An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Ask Zelda
Search
Search
Upload Date
Upload Date
Document Date
Title
Wrong Address.PDF
Suffering from Neglect on Planet Schmooze.PDF
Enjoying (?) the Ride.PDF
Guilty Until Proven Innocent?.PDF
Know-It-All Doesn't Know Much.PDF
Phone Hog Grills Callers, Spills Beans.PDF
Emails Going Unanswered.PDF
Zelda Tackles a Tackler.PDF
Not Speaking the Same Language.PDF
Short-Timers Are Short-Circuiting the Fun.PDF
"Double Commuters" Attacked by Bear.PDF
Exterminating a Pack Rat.PDF
Co-worker Full of Hot Air.PDF
Tormented by Twisted English.PDF
Peeved by Purloined Pop.PDF
How Do You Stop the Epithet Epidemic in Your Office?.PDF
Employee Uses Co-workers as Entourage.PDF
Watching Every Word in Snitch City.PDF
Message in a Bottle.PDF
40 Winks at Work.PDF
FIRST
1
2
(current)
3
4
LAST
Communicators
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Almanac Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
The Berlin Tunnel Part I: But Did They Call Miss Utility?
The Time of Investigations Part 2
The Time of Investigations Part 1
Three African-American Cryptologic Pioneers
The TRS Program Part II: The Capture of the Pueblo
The TRS Program Part I: The Beginning
The Soviet Union's Invasion of Afghanistan, 25 December 1979
The Move to Fort Meade
The Last Days of the Enigma
The Korean War: The First Phase
The Formation of NSOC
The First Round: NSA's Effort against International Terrorism in the 1970s
The Effort to Create a Smokefree NSA
The Central Security Service
The Creation of NSA - Part 1: The Brownell Committee
The Creation of NSA - Part 1: AFSA
The Creation of NSA - Part 1: JOP
Solomon Kullback on Maintaining Communications Security
Six Decades of Second Party Relations
SIGINT Against the Chinese Intervention in the Korean War
FIRST
1
2
(current)
3
4
5
LAST
Cryptologic Histories
Search
Search
Upload Date
Upload Date
Document Date
Title
The Cryptology of the German Intelligence Services.PDF
American Cryptology During the Cold War.PDF
American Cryptology During the Cold War.PDF
American Cryptology During the Cold War.PDF
American Cryptology During the Cold War.PDF
BOURBON to Black Friday: The Allied Collaborative COMINT Effort against the Soviet Union 1945-1948.PDF
FIRST
1
2
(current)
LAST
Cryptologic Quarterly
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Quarterly Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
The Uncertain Summer of 1945.PDF
The UCSD p-System.PDF
The Sting - Enabling Codebreaking in the Twentieth Century.PDF
The Rosetta Stone and Its Decipherment.PDF
The Pyramid of Excellence for Intelligence Analysis and Production: A Maturity Model.PDF
The PLATFORM Network Evolution.PDF
The Origination and Evolution of Radio Traffic Analysis: The Period between the Wars.PDF
The Passing of an Extraordinary Man.PDF
The Parable of the Tail With No Teeth.PDF
The Origins of the Soviet Problem: A Personal View.PDF
"The New Kid on the Block": Personal Experiences of An NSA Historian and the Nazi Gold Report January - May 1997.PDF
The National OPSEC Program.PDF
The Move, or How NSA Came to Fort Meade.PDF
The High-Tech Trade War with Japan: Can Anyone Win?.PDF
The Handy-Dandy Field Site History: Fifty Years of Field Operations, 1945-1995.PDF
The Golden Age of Russia.PDF
The Fiber Distributed Data Interface.PDF
The Fall of the Shah of Iran: A Chaotic Approach.PDF
The Essential Difference.PDF
Ten Rules to Avoid Planning Foul-Ups.PDF
FIRST
1
2
(current)
3
4
5
LAST
Cryptologic Spectrum Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Sigint Technical Primer-III.PDF
Sigint Technical Primer-II Modulation.PDF
Sigint Technical Primer-I.PDF
The Sigint Users' Handbook.PDF
Security in an Open Society.PDF
The Russian Language Training Program.PDF
RS-15A: Thoughts on the Intensive Russian Training Course.PDF
Remember the Liberty.PDF
Remarks at Language Intern Graduation.PDF
Reflections on the Soviet Strategic Missile Threat of 1960.PDF
Ralph Canine.PDF
Provision of Cryptologic Information to the Congress.PDF
