An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
    • Trending Opportunities
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Spring/Summer 2001-Vol. 20, Nos. 1-2

Intelligence Analysis: Does NSA Have What It Takes.PDF

Fall/Winter 1993-Vol. 12, Nos. 3-4

Inference and Cover Stories.PDF

Winter 1983-Vol. 1, No. 4

I Was a Cryptologic Corporal!.PDF

Spring 1994-Vol. 13, No. 1

History of the South Vietnamese Directorate General for Technical Security.PDF

Winter/Spring 2000-2001 - Vols. 19/20, Nos. 4-1

A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding.PDF

Spring 1996 - Vol. 15, No. 1

Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45.PDF

Summer 1987 - Vol. 6, No. 2

Glimpses of a Man: The Life of Ralph J. Canine.PDF

Fall/Winter 1991 Vol 10, Nos. 3-4

Geographic Information Systems.PDF

Fall 1992-Vol. 11, No 3

The Future of High Frequencies in Cryptology, Part Two.PDF

Summer 1992-Vol. 11, No. 2

The Future of High Frequencies in Cryptology, Part One.PDF

Spring/Summer 2005 - Vol. 24, Nos. 1-2

From Crosswords to High-Level Language Competency.PDF

Summer 1987 - Vol. 6, No. 2

From Chaos Born: General Canine's First Charge to the NSA Workforce.PDF

Summer 1988-Vol. 7, No. 2

A First Generation Technical Viral Defense.PDF

Winter 1987-Vol. 5, No. 4

Fault Simulation Requirements for Security Fault Analysis.PDF

Winter 1992-Vol. 11, No. 4

Facing the Post-Cold War Era.PDF

Winter 1986-Vol. 5, No. 4

Examples of Lattices in Computer Security Models.PDF

Spring 1992-Vol. 11, No. 1

Error Messages: The Importance of Good Design.PDF

Spring 1992 Vol. 11, No.1

DOS/UNIX Interoperability and Email in the Agency.PDF

Summer 1994-Vol. 13, No. 2

Doing Business Smarter: A Proposal for Consolidating NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance.PDF

Winter/Spring 2000- 2001 - Vols. 19/20, Nos. 4-1

Dodging Armageddon: The Third World War That Almos Was, 1950.PDF

  • FIRST
  • 83
  • 84
  • 85 (current)
  • 86
  • 87
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
  • FY2024 Strategic Plan for the Recruitment, Hiring, Advancement, and Retention of Persons With Disabilities
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source 
RELATED LINKS
  • DNI.gov
  • War.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOW IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1