Skip to main content (Press Enter).
Toggle navigation
National Security Agency Central Security Service
National Security Agency Central Security Service
Search
Search NSA CSS:
Search
Search NSA CSS:
Search
CryptoComics
NSA.gov Navigation Menu Button
About Us
Mission & Values
Current Leadership
Former Directors
Former D/Directors
Former D/CSS
Central Security Service (CSS)
Cryptologic Centers
NSA/CSS Colorado
NSA/CSS Georgia
NSA/CSS Hawaii
NSA/CSS Texas
Diversity, Equality & Inclusion
Accommodations & Accessibility
Discrimination Complaints
No FEAR Act & Data
Employee Resource Groups
Civil Liberties and Privacy
About
Leadership
Reports
Resources
Contact
Cryptologic Heritage
Cryptologic Heritage FAQs
Center for Cryptologic History
Pre 1952 Timeline
Pearl Harbor Review
Voices from the Past
About the NSA/CSS Insignia
Historical Figures & Publications
African Americans
Cryptologic Hall of Honor
NSA 60th Anniversary
Publications
Women
National Cryptologic Memorial
National Cryptologic Museum
About the Museum
Exhibits & Artifacts
Hours of Operation
Tours & Education Programs
Map & Directions
Office of General Counsel
Office of the Inspector General
Frequently Asked Questions
Contact NSA
What We Do
Understanding the Threat
Signals Intelligence
SIGINT FAQs
Cybersecurity
Cybersecurity Advisories & Technical Guidance
Telework and Mobile Security Guides
Threat Intelligence & Assessments
Cybersecurity Products & Services
Cybersecurity Education
Cybersecurity Careers
Partnership
Press & Public Engagements
Cybersecurity Collaboration Center
Support to the Military
Customers & Partners
Research
Cybersecurity Research
Math Sciences Program
Computer and Analytic Sciences Research
Technology Transfer Program
Publications
Research Papers
Science of Security
News & Features
Feature Stories
Press Room
Speeches and Testimonies
Declassified Documents
The Next Wave
Digital Media Center
Video Audio Clips
Image Galleries
Publications
Resources
Students and Educators
National Centers of Academic Excellence in Cybersecurity
Centers of Academic Excellence in Cyber Operations
Criteria for Measurement for CAE in Cyber Operations Advanced
Requirements
Application
Criteria for Measurement for CAE in Cyber Operations Fundamental
application
Application
CAE-Cyber Operations Announcements
K-12 Partnership
Research Partnership
Featured Schools
UMBC
North Carolina Agricultural & Technical State University (N.C. A&T)
University of Texas San Antonio
University of Hawaii
Illinois at Urbana-Chapaign
Carnegie Mellon University
OnRamp II Program
Cybersecurity Professionals
Request an NSA Speaker
Freedom of Information Act
Open Source @ NSA
Prepublication Review
Commercial Solutions for Classified Program (CSfC)
Threat Prevention
Capability Packages
Archived Capability Packages
Components List
Archived Components List
CNSA Suite
Solution Registration
Newsletter
Trusted Integrator List
Archived Trusted Integrator List
Customer Handbook
Frequently Asked Question
Coming Soon
Points of Contact
Media Destruction Guidance
Vendor Information
FAQ
Classified Material Conversion
Join our Team
Apply Now!
Career Fields
Development Programs
Student Programs
Diversity at NSA
Employee Spotlights
Doing Business With Us
Getting Started
Conferences & Events
Office of Small Business Programs
Acquisition Resource Center
Business Programs and Resources
Contacts
Home
News & Features
Declassified Documents
Cryptologic Histories
Cryptologic Histories
A History of U.S. Communications Security
Volume I
A History of U.S. Communications Security
Volume II
American Cryptology During the Cold War
1945-1989 Book I
American Cryptology During the Cold War
1945-1989 Book II
American Cryptology During the Cold War
1945-1989 Book III
American Cryptology During the Cold War
1945-1989 Book IV
BOURBON to Black Friday: The Allied Collaborative COMINT Effort against the Soviet Union 1945-1948
The Cryptology of the German Intelligence Services
German Clandestine Activities in South America in World War II
History of Collaboration among French Cryptologic Agencies 1909 - 1939
History of the Signal Security Agency
Volume I Organization Parts I and II
History of the Signal Security Agency
Volume II The General Cryptanalytic Problems
In the Shadow of War
It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis 1930s - 1960s
Learning from the Enemy: The GUNMAN Project
The National Security Agency and the EC-121 Shootdown
On Watch- Profiles from The National Security Agencys' past 40 years
Operation REGAL: The Berlin Tunnel
The Origins of the National Security Agency 1940-1952
Purple Dragon
Space Surveillance SIGINT Program
Spartans in Darkness
The Suez Crisis: A Brief Comint History
Working Against the Tide