An official website of the United States government
Here's how you know

Official websites use .gov

A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS

A lock (lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Home Logo: National Security Agency I Central Security Service Home
National Security Agency/Central Security Service
NSA/CSS
Search
Search
Search
  • About
    • Leadership
    • Mission & Combat Support
    • Cybersecurity
    • Signals Intelligence
    • Central Security Service
    • Locations
    • Research
    • Cybersecurity Collaboration Center
      • Collaborative Partnerships
      • DIB Cybersecurity Services
      • Standards and Certifications
      • Artificial Intelligence Security Center
  • Press Room
    • Press Releases & Statements
    • News & Highlights
    • Podcast
    • Declassification & Transparency Initiatives
    • Cybersecurity Advisories & Guidance
    • Telework and Mobile Security Guidance
    • DoD Microelectronics Guidance
    • Research Publications
  • Careers
  • History
    • National Cryptologic Museum
    • Cryptologic History
    • National Cryptologic Memorial

  • Upload Date
  • Document Date
  • Title
Winter 1986-Vol. 5, No. 4

Examples of Lattices in Computer Security Models.PDF

Spring 1992-Vol. 11, No. 1

Error Messages: The Importance of Good Design.PDF

Spring 1992 Vol. 11, No.1

DOS/UNIX Interoperability and Email in the Agency.PDF

Summer 1994-Vol. 13, No. 2

Doing Business Smarter: A Proposal for Consolidating NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance.PDF

Winter/Spring 2000- 2001 - Vols. 19/20, Nos. 4-1

Dodging Armageddon: The Third World War That Almos Was, 1950.PDF

Disclaimer

Disclaimer.PDF

Fall/Winter 1987-1988 Vol. 8, Nos. 3-4

Influence of US Cryptologic Organizations on the Digital Computer Industry.PDF

Spring/Summer 2004 - Vol. 23, Nos. 1-2

DDE & NSA: An Introductory Survey.PDF

Spring/Summer 2001-Vol. 20, Nos. 1-2

Data Communications Via Powerlines.PDF

Spring 1994- Vol. 13, No. 1

The Cuban Missile Crisis: A SIGINT Perspective.PDF

Spring/Summer 1984-Vol. 3, Nos. 1-2

Cuban-Mexican Oil Cooperation: Loosening the Ties that Bind.PDF

Fall 1985-Vol. 4, No. 3

Computer Virus Infections: Is NSA Vulnerable?.PDF

Fall/Winter 1984-1985-Vol. 3, Nos. 3-4

Communications Security and the Problem of Hamlet.PDF

Summer 1996 - Vol. 15, No. 2

COMINT and the PRC Intervention in the Korean War.PDF

Winter 1983-Vol. 1, No. 4

The Cobra Judy Acquisition.PDF

Winter 1996 - Vol. 15, No. 4

The BS Attitudes: How Things Work in Bureaucracies.PDF

Fall 1994 - Vol. 13, No. 3

Book Review: Chicksands: A Millenium of History.PDF

Fall 1996 - Vol. 153, No. 3

Book Review: A Century of Spies: Intelligence in the Twentieth Century -.PDF

Winter 1994 - Vol. 13, No. 4

An Introduction to a Historic Computer Document: Betting on the Future -The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer.PDF

Fall/Winter 1993 - Vol. 12, Nos. 3-4

Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945.PDF

  • FIRST
  • 83
  • 84
  • 85 (current)
  • 86
  • 87
  • LAST
NSA.GOV
  • About
  • Leadership
  • Cybersecurity Collaboration
    Center
  • National Cryptologic Museum
  • Contact NSA
  • Accessibility
  • ABA Notice
  • Site Policies
CULTURE
  • Operating Authorities
  • Civil Liberties, Privacy, & Transparency Office
  • Compliance

  • General Counsel
  • NSA Inspector General
HELPFUL LINKS
  •  
  • NSA Freedom of Information Act
  • Privacy Act Requests
  • Request a Speaker
  • Prepublication Review
  • Media Inquiry
  • Frequently Asked Questions
  • Scams & Safety
  • Reasonable Accommodations Process
  • Personal Assistance Services
RESOURCES
  • Classified Materiel Conversion
  • Commercial Solutions for Classified Program (CSfC)​
  • Cryptographic Support Services
  • Media Destruction Guidance
  • NSA Open Source
RELATED LINKS
  • DNI.gov
  • Defense.gov
  • IC on the Record
  • Intelligence.gov
  • NSA.GOV
    • About
    • Leadership
    • Cybersecurity Collaboration Center
    • National Cryptologic Museum
    • Contact NSA
    • Accessibility
    • ABA Notice
    • Site Policies
  • CULTURE
    • Operating Authorities
    • Civil Liberties & Privacy
    • General Counsel
    • NSA Inspector General
  • HELPFUL LINKS
    • NSA Freedom of Information Act
    • Frequently Asked Questions
    • Privacy Act Requests
    • Request a Speaker
    • Prepublication Review
    • Media Inquiry
    • Scams & Safety
    • Reasonable Accommodations Process
    • Personal Assistance Services
  • RESOURCES
    • Commercial Solutions for Classified Material (CSFC)
    • Media Destruction Guidance
    • Classified Materiel Conversion
    • Cross Domain Services
    • NSA Open Source
    • NSA Exhibit Roadshow
  • RELATED LINKS
    • DNI.gov
    • Defense.gov
    • IC on the Record
    • Intelligence.gov
  • Privacy & Security     Links Disclaimer     Section 508     Web Policy     Plain Writing Act    DOD IG    No FEAR Act    Imagery Use    FOIA    Open GOV    Strategic Plan    USA.gov    Small Business Act    Site Map  
 
Hosted by Defense Media Activity - WEB.mil Veterans Crisis Line number. Dial 988 then Press 1