An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Equal Employment Opportunity & Accessibility
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Ask Zelda
Search
Search
Upload Date
Upload Date
Document Date
Title
It's the 'P' Word.PDF
An Interview with Zelda.PDF
The Negative Supervisor.PDF
The Disappearing Boss.PDF
Decibels Driving Me Batty.PDF
Private Chit-Chat Goes Public.PDF
Be Zelda for a Day: Butterfly Not Working the Mission.PDF
Is Gossip Getting Your Goat?.PDF
Workplace Dilemma? Dealing with a 'Downer'.PDF
Thorny Supervisory Problem? 'The Odoriferous Officemate'.PDF
Supervisory Woes? 'No Fun to be Caught in the Middle'.PDF
Dress Code.PDF
Zelda's Farewell.PDF
Not My Problem.PDF
Your Experiences.PDF
Stuffed Then Stiffed.PDF
Scent of a Woman.PDF
Navigating the Social Scene with Wallet and Dignity Intact.PDF
Rebuilding after the Hurricane.PDF
Bored to Tears.PDF
FIRST
1
2
3
(current)
4
LAST
Communicators
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Almanac Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
SIGINT and the Battle of the Ia Drang Valley, November 1965
A Spy Like Us: Ronald W. Pelton
Richard A. Day: A Telecommunications Pioneer
A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962 Part 4
A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962 Part 3
A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962 Part 2
A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962 Part 1
The Good Looking Engineer: Ray Bowman
Ralph J. Canine
Ralph Bennett
Quiz
Quis Custodiet Ipsos Custodes?
POLYGLOT: The Meredith Gardner Story
SIGINT in the Panama Canal Treaty Negotiations: Deceptions or Believable Intelligence?
Oscar Collins: A Successful Senior Executive
Operation Billy Budd: NSA and the U.S. Army's Secret
NSA's First Inspector General
NSA's Field Sites
Before Super-Computers: NSA and Computer Development
Nothing Left to Give Up: SIGINT and the Fall of Saigon, April 1975 Part 2
FIRST
1
2
3
(current)
4
5
LAST
Cryptologic Histories
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Quarterly
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Quarterly Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Ten Rules to Avoid Planning Foul-Ups.PDF
Telephone Codes and Safe Combinations: A Deadly Duo.PDF
TEABALL: Some Personal Observations of SIGINT at War.PDF
Summary of the 2003 ATA Annual Conference
Station "C" and Fleet Radio Unit Melbourne (FRUMEL) Revisited.PDF
Solving xa=b(mod c) for x and Undecimating Recursions.PDF
Skunks, Bogies, Silent Hounds, and the Flying Fish: The Gulf of Tonkin Mystery, 2-4 August 1964.PDF
SIGINT Goes to War.PDF
SIGINT and the Holocaust.PDF
Seward's Other Folly: America's First Encrypted Cable.PDF
Sub-HF Search and Acquisition.PDF
RISC Does Windows.PDF
Revisiting the Dispute over the Identification of "AF" as Midway.PDF
Remembering the Lessons of the Vietnam War.PDF
Regierungs-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire.PDF
Red and Purple: A Story Retold.PDF
Receiver Dynamics.PDF
Reading Between the Lines: Methods of Analysis of Soviet Military Literature.PDF
The Origination and Evolution of Radio Traffic Analysis: World War II.PDF
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations.PDF
FIRST
1
2
3
(current)
4
5
LAST
Cryptologic Spectrum Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
The New National Sigint Requirements System: What It Means to NSA .PDF
National Intelligence Warning: The Alert Memorandum.PDF
Message from the Director.PDF
The Many Lives of Herbert O. Yardley.PDF
A Major COMSEC Challenge.PDF
Letter from FANX II.PDF
The Legendary William F. Friedman.PDF
The Legacy of Lambros Demetrios Callimahos.PDF
