An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
With Pail and Shovel: The "Sandbox Approach" to Management and Leadership.PDF
Winning the Paper Chase: Operational Applications of Computer Output Microfiche.PDF
Warning and Crisis Management.PDF
Volunteering: A Fresh Approach.PDF
Virtual Reality.PDF
Unofficial Vocabulary.PDF
United Pigeons Service (UPS).PDF
Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them.PDF
The Origination and Evolution of Radio Traffic Analysis: The World War I Era.PDF
Toward a Taxonomy of Secrets.PDF
Time Is - Time Was - Time Is Past: Computers for Intelligence.PDF
Third Party Nations: Partners and Targets.PDF
The Zimmermann Telegram.PDF
The Way It Used To Be or From ADVA/GENS to the Alphabet (PART II).PDF
The Value of Working Longer Hours for Promotion.PDF
The Use of Compressed Speech in Selecting Morse Code Operators.PDF
The Uncertain Summer of 1945.PDF
The UCSD p-System.PDF
The Sting - Enabling Codebreaking in the Twentieth Century.PDF
The Rosetta Stone and Its Decipherment.PDF
FIRST
77
78
79
(current)
80
81
LAST