<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Cryptology - The Black Vault</title>
	<atom:link href="https://www.theblackvault.com/documentarchive/category/intelligence/cryptology/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.theblackvault.com/documentarchive</link>
	<description>Discover the Truth</description>
	<lastBuildDate>Wed, 22 Nov 2023 12:49:20 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.theblackvault.com/documentarchive/wp-content/uploads/2020/06/cropped-siteicon-2-150x150.jpg</url>
	<title>Cryptology - The Black Vault</title>
	<link>https://www.theblackvault.com/documentarchive</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">87123917</site>	<item>
		<title>History of Special Project Branch, SIS ETOUSA, aka the &#8220;BEECHNUT Report&#8221; or &#8220;Rowlett Report,&#8221; written by Col. Frank B. Rowlett</title>
		<link>https://www.theblackvault.com/documentarchive/history-of-special-project-branch-sis-etousa-aka-the-beechnut-report-or-rowlett-report-written-by-col-frank-b-rowlett/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=history-of-special-project-branch-sis-etousa-aka-the-beechnut-report-or-rowlett-report-written-by-col-frank-b-rowlett</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 25 Oct 2022 11:54:57 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[NARA]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=16955</guid>

					<description><![CDATA[<p>The following document chronicles the history of the &#8220;Special Project Branch, SIS ETOUSA&#8221;. It was originally requested from the National Archives in October of 2022, and released about a week and a half later under FOIA case 23-02451. Document Archive History of Special Project Branch, SIS ETOUSA, aka the &#8220;BEECHNUT Report&#8221; or &#8220;Rowlett Report,&#8221; written [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/history-of-special-project-branch-sis-etousa-aka-the-beechnut-report-or-rowlett-report-written-by-col-frank-b-rowlett/">History of Special Project Branch, SIS ETOUSA, aka the “BEECHNUT Report” or “Rowlett Report,” written by Col. Frank B. Rowlett</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following document chronicles the history of the &#8220;Special Project Branch, SIS ETOUSA&#8221;.</p>
<p>It was originally requested from the National Archives in October of 2022, and released about a week and a half later under FOIA case 23-02451.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nara/23-02451.pdf">History of Special Project Branch, SIS ETOUSA, aka the &#8220;BEECHNUT Report&#8221; or &#8220;Rowlett Report,&#8221; written by Col. Frank B. Rowlett</a> [9 Pages, 1.5MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fnara%2F23-02451.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/nara/23-02451.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/nara/23-02451.pdf" download>Download [1.81 MB] </a></p></div><p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/history-of-special-project-branch-sis-etousa-aka-the-beechnut-report-or-rowlett-report-written-by-col-frank-b-rowlett/">History of Special Project Branch, SIS ETOUSA, aka the “BEECHNUT Report” or “Rowlett Report,” written by Col. Frank B. Rowlett</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">16955</post-id>	</item>
		<item>
		<title>Cryptolog (NSA Newsletter), October 1981 Edition</title>
		<link>https://www.theblackvault.com/documentarchive/cryptolog-nsa-newsletter-october-1981-edition/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptolog-nsa-newsletter-october-1981-edition</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 19 Dec 2020 14:27:15 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[Cryptolog]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[MDR]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=12662</guid>

					<description><![CDATA[<p>Background Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.” Another editor called it “a mix of technical, expository, philosophical, futuristic, argumentative and historical articles – with a light touch here and there – there’s always an article or two to engage [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptolog-nsa-newsletter-october-1981-edition/">Cryptolog (NSA Newsletter), October 1981 Edition</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.” Another editor called it “a mix of technical, expository, philosophical, futuristic, argumentative and historical articles – with a light touch here and there – there’s always an article or two to engage the reader.” Issues of Cryptolog were published initially on a monthly basis, but in the final years of its publication, were released on a quarterly basis. There were no issues published in 1993 and the final issue was released in July of 1997.</p>
<p>The Black Vault began not only archiving the released versions first put out in 2012, but later filing Mandatory Declassification Review (MDR) requests to get them further reviewed.</p>
<p>Below you will find the October 1981 edition, and the huge MDR request success that got much of it further declassified.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/nsa/107650.pdf">Cryptolog (NSA Newsletter), October 1981 Edition</a>, Released September 2020 [18 Pages, 7.5MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fnsa%2F107650.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/nsa/107650.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/nsa/107650.pdf" download>Download [7.30 MB] </a></p></div><p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/nsa/107650-highlighted.pdf">Cryptolog (NSA Newsletter), October 1981 Edition</a>, Released September 2020 <strong>&#8211; HIGHLIGHTED EDITION &#8211;</strong> [18 Pages, 7.5MB] &#8211; This version contains highlighted text, which discerns the newly released information after the MDR.</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments2.theblackvault.com%2Fdocuments%2Fnsa%2F107650-highlighted.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents2.theblackvault.com/documents/nsa/107650-highlighted.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents2.theblackvault.com/documents/nsa/107650-highlighted.pdf" download>Download [7.47 MB] </a></p></div><h3>Archived Versions</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/nsa/107650.pdf">Cryptolog (NSA Newsletter), October 1981 Edition</a>, Released October 2012 &#8211; This is the original release of the 1981 edition in 2012. It is archived here to represent how redacted the record originally was.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptolog-nsa-newsletter-october-1981-edition/">Cryptolog (NSA Newsletter), October 1981 Edition</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12662</post-id>	</item>
		<item>
		<title>The Bissell Report of 18 February 1965 &#8211; Review of Selected NSA Cryptanalytic Efforts</title>
		<link>https://www.theblackvault.com/documentarchive/the-bissell-report-of-18-february-1965-review-of-selected-nsa-cryptanalytic-efforts/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-bissell-report-of-18-february-1965-review-of-selected-nsa-cryptanalytic-efforts</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 03 Dec 2020 15:07:29 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=12557</guid>

					<description><![CDATA[<p>Background Richard Bissell Jr. was a Central Intelligence Agency officer responsible for major projects such as the U-2 spy plane and the Bay of Pigs Invasion. In 1965, he created a report that looked into the NSA&#8217;s effort to crack high grade cipher systems. This was his report. In February of 2019, The Black Vault [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/the-bissell-report-of-18-february-1965-review-of-selected-nsa-cryptanalytic-efforts/">The Bissell Report of 18 February 1965 – Review of Selected NSA Cryptanalytic Efforts</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>Richard Bissell Jr. was a Central Intelligence Agency officer responsible for major projects such as the U-2 spy plane and the Bay of Pigs Invasion. In 1965, he created a report that looked into the NSA&#8217;s effort to crack high grade cipher systems. This was his report.</p>
<p>In February of 2019, The Black Vault requested a mandatory declassification review (MDR) of the document, which was previously released but heavily redacted. Although redactions still remain, many were lifted, and the report offers a more in-depth review of the NSA&#8217;s efforts.</p>
<h3>Document Archive</h3>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nsa/mdr-106291.pdf">The Bissell Report of 18 February 1965</a> [86 Pages, 28MB]</h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/the-bissell-report-of-18-february-1965-review-of-selected-nsa-cryptanalytic-efforts/">The Bissell Report of 18 February 1965 – Review of Selected NSA Cryptanalytic Efforts</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">12557</post-id>	</item>
		<item>
		<title>United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</title>
		<link>https://www.theblackvault.com/documentarchive/united-states-cryptologic-history-space-surveillance-sigint-program-originally-drafted-in-1968/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=united-states-cryptologic-history-space-surveillance-sigint-program-originally-drafted-in-1968</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 16 May 2019 15:24:04 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<guid isPermaLink="false">https://www.theblackvault.com/documentarchive/?p=7702</guid>

