The following are the declassified issues of the Communicator – NSA’s Employee Publication. Just click on the corresponding issue to download the file. Communicator – Vol. III, No. 35 [4 Pages, 367kb] Communicator – Vol. III, No. 36 [4 Pages, 353kb] Communicator – Vol. III, No. 37 [4 Pages, 227kb] Communicator – Vol. III, No. 38 [4 Pages, 275kb] Communicator – Vol. III, No. 39 [4 Pages, 364kb] Communicator – Vol. III, No. 40 [4 Pages, 342kb] Communicator – Vol. III, No. 41 [4 Pages, 346kb] Communicator – Vol. III, No. 42 [4 Pages, 360kb] Communicator – Vol. III, No.…
Author: John Greenewald
Background The National Security Agency released all 136 issues of one of its longest-lived technical publications, Cryptolog. This released collection encompasses well over a thousand articles covering a cross-section of the disciplines and focus areas of the Agency, and is over 4,100 pages. Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.” Another editor called it “a mix of technical, expository, philosophical, futuristic, argumentative and historical articles – with a light touch here and there – there’s always an article or two to engage the reader.” Issues…
(Published in 2012) – Established on Nov. 4, 1952, this year the National Security Agency celebrates 60 years of service to the nation. In issuing the directive that gave birth to the agency, then-President Harry Truman understood the need to continue U.S. efforts that had led to breaking German and Japanese codes in World War II, success against the German U-Boat threat in the North Atlantic, and victory in the Battle of Midway in the Pacific. America had become a dominant power on a global stage, facing global responsibilities and threats. As war raged in Korea, the creation of NSA…
In September of 2013, news surfaced that the National Security Agency (NSA) entered a one year contract with the French security firm VUPEN, for a one-year subscription to the company’s “binary analysis and exploits service”. According to their website: “VUPEN is the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research. While other companies in the vulnerability intelligence industry mainly act as brokers who buy vulnerabilities from third-party researchers and then sell them to their customers, all VUPEN’s vulnerability intelligence results exclusively from our internal and in-house research efforts conducted by our team of world-class researchers.” With…
The following is a list of documents that have not yet been categorized into the other categories. Until they are, they are listed here. Air Crash in Up-State New York [6 Pages] The Booklet: Intelligence – The Acme of Skill [32 Pages] Democratic Influence Through Internet Usage in the Peoples Republic of China [49 Pages, 4.75mb] The Defense of Duffer’s Drift [78 Pages] – Fictional account of a young British officer’s misadventures during the Boer War Department of Energy Super Computer [311 Pages] Developments in Military Infrared and Laser Technology [12 Pages] DoD Supercomputing Needs [24 Pages] Hale-Bopp Comet [10…