NSA Technical Journal Articles
Emergency Destruction of Documents - April 1956 - Vol. I, No. 1
Computers - The Wailing Wall - October 1956 - Vol. I, No. 3
Communication Intelligence - April 1957 - Vol. II, No. 2
An Introduction to IBM Methods in Cryptanalysis - July 1957 - Vol. II, No. 3
Development of Automatic Telegraph Switching Systems - July 1957 - Vol. II, No. 3
Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4
Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2
Signals from Outer Space - April 1958 - Vol. III, No. 2
Science and Cryptology - July 1958 - Vol. III, No. 3
Net Reconstruction - A Basic Step in Traffic Analysis - July 1958 - Vol. III, No. 3
A Precursor of Modern Communications Intelligence- July 1958 - Vol. III, No. 3
Weather; its Role in Communications Intelligence - July 1958 - Vol. III, No. 3
A New Concept in Computing - December 1958 - Vol. III, No. 4
About NSA - January 1959 - Vol. IV, No. 1
Antipodal Propagation - January 1959 - Vol. IV, No. 1
Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1
Soviet Science and Technology: Present Levels and Future Prospects - January 1959 - Vol. IV, No. 1
Analysis of a Transistor Monostable Multiviibrator - July 1959 - Vol. IV, No. 3
Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2
The Special Felix System - April 1959 - Vol. IV, No. 2
Cover and Deception - July 1959 - Vol. IV, No. 3
Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3
LIGHTNING - July 1959 - Vol. IV, No. 3
A "Word Spotter" - October 1959 - Vol. IV, No. 4
Approximation of Central Limits - October 1959 - Vol. IV, No. 4
A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4
COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4
The Borders of Cryptology - October 1959 - Vol. IV, No. 4
Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1
Bayes Marches On - January 1960 - Vol. V, No. 1
Abstract Groups Defined by Generating Operators - April 1960 - Vol. V, No. 2
Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4
How the Germans Broke a U.S. Code - Fall 1960 - Vol. V, Nos. 3 & 4
The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2
The Unbreakable Cipher - Spring 1961 - Vol. VI, No. 2
Are the Russians Gaining Wordwise? - Spring 1961 - Vol. VI, No. 2
The GEE System I - Fall 1961, Vol. VI, No. 4
Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1 - Winter 1962 - Vol. VII, No. 1
A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2
Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol. VII, No. 2
Why Analog Computation? - Summer 1962 - Vol. VII, No. 3
German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3
The GEE System - V - Fall 1962 - Vol. VII, No. 4
An Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride - Spring 1963 - Vol. VIII, No. 2
How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3
Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol. VIII, No. 1
The LIGHTNING Program - Winter 1963 - Vol. VIII, No. 1
Soviet Communications Journals as Sources of Intelligence - August 1964 - Vol. IX, No. 3
Use of Bayes Factors With a Composite Hypothesis - Fall 1964 - Vol. IX, No. 4
A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No. 2
Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables - Spring 1965 - Vol. X, No. 2
A 'Binary' System for Complex Numbers - Spring 1965 - Vol. X, No. 2
Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes - Summer 1965 - Vol. X, No. 3
Broadband Planar Log-Periodic Feed for the Spherical Reflector Used at Arecibo Ionospheric Observatory - Summer 1965 - Vol. X, No. 3
A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. X, No. 4
Something May Rub Off! - Winter 1965 - Vol. X, No. 1
Time Is - Time Was - Time Is Past Computes for Intelligence - Winter 1965 - Vol. X, No. 1
The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1
Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2
A Text Recognition Procedure for Cryptanalysis - Summer 1966 - Vol. XI, No. 3
Some Reminiscences - Summer 1966 - Vol. XI, No. 3
Communications with Extraterrestrial Intelligence - Winter 1966 - Vol. XI, No. 1
Cranks, Nuts, and Screwballs - Winter 1966 - Vol. XI, No. 1
Collected Editorials of Sydney Fairbanks - December 1966 - Special Issue
Bipolar Coding and Baseband Recovery - Winter 1967 - Vol. XII, No. 1
The Voynich Manuscript: "The Most Mysterious Manuscript in the World" - Summer 1967 - Vol. XII, No. 3
John Dee: Consultant to Queen Elizabeth I - Fall 1967 - Vol. XII, No. 4
Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4
The Library and the User - Spring 1968 - Vol. XIII, No. 2
Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4
Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1
An Application of Queueing Theory to Computer Systems - Spring 1969 - Vol. XIV, No. 2
Curiosa Scriptorum Sericorum: To Write But Not to Communicate - Summer 1971 - Vol. XVI, No. 3
Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol. XVI, No. 3
The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1
Foreign vs. U.S. Computers: An Appraisal - Special Issue 1972
Growing Up With Computers at NSA - Special Issue 1972
Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1
Anglicisms in Puerto Rico - Winter 1972 - Vol. XVII, No. 1
The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1
APL Mechanization of Indirect Symmetry - Summer 1972 - Vol. XVII, No. 3
Experiences 1920-1929 - Summer 1972 - Vol. XVII, No. 3
The Apparent Paradox of Bayes Factors - Summer 1972 - Vol. XVII, No. 3
Famous First Facts, NSA Part I: Pre-Computer Machine Cryptanalysis - Fall 1972 - Vol. XVII, No. 4
Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4
Rochford's Cipher: A Discovery in Confederate Cryptography - Fall 1973, Vol. XVIII, No. 4
Earliest Applications of the Computer at NSA - Winter 1973 - Vol. XVIII, No. 1
Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1
Report of the Second Computer Study Group - Winter 1974 - Vol. XIX, No. 1
Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3
Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4
Der Fall WICHER: German Knowledge of Polish Success on ENIGMA - Spring 1975 - Vol. XX, No. 2
A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4
Spacecraft Passenger Television from Laika to Gagarin - Spring 1976 - Vol. XXI, No. 2
The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3
Words and the Intelligence Value of Conversations - Spring 1978 - Vol XXIII, No. 2
An Application of Cluster Analysis and Multidimensional Scaling to the Question of "Hands" and "Languages" in the Voynich Manuscript - Summer 1978 - Vol. XXIII, No. 3
An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol. XXIV, No. 2
German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4