An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
The Cuban Missile Crisis: A SIGINT Perspective.PDF
Cuban-Mexican Oil Cooperation: Loosening the Ties that Bind.PDF
Computer Virus Infections: Is NSA Vulnerable?.PDF
Communications Security and the Problem of Hamlet.PDF
COMINT and the PRC Intervention in the Korean War.PDF
The Cobra Judy Acquisition.PDF
The BS Attitudes: How Things Work in Bureaucracies.PDF
Book Review: Chicksands: A Millenium of History.PDF
Book Review: A Century of Spies: Intelligence in the Twentieth Century -.PDF
An Introduction to a Historic Computer Document: Betting on the Future -The 1946 Pendegrass Report - Cryptanalysis and the Digital Computer.PDF
Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945.PDF
BEACHCOMB Program Overview: History, Status, and Directions.PDF
An Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery.PDF
An Evaluation of Conventional and LDD Devices for Submicron Geometries.PDF
A Stab at A2 Criteria.PDF
A Response to "The SIGINT Hounds Were Howling".PDF
A Reflection of Sherman Kent.PDF
A New View of Pearl Harbor: The U.S. Navy and Communications Intelligence.PDF
A Communist Carol.PDF
History of the Signal Security Agency.PDF
FIRST
82
83
84
(current)
85
86
LAST