The Origin of U.S.-British Communications Intelligence Cooperation (1940-41).PDF
Operations Security Techniques: An Analysis of GIANT SCALE.PDF
Operation Starlight: A Sigint Success Story.PDF
The Origin and Development of 3-US.PDF
The Origin and Development of 3-US - Part II.PDF
The National Sigint Operations Center.PDF
The NSA Declassification Program.PDF
NSA's First Contingency Operation.PDF
FIRST
1
2
(current)
3
4
5
LAST
Cryptologs
Search
Search
Upload Date
Upload Date
Document Date
Title
Vol. XVI, No. 3 - 3rd Issue 1989
Vol. XVI, No. 2 - 2nd Issue 1989
Vol. XVI, No. 1 - 1st Issue 1989
Vol. XV, No. 4 - 4th Issue 1988
Vol. XV, No. 3 - 3rd Issue 1988
Vol. XV, No. 2 - 2nd Issue 1988
Vol. XV, No. 1 - 1st Issue 1988
Vol. XIV, No. 4 - 4th Issue 1987
Vol. XIV, No. 3 - 3rd Issue 1987
Vol. XIV, No. 2 - 2nd Issue 1987
Vol. XIV, No. 1 - 1st Issue 1987
Vol. XIII, No. 12 - December 1986
Vol. XIII, Nos. 10 - 11 - October - November 1986
Vol. XIII, Nos. 8 - 9 - August - September 1986
Vol. XIII, Nos. 5 - 7 - May - July 1986
Vol. XIII, Nos. 3 - 4 - March - April 1986
Vol. XIII, Nos. 1 - 2 - January - February 1986
Vol. XII, Nos. 11 - 12 - November - December 1985
Vol. XII, Nos. 9 - 10 - September - October 1985
Vol. XII, Nos. 6 - 8 - June - August 1985
FIRST
1
2
(current)
3
4
5
LAST
History of the Army Security Agency
Search
Search
Upload Date
Upload Date
Document Date
Title
FY 1952 ASA History FY 1952, Vol. I (186 pages)
FY 1948 Summary Annual Report ASA FY 1948 (85 pages)
FY 1947 Summary Annual Report ASA FY 1947 (55 pages)
FY 1945-1948 ASA: Post War Transition Period, the Army Security Agency FY 1945-1948 (154 pages)
FY 1950 History of ASA & Subordinate Units (121 pages)
FY 1946 Summary Annual Report ASA FY 1946 (289 pages)
FIRST
1
2
(current)
LAST
History Today Anthologies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
History Today Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
HISTORY TODAY - 13 JUNE 2016.PDF
HISTORY TODAY - 3 MAY 2016.PDF
HISTORY TODAY - FRIDAY CLASSIC 15 APRIL 2016.PDF
HISTORY TODAY - 20 APRIL 2016.PDF
HISTORY TODAY FRIDAY CLASSIC - 8 APRIL 2016.PDF
HISTORY TODAY - 14 APRIL 2016.PDF
HISTORY TODAY - 8 APRIL 2016.PDF
HISTORY TODAY - 31 MARCH 2016.PDF
HISTORY TODAY - 30 MARCH 2016.PDF
HISTORY TODAY FRIDAY CLASSIC - 25 MARCH 2016.PDF
HISTORY TODAY - 25 MARCH 2016.PDF
HISTORY TODAY - 23 MARCH 2016.PDF
HISTORY TODAY FRIDAY CLASSIC - 18 MARCH 2016.PDF
HISTORY TODAY - 18 MARCH 2016.PDF
HISTORY TODAY - 19 JANUARY 2016.PDF
HISTORY TODAY - 10 FEBRUARY 2016.PDF
HISTORY TODAY - 8 FEBRUARY 2016.PDF
HISTORY TODAY FRIDAY CLASSIC - 11 DECEMBER 2015.PDF
HISTORY TODAY - 16 DECEMBER 2015.PDF
HISTORY TODAY - 3 FEBRUARY 2016.PDF
FIRST
1
2
(current)
3
4
5
LAST
Military Cryptanalysis
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Early Computer History
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Newsletters
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Technical Journal Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
APL Mechanization of Indirect Symmetry
Foreign vs. U.S. Computers: An Appraisal
The Rosetta Stone and Its Decipherment
Multiple Hypothesis Testing and the Bayes Factor
Growing Up With Computers at NSA
Mokusatsu: One Word, Two Lessons
Key to The Extraterrestrial Messages
The Library and the User
Weather or Not - Encrypted?
Curiosa Scriptorum Sericorum: To Write But Not to Communicate
An Application of Queueing Theory to Computer Systems
Bipolar Coding and Baseband Recovery
The Voynich Manuscript: "The Most Mysterious Manuscript in the World"
Cranks, Nuts, and Screwballs
John Dee: Consultant to Queen Elizabeth I
Extraterrestrial Intelligence
A Text Recognition Procedure for Cryptanalysis
The Apparent Paradox of Bayes Factors
Time Is - Time Was - Time Is Past Computes for Intelligence
Something May Rub Off!
FIRST
1
2
(current)
3
4
5
LAST
NSA/CSS
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Untangling the Web
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA/CSS Policies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.