An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
FOIA report for Fiscal Year 2006

Fiscal Year 2006

FOIA report for Fiscal Year 2002

Fiscal Year 2002

FOIA report for Fiscal Year 2001

Fiscal Year 2001

FOIA report for Fiscal Year 2000

Fiscal Year 2000

FOIA report for Fiscal Year 2005

Fiscal Year 2005

FOIA report for Fiscal Year 1999

Fiscal Year 1999

FOIA Report for Fiscal Year 1998

Fiscal Year 1998

FOIA Reports for Fiscal Year 1997

Fiscal Year 1997

FOIA reports for Calendar Year 1996

Calendar Year 1996.PDF

Leverage NSA Technology - Gain Market Advantage

EXTERNAL-BROCHURE

Vol. 23 No 1 2021

TNW 23-1 | 2021 | Deception Research: Using Science to Reveal the Truth

Fall 1980 - Vol. XXV, No. 4

German Radio Intelligence

Spring 1978 - Vol XXIII, No. 2

Words and the Intelligence Value of Conversations

Spring 1979 - Vol. XXIV, No. 2

An Application of PTAH to the Voynich Manuscript

Summer 1976 - Vol. XXI, No. 3

The Voynich Manuscript Revisited

Spring 1976 - Vol. XXI, No. 2

Spacecraft Passenger Television from Laika to Gagarin

Fall 1975 - Vol. XX, No. 4

A Personal Contribution to the Bombe Story

Summer 1978 - Vol. XXIII, No. 3

An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript

Fall 1974 - Vol. XIX, No. 4

Selected SIGINT Intelligence Highlights

Summer 1974 - Vol. XIX, No. 3

Some Principles of Cryptographic Security

  • FIRST
  • 37
  • 38
  • 39 (current)
  • 40
  • 41
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1