					<description><![CDATA[<p>Background The Space Surveillance Sigint Program came into existence in the early 1960s when both the United States and the Soviet Union were racing to get satellites launched and were preparing for unmanned and manned exploration of outer space. This history was prepared in draft in 1968, and a limited number of copies were circulated [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/united-states-cryptologic-history-space-surveillance-sigint-program-originally-drafted-in-1968/">United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The Space Surveillance Sigint Program came into existence in the early 1960s when both the United States and the Soviet Union were racing to get satellites launched and were preparing for unmanned and manned exploration of outer space.</p>
<p>This history was prepared in draft in 1968, and a limited number of copies were circulated throughout the Agency. We are indebted to [ REDACTED ] who served as project officer of the SSS program, for reviewing this history and locating the photographs used, and to [ REDACTED ] of the History and Publications Staff for performing the copy editing and seeing the manuscript through the printing process.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nsa/mdr104418.pdf">United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</a> (<strong>highlighted version</strong>) [59 Pages, 33.5MB] &#8211; This version of the document was released after a Mandatory Declassification Review (MDR) request I filed in May of 2018. The record was released in April of 2019. Newly released information is highlighted.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nsa/mdr104418-clean.pdf">United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</a> (<strong>clean version</strong>) [59 Pages, 33.5MB] &#8211; This version of the document was released after a Mandatory Declassification Review (MDR) request I filed in May of 2018. The record was released in April of 2019.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents2.theblackvault.com/documents/nsa/4035972.pdf">United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</a> (<strong>clean version</strong>) [59 Pages, 32.5MB]</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/united-states-cryptologic-history-space-surveillance-sigint-program-originally-drafted-in-1968/">United States Cryptologic History, Space Surveillance SIGINT Program, Originally Drafted in 1968</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">7702</post-id>	</item>
		<item>
		<title>The CIA&#8217;s Kryptos Statue</title>
		<link>https://www.theblackvault.com/documentarchive/the-cias-kryptos-statue/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-cias-kryptos-statue</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Mon, 05 Nov 2018 06:30:52 +0000</pubDate>
				<category><![CDATA[Central Intelligence Agency (CIA) Collection]]></category>
		<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[CIA. Central Intelligence Agency]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=378</guid>

					<description><![CDATA[<p>Background Kryptos is an encrypted sculpture by American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia. Since its dedication on November 3, 1990, there has been much speculation about the meaning of the encrypted messages it bears. Of the four messages, three have been solved, with the [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/the-cias-kryptos-statue/">The CIA’s Kryptos Statue</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<figure id="attachment_380" aria-describedby="caption-attachment-380" style="width: 300px" class="wp-caption alignright"><a href="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-380" src="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-300x225.jpg" alt="Close up of the lower edge of the Kryptos statue" width="300" height="225" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-300x225.jpg 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-600x450.jpg 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-1024x768.jpg 1024w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-150x113.jpg 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-450x338.jpg 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-1200x900.jpg 1200w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-768x576.jpg 768w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright-731x548.jpg 731w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/02/cipherlowerright.jpg 1280w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-380" class="wp-caption-text">Close up of the lower edge of the Kryptos statue</figcaption></figure>
<p>Kryptos is an encrypted sculpture by American artist Jim Sanborn located on the grounds of the Central Intelligence Agency (CIA) in Langley, Virginia. Since its dedication on November 3, 1990, there has been much speculation about the meaning of the encrypted messages it bears. Of the four messages, three have been solved, with the fourth remaining one of the most famous unsolved codes in the world. The sculpture continues to provide a diversion for cryptanalysts, both amateur and professional, who are attempting to decrypt the final section.</p>
<p>The below represents multiple FOIA requests to get documents on the sculpture declassified.</p>
<h3>Document Archive</h3>
<p><strong>The National Security Agency (NSA) Documents</strong></p>
<p>In the early 1990s, the NSA proposed a challenged that was taken up by a small group of cryptanalysts who wanted to decode the message on the Kryptos statue.  The documents below were the results of their research, including clues to deciphering the still unencrypted &#8216;fourth message.&#8217;</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/controversies/CIAKryptosSculpturePresentation.pdf">The CIA Kryptos Sculpture</a> [ 98 Pages, 2.36MB ] &#8211; This document was declassified and released to The Black Vault in September of 2014.  It took nearly 3 years to process.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/controversies/KRYPTOS-Statue-NSA.pdf">NSA Documents on Kryptos</a> [ 60 Pages, 8.56MB ] &#8211; This was the first batch of documents released to The Black Vault by the NSA, in relation to my 2011 FOIA request.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents2.theblackvault.com/documents/cia/kryptos-cia-release.pdf">CIA Released Document, 9 July 2014</a> [ 2 Pages, 8.56MB ] &#8211; This single document was referred by the NSA to the CIA for review and release.</p>
<p><a href="https://documents.theblackvault.com/documents/intellipedia/intellipediamkultra.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /></a><a href="https://documents.theblackvault.com/documents/intellipedia/intellipedia-kryptos.pdf">The Kryptos Sculpture Intellipedia Entry</a> [ 10 Pages, 2.2MB | Released 07/2017 ]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/the-cias-kryptos-statue/">The CIA’s Kryptos Statue</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">378</post-id>	</item>
		<item>
		<title>The Voynich Manuscript &#8211; National Security Agency (NSA) Documents</title>
		<link>https://www.theblackvault.com/documentarchive/voynich-manuscript-national-security-agency-nsa-documents/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=voynich-manuscript-national-security-agency-nsa-documents</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Thu, 24 Aug 2017 17:00:40 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[cryptography]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Voynich Manuscript]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=4949</guid>

