An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Equal Employment Opportunity & Accessibility
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Ask Zelda
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Communicators
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Almanac Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
From Spring, into a Long Winter's Night: The Czechoslovakian Crisis of 1968 Part Two
From Spring, into a Long Winter's Night: The Czechoslovakian Crisis of 1968 Part One
From Librarians to Leadership: Women at NSA
Frank Rowlett
Francis A. Raven
Fifty Years of GCHQ in Cheltenham
The Death of Dr. Eugene Fubini
Essential for Morale of the Workforce
The World at the End of the War
Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization
Dr. Lowell K. Frazer
Dr. Joseph J. Eachus
Dr. William D. Wray
Dorothy Toplitzky Blum: A Pioneer Computer Scientist
Dining at NSA
Did Anyone Tell the President? Establishing the CRITICOMM System
Defense Special Missile and Astronautics Center (DEFSMAC)
Days of BOURBON
Collection and Processing at NSA
Cecil Phillips: Cryptologic Pioneer
FIRST
3
4
5
(current)
6
7
LAST
Cryptologic Histories
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Quarterly
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Cryptologic Quarterly Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
John H. Tiltman: A Reminiscence.PDF
Intelligence Analysis: Does NSA Have What It Takes.PDF
Inference and Cover Stories.PDF
I Was a Cryptologic Corporal!.PDF
History of the South Vietnamese Directorate General for Technical Security.PDF
A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding.PDF
Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45.PDF
Glimpses of a Man: The Life of Ralph J. Canine.PDF
Geographic Information Systems.PDF
The Future of High Frequencies in Cryptology, Part Two.PDF
The Future of High Frequencies in Cryptology, Part One.PDF
From Crosswords to High-Level Language Competency.PDF
From Chaos Born: General Canine's First Charge to the NSA Workforce.PDF
A First Generation Technical Viral Defense.PDF
Fault Simulation Requirements for Security Fault Analysis.PDF
Facing the Post-Cold War Era.PDF
Examples of Lattices in Computer Security Models.PDF
Error Messages: The Importance of Good Design.PDF
DOS/UNIX Interoperability and Email in the Agency.PDF
Doing Business Smarter: A Proposal for Consolidating NSA's Analysis and Reporting of Foreign Spaceborne Reconnaissance.PDF
FIRST
3
4
5
(current)
6
7
LAST
Cryptologic Spectrum Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Decision Making About Decision Making: Centralization at NSA.PDF
Cryptologic Exhibit Opens at Smithsonian.PDF
Critical Analysis of German Operational Intelligence Part II.PDF
Conel Hugh O'Donel Alexander: A Personal Memoir.PDF
Communications with Extraterrestrial Intelligence.PDF
Comint and the Torpedoing of the Battleship Yamato.PDF
Comint and Sinking of the Battleship Yamato.PDF
COMINT and COMSEC: The Tactics of 1914-1918, Part II.PDF
COMINT and COMSEC: The Tactics of 1914-1918, Part I.PDF
The Colmar Incident.PDF
The Civilianization of Harrogate.PDF
Challenge to SIGINT: Change or Die.PDF
The Callimahos Course.PDF
Building an Intercept Station During World War II.PDF
A Brief History of the U.S. Cryptologic Operations 1917-1929.PDF
Bitter Roots: The Bases of Present Conflicts in the Middle East.PDF
The Beginnings of Radio Intercept in World War I.PDF
Army-Navy-FBI COMINT Agreements in 1942.PDF
The Ardennes Campaign: The Impact of Intelligence.PDF
An Exchange of Memos.PDF
FIRST
2
3
4
5
(current)
6
LAST
Cryptologs
Search
Search
Upload Date
Upload Date
Document Date
Title
Vol. VI, No. 10 - October 1979
Vol. VI, Nos. 8 - 9 - August - September 1979
Vol. VI, No. 7 - July 1979
Vol. VI, No. 6 - June 1979
Vol. VI, No. 5 - May 1979
Vol. VI, No. 4 - April 1979
Vol. VI, No. 3 - March 1979
Vol. VI, No. 2 - February 1979
Vol. VI, No. 1 - January 1979
Vol. V, No. 12 - December 1978
Vol. V, No. 11 - November 1978
Vol. V, No. 10 - October 1978
Vol. V, No. 9 - September 1978
Vol. V, Nos. 7 - 8 - July - August 1978
Vol. V, No. 6 - June 1978
Vol. V, No. 5 - May 1978
Vol. V, No. 4 - April 1978
Vol. V, No. 3 - March 1978
Vol. V, No. 2 - February 1978
Vol. V, No. 1 - January 1978
FIRST
3
4
5
(current)
6
7
LAST
History of the Army Security Agency
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
History Today Anthologies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
History Today Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
History Today 26 June 2014.PDF
History Today 17 June 2014.PDF
History Today 10 July 2014.PDF
10 DECEMBER 2013.PDF
History Today 02 July 2014.PDF
31 JULY 2013.PDF
26 JUNE 2013.PDF
26_JUL_2013.PDF
24 JUNE 2013.PDF
24 JANUARY 2013.PDF
26 SEP 2012.PDF
20 AUG 2012.PDF
15_AUG_2012.PDF
14_JUNE_2013.PDF
29_AUGUST_2011.PDF
25_JULY_2011.PDF
24_MAY_2011.PDF
24_AUGUST_2011.PDF
11_OCTOBER_2011.PDF
1 AUGUST 2011.PDF
FIRST
3
4
5
(current)
6
7
LAST
Military Cryptanalysis
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Early Computer History
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Newsletters
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA Technical Journal Articles
Search
Search
Upload Date
Upload Date
Document Date
Title
Soviet Science and Technology: Present Levels and Future Prospects
Data Transmission Over Telephone Circuits
Antipodal Propagation
Analysis of a Transistor Monostable Multiviibrator
A New Concept in Computing
About NSA
Weather; its Role in Communications Intelligence
Net Reconstruction - A Basic Step in Traffic Analysis
A "Word Spotter"
Signals from Outer Space
Science and Cryptology
Introduction to Traffic Analysis
Development of Automatic Telegraph Switching Systems
Chatter Patterns: A Last Resort
A Precursor of Modern Communications Intelligence
An Introduction to IBM Methods in Cryptanalysis
Emergency Destruction of Documents
Communication Intelligence
Computers - The Wailing Wall
FIRST
1
2
3
4
5
(current)
LAST
NSA/CSS
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
Untangling the Web
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.
NSA/CSS Policies
Search
Search
Upload Date
Upload Date
Document Date
Title
No Documents Found.