An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
The Korean War: The SIGINT Background *
PFC Jay Stoner
A History of US Communications Intelligence during WWII: Policy and Administration *
SIGSALY Story
How Mathematicians Helped Win WWII
Sharing the Burden: Women in Cryptology during WWII *
A History of Secure Voice Coding: Insights Drawn from the Career of One of the Earliest Practitioners of the Art of Speech Coding
A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea Midway and the Aleutians *
American Signal Intelligence in Northwest Africa and Western Europe *
The Start of the Digital Revolution: SIGSALY - Secure Digital Voice Communications in WWII *
The Battle of Midway: AF is Short of Water
West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History *
Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust 1939-1945 *
Cryptologic Aspects of German Intelligence Activities in South America during World War II *
The Cryptographic Mathematics of Enigma
The First Americans: The 1941 US Codebreaking Mission to Bletchley Park
Pearl Harbor Revisited: United States Navy Communications Intelligence 1924-1941 *
Origins of the Navajo Code Talkers
The Secret of Adam and Eve
German Cipher Machines of World War II *
FIRST
26
27
28
(current)
29
30
LAST