					<description><![CDATA[<p>Background According to Wikipedia: The Voynich manuscript is an illustrated codex hand-written in an unknown writing system. The vellum on which it is written has been carbon-dated to the early 15th century (1404–1438), and it may have been composed in Northern Italy during the Italian Renaissance. The manuscript is named after Wilfrid Voynich, a Polish book dealer who purchased it in 1912. Some of the pages are [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/voynich-manuscript-national-security-agency-nsa-documents/">The Voynich Manuscript – National Security Agency (NSA) Documents</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>According to Wikipedia:</p>
<p style="padding-left: 30px;"><em><strong>The Voynich manuscript is an illustrated codex hand-written in an unknown writing system. The vellum on which it is written has been carbon-dated to the early 15th century (1404–1438), and it may have been composed in Northern Italy during the Italian Renaissance. The manuscript is named after Wilfrid Voynich, a Polish book dealer who purchased it in 1912.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>Some of the pages are missing, with around 240 remaining. The text is written from left to right, and most of the pages have illustrations or diagrams. Some pages are foldable sheets.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>The Voynich manuscript has been studied by many professional and amateur cryptographers, including American and British codebreakers from both World War I and World War II. No one has yet succeeded in deciphering the text, and it has become a famous case in the history of cryptography. The mystery of the meaning and origin of the manuscript has excited the popular imagination, making the manuscript the subject of novels and speculation. None of the many hypotheses proposed over the last hundred years has yet been independently verified.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>In 1969 the Voynich manuscript was donated by Hans P. Kraus to Yale University&#8217;s Beinecke Rare Book and Manuscript Library, where it is cataloged under call number MS 408.</strong></em></p>
<p> In June of 2017, I requested from the National Security Agency (NSA) all records they had to The Voynich Manuscript. Below, you will find the search results.  They did inform me they have put some of the material on their website, however, it does not appear that it is complete.</p>
<p>Below, according to the NSA, is a complete set of records.</p>
<h3>Document Archive</h3>
<h4><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" /> <a href="https://documents.theblackvault.com/documents/nsa/voynichmanuscript-nsa1.pdf">The Voynich Manuscript NSA Documents</a> [348 Pages, 57MB]</h4>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<hr />
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/voynich-manuscript-national-security-agency-nsa-documents/">The Voynich Manuscript – National Security Agency (NSA) Documents</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4949</post-id>	</item>
		<item>
		<title>Martin and Mitchell Defection to Soviet Union, September 1960</title>
		<link>https://www.theblackvault.com/documentarchive/martin-and-mitchell-defection-to-soviet-union-september-1960/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=martin-and-mitchell-defection-to-soviet-union-september-1960</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Wed, 22 Jul 2015 16:15:06 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[defect]]></category>
		<category><![CDATA[defection]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[soviet]]></category>
		<category><![CDATA[Spy]]></category>
		<category><![CDATA[USSR]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=1822</guid>

					<description><![CDATA[<p>The following was written by Wikipedia, which summarizes this historical incident: The Martin and Mitchell Defection occurred in September 1960 when two U.S. National Security Agency (NSA) cryptologists, William Hamilton Martin and Bernon F. Mitchell, defected to the Soviet Union. A secret 1963 NSA study said that &#8220;Beyond any doubt, no other event has had, [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/martin-and-mitchell-defection-to-soviet-union-september-1960/">Martin and Mitchell Defection to Soviet Union, September 1960</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following was written by Wikipedia, which summarizes this historical incident:</p>
<p style="padding-left: 30px;"><em><strong>The Martin and Mitchell Defection occurred in September 1960 when two U.S. National Security Agency (NSA) cryptologists, William Hamilton Martin and Bernon F. Mitchell, defected to the Soviet Union. A secret 1963 NSA study said that &#8220;Beyond any doubt, no other event has had, or is likely to have in the future, a greater impact on the Agency&#8217;s security program.&#8221;</strong></em></p>
<p style="padding-left: 30px;"><em><strong>Martin and Mitchell met while serving in the U.S. Navy in Japan in the early 1950s and both joined the NSA on the same day in 1957. They defected together to the Soviet Union in 1960, and at a Moscow press conference they revealed and denounced various U.S. policies, especially provocative incursions into the air space of other nations and spying on America&#8217;s own allies. Underscoring their apprehension of nuclear war, they said &#8220;we would attempt to crawl to the moon if we thought it would lessen the threat of an atomic war.&#8221;</strong></em></p>
<p style="padding-left: 30px;"><em><strong>Within days, citing a trusted source, Congressman Francis E. Walter, chairman of the House Un-American Activities Committee (HUAC), said Martin and Mitchell were &#8220;sex deviates&#8221;, prompting sensational press coverage. U.S. officials at the National Security Council privately shared their assumption that the two were part of a traitorous homosexual network. Classified NSA investigations, on the other hand, determined the pair had &#8220;greatly inflated opinions concerning their intellectual attainments and talents&#8221; and had defected to satisfy social aspirations. The House Un-American Activities Committee publicly intimated its interpretation of the relationship between Martin and Mitchell as homosexual and that reading guided the Pentagon&#8217;s discussion of the defection for decades.</strong></em></p>
<p>Below, you will find my research into this defection, and the declassified documents that have been released.</p>
<h3>National Security Agency Documents</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/75791A.pdf">NSA Declassified Documents, Released March 2015</a> [ 103 Pages, 49.5MB ] &#8211; The NSA is charging nearly $2,000 to complete their search for records relating to this incident. They used the 2 hours allotted to me for free, and sent me the first 100 pages that they found. This is that release. Any additional searching or releases, I will be required to pay the thousands of dollars.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/martin-and-mitchell-defection-to-soviet-union-september-1960/">Martin and Mitchell Defection to Soviet Union, September 1960</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1822</post-id>	</item>
		<item>
		<title>The Beale Ciphers</title>
		<link>https://www.theblackvault.com/documentarchive/the-beale-ciphers/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-beale-ciphers</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Fri, 03 Jul 2015 15:37:17 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[Beale]]></category>
		<category><![CDATA[Beale Ciphers]]></category>
		<category><![CDATA[Beale Papers]]></category>
		<category><![CDATA[Code]]></category>
		<category><![CDATA[Crack]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[Treasure]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=1774</guid>

