Disclaimer
- Winning the Paper Chase: Operational Applications of Computer Output Microfiche
Spring 1982-Vol. 1, No. 1
- John H. Tiltman: A Reminiscence
Summer/Fall 1982-Vol. 1, Nos. 2-3
- The Use of Compressed Speech in Selecting Morse Code Operators
Summer/Fall 1982-Vol. 1, Nos. 2-3
- Regierungs-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire
Fall/Winter 1983-1984-Vol. 2, Nos. 3-4
- Warning and Crisis Management
Fall/Winter 1983-1984-Vol. 2, Nos. 3-4
- United Pigeons Service (UPS)
Fall/Winter 1983-Vol. 2, Nos. 3-4
- You've Got to Go by the Rules
Fall/Winter 1983-Vol. 2, Nos. 3-4
- I Was a Cryptologic Corporal!
Winter 1983-Vol. 1, No. 4
- The Cobra Judy Acquisition
Winter 1983-Vol. 1, No. 4
- Cuban-Mexican Oil Cooperation: Loosening the Ties that Bind
Spring/Summer 1984-Vol. 3, Nos. 1-2
- Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them
Spring/Summer 1984-Vol. 3, Nos. 1-2
- Communications Security and the Problem of Hamlet
Fall/Winter 1984-1985-Vol. 3, Nos. 3-4
- Red and Purple: A Story Retold
Fall/Winter 1984-1985 - Vol. 3, Nos. 3-4
- XNS Ethernet Connections for the IBM PC XT
Spring 1985-Vol. 4, No. 1
- Computer Virus Infections: Is NSA Vulnerable?
Fall 1985-Vol. 4, No. 3
- Reading Between the Lines: Methods of Analysis of Soviet Military Literature
Fall 1985-Vol. 4, No. 3
- The Passing of an Extraordinary Man
Fall 1985-Vol. 4, No. 3
- The UCSD p-System
Special Computer Science Issue 1985-Vol. 4
- A Reflection of Sherman Kent
Spring/Summer 1986 - Vol. 5, Nos. 1-2
- The High-Tech Trade War with Japan: Can Anyone Win?
Spring/Summer 1986-Vol. 5, Nos. 1-2
- Examples of Lattices in Computer Security Models
Winter 1986-Vol. 5, No. 4
- A New View of Pearl Harbor: The U.S. Navy and Communications Intelligence
Fall 1986-Vol. 5, No. 3
- The Essential Difference
Winter 1987-Vol. 5, No. 4
- With Pail and Shovel: The "Sandbox Approach" to Management and Leadership
Winter 1987-Vol. 5, No. 4
- A Communist Carol
Fall/Winter 1987-1988-Vol. 6, Nos. 3-4
- The Origination and Evolution of Radio Traffic Analysis: The World War I Era
Spring 1987-Vol. 6, No. 1
- From Chaos Born: General Canine's First Charge to the NSA Workforce
Summer 1987 - Vol. 6, No. 2
- Glimpses of a Man: The Life of Ralph J. Canine
Summer 1987 - Vol. 6, No. 2
- What Every Cryptologist Should Know About Pearl Harbor
Summer 1987 - Vol. 6, No. 2
- Influence of US Cryptologic Organizations on the Digital Computer Industry
Fall/Winter 1987-1988 Vol. 8, Nos. 3-4
- The Origination and Evolution of Radio Traffic Analysis: The Period between the Wars
Fall/Winter 1987-1988 - Vol. 6, Nos. 3-4
- Time Is - Time Was - Time Is Past: Computers for Intelligence
Fall/Winter 1987-1988 - Vol. 6, Nos. 3-4
- Fault Simulation Requirements for Security Fault Analysis
Winter 1987-Vol. 5, No. 4
- The Fiber Distributed Data Interface
Spring 1988-Vol. 7, No. 1
- A First Generation Technical Viral Defense
Summer 1988-Vol. 7, No. 2
- OJE: On the Job Enthusiasm- A Layman's Perspective
Summer 1988-Vol. 7, No. 2
- Problem Encountered with the Variant Record Construct in Ada
Summer 1988-Vol. 7, No. 2
- An Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery
Fall 1988-Vol. 7, No. 3
- The Origination and Evolution of Radio Traffic Analysis: World War II
Winter 1989 - Vol. 7, No. 4
- Third Party Nations: Partners and Targets
Winter 1989 - Vol. 7, No. 4
- An Evaluation of Conventional and LDD Devices for Submicron Geometries
Spring 1989-Vol. 8, No. 1
- Ten Rules to Avoid Planning Foul-Ups
Spring 1989-Vol. 8, No. 1
- Volunteering: A Fresh Approach
Spring 1989-Vol. 8, No. 1
- PCSE: A Design Implementation for PC Security
Summer 1989-Vol. 8, No. 2
- Processor Interconnection Networks from Cayley Graphs
Fall 1989-Vol. 8, No. 3
- RISC Does Windows
Fall 1989-Vol. 8, No. 3
- Moscow's Realignment with Cairo: A Look at Gorbachev's New Political Thinking
Winter 1990-Vol. 8, No. 4
- A Stab at A2 Criteria
Spring 1990-Vol. 9, No. 1
- Radio Intelligence in Japanese and American North Pacific Naval and Air Operations
Summer 1990-Vol. 9, No. 2
- Meteor Burst Communications: An Ignored Phenomenon?
