An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Equal Employment Opportunity & Accessibility
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Ask Zelda
Search
Search
Upload Date
Upload Date
Document Date
Title
'Situation' in the Office? How Can I Get My Boss to 'Ask Before You Task'?.PDF
More Suggestions from Our Readers.PDF
Break it Up!.PDF
Careless Whispers.PDF
Rising from the Ashes of a Ruined Reputation.PDF
The Perils of Pauline.PDF
Stalled in the Ladies Room.PDF
Awful to Always Await an Award.PDF
Avoiding Lock-Up.PDF
Afraid of Retribution.PDF
Zelda and the Grammar Geek Jointly Cure the "Dr" Dilemma.PDF
Retired in Place.PDF
Underwater Battleground.PDF
Taking the "Ouch" Out of a Slouch.PDF
The Young and the Restless.PDF
How to Deal with Resistant Reggie.PDF
Hijacked Distribution List.PDF
Calming a Choleric Co-worker.PDF
Boss is Steering Us Wrong.PDF
Reining in a Chatterbox.PDF
FIRST
1
(current)
2
3
4
LAST
Communicators
Search
Search
Upload Date
Upload Date
Document Date
Title
COMMUNICATOR-III-44.PDF
COMMUNICATOR-III-45.PDF
COMMUNICATOR-III-47.PDF
COMMUNICATOR-III-46.PDF
COMMUNICATOR-III-43.PDF
COMMUNICATOR-III-42.PDF
COMMUNICATOR-III-41.PDF
COMMUNICATOR-III-40.PDF
COMMUNICATOR-III-39.PDF
COMMUNICATOR-III-38.PDF
COMMUNICATOR-III-37.PDF
COMMUNICATOR-III-36.PDF
COMMUNICATOR-III-35.PDF
Cryptologic Almanac Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Delmar C. Lang
A Language Scholar
A mission of great importance?: Recruiting Scientists and Mathematicians at NSA circa 1960
AFSAM-7
The Yom Kippur War of 1973 (Part Two)
The Yom Kippur War of 1974 (Part 1)
Wilma Z. Davis
William Hunt
William Coffee
The Widowmaker: SIGINT and Submarine K-19
Walter Deeley
William F. Friedman
Vietnam: A SIGINT Paradox (Part II)
Vietnam: A SIGINT Paradox (Part I)
VENOVA: An Overview
Velva Klaessy
Update to Martin and Mitchell Article
Uncle Ned
Two-Gun Milt
The Berlin Tunnel Part II: The Rivals
FIRST
1
(current)
2
3
4
5
LAST
Cryptologic Histories
Search
Search
Upload Date
Upload Date
Document Date
Title
American Cryptology during the Cold War, 1945-1989 Series VI, Volume 5, Book II: Centralization Wins, 1960-1972
American Cryptology during the Cold War, 1945-1989 Series VI, Volume 5, Book I: The Struggle for Centralization 1945-1960
History of the Signal Security Agency.PDF
Working Against the Tide.PDF
Space Surveillance SIGINT Program.PDF
THE NATIONAL SECURITY AGENCY AND THE EC-121 SHOOTDOWN.PDF
The Suez Crisis: A Brief Comint History.PDF
Spartans in Darkness.PDF
Purple Dragon.PDF
The Origins of the National Security Agency 1940-1952.PDF
Operation REGAL: The Berlin Tunnel.PDF
On Watch- Profiles from The National Security Agencys' past 40 years.PDF
It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis 1930s - 1960s.PDF
Learning from the Enemy: The GUNMAN Project.PDF
In the Shadow of War.PDF
History of the Signal Security Agency.PDF
A History of U.S. Communications Security.PDF
A History of U.S. Communications Security.PDF
German Clandestine Activities in South America in World War II.PDF
History of Collaboration among French Cryptologic Agencies 1909 - 1939.PDF
FIRST
1
(current)
2
LAST
Cryptologic Quarterly
Search
Search
Upload Date
Upload Date
Document Date
Title
Cryptologic Quarterly Vol. 41
Cryptologic Quarterly Vol. 40
Cryptologic Quarterly Vol. 33
Cryptologic Quarterly Vol. 34
Cryptologic Quarterly Vol. 38
Cryptologic Quarterly Vol. 36
Cryptologic Quarterly Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
National Computer Security Center and the Origins of NSA's Information Assurance Mission
You've Got to Go by the Rules
XNS Ethernet Connections for the IBM PC XT
A World War II German Army Field Cipher and How We Broke It.PDF
Work Force Skills and Mission Requirements Comparison System.PDF
With Pail and Shovel: The "Sandbox Approach" to Management and Leadership.PDF
Winning the Paper Chase: Operational Applications of Computer Output Microfiche.PDF