					<description><![CDATA[<p>(Scroll Down for Declassified Documents) The following is a great write up by Wikipedia of what &#8220;The Beale Ciphers&#8221; or &#8220;The Beale Papers&#8221; really are. I was surprised to learn of an extensive collection of documents regarding these papers. The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/the-beale-ciphers/">The Beale Ciphers</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<figure id="attachment_1775" aria-describedby="caption-attachment-1775" style="width: 300px" class="wp-caption alignright"><a href="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1775" src="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-300x247.png" alt="Beale's first cryptogram " width="300" height="247" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-300x247.png 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-600x495.png 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-150x124.png 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-450x371.png 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_-168x137.png 168w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/700px-Beale_1.svg_.png 700w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1775" class="wp-caption-text">Beale&#8217;s first cryptogram</figcaption></figure>
<p><em>(Scroll Down for Declassified Documents)</em></p>
<p>The following is a great write up by Wikipedia of what &#8220;The Beale Ciphers&#8221; or &#8220;The Beale Papers&#8221; really are. I was surprised to learn of an extensive collection of documents regarding these papers.</p>
<p style="padding-left: 30px;"><em><strong>The Beale ciphers, also referred to as the Beale Papers, are a set of three ciphertexts, one of which allegedly states the location of a buried treasure of gold, silver and jewels estimated to be worth over $63 million USD as of September 2011. Comprising three ciphertexts, the first (as yet unsolved) text describes the location, the second (solved) ciphertext the content of the treasure, and the third (unsolved) lists the names of the treasure&#8217;s owners and their next of kin.</strong></em></p>
<p style="padding-left: 30px;"><em><strong>The story of the three ciphertexts originates from an 1885 pamphlet detailing treasure being buried by a man named Thomas J. Beale in a secret location in Bedford County, Virginia, in the 1820s. Beale entrusted a box containing the encrypted messages to a local innkeeper named Robert Morriss and then disappeared, never to be seen again. According to the story, the innkeeper opened the box 23 years later, and then decades after that gave the three encrypted ciphertexts to a friend before he died. The friend then spent the next twenty years of his life trying to decode the messages, and was able to solve only one of them which gave details of the treasure buried and the general location of the treasure. The unnamed friend then published all three ciphertexts in a pamphlet which was advertised for sale in the 1880s.</strong></em></p>
<figure id="attachment_1776" aria-describedby="caption-attachment-1776" style="width: 300px" class="wp-caption alignleft"><a href="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1776" src="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-300x275.png" alt="Beale's second cryptogram (the deciphered one)" width="300" height="275" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-300x275.png 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-600x550.png 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-150x138.png 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-450x413.png 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-235x216.png 235w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_-731x670.png 731w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_2.svg_.png 744w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1776" class="wp-caption-text">Beale&#8217;s second cryptogram (the deciphered one)</figcaption></figure>
<p style="padding-left: 30px;"><em><strong>Since the publication of the pamphlet, a number of attempts have been made to decode the two remaining ciphertexts and to locate the treasure, but all efforts have resulted in failure. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>There are many arguments that the entire story is a hoax, including a 1980 article &#8220;A Dissenting Opinion&#8221; by cryptographer Jim Gillogly, and a 1982 scholarly analysis of the Papers and their related story by Joe Nickell, using historical records that cast doubt on the existence of Thomas J. Beale. Nickell also presents linguistic evidence demonstrating that the documents could not have been written at the time alleged (words such as &#8220;stampeding&#8221;, for instance, are of later vintage). His analysis of the writing style showed that Beale was almost certainly James B. Ward, whose 1885 pamphlet brought the Beale Papers to light. Nickell argues that the tale is thus a work of fiction; specifically, a &#8220;secret vault&#8221; allegory of the Freemasons. James B. Ward was, in fact, a Mason himself.</strong></em></p>
<h3>The National Security Agency Declassified Records</h3>
<p>The following records were released to me, in connection with my FOIA Request 75804 with the National Security Agency (NSA). There are more records being reviewed for declassification, and will be added here once I receive them (or they are posted online by the NSA):</p>
<figure id="attachment_1777" aria-describedby="caption-attachment-1777" style="width: 300px" class="wp-caption alignright"><a href="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_.png"><img loading="lazy" decoding="async" class="size-medium wp-image-1777" src="http://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-300x274.png" alt="Beale's third cryptogram." width="300" height="274" srcset="https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-300x274.png 300w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-600x548.png 600w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-150x137.png 150w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-450x411.png 450w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-235x216.png 235w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_-731x668.png 731w, https://www.theblackvault.com/documentarchive/wp-content/uploads/2015/07/744px-Beale_3.svg_.png 744w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1777" class="wp-caption-text">Beale&#8217;s third cryptogram.</figcaption></figure>
<p>[205 Pages]</p>
<ol>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656765.pdf">A Cipher&#8217;s the Key to the Treasure in Them Thar Hills</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656758.pdf">A Treasure Buried Deep in Bedford County</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656729.pdf">Beale, The Beale Papers</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656724.pdf">Beale Treasure &#8211; Fact or Fiction</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656743.pdf">Has the Beale Treasure Code Been Solved?</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656725.pdf">Historical and Analytical Studies in Relation to the Beale Cypers, dated 7 March 1970</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656726.pdf">Historical and Analytical Studies in Relation to the Beale Cypers, dated 15 April 1972</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656736.pdf">Membership Application</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656772.pdf">More Information on Unsolved Cipher</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc2453995.pdf">Other Miscellany</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656742.pdf">Research Library</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656746.pdf">Secret Code to Virginia&#8217;s $2 Million Blue Ridge Bonanza</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656733.pdf">Signature Simulation and Certain Cryptographic Codes</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656768.pdf">Solve the Cipher, Find a Treasure</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656738.pdf">The Beale Ciphers</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656779.pdf">The Beale Papers</a></li>
<li><a href="https://documents.theblackvault.com/documents/nsa/bealepapers/doc656753.pdf">Treasure Beyond Your Wildest Dreams</a></li>
</ol><p>The post <a href="https://www.theblackvault.com/documentarchive/the-beale-ciphers/">The Beale Ciphers</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1774</post-id>	</item>
		<item>
		<title>NSA Newsletters</title>
		<link>https://www.theblackvault.com/documentarchive/nsa-newsletters/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-newsletters</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 28 Feb 2015 18:35:57 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[Newsletter]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=839</guid>

					<description><![CDATA[<p>The following are the official NSA newsletters that have been released to date to The Black Vault.  Simply click on the edition below for a link over to the file.   NSA Newsletter &#8211; September 1999 [16 Pages. 1.45 MB]   NSA Newsletter &#8211; October 1999 [16 Pages. 2.03 MB]   NSA Newsletter &#8211; November 1999 [16 Pages. [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-newsletters/">NSA Newsletters</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following are the official NSA newsletters that have been released to date to The Black Vault.  Simply click on the edition below for a link over to the file.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/nsa/Newsletter_Sept_1999.pdf">NSA Newsletter &#8211; September 1999</a> [16 Pages. 1.45 MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/nsa/Newsletter_Oct_1999.pdf">NSA Newsletter &#8211; October 1999</a> [16 Pages. 2.03 MB]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />  <a href="https://documents.theblackvault.com/documents/nsa/Newsletter_Nov_1999.pdf">NSA Newsletter &#8211; November 1999</a> [16 Pages. 1.92 MB]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-newsletters/">NSA Newsletters</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">839</post-id>	</item>
		<item>
		<title>Communicator &#8211; NSA&#8217;s Employee Publication</title>
		<link>https://www.theblackvault.com/documentarchive/communicator-nsas-employee-publication/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=communicator-nsas-employee-publication</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 28 Feb 2015 18:34:34 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[Cryptolog]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=836</guid>

					<description><![CDATA[<p>The following are the declassified issues of the Communicator &#8211; NSA&#8217;s Employee Publication. Just click on the corresponding issue to download the file. Communicator &#8211; Vol. III, No. 35 [4 Pages, 367kb] Communicator &#8211; Vol. III, No. 36 [4 Pages, 353kb] Communicator &#8211; Vol. III, No. 37 [4 Pages, 227kb] Communicator &#8211; Vol. III, No. [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/communicator-nsas-employee-publication/">Communicator – NSA’s Employee Publication</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following are the declassified issues of the Communicator &#8211; NSA&#8217;s Employee Publication. Just click on the corresponding issue to download the file.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-35.pdf">Communicator &#8211; Vol. III, No. 35</a> [4 Pages, 367kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-36.pdf">Communicator &#8211; Vol. III, No. 36</a> [4 Pages, 353kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-37.pdf">Communicator &#8211; Vol. III, No. 37</a> [4 Pages, 227kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-38.pdf">Communicator &#8211; Vol. III, No. 38</a> [4 Pages, 275kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-39.pdf">Communicator &#8211; Vol. III, No. 39</a> [4 Pages, 364kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-40.pdf">Communicator &#8211; Vol. III, No. 40</a> [4 Pages, 342kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-41.pdf">Communicator &#8211; Vol. III, No. 41</a> [4 Pages, 346kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-42.pdf">Communicator &#8211; Vol. III, No. 42</a> [4 Pages, 360kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-43.pdf">Communicator &#8211; Vol. III, No. 43</a> [4 Pages, 383kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-44.pdf">Communicator &#8211; Vol. III, No. 44</a> [4 Pages, 304kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-45.pdf">Communicator &#8211; Vol. III, No. 45</a> [4 Pages, 393kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-46.pdf">Communicator &#8211; Vol. III, No. 46</a> [4 Pages, 343kb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/Communicator-III-47.pdf">Communicator &#8211; Vol. III, No. 47</a> [4 Pages, 338kb]</p><p>The post <a href="https://www.theblackvault.com/documentarchive/communicator-nsas-employee-publication/">Communicator – NSA’s Employee Publication</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">836</post-id>	</item>
		<item>
		<title>Cryptolog Issues &#8211; National Security Agency (NSA) Publication</title>
		<link>https://www.theblackvault.com/documentarchive/cryptolog-issues-national-security-agency-nsa-publication/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptolog-issues-national-security-agency-nsa-publication</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 28 Feb 2015 18:33:10 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[Cryptolog]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=833</guid>

