Skip to main content (Press Enter).
Toggle navigation
National Security Agency Central Security Service
National Security Agency Central Security Service
Search
Search NSA CSS:
Search
Search NSA CSS:
Search
Documentation
Interactive Process
Job Reassignment
Implementation
Decisions
Denial
Reconsideration
Confidentiality
Statutory Claims
CryptoComics
NSA.gov Navigation Menu Button
About Us
Mission & Values
Current Leadership
Former Directors
Former D/Directors
Former D/CSS
Central Security Service (CSS)
Cryptologic Centers
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
NSA/CSS Texas
Diversity, Equality & Inclusion
Accommodations & Accessibility
Discrimination Complaints
No FEAR Act & Data
Employee Resource Groups
Civil Liberties and Privacy
About
Leadership
Reports
Resources
Contact
Cryptologic Heritage
Cryptologic Heritage FAQs
Center for Cryptologic History
Pre 1952 Timeline
Pearl Harbor Review
Voices from the Past
About the NSA/CSS Insignia
Historical Figures & Publications
African Americans
Cryptologic Hall of Honor
NSA 60th Anniversary
Publications
Women
National Cryptologic Memorial
National Cryptologic Museum
About the Museum
Exhibits & Artifacts
Hours of Operation
Tours & Education Programs
Map & Directions
Office of General Counsel
Office of the Inspector General
Frequently Asked Questions
Contact NSA
What We Do
Understanding the Threat
Signals Intelligence
SIGINT FAQs
Cybersecurity
Cybersecurity Advisories & Technical Guidance
Telework and Mobile Security Guides
Threat Intelligence & Assessments
Cybersecurity Products & Services
Cybersecurity Education
Cybersecurity Careers
Partnership
Press & Public Engagements
Support to the Military
Customers & Partners
Research
Cybersecurity Research
Math Sciences Program
Computer and Analytic Sciences Research
Technology Transfer Program
Publications
Research Papers
Science of Security
News & Features
Feature Stories
Press Room
Speeches and Testimonies
Declassified Documents
The Next Wave
Digital Media Center
Video Audio Clips
Image Galleries
Publications
Resources
Students and Educators
National Centers of Academic Excellence in Cybersecurity
Centers of Academic Excellence in Cyber Operations
Criteria for Measurement for CAE in Cyber Operations Advanced
Requirements
Application
Criteria for Measurement for CAE in Cyber Operations Fundamental
application
Application
CAE-Cyber Operations Announcements
K-12 Partnership
Research Partnership
Featured Schools
UMBC
North Carolina Agricultural & Technical State University (N.C. A&T)
University of Texas San Antonio
University of Hawaii
Illinois at Urbana-Chapaign
Carnegie Mellon University
OnRamp II Program
Cybersecurity Professionals
Request an NSA Speaker
Freedom of Information Act
Open Source @ NSA
Prepublication Review
Commercial Solutions for Classified Program (CSfC)
Threat Prevention
Capability Packages
Archived Capability Packages
Components List
Archived Components List
CNSA Suite
Solution Registration
Newsletter
Trusted Integrator List
Archived Trusted Integrator List
Customer Handbook
Frequently Asked Question
Coming Soon
Points of Contact
Media Destruction Guidance
Vendor Information
FAQ
Classified Material Conversion
Join our Team
Apply Now!
