An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
BEACHCOMB Program Overview: History, Status, and Directions.PDF
An Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery.PDF
An Evaluation of Conventional and LDD Devices for Submicron Geometries.PDF
A Stab at A2 Criteria.PDF
A Response to "The SIGINT Hounds Were Howling".PDF
A Reflection of Sherman Kent.PDF
A New View of Pearl Harbor: The U.S. Navy and Communications Intelligence.PDF
A Communist Carol.PDF
History of the Signal Security Agency.PDF
Working Against the Tide.PDF
Space Surveillance SIGINT Program.PDF
THE NATIONAL SECURITY AGENCY AND THE EC-121 SHOOTDOWN.PDF
The Suez Crisis: A Brief Comint History.PDF
Spartans in Darkness.PDF
Purple Dragon.PDF
The Origins of the National Security Agency 1940-1952.PDF
Operation REGAL: The Berlin Tunnel.PDF
On Watch- Profiles from The National Security Agencys' past 40 years.PDF
It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis 1930s - 1960s.PDF
Learning from the Enemy: The GUNMAN Project.PDF
FIRST
84
85
86
(current)
87
88
LAST