					<description><![CDATA[<p>Background The National Security Agency released all 136 issues of one of its longest-lived technical publications, Cryptolog. This released collection encompasses well over a thousand articles covering a cross-section of the disciplines and focus areas of the Agency, and is over 4,100 pages. Cryptolog was created in 1974 and was, according to the editor, “a [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptolog-issues-national-security-agency-nsa-publication/">Cryptolog Issues – National Security Agency (NSA) Publication</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<h3>Background</h3>
<p>The National Security Agency released all 136 issues of one of its longest-lived technical publications, Cryptolog. This released collection encompasses well over a thousand articles covering a cross-section of the disciplines and focus areas of the Agency, and is over 4,100 pages.</p>
<p>Cryptolog was created in 1974 and was, according to the editor, “a new vehicle for the interchange of ideas on technical subjects.” Another editor called it “a mix of technical, expository, philosophical, futuristic, argumentative and historical articles – with a light touch here and there – there’s always an article or two to engage the reader.” Issues of Cryptolog were published initially on a monthly basis, but in the final years of its publication, were released on a quarterly basis. There were no issues published in 1993 and the final issue was released in July of 1997.</p>
<p>For more information on Cryptolog, check out the FAQ below.</p>
<p>The Black Vault began not only archiving the released versions first put out in 2012, but later filing Mandatory Declassification Review (MDR) requests to get them further reviewed. Where available, the issues with an MDR have been added, and when you click on the issue below, it will either go to the page to download both copies, or if a new version is not available, it will directly link to the PDF that is. All listing below without a <img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> generally indicates an MDR was filed, completed and is available.</p>
<h3>Document Archive</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/faqs_for_cryptolog_release.pdf">FAQs for Crytologs</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog-full.pdf">Entire Collection of Cryptologs in 1 files</a> [4,174 Pages, 233 MB]</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_01.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /></a> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_01.pdf">Vol. I, No. 1 &#8211; August 1974</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_02.pdf">Vol. I, No. 2 &#8211; September 1974</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_03.pdf">Vol. I, No. 3 &#8211; October 1974</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_04.pdf">Vol. I, No. 4 &#8211; November 1974</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_05.pdf">Vol. I, No. 5 &#8211; December 1974</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_06.pdf">Vol. II, No. 1 &#8211; January 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_07.pdf">Vol. II, Nos. 2 &#8211; 3 &#8211; February &#8211; March 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_08.pdf">Vol. II, No. 4 &#8211; April 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_09.pdf">Vol. II, No. 5 &#8211; May 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_10.pdf">Vol. II, No. 6 &#8211; June 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_11.pdf">Vol. II, No. 7 &#8211; July 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_12.pdf">Vol. II, Nos. 8 &#8211; 9 &#8211; August &#8211; September 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_13.pdf">Vol. II, No. 10 &#8211; October 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_14.pdf">Vol. II, No. 11 &#8211; November 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_15.pdf">Vol. II, No. 12 &#8211; December 1975</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_16.pdf">Vol. III, No. 1 &#8211; January 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_17.pdf">Vol. III, No. 2 &#8211; February 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_18.pdf">Vol. III, No. 3 &#8211; March 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_19.pdf">Vol. III, No. 4 &#8211; April 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_20.pdf">Vol. III, No. 5 &#8211; May 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_21.pdf">Vol. III, Nos. 6 &#8211; 7 &#8211; June &#8211; July 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_22.pdf">Vol. III, No. 8 &#8211; August 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_23.pdf">Vol. III, No. 9 &#8211; September 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_24.pdf">Vol. III, No. 10 &#8211; October 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_25.pdf">Vol. III, No. 11 &#8211; November 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_26.pdf">Vol. III, No. 12 &#8211; December 1976</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_27.pdf">Vol. IV, Nos. 1 &#8211; 2 &#8211; January &#8211; February 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_28.pdf">Vol. IV, No. 3 &#8211; March 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_29.pdf">Vol. IV, No. 4 &#8211; April 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_30.pdf">Vol. IV, No. 5 &#8211; May 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_31.pdf">Vol. IV, No. 6 &#8211; June 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_32.pdf">Vol. IV, No. 7 &#8211; July 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_33.pdf">Vol. IV, No. 8 &#8211; August 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_34.pdf">Vol. IV, No. 9 &#8211; September 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_35.pdf">Vol. IV, No. 10 &#8211; October 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_36.pdf">Vol. IV, No. 11 &#8211; November 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_37.pdf">Vol. IV, No. 12 &#8211; December 1977</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_38.pdf">Vol. V, No. 1 &#8211; January 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_39.pdf">Vol. V, No. 2 &#8211; February 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_40.pdf">Vol. V, No. 3 &#8211; March 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_41.pdf">Vol. V, No. 4 &#8211; April 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_42.pdf">Vol. V, No. 5 &#8211; May 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_43.pdf">Vol. V, No. 6 &#8211; June 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_44.pdf">Vol. V, Nos. 7 &#8211; 8 &#8211; July &#8211; August 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_45.pdf">Vol. V, No. 9 &#8211; September 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_46.pdf">Vol. V, No. 10 &#8211; October 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_47.pdf">Vol. V, No. 11 &#8211; November 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_48.pdf">Vol. V, No. 12 &#8211; December 1978</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_49.pdf">Vol. VI, No. 1 &#8211; January 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_50.pdf">Vol. VI, No. 2 &#8211; February 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_51.pdf">Vol. VI, No. 3 &#8211; March 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_52.pdf">Vol. VI, No. 4 &#8211; April 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_53.pdf">Vol. VI, No. 5 &#8211; May 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_54.pdf">Vol. VI, No. 6 &#8211; June 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_55.pdf">Vol. VI, No. 7 &#8211; July 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_56.pdf">Vol. VI, Nos. 8 &#8211; 9 &#8211; August &#8211; September 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_57.pdf">Vol. VI, No. 10 &#8211; October 1979</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_58.pdf">Vol. VII, Nos. 1 &#8211; 3 &#8211; January &#8211; March 1980</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_59.pdf">Vol. VII, Nos. 4 &#8211; 6 &#8211; April &#8211; June 1980</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_60.pdf">Vol. VIII, Nos. 1 &#8211; 3 &#8211; January &#8211; March 1981</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_61.pdf">Vol. VIII, Nos. 4 &#8211; 6 &#8211; April &#8211; June 1981</a></p>
<p><a href="https://www.theblackvault.com/documentarchive/cryptolog-nsa-newsletter-october-1981-edition/" target="_blank" rel="noopener">Vol. VIII, No. 10 &#8211; October 1981</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_63.pdf">Vol. VIII, No. 11 &#8211; November 1981</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_64.pdf">Vol. VIII, No. 12 &#8211; December 1981</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_65.pdf">Vol. IX, No. 1 &#8211; January 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_66.pdf">Vol. IX, No. 2 &#8211; February 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_67.pdf">Vol. IX, No. 3 &#8211; March 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_68.pdf">Vol. IX, No. 4 &#8211; April 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_69.pdf">Vol. IX, No. 5 &#8211; May 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_70.pdf">Vol. IX, Nos. 6 &#8211; 7 &#8211; June &#8211; July 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_71.pdf">Vol. IX, No. 8 &#8211; August 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_72.pdf">Vol. IX, No. 9 &#8211; September 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_73.pdf">Vol. IX, No. 10 &#8211; October 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_74.pdf">Vol. IX, No. 11 &#8211; November 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_75.pdf">Vol. IX, No. 12 &#8211; December 1982</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_76.pdf">Vol. X, Nos. 1 &#8211; 2 &#8211; January &#8211; February 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_77.pdf">Vol. X, No. 3 &#8211; March 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_78.pdf">Vol. X, No. 4 &#8211; April 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_79.pdf">Vol. X, No. 5 &#8211; May 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_80.pdf">Vol. X, Nos. 6 &#8211; 7 &#8211; June &#8211; July 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_81.pdf">Vol. X, No. 8 &#8211; August 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_82.pdf">Vol. X, No. 9 &#8211; September 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_83.pdf">Vol. X, No. 10 &#8211; October 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_84.pdf">Vol. X, No. 11 &#8211; November 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_85.pdf">Vol. X, No. 12 &#8211; December 1983</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_86.pdf">Vol. XI, No. 1 &#8211; January 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_87.pdf">Vol. XI, Nos. 2 &#8211; 3 &#8211; February &#8211; March 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_88.pdf">Vol. XI, No. 4 &#8211; April 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_89.pdf">Vol. XI, No. 5 &#8211; May 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_90.pdf">Vol. XI, Nos. 6 &#8211; 7 &#8211; June &#8211; July 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_91.pdf">Vol. XI, Nos. 8 &#8211; 9 &#8211; August &#8211; September 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_92.pdf">Vol. XI, No. 10 &#8211; October 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_93.pdf">Vol. XI, Nos. 11 &#8211; 12 &#8211; November &#8211; December 1984</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_94.pdf">Vol. XII, Nos. 1 &#8211; 3 &#8211; January &#8211; March 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_95.pdf">Vol. XII, No. 4 &#8211; April 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_96.pdf">Vol. XII, No. 5 &#8211; May 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_97.pdf">Vol. XII, Nos. 6 &#8211; 8 &#8211; June &#8211; August 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_98.pdf">Vol. XII, Nos. 9 &#8211; 10 &#8211; September &#8211; October 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_99.pdf">Vol. XII, Nos. 11 &#8211; 12 &#8211; November &#8211; December 1985</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_100.pdf">Vol. XIII, Nos. 1 &#8211; 2 &#8211; January &#8211; February 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_101.pdf">Vol. XIII, Nos. 3 &#8211; 4 &#8211; March &#8211; April 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_102.pdf">Vol. XIII, Nos. 5 &#8211; 7 &#8211; May &#8211; July 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_103.pdf">Vol. XIII, Nos. 8 &#8211; 9 &#8211; August &#8211; September 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_104.pdf">Vol. XIII, Nos. 10 &#8211; 11 &#8211; October &#8211; November 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_105.pdf">Vol. XIII, No. 12 &#8211; December 1986</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_106.pdf">Vol. XIV, No. 1 &#8211; 1st Issue 1987</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_107.pdf">Vol. XIV, No. 2 &#8211; 2nd Issue 1987</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_108.pdf">Vol. XIV, No. 3 &#8211; 3rd Issue 1987</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_109.pdf">Vol. XIV, No. 4 &#8211; 4th Issue 1987</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_110.pdf">Vol. XV, No. 1 &#8211; 1st Issue 1988</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_111.pdf">Vol. XV, No. 2 &#8211; 2nd Issue 1988</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_112.pdf">Vol. XV, No. 3 &#8211; 3rd Issue 1988</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_113.pdf">Vol. XV, No. 4 &#8211; 4th Issue 1988</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_114.pdf">Vol. XVI, No. 1 &#8211; 1st Issue 1989</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_115.pdf">Vol. XVI, No. 2 &#8211; 2nd Issue 1989</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_116.pdf">Vol. XVI, No. 3 &#8211; 3rd Issue 1989</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_117.pdf">Vol. XVII, No. 1 &#8211; 1st Issue 1990</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_118.pdf">Vol. XVII, No. 2 &#8211; 2nd Issue 1990</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_119.pdf">Vol. XVII, No. 3 &#8211; 3rd Issue 1990</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_120.pdf">Vol. XVIII, No. 1 &#8211; 1st Issue 1991</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_121.pdf">Vol. XVIII, No. 2 &#8211; 2nd Issue 1991</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_122.pdf">Vol. XVIII, No. 3 &#8211; 3rd Issue 1991</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_123.pdf">Vol. XIX, No. 1 &#8211; 1st Issue 1992</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_124.pdf">Vol. XIX, No. 2 &#8211; 2nd Issue 1992</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_125.pdf">Vol. XIX, No. 3 &#8211; 3rd Issue 1992</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_126.pdf">Vol. XX, No. 1 &#8211; 1st Issue 1994</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_127.pdf">Vol. XX, No. 2 &#8211; 2nd Issue 1994</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_128.pdf">Vol. XXI, No. 1 &#8211; Issue 1 1995</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_129.pdf">Vol. XXI, No. 2 &#8211; Summer 1995</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_130.pdf">Vol. XXI, No. 3 &#8211; Fall 1995</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_131.pdf">Vol. XXI, No. 4 &#8211; Winter 1995</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_132.pdf">Vol. XXII, No. 1 &#8211; Spring 1996</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_133.pdf">Vol. XXII, No. 2 &#8211; Summer 1996</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_134.pdf">Vol. XXII, No. 4 &#8211; Winter 1996</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_135.pdf">Vol. XXIII, No. 1 &#8211; Spring 1997</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptolog/cryptolog_136.pdf">Vol. XXIII, No. 2 &#8211; Summer 1997</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptolog-issues-national-security-agency-nsa-publication/">Cryptolog Issues – National Security Agency (NSA) Publication</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">833</post-id>	</item>
		<item>
		<title>NSA 60th Anniversary Book</title>
		<link>https://www.theblackvault.com/documentarchive/nsa-60th-anniversary-book/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=nsa-60th-anniversary-book</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Sat, 28 Feb 2015 18:31:27 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[history]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=830</guid>

