An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Winter 1996 - Vol. 15, No. 4

The BS Attitudes: How Things Work in Bureaucracies.PDF

Fall 1994 - Vol. 13, No. 3

Book Review: Chicksands: A Millenium of History.PDF

Fall 1996 - Vol. 153, No. 3

Book Review: A Century of Spies: Intelligence in the Twentieth Century -.PDF

Winter 1994 - Vol. 13, No. 4

An Introduction to a Historic Computer Document: Betting on the Future -The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer.PDF

Fall/Winter 1993 - Vol. 12, Nos. 3-4

Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945.PDF

Spring 1991 - Vol. 10, No. 1

BEACHCOMB Program Overview: History, Status, and Directions.PDF

Fall 1988-Vol. 7, No. 3

An Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery.PDF

Spring 1989-Vol. 8, No. 1

An Evaluation of Conventional and LDD Devices for Submicron Geometries.PDF

Spring 1990-Vol. 9, No. 1

A Stab at A2 Criteria.PDF

Fall 2006-Winter 2007

A Response to "The SIGINT Hounds Were Howling".PDF

Spring/Summer 1986 - Vol. 5, Nos. 1-2

A Reflection of Sherman Kent.PDF

Fall 1986-Vol. 5, No. 3

A New View of Pearl Harbor: The U.S. Navy and Communications Intelligence.PDF

Fall/Winter 1987-1988-Vol. 6, Nos. 3-4

A Communist Carol.PDF

History of the Signal Security Agency
Volume II The General Cryptanalytic Problems

History of the Signal Security Agency.PDF

Southeast Asia Working against the Tide

Working Against the Tide.PDF

United States Cryptologic History Space Surveillance SIGNET Program

Space Surveillance SIGINT Program.PDF

THE NATIONAL SECURITY AGENCY AND THE EC-121 SHOOTDOWN

THE NATIONAL SECURITY AGENCY AND THE EC-121 SHOOTDOWN.PDF

The Suez Crisis: A Brief Comint History

The Suez Crisis: A Brief Comint History.PDF

Spartans in Darkness

Spartans in Darkness.PDF

The origin and Development of the
United States OPSEC Program

Purple Dragon.PDF

  • FIRST
  • 83
  • 84
  • 85 (current)
  • 86
  • 87
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1