Fall 1990 - Vol. 9, No. 3
- BEACHCOMB Program Overview: History, Status, and Directions
Spring 1991 - Vol. 10, No. 1
- The PLATFORM Network Evolution
Winter 1991-Vol. 9, No. 4
- Geographic Information Systems
Fall/Winter 1991 Vol 10, Nos. 3-4
- Unofficial Vocabulary
Fall/Winter 1991-Vol. 10, Nos. 3-4
- DOS/UNIX Interoperability and Email in the Agency
Spring 1992 Vol. 11, No.1
- Error Messages: The Importance of Good Design
Spring 1992-Vol. 11, No. 1
- Book Review: Now Playing: Churchill as Pearl Harbor Villain
Summer 1992-Vol. 11, No. 2
- The Future of High Frequencies in Cryptology, Part One
Summer 1992-Vol. 11, No. 2
- The Future of High Frequencies in Cryptology, Part Two
Fall 1992-Vol. 11, No 3
- The National OPSEC Program
Fall 1992-Vol. 11, No. 3
- Facing the Post-Cold War Era
Winter 1992-Vol. 11, No. 4
- Solving xa=b(mod c) for x and Undecimating Recursions
Winter 1992 - Vol. 11, No. 4
- The First US Government Manual on Cryptography
Winter 1992 - Vol. 11, No. 4
- The Origins of the Soviet Problem: A Personal View
Winter 1992 - Vol. 11, No. 4
- Telephone Codes and Safe Combinations: A Deadly Duo
Spring 1993 Vol 12, No.1
- Maybe You Had to Be There: The SIGINT on Thirteen Soviet Shootdowns of U.S. Reconnaissance Aircraft
Summer 1993 – Vol. 12, No. 2
- Seward's Other Folly: America's First Encrypted Cable
Summer 1993-Vol. 12, No. 2
- Station "C" and Fleet Radio Unit Melbourne (FRUMEL) Revisited
Summer 1993-Vol. 12, No. 2
- Inference and Cover Stories
Fall/Winter 1993-Vol. 12, Nos. 3-4
- Virtual Reality
Fall/Winter 1993-Vol. 12, Nos. 3-4
- Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945
Fall/Winter 1993 - Vol. 12, Nos. 3-4
- The Cuban Missile Crisis: A SIGINT Perspective
Spring 1994- Vol. 13, No. 1
- The Way It Used To Be or From ADVA/GENS to the Alphabet (PART II)
Spring 1994-Vol. 13, No. 1
- History of the South Vietnamese Directorate General for Technical Security
Spring 1994-Vol. 13, No. 1
- Doing Business Smarter: A Proposal for Consolidating NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance
Summer 1994-Vol. 13, No. 2
- Sub-HF Search and Acquisition
Summer 1994 Vol.13, No2
- Book Review: Chicksands: A Millenium of History
Fall 1994 - Vol. 13, No. 3
- SIGINT Goes to War
Fall 1994 - Vol. 13. No. 3
- An Introduction to a Historic Computer Document: Betting on the Future -The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer
Winter 1994 - Vol. 13, No. 4
- The Fall of the Shah of Iran: A Chaotic Approach
Winter 1994-Vol. 13, No. 4
- The Golden Age of Russia
Winter 1994-Vol. 13, No. 4
- Revisiting the Dispute over the Identification of "AF" as Midway
Winter 1994-Vol. 13, No. 4
- SIGINT and the Holocaust
Spring 1995-Vol. 14, No. 1
- The Handy-Dandy Field Site History: Fifty Years of Field Operations, 1945-1995
Spring 1995 - Vol. 14, No. 1
