page list

31 Jul 2018

NSA Technical Journal Articles



NSA Technical Journal Articles


Emergency Destruction of Documents - April 1956 - Vol. I, No. 1
Computers - The Wailing Wall - October 1956 - Vol. I, No. 3
Communication Intelligence - April 1957 - Vol. II, No. 2
Chatter Patterns: A Last Resort - October 1957 - Vol. II, No. 4
Introduction to Traffic Analysis - April 1958 - Vol. III, No. 2
Signals from Outer Space - April 1958 - Vol. III, No. 2
Science and Cryptology - July 1958 - Vol. III, No. 3
A New Concept in Computing - December 1958 - Vol. III, No. 4
About NSA - January 1959 - Vol. IV, No. 1
Antipodal Propagation - January 1959 - Vol. IV, No. 1
Data Transmission Over Telephone Circuits - January 1959 - Vol. IV, No. 1
Cryptanalysis in The German Air Force - April 1959 - Vol. IV, No. 2
The Special Felix System - April 1959 - Vol. IV, No. 2
Cover and Deception - July 1959 - Vol. IV, No. 3
Intercept of USSR Missile Transmissions - July 1959 - Vol. IV, No. 3
LIGHTNING - July 1959 - Vol. IV, No. 3
Approximation of Central Limits - October 1959 - Vol. IV, No. 4
A Program for Correcting Spelling Errors - October 1959 - Vol. IV, No. 4
COMINT Satellites - A Space Problem- October 1959 - Vol. IV, No. 4
The Borders of Cryptology - October 1959 - Vol. IV, No. 4
Did Aleksandr Popov Invent Radio? - January 1960 - Vol. V, No. 1
Bayes Marches On - January 1960 - Vol. V, No. 1
Book Review: Lost Languages - Fall 1960 - Vol. V. Nos. 3 & 4
How the Germans Broke a U.S. Code - Fall 1960 - Vol. V, Nos. 3 & 4
The "Tunny" Machine and Its Solution - Spring 1961 - Vol. VI, No. 2
The Unbreakable Cipher - Spring 1961 - Vol. VI, No. 2
Are the Russians Gaining Wordwise? - Spring 1961 - Vol. VI, No. 2
The GEE System I - Fall 1961, Vol. VI, No. 4
A Cryptologic Fairy Tale - Spring 1962 - Vol. VII, No. 2
Aristocrat - An Intelligence Test for Computers - Spring 1962 - Vol. VII, No. 2
Why Analog Computation? - Summer 1962 - Vol. VII, No. 3
German Agent Systems of World War II - Summer 1962 - Vol. VII, No. 3
The GEE System - V - Fall 1962 - Vol. VII, No. 4
How to Visualize a Matrix - Summer 1963 - Vol. VIII, No. 3
Book Review: Pearl Harbor: Warning and Decision - Winter 1963 - Vol. VIII, No. 1
The LIGHTNING Program - Winter 1963 - Vol. VIII, No. 1
A List of Properties of Bayes-Turing Factors - Spring 1965 - Vol. X, No. 2
A 'Binary' System for Complex Numbers - Spring 1965 - Vol. X, No. 2
A Boer War Cipher - Summer 1965 - Vol. X, No. 3 and Fall 1965 - Vol. X, No. 4
Something May Rub Off! - Winter 1965 - Vol. X, No. 1
The Apparent Paradox of Bayes Factors - Winter 1965 - Vol. X, No. 1
Extraterrestrial Intelligence - Spring 1966 - Vol. XI, No. 2
A Text Recognition Procedure for Cryptanalysis - Summer 1966 - Vol. XI, No. 3
Some Reminiscences - Summer 1966 - Vol. XI, No. 3
Cranks, Nuts, and Screwballs - Winter 1966 - Vol. XI, No. 1
Collected Editorials of Sydney Fairbanks - December 1966 - Special Issue
Bipolar Coding and Baseband Recovery - Winter 1967 - Vol. XII, No. 1
John Dee: Consultant to Queen Elizabeth I - Fall 1967 - Vol. XII, No. 4
Weather or Not - Encrypted? - Fall 1967 - Vol. XII, No. 4
The Library and the User - Spring 1968 - Vol. XIII, No. 2
Mokusatsu: One Word, Two Lessons - Fall 1968 - Vol. XIII, No. 4
Key to The Extraterrestrial Messages - Winter 1969 - Vol. XIV, No. 1
Multiple Hypothesis Testing and the Bayes Factor - Summer 1971 - Vol. XVI, No. 3
The Rosetta Stone and Its Decipherment - Winter 1971 - Vol. XVI, No. 1
Growing Up With Computers at NSA - Special Issue 1972
Writing Efficient FORTRAN - Spring 1972 - Vol. IX, No. 1
Anglicisms in Puerto Rico - Winter 1972 - Vol. XVII, No. 1
The Strength of the Bayes Score - Winter 1972 - Vol. XVII, No. 1
APL Mechanization of Indirect Symmetry - Summer 1972 - Vol. XVII, No. 3
Experiences 1920-1929 - Summer 1972 - Vol. XVII, No. 3
The Apparent Paradox of Bayes Factors - Summer 1972 - Vol. XVII, No. 3
Q.E.D. - 2 Hours, 41 Minutes - Fall 1973, Vol. XVIII, No. 4
Earliest Applications of the Computer at NSA - Winter 1973 - Vol. XVIII, No. 1
Addendum to "A Cryptologic Fairy Tale" - Winter 1973 - Vol. XVIII, No. 1
Report of the Second Computer Study Group - Winter 1974 - Vol. XIX, No. 1
Some Principles of Cryptographic Security - Summer 1974 - Vol. XIX, No. 3
Selected SIGINT Intelligence Highlights - Fall 1974 - Vol. XIX, No. 4
A Personal Contribution to the Bombe Story - Fall 1975 - Vol. XX, No. 4
The Voynich Manuscript Revisited - Summer 1976 - Vol. XXI, No. 3
Words and the Intelligence Value of Conversations - Spring 1978 - Vol XXIII, No. 2
An Application of PTAH to the Voynich Manuscript - Spring 1979 - Vol. XXIV, No. 2
German Radio Intelligence - Fall 1980 - Vol. XXV, No. 4