					<description><![CDATA[<p>(Published in 2012) &#8211; Established on Nov. 4, 1952, this year the National Security Agency celebrates 60 years of service to the nation. In issuing the directive that gave birth to the agency, then-President Harry Truman understood the need to continue U.S. efforts that had led to breaking German and Japanese codes in World War [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-60th-anniversary-book/">NSA 60th Anniversary Book</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>(Published in 2012) &#8211; Established on Nov. 4, 1952, this year the National Security Agency celebrates 60 years of service to the nation.</p>
<p>In issuing the directive that gave birth to the agency, then-President Harry Truman understood the need to continue U.S. efforts that had led to breaking German and Japanese codes in World War II, success against the German U-Boat threat in the North Atlantic, and victory in the Battle of Midway in the Pacific. America had become a dominant power on a global stage, facing global responsibilities and threats. As war raged in Korea, the creation of NSA allowed the Defense Department to consolidate cryptologic support to military operations, and to meet challenges that the nation would face in the Cold War.</p>
<p>&nbsp;</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/NSA_60th_Anniversary.pdf">NSA 60th Anniversary Book</a> [62 Pages, 18.7MB]</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/NSA_60th_Anniversary.pdf">https://documents.theblackvault.com/documents/nsa/NSA_60th_Anniversary.pdf</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/nsa-60th-anniversary-book/">NSA 60th Anniversary Book</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">830</post-id>	</item>
		<item>
		<title>Cryptanalysis</title>
		<link>https://www.theblackvault.com/documentarchive/cryptanalysis/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptanalysis</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:46:19 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[cryptanalysis]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=400</guid>

