An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
The Origins of the National Security Agency 1940-1952

The Origins of the National Security Agency 1940-1952.PDF

Operation REGAL: The Berlin Tunnel

Operation REGAL: The Berlin Tunnel.PDF

On Watch- Profiles from The National Security Agencys' past 40 years

On Watch- Profiles from The National Security Agencys' past 40 years.PDF

It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis 1930s - 1960s

It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis 1930s - 1960s.PDF

Learning from the Enemy: The GUNMAN Project

Learning from the Enemy: The GUNMAN Project.PDF

In the Shadow of War

In the Shadow of War.PDF

History of the Signal Security Agency
Volume I Organization Parts I and II

History of the Signal Security Agency.PDF

Volume II

A History of U.S. Communications Security.PDF

A History of U.S. Communications Security Volume 1

A History of U.S. Communications Security.PDF

German Clandestine Activities in South America in World War II

German Clandestine Activities in South America in World War II.PDF

History of Collaboration among French Cryptologic Agencies 1909 - 1939

History of Collaboration among French Cryptologic Agencies 1909 - 1939.PDF

The Cryptology of the German Intelligence Services

The Cryptology of the German Intelligence Services.PDF

American Cryptology During the Cold War 1945-1989 Book IV

American Cryptology During the Cold War.PDF

American Cryptology During the Cold War
1945-1989 Book III

American Cryptology During the Cold War.PDF

American Cryptology During the Cold War
1945-1989 Book II

American Cryptology During the Cold War.PDF

American Cryptology During the Cold War
1945-1989 Book I

American Cryptology During the Cold War.PDF

BOURBON to Black Friday: The Allied Collaborative COMINT Effort against the Soviet Union 1945-1948

BOURBON to Black Friday: The Allied Collaborative COMINT Effort against the Soviet Union 1945-1948.PDF

Communicator Declassified

COMMUNICATOR-III-44.PDF

Communicator Declassified

COMMUNICATOR-III-45.PDF

Communicator Declassifed

COMMUNICATOR-III-47.PDF

  • FIRST
  • 84
  • 85
  • 86 (current)
  • 87
  • 88
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1