Warning and Crisis Management.PDF
Volunteering: A Fresh Approach.PDF
Virtual Reality.PDF
Unofficial Vocabulary.PDF
United Pigeons Service (UPS).PDF
Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them.PDF
The Origination and Evolution of Radio Traffic Analysis: The World War I Era.PDF
Toward a Taxonomy of Secrets.PDF
Time Is - Time Was - Time Is Past: Computers for Intelligence.PDF
Third Party Nations: Partners and Targets.PDF
The Zimmermann Telegram.PDF
The Way It Used To Be or From ADVA/GENS to the Alphabet (PART II).PDF
The Value of Working Longer Hours for Promotion.PDF
FIRST
1
(current)
2
3
4
5
LAST
Cryptologic Spectrum Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Cryptologic Spectrum Articles Disclamer.PDF
Up to Our Ears in R/T Intercept.PDF
An Unsolved Puzzle Solved.PDF
Umbrellas, Loops, and Tractors.PDF
ULTRA and the Battle of the Atlantic.PDF
The Historical Impact of Revealing the Ultra Secret.PDF
A Translator Extraordinaire.PDF
Toward an Estimate of the Soviet Worldview Part II.PDF
Toward an Estimate of the Soviet Worldview Part I.PDF
Think Small: Acronyms in English.PDF
The Federal Women's Program: Issues and Answers.PDF
The Need for Continuity in Cryptanalytic Studies.PDF
The History of Friendship.PDF
The Delphi Technique.PDF
Testing Triple Play at NSA.PDF
TEMPEST: A Signal Problem.PDF
Stonehouse.PDF
The Spoken Language Library: Filling a Gap.PDF
A Soviet Defector at NSA.PDF
The Sinking and the Salvage of the Awa Maru.PDF
FIRST
1
(current)
2
3
4
5
LAST
Cryptologs
Search
Search
Upload Date
Upload Date
Document Date
Title
Vol. XXIII, No. 2 - Summer 1997
Vol. XXIII, No. 1 - Spring 1997
Vol. XXII, No. 4 - Winter 1996
Vol. XXII, No. 2 - Summer 1996
Vol. XXII, No. 1 - Spring 1996
Vol. XXI, No. 4 - Winter 1995
Vol. XXI, No. 3 - Fall 1995
Vol. XXI, No. 2 - Summer 1995
Vol. XXI, No. 1 - Issue 1 1995
Vol. XX, No. 2 - 2nd Issue 1994
Vol. XX, No. 1 - 1st Issue 1994
Vol. XIX, No. 3 - 3rd Issue 1992
Vol. XIX, No. 2 - 2nd Issue 1992
Vol. XIX, No. 1 - 1st Issue 1992
Vol. XVIII, No. 3 - 3rd Issue 1991
Vol. XVIII, No. 2 - 2nd Issue 1991
Vol. XVIII, No. 1 - 1st Issue 1991
Vol. XVII, No. 3 - 3rd Issue 1990
Vol. XVII, No. 2 - 2nd Issue 1990
Vol. XVII, No. 1 - 1st Issue 1990
FIRST
1
(current)
2
3
4
5
LAST
History of the Army Security Agency
Search
Search
Upload Date
Upload Date
Document Date
Title
HOMEWORK_BY_DR_WERNER_WEBER_OF_OKWCHI.PDF
FY 1962 ASA History FY 1962 (61 pages)
FY 1963 ASA History FY 1963 (91 pages)
FY 1961 ASA History FY 1961 (52 pages)
FY 1958-1959 ASA History FY 1958-1959, Vol II (181 pages)
FY 1960 ASA History FY 1960, Vol II (111 pages)
FY 1957 ASA History FY 1957, Vol II (115 pages)
FY 1960 ASA History FY 1960, Vol I (286 pages)
FY 1958-1959 ASA History FY 1958-1959, Vol I (302 pages)
FY 1956 ASA History FY 1956, Vol. II (192 pages)
FY 1957 ASA History FY 1957, Vol I (243 pages)
FY 1956 ASA History FY 1956, Vol. I (450 pages)
FY 1955 ASA History FY 1955, Vol. II (236 pages)
FY 1954 ASA History FY 1954, Vol. I ( 195 pages)
FY 1955 ASA History FY 1955, Vol. I (399 pages)
FY 1954 ASA History FY 1954, Vol. II (320 pages)
FY 1953 ASA History FY 1953, Vol. I (185 pages)
FY 1953 ASA History FY 1953, Vol. II (143 pages)
FY 1952 ASA History FY 1952, Vol. II (125 pages)
FY 1951 History of ASA & Subordinate Units (126 pages)
FIRST
1
(current)
2
LAST
History Today Anthologies
Search
Search
Upload Date
Upload Date
Document Date
Title
On The Roof Gang: Who's Harry Kidder
On The Roof Gang: USS Gold Star
On The Roof Gang: Stewart Faulkner Article Part 2
On The Roof Gang: Stewart Faulkner Article Part 1
On The Roof Gang: Lieutenant Prescott Currier
On The Roof Gang: LCDR Kenneth Carmichael
On The Roof Gang: Historic Photograph of the OTR Training Hut
On The Roof Gang: Early Maritime Collection
On The Roof Gang: Cookie and the Clippers
History Today Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
History Today - 10 June 2008