- The Uncertain Summer of 1945
Spring 1995-Vol. 14, No. 1
- Work Force Skills and Mission Requirements Comparison System
Spring 1995-Vol. 14, No. 1
- The Move, or How NSA Came to Fort Meade
Summer 1995-Vol. 14, No. 2
- The Rosetta Stone and Its Decipherment
Fall 1995, Vol. 14, No. 3
- NSA and the Supercomputer Industry
Winter 1995 - Vol. 14, No. 4
- A World War II German Army Field Cipher and How We Broke It
Winter 1995 - Vol. 14, No. 4
- Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45
Spring 1996 - Vol. 15, No. 1
- NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders
Spring 1996 - Vol. 15
- Long Live the King
Special Edition 1996 - Vol. 15
- Out of Control
Special Edition 1996 - Vol. 15
- The Parable of the Tail With No Teeth
May 1996
- COMINT and the PRC Intervention in the Korean War
Summer 1996 - Vol. 15, No. 2
- Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos
Summer 1996-Vol. 15, No. 2
- Book Review: A Century of Spies: Intelligence in the Twentieth Century -
Fall 1996 - Vol. 153, No. 3
- Dealing with the Future: The Limits of Forecasting
Fall 1996 - Vol. 153, No. 3
- The BS Attitudes: How Things Work in Bureaucracies
Winter 1996 - Vol. 15, No. 4
- Receiver Dynamics
Winter 1996-Vol. 15, No. 4
- The Value of Working Longer Hours for Promotion
Winter 1996-Vol. 15, No. 4
- A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding
Winter/Spring 2000-2001 - Vols. 19/20, Nos. 4-1
- Dodging Armageddon: The Third World War That Almos Was, 1950
Winter/Spring 2000- 2001 - Vols. 19/20, Nos. 4-1
- Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964
Winter/Spring 2000-2001 - Vols. 19/20, Nos. 4-1
- Intelligence Analysis: Does NSA Have What It Takes
Spring/Summer 2001-Vol. 20, Nos. 1-2
- The Pyramid of Excellence for Intelligence Analysis and Production: A Maturity Model
Spring/Summer 2001-Vol. 20, Nos. 1-2
- Operation Cassandra
Spring/Summer 2001-Vol. 20, Nos. 1-2
- The Zimmermann Telegram
Spring/Summer 2001-Vol. 20, Nos. 1-2
- Data Communications Via Powerlines
Spring/Summer 2001-Vol. 20, Nos. 1-2
- Toward a Taxonomy of Secrets
Spring/Summer 2001-Vol. 20, Nos. 1-2
- One Picture is Worth
Spring/Summer 2001-Vol. 20, Nos. 1-2
- DDE & NSA: An Introductory Survey
Spring/Summer 2004 - Vol. 23, Nos. 1-2
- A Partial History of ELINT at NSA
Spring/Summer 2004 - Vol. 23, Nos. 1-2
- Remembering the Lessons of the Vietnam War
Spring/Summer 2004 - Vol. 23, Nos. 1-2
- The Sting - Enabling Codebreaking in the Twentieth Century
Spring/Summer 2004 - Vol. 23, Nos. 1-2
- Summary of the 2003 ATA Annual Conference
Spring/Summer 2004 - Vol. 23, Nos. 1-2
- From Crosswords to High-Level Language Competency
Spring/Summer 2005 - Vol. 24, Nos. 1-2
- NSA Culture, 1980s to the 21st Century-a SID Perspective
Winter/Spring 2011 - Vol. 30, No. 4
|
|