An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Fall/Winter 1991-Vol. 10, Nos. 3-4

Unofficial Vocabulary.PDF

Fall/Winter 1983-Vol. 2, Nos. 3-4

United Pigeons Service (UPS).PDF

Spring/Summer 1984-Vol. 3, Nos. 1-2

Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them.PDF

Spring 1987-Vol. 6, No. 1

The Origination and Evolution of Radio Traffic Analysis: The World War I Era.PDF

Spring/Summer 2001-Vol. 20, Nos. 1-2

Toward a Taxonomy of Secrets.PDF

Winter 1989 - Vol. 7, No. 4

Third Party Nations: Partners and Targets.PDF

Spring/Summer 2001-Vol. 20, Nos. 1-2

The Zimmermann Telegram.PDF

Spring 1994-Vol. 13, No. 1

The Way It Used To Be or From ADVA/GENS to the Alphabet (PART II).PDF

Winter 1996-Vol. 15, No. 4

The Value of Working Longer Hours for Promotion.PDF

Summer/Fall 1982-Vol. 1, Nos. 2-3

The Use of Compressed Speech in Selecting Morse Code Operators.PDF

Spring 1995-Vol. 14, No. 1

The Uncertain Summer of 1945.PDF

Special Computer Science Issue 1985-Vol. 4

The UCSD p-System.PDF

Spring/Summer 2004 - Vol. 23, Nos. 1-2

The Sting - Enabling Codebreaking in the Twentieth Century.PDF

Fall 1995, Vol. 14, No. 3

The Rosetta Stone and Its Decipherment.PDF

Spring/Summer 2001-Vol. 20, Nos. 1-2

The Pyramid of Excellence for Intelligence Analysis and Production: A Maturity Model.PDF

Winter 1991-Vol. 9, No. 4

The PLATFORM Network Evolution.PDF

Fall/Winter 1987-1988 - Vol. 6, Nos. 3-4

The Origination and Evolution of Radio Traffic Analysis: The Period between the Wars.PDF

Fall 1985-Vol. 4, No. 3

The Passing of an Extraordinary Man.PDF

May 1996

The Parable of the Tail With No Teeth.PDF

Winter 1992 - Vol. 11, No. 4

The Origins of the Soviet Problem: A Personal View.PDF

  • FIRST
  • 78
  • 79
  • 80 (current)
  • 81
  • 82
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1