Career Fields
Development Programs
Student Programs
Diversity at NSA
Employee Spotlights
Doing Business With Us
Getting Started
Conferences & Events
Office of Small Business Programs
Acquisition Resource Center
Business Programs and Resources
Contacts
Home
News & Features
Declassified Documents
Cryptologic Spectrum
Cryptologic Spectrum Articles
Disclaimer
Challenge to SIGINT: Change or Die
Fall 1969-Vol. 1, No. 1
Equal Employment Opportunity: What It Means
Fall 1969 - Vol. 1, No. 1
Letter from FANX II
Fall 1969 - Vol. 1, No. 1
Fishing for HF Signals
Fall 1969-Vol. 1, No. 1
The Gray Fox Swallowed the Bait
Fall 1969-Vol. 1, No. 1
Ralph Canine
Fall 1969 - Vol. 1, No. 1
The Civilianization of Harrogate
Summer 1970 Vol. 1, No. 2
Operation Starlight: A Sigint Success Story
Fall 1971 - Vol. 1, No. 3
Up to Our Ears in R/T Intercept
Summer 1970 Vol. 1, No. 2
Sigint Technical Primer-I
Fall 1971 - Vol. 1, No. 3
Remember the Liberty
Spring 1972 - Vol. 2, No. 2
COMINT and COMSEC: The Tactics of 1914-1918, Part I
Summer 1972 Vol 2, No. 3
The Federal Women's Program: Issues and Answers
Spring 1973 - Vol. 3, No. 2
German SIGINT Success in World War II
Spring 1973 - Vol. 3, No. 2
Sigint Technical Primer-II Modulation
Summer 1972 Vol 2, No. 3
TEMPEST: A Signal Problem
Summer 1972 Vol. 2, No. 3
COMINT and COMSEC: The Tactics of 1914-1918, Part II
Fall 1972 Vol 2, No. 4
An Exchange of Memos
Spring 1973 - Vol. 3, No. 2
A History of U.S. Civilians in Field Comint Operations, 1953-1960 - Part I
Spring 1973 - Vol. 3, No. 2
The History of Friendship
Spring-Summer 1973 - Vol. 3, Nos. 2-3
A History of U.S. Civilians in Field Comint Operations, 1953-1960 - Part II
Summer 1973 - Vol. 3, No. 3
Security in an Open Society
Fall 1973 - Vol. 3, No. 4
Decision Making About Decision Making: Centralization at NSA
Fall 1973 Vol 3, No.4
NSA's First Contingency Operation
Fall 1973 Vol.3, No. 4
Don't Say MUSSO--Say USSID (There is a BIG Difference)
Winter 1973 - Vol. 3, No. 1
The History of Applesauce
Winter 1973 - Vol. 3, No. 1
The Early History of NSA
Spring 1974 - Vol. 4, No. 2
A Soviet Defector at NSA
Spring 1974 - Vol. 4, No. 2
Ground- Based Remote Intercept in the Far East
Spring 1974 - Vol. 4, No. 2
Building an Intercept Station During World War II
Summer 1974 - Vol. 45, No. 4
IN MEMORIAM: Conel Hugh O'Donel Alexander
Summer 1974 - Vol. 4, No. 3
The Delphi Technique
Summer 1974 - Vol. 4, No. 3
A Major COMSEC Challenge
Fall 1974 - Vol. 4, No. 5
The New National Sigint Requirements System: What It Means to NSA
-
Fall 1974 - Vol. 5, No. 4
Think Small: Acronyms in English
Fall 1974 - Vol. 4, No. 5
First Airborne Elint Collection?
Winter 1974 - Vol. 4, No. 1
The Legendary William F. Friedman
Winter 1974 - Vol. 4, No. 1
Message from the Director
Winter 1974 - Vol. 4, No. 1
Sigint Technical Primer-III
Spring 1975 - Vol. 5, No. 2
The Sigint Users' Handbook
Spring 1975 - Vol. 5, No. 2
Communications with Extraterrestrial Intelligence
Spring 1975-Vol. 5, No. 2
The Need for Continuity in Cryptanalytic Studies
Spring 1975 - Vol. 5, No. 2
Early History of the Soviet Missile Program (1945-1953)
Summer 1975 - Vol. 5, No. 3
The German Cryptologic Effort 1918-1945
Summer 1975
Army-Navy-FBI COMINT Agreements in 1942
Fall 1975 - Vol. 5, No. 4
The Colmar Incident
Fall 1975 - Vol. 5, No. 4
Stonehouse
Fall 1975 - Vol. 5, No. 4
A Brief History of the U.S. Cryptologic Operations 1917-1929
Spring 1976 - Vol. 6, No. 2
A Translator Extraordinaire
Fall 1976 - Vol. 6, No. 4
Dmitri Ustinov: The Kremlin's Surprise Choice for Minister of Defense
Fall 1976 - Vol. 6, No. 4
American Systems in the Revolutionary War