					<description><![CDATA[<p>The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion. Military Cryptanalysis Part I Military Cryptanalysis Part II Military Cryptanalysis Part III Military Cryptanalysis Part IV</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptanalysis/">Cryptanalysis</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The goal of cryptanalysis is to find some weakness or insecurity in a cryptographic scheme, thus permitting its subversion or evasion.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/Mil_Crypt_I.pdf">Military Cryptanalysis Part I</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/Mil_Crypt_II.pdf">Military Cryptanalysis Part II</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/Mil_Crypt_III.pdf">Military Cryptanalysis Part III</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/mil_crypt_IV.pdf">Military Cryptanalysis Part IV</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptanalysis/">Cryptanalysis</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">400</post-id>	</item>
		<item>
		<title>Cryptologic Quarterly Articles</title>
		<link>https://www.theblackvault.com/documentarchive/cryptologic-quarterly-articles/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptologic-quarterly-articles</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:44:36 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=397</guid>

					<description><![CDATA[<p>The following are documents from the Cryptologic Quarterly, declassified by the NSA. Disclaimer John H. Tiltman: A Reminiscence &#8211; Summer/Fall 1982-Vol. 1, Nos. 2-3 Computer Virus Infections: Is NSA Vulnerable? &#8211; Fall 1985-Vol. 4, No. 3 The Origination and Evolution of Radio Traffic Analysis: The World War I Era &#8211; Spring 1987-Vol. 6, No. 1 [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptologic-quarterly-articles/">Cryptologic Quarterly Articles</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following are documents from the Cryptologic Quarterly, declassified by the NSA.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/disclaimer.pdf">Disclaimer</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/johnhtiltman.pdf">John H. Tiltman: A Reminiscence</a> &#8211; Summer/Fall 1982-Vol. 1, Nos. 2-3</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/computervirus.pdf">Computer Virus Infections: Is NSA Vulnerable?</a> &#8211; Fall 1985-Vol. 4, No. 3</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/trafficanalysis.pdf">The Origination and Evolution of Radio Traffic Analysis: The World War I Era</a> &#8211; Spring 1987-Vol. 6, No. 1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/pearlharbor.pdf">What Every Cryptologist Should Know About Pearl Harbor</a> &#8211; Summer 1987 &#8211; Vol. 6, No. 2</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/digitalcomputer_industry.pdf">Influence of US Cryptologic Organizations on the Digital Computer Industry</a> &#8211; Fall/Winter 1987-1988 Vol. 8, Nos. 3-4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/third_part_nations.pdf">Third Party Nations: Partners and Targets</a> &#8211; Winter 1989 &#8211; Vol. 7, No. 4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/meteo_burst.pdf">Meteor Burst Communications: An Ignored Phenomenon?</a> &#8211; Fall 1990 &#8211; Vol. 9, No. 3</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/geo_info.pdf">Geographic Information Systems</a> &#8211; Fall/Winter 1991 &#8211; Vol 10, Nos. 3-4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/dos_unix.pdf">DOS/UNIX Interoperability and Email in the Agency</a> &#8211; Spring 1992 &#8211; Vol. 11, No.1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/solving_xa.pdf">Solving xa=b(mod c) for x and Undecimating Recursions</a> &#8211; Winter 1992 &#8211; Vol. 11, No. 4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/solving_xa.pdf">The First US Government Manual on Cryptography</a> &#8211; Winter 1992 &#8211; Vol. 11, No. 4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/tele_codes.pdf">Telephone Codes and Safe Combinations: A Deadly Duo</a> &#8211; Spring 1993 &#8211; Vol 12, No.1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/search_acquisition.pdf">Sub-HF Search and Acquisition</a> &#8211; &#8211; Summer 1994 &#8211; Vol.13, No2</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/world_war_II.pdf">A World War II German Army Field Cipher and How We Broke It</a> &#8211; Winter 1995 &#8211; Vol. 14, No. 4</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/guerillas_in_mist.pdf">Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45</a> &#8211; Spring 1996 &#8211; Vol. 15, No. 1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/br_century_spies.pdf">Book Review: A Century of Spies: Intelligence in teh Twentieth Century</a> &#8211; Fall 1996 &#8211; Vol. 153, No. 3</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/limits_forecasting.pdf">Dealing with the Future: The Limits of Forecasting</a> &#8211; Fall 1996 &#8211; Vol. 153, No. 3</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/bs_attitudes.pdf">The BS Attitudes: How Things Work in Bureaucracies</a> &#8211; Winter 1996 &#8211; Vol. 15, No. 4</p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptologic-quarterly-articles/">Cryptologic Quarterly Articles</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">397</post-id>	</item>
		<item>
		<title>Venona Project</title>
		<link>https://www.theblackvault.com/documentarchive/venona-project/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=venona-project</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:41:54 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[History]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<category><![CDATA[venona]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=394</guid>

					<description><![CDATA[<p>The Venona project was a long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union, mostly during World War II. There were known to be at least 13 code words for this effort used by [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/venona-project/">Venona Project</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The Venona project was a long-running and highly secret collaboration between intelligence agencies of the United States and United Kingdom that involved the cryptanalysis of messages sent by several intelligence agencies of the Soviet Union, mostly during World War II. There were known to be at least 13 code words for this effort used by the U.S. and UK. &#8220;Venona&#8221; was the last one used. It has no known meaning. (In the decrypted documents issued from the National Security Agency, &#8216;VENONA&#8217; is written in full capitals; authors writing on the subject generally capitalize only the first letter.)</p>
<p><img decoding="async" src="http://www.theblackvault.com/images/gif.gif" alt="" /> <a href="http://www.theblackvault.com/documents/nsa/venona/venona.html">Entire collection of Venona documents from the NSA</a></p>
<p>Please note: The above collection was copied from the official NSA index. It is currently under construction for a better index, and format, and will be converted soon.</p><p>The post <a href="https://www.theblackvault.com/documentarchive/venona-project/">Venona Project</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">394</post-id>	</item>
		<item>
		<title>Cryptologic Almanac 50th Anniversary Series</title>
		<link>https://www.theblackvault.com/documentarchive/cryptologic-almanac-50th-anniversary-series/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptologic-almanac-50th-anniversary-series</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:34:04 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[cryptology]]></category>
		<category><![CDATA[National Security Agency]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=391</guid>