The Legacy of Lambros Demetrios Callimahas.PDF
Kicking the Hardcopy Habit.PDF
KEPLER: At Last!.PDF
Is Yugoslav President Tito Really a Yugoslav?.PDF
Information Support to Intelligence Production: The Reality and the Dream.PDF
Information and the Sigint Analyst.PDF
IN MEMORIAM: Conel Hugh O'Donel Alexander.PDF
I Remember Juliana.PDF
A History of U.S. Civilians in Field Comint Operations, 1953-1960 - Part II.PDF
A History of U.S. Civilians in Field Comint Operations, 1953-1960 - Part I.PDF
The History of Applesauce.PDF
Ground- Based Remote Intercept in the Far East.PDF
FIRST
1
2
3
(current)
4
5
LAST
Cryptologs
Search
Search
Upload Date
Upload Date
Document Date
Title
Vol. XII, No. 5 - May 1985
Vol. XII, No. 4 - April 1985
Vol. XII, Nos. 1 - 3 - January - March 1985
Vol. XI, Nos. 11 - 12 - November - December 1984
Vol. XI, No. 10 - October 1984
Vol. XI, Nos. 8 - 9 - August - September 1984
Vol. XI, Nos. 6 - 7 - June - July 1984
Vol. XI, No. 5 - May 1984
Vol. XI, No. 4 - April 1984
Vol. XI, Nos. 2 - 3 - February - March 1984
Vol. XI, No. 1 - January 1984
Vol. X, No. 12 - December 1983
Vol. X, No. 11 - November 1983
Vol. X, No. 10 - October 1983
Vol. X, Nos. 6 - 7 - June - July 1983
FAQ for Cryptologs
Vol. X, No. 9 - September 1983
Vol. X, No. 8 - August 1983
Vol. X, No. 5 - May 1983
Vol. X, No. 4 - April 1983
FIRST
1
2
3
(current)
4
5
LAST
History of the Army Security Agency
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
History Today Anthologies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
History Today Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
HISTORY TODAY - 2 NOVEMBER 2015.PDF
HISTORY TODAY - 29 OCTOBER 2015.PDF
HISTORY TODAY - 22 DECEMBER 2015.PDF
HISTORY TODAY - 21 OCTOBER 2015.PDF
HISTORY TODAY - 28 SEPTEMBER 2015.PDF
HISTORY TODAY - 24 SEPTEMBER 2015.PDF
HISTORY TODAY - 20 OCTOBER 2015.PDF
HISTORY TODAY - 2 SEPTEMBER 2015.PDF
HISTORY TODAY - 27 AUGUST 2015.PDF
HISTORY TODAY - 25 AUGUST 2015.PDF
HISTORY TODAY - 1 SEPTEMBER 2015.PDF
HISTORY TODAY - 17 JULY 2015.PDF
HISTORY TODAY - 15 JULY 2015.PDF
HISTORY TODAY - 13 AUGUST 2015.PDF
HISTORY TODAY - 19 MAY 2015.PDF
HISTORY TODAY - 10 JULY 2015.PDF
HISTORY TODAY - 26 FEBRUARY 2015.PDF
HISTORY TODAY - 9 APRIL 2015.PDF
HISTORY TODAY - 6 MAY 2015.PDF
HISTORY TODAY - 4 FEBRUARY 2015.PDF
FIRST
1
2
3
(current)
4
5
LAST
Military Cryptanalysis
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Early Computer History
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Newsletters
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Technical Journal Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
The Apparent Paradox of Bayes Factors
Time Is - Time Was - Time Is Past Computes for Intelligence
Something May Rub Off!
Some Reminiscences
A Boer War Cipher
Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes
A 'Binary' System for Complex Numbers
Soviet Communications Journals as Sources of Intelligence
Broadband Planar Log-Periodic Feed for the Spherical Reflector Used at Arecibo Ionospheric Observatory
Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables
Use of Bayes Factors With a Composite Hypothesis
A List of Properties of Bayes-Turing Factors
Book Review: Pearl Harbor: Warning and Decision
The LIGHTNING Program
An Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride
Why Analog Computation?
How to Visualize a Matrix
The GEE System - V
Aristocrat - An Intelligence Test for Computers
A Cryptologic Fairy Tale
FIRST
1
2
3
(current)
4
5
LAST
NSA/CSS
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Untangling the Web
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA/CSS Policies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.