20210211 History Today - Battle of Long Tan.PDF
History Today - Non-Secret Encryption - a “SECRET” no longer
History Today - YP Kim – 2022 NSA Hall of Honor Inductee 3 May 2023
History Today - Finding Ferner: The Story Behind the Re-discovery of a 2022 Cryptologic Hall of Honor Inductee
History Today - Battle of Long Tan: American SIGINT Assists the Australians
History Today - Happy 70th Birthday, Tower Federal Credit Union 2 March 2023
History Today - Jimmy T - 2 February 2023
History Today - Lifting the Curtain 17 February 2022.PDF
HISTORY TODAY 2 MAY 2019.PDF
HISTORY TODAY 23 APRIL 2019.PDF
HISTORY TODAY 25 MARCH 2019.PDF
HISTORY TODAY 25 FEBRUARY 2019.PDF
HISTORY TODAY 22 APRIL 2019.PDF
HISTORY TODAY 10 APRIL 2019.PDF
HISTORY TODAY - 27 MAY 2016.PDF
HISTORY TODAY - 13 JUNE 2016.PDF
HISTORY TODAY - 3 MAY 2016.PDF
HISTORY TODAY - FRIDAY CLASSIC 15 APRIL 2016.PDF
HISTORY TODAY - 20 APRIL 2016.PDF
FIRST
1
(current)
2
3
4
5
LAST
Military Cryptanalysis
Search
Search
Upload Date
Upload Date
Document Date
Title
Military Cryptanalysis Part IV.PDF
Military Cryptanalysis Part I.PDF
Military Cryptanalysis Part III.PDF
Military Cryptanalysis Part II.PDF
NSA Early Computer History
Search
Search
Upload Date
Upload Date
Document Date
Title
NSA's Key Role in Major Developments in Computer Science (Parts 1 & 2)
Equipment Maintenance on ABNER
R7 Memorandum to CRYPTOLOG Editor
History of NSA General-Purpose Electronic Digital Computers; 1964
ABNER: The ASA Computer; Part II
NSA Newsletters
Search
Search
Upload Date
Upload Date
Document Date
Title
NSA NEWSLETTER 1987 NOVEMBER
NSA Newsletter, October 1967
NSA Newsletter - November 1999
NSA Newsletter - October 1999
NSA Newsletter - September 1999
NSA Technical Journal Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
German Radio Intelligence
Words and the Intelligence Value of Conversations
An Application of PTAH to the Voynich Manuscript
The Voynich Manuscript Revisited
Spacecraft Passenger Television from Laika to Gagarin
A Personal Contribution to the Bombe Story
An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript
Selected SIGINT Intelligence Highlights
Some Principles of Cryptographic Security
Earliest Applications of the Computer at NSA
Addendum to "A Cryptologic Fairy Tale"
Rochford's Cipher: A Discovery in Confederate Cryptography
Report of the Second Computer Study Group
Q.E.D. - 2 Hours, 41 Minutes
Famous First Facts, NSA Part I: Pre-Computer Machine Cryptanalysis
Der Fall WICHER: German Knowledge of Polish Success on ENIGMA
The Apparent Paradox of Bayes Factors
Experiences 1920-1929
The Strength of the Bayes Score
Anglicisms in Puerto Rico
FIRST
1
(current)
2
3
4
5
LAST
NSA/CSS
Search
Search
Upload Date
Upload Date
Document Date
Title
National Computer Security Center and the Origins of NSA's Information Assurance Mission
Settings, Keys, Hats, and Head Scratching: The Headline Puzzle
Ninety Years of Assessing Civilian Cryptologic Performance at the National Security Agency
NSA Directors: The Selection and Confirmation Process
Showcase of the National Security Agency The National Cryptologic Museum: A 10-Year Anniversary Retrospective
Women in Mathematics Society
Tale of the Tape
Rare Books in the National Cryptologic Museum *
The Origins of NSA *
Fun Facts about Cryptology
The History of Traffic Analysis: World War I - Vietnam *
50th Anniversary Brochure
Untangling the Web
Search
Search
Upload Date
Upload Date
Document Date
Title
Untangling the Web.PDF
NSA/CSS Policies
Search
Search
Upload Date
Upload Date
Document Date
Title
NSA/CSS POLICY 12-3: ANNEX A
NSA/CSS POLICY 12-2: MISSION COMPLIANCE AND INTELLIGENCE OVERSIGHT
NSA/CSS POLICY 12-1: CIVIL LIBERTIES AND PRIVACY PROGRAM
NSA/CSS POLICY 12-3(a): PROTECTION OF CIVIL LIBERTIES AND PRIVACYOF U.S. PERSON INFORMATION WHEN CONDUCTING NSA/CSS MISSION AND MISSION-RELATED ACTIVITIES
Handling Requests for Release of U.S. Identities