Winter 1976 Vol 6., No. 1
Fabrication of Traffic--It Can and Did Happen
Winter 1976 - Vol. 6, No. 1
Bitter Roots: The Bases of Present Conflicts in the Middle East
Spring 1977 - Vol. 7, No. 2
Comint and Torpedoing of the Battleship Yamato
Spring 1977 Vol. 7, No. 2
Comint and Sinking of the Battleship Yamato
Spring 1977 Vol. 7, No. 3
The Origin and Development of 3-US
Spring 1977 - Vol. 7, No. 2
The Origin and Development of 3-US - Part II
Summer 1977 - Vol. 7, No. 3
I Remember Juliana
Summer 1977 - Vol. 7, No. 3
The Origin of U.S.-British Communications Intelligence Cooperation (1940-41)
Fall 1977 - Vol. 7, No. 4
Conel Hugh O'Donel Alexander: A Personal Memoir
Spring 1978 - Vol. 8, No. 2
The German Comint Organization in World War II
Spring 1978 - Vol. 8, No. 2
The Beginnings of Radio Intercept in World War I
Summer 1978 - Vol. 8, No. 2
German Intercept Successes Early in World War II
Fall 1978 - Vol. 8, No. 4
ULTRA and the Battle of the Atlantic
Winter 1978 - Vol. 8, No. 1
The Historical Impact of Revealing the Ultra Secret
Winter 1978 - Vol. 8, No. 1
The Callimahos Course
Winter 1979 - Vol. 9, No. 1
The National Sigint Operations Center
Summer 1979 - Vol. 9, No. 3
The Legacy of Lambros Demetrios Callimahos
Winter 1979 - Vol. 9, No. 1
The Legacy of Lambros Demetrios Callimahas
Winter 1979 - Vol. 9, No. 1
Is Yugoslav President Tito Really a Yugoslav?
Spring 1980 - Vol. 10, No. 2
The Russian Language Training Program
Spring 1980 - Vol. 10, No. 2
Testing Triple Play at NSA
Spring 1980 - Vol. 10, No. 2
An Unsolved Puzzle Solved
Spring 1980 - Vol. 10, No. 2
Electronic Security Command Alert Center
Summer 1980 - Vol. 10, No. 3
Information and the Sigint Analyst
Summer 1980 - Vol. 10, No. 3
Kicking the Hardcopy Habit
Summer 1980 - Vol. 10, No. 3
Umbrellas, Loops, and Tractors
Summer 1980 - Vol. 10, No. 3
Down the Amur, Statistically
Fall 1980 - Vol. 10, No. 4
Information Support to Intelligence Production: The Reality and the Dream
Fall 1980 - Vol. 10, No. 4
Remarks at Language Intern Graduation
Fall 1980 - Vol. 10, No. 4
Toward an Estimate of the Soviet Worldview Part I
Fall 1980 - Vol. 10, No. 4
Critical Analysis of German Operational Intelligence Part II
Winter 1980 - Vol. 10, No. 1
KEPLER: At Last!
Winter 1980 - Vol. 10, No. 1
The NSA Declassification Program
Winter 1980 - Vol. 10, No. 1
Cryptologic Exhibit Opens at Smithsonian
Spring 1981 - Vol. 11, No. 2
Electronic Warfare and Signals Intelligence at the Outset of World War I
Spring 1981 - Vol. 11, No. 2
Frank B. Rowlett
Spring 1981 - Vol. 11, No. 2
The Spoken Language Library: Filling a Gap
Spring 1981 - Vol. 11, No. 2
The Ardennes Campaign: The Impact of Intelligence
Summer 1981 - Vol. 11, No. 3
Direct Support during Operation DEWEY CANYON
Summer 1981 - Vol. 11, No. 3
Provision of Cryptologic Information to the Congress
Summer 1981 - Vol. 11, No. 3
Reflections on the Soviet Strategic Missile Threat of 1960
Summer 1981 - Vol. 11, No. 3
The Sinking and the Salvage of the Awa Maru
Summer 1981 - Vol. 11, No. 3
The Defense Special Missile and Astronautics Center
Fall 1981 - Vol. 11, No. 4
The Many Lives of Herbert O. Yardley
Fall 1981 - Vol. 11, No. 4
Operations Security Techniques: An Analysis of GIANT SCALE
Fall 1981 - Vol. 11, No. 4
Foreign Language Learning: A Comparative Analysis of Relative Difficulty
Winter 1981 - Vol. 11, No. 1
National Intelligence Warning: The Alert Memorandum
Winter 1981 - Vol. 11, No. 1
RS-15A: Thoughts on the Intensive Russian Training Course
Winter 1981 - Vol. 11, No. 1
Toward an Estimate of the Soviet Worldview Part II
Winter 1981 - Vol. 11, No. 1