					<description><![CDATA[<p>The following documents have been released by the National Security Agency. 1996 Rosman Tracks on to the End August 1996 1998 Baron Oshima&#8217;s Contributions September 1998 2002 AFSAM-7 January &#8211; February 2002 Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization January &#8211; February 2002 The Central Security Service January &#8211; February 2002 The [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptologic-almanac-50th-anniversary-series/">Cryptologic Almanac 50th Anniversary Series</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following documents have been released by the National Security Agency.</p>
<p><strong>1996</strong></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Rosman_Tracks_to_the_End.pdf">Rosman Tracks on to the End</a><br />
August 1996</p>
<p><strong>1998</strong></p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/baron_oshimas_contributions.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />Baron Oshima&#8217;s Contributions</a><br />
September 1998</p>
<p><strong>2002</strong></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/AFSAM_7.pdf">AFSAM-7</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Earl_Stone.pdf">Rear Admiral Earl Everett Stone: A Convert to Cryptologic Centralization</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_CSS.pdf">The Central Security Service</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Creation_of_NSA_Part_1.pdf">The Creation of NSA &#8211; Part 1: JOP</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Creation_of_NSA_Part_2.pdf">The Creation of NSA &#8211; Part 1: AFSA</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Creation_of_NSA_Part_3.pdf">The Creation of NSA &#8211; Part 1: The Brownell Committee</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Effort_to_Create_a_Smokefree_NSA.pdf">The Effort to Create a Smokefree NSA</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Korean_War.pdf">The Korean War: The First Phase</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/VENONA_An_Overview.pdf">VENONA: An Overview</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Vint_Hill_Farms_Station.pdf">William F. Friedman</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Breaking_of_Geheimschreiber.pdf">The Breaking of Geheimschreier</a><br />
January-March 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Necessary_Invention.pdf">The Necessary Invention: The Cryptologic Effort by the Philippine Guerrilla Army, 1944-1945</a><br />
January-March 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Vint_Hill_Farms_Station.pdf">Vint Hill Farms Station: 1942-1945 (USM-1)</a><br />
January-March 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Days_of_Bourbon.pdf">Days of BOURBON</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/End_of_the_War.pdf">The World at the End of the War</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Three_African_American_Pioneers.pdf">Three African-American Cryptologic Pioneers</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/William_Coffee.pdf">William Coffee</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Wilma_Z._Davis.pdf">Wilma Z. Davis</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Mission_of_Great_Importance.pdf">A mission of great importance?: Recruiting Scientists and Mathematicians at NSA, circa 1960</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Betrayers_of_the_Trust_Joseph_Sidney_Peterson.pdf">Betrayers of the Trust: Joseph Sidney Petersen</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Did_Anyone_Tell_the_President.pdf">Did Anyone Tell the President? Establishing the CRITICOMM System</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Dorothy_Toplitzky_Blum.pdf">Dorothy Toplitzky Blum: A Pioneer Computer Scientist</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Dr._William_D._Wray.pdf">Dr. William D. Wray</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/From_Librarians_to_Leadership.pdf">From Librarians to Leadership: Women at NSA</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Hungary_1956.pdf">Hungary, 1956: The Crisis That NSA Did Not Predict</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Joseph_N._Wenger.pdf">Joseph N. Wenger</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Madame_X_Agnes_in_Twilight.pdf">Madame X: Agnes in Twilight, The Last Years of the Career of Agnes Driscoll, 1941-1957</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Madame_X_Agnes_Meyer_Driscoll.pdf">Madame X: Agnes Meyer Driscoll and U.S. Naval Cryptology, 1919-1940</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Oscar_Collins.pdf">Oscar Collins: A Successful Senior Executive</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/SIGINT_and_the_Battle_of_the_Ia_Drang_Valley.pdf">SIGINT and the Battle of the Ia Drang Valley, November 1965</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Last_Days_of_the_Enigma.pdf">The Last Days of the Enigma</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Move_to_Fort_Meade.pdf">The Move to Fort Meade</a><br />
March &#8211; April 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Child_of_the_Century.pdf">A Child of the Century: Washington Wong</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Betrayers_of_the_Trust.pdf">Betrayers of the Trust</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Francis_A._Raven.pdf">Francis A. Raven</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Hall_of_Honor_Inductees_for_2002.pdf">Hall of Honor Inductees for 2002</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Juanita_Moody.pdf">Juanita Moody</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Louis_W._Tordella.pdf">Louis W. Tordella</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/NSA_Before_Super_Computers.pdf">Before Super-Computers: NSA and Computer Development</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Quis_Custodiet_Ipsos_Custodes.pdf">Quis Custodiet Ipsos Custodes?</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Ralph_J._Canine.pdf">Ralph J. Canine</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_TRS_Program_Part_I.pdf">The TRS Program Part I: The Beginning</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_TRS_Program_Part_II.pdf">The TRS Program Part II: The Capture of the Pueblo</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Update_to_Martin_and_Mitchell_Article.pdf">Update to Martin and Mitchell Article</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Vietnam_A_SIGINT_Paradox_Part_I.pdf">Vietnam: A SIGINT Paradox (Part I)</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Vietnam_A_SIGINT_Paradox_Part_II.pdf">Vietnam: A SIGINT Paradox (Part II)</a><br />
May &#8211; June 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/FILE.pdf">Collection and Processing at NSA</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/From_Spring_Part_One.pdf">From Spring, into a Long Winter&#8217;s Night: The Czechoslovakian Crisis of 1968 Part One</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/From_Spring_Part_Two.pdf">From Spring, into a Long Winter&#8217;s Night: The Czechoslovakian Crisis of 1968 Part Two</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Lambros_D._Callimahos_Part_1.pdf">Lambros D. Callimahos, Part 1</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Lambros_D._Callimahos_Part_2.pdf">Lambros D. Callimahos, Part 2</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Quiz.pdf">Quiz</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/KAL_007.pdf">KAL-007: The SIGINT Perspective</a><br />
September &#8211; October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Peek_Behind_the_Scenes_Part_1.pdf">A Peek Behind the Scenes: The History of History at NSA (Part 1 of 3)</a><br />
September-October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Peek_Behind_the_Scenes_Part_2.pdf">A Peek Behind the Scenes: Special Functions In the CCH (Part 2 of 3)</a><br />
September-October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Peek_Behind_the_Scenes_Part_3.pdf">A Peek Behind the Scenes: Founding of the National Cryptologic Museum (Part 3 of 3)</a><br />
September-October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Richard_A._Day.pdf">Richard A. Day: A Telecommunications Pioneer</a><br />
September &#8211; October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Soviet_Unions_Invasion.pdf">The Soviet Union&#8217;s Invasion of Afghanistan, </a><br />
25 December 1979 &#8211; October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/six_decades_of_second_party_relations.pdf">Six Decades of Second Party Relations</a><br />
January &#8211; February 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/nsa_s_field_sites.pdf">NSA&#8217;s Field Sites</a><br />
March &#8211; April 2002</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/reconsideration_of_the_role_of_sigint_part_1.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962</a><br />
March &#8211; April 2002, Part 1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/reconsideration_of_the_role_of_sigint_part_2.pdf">A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962</a><br />
March &#8211; April 2002, Part 2</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/reconsideration_of_the_role_of_sigint_part_4.pdf">A Reconsideration of the Role of SIGINT during the Cuban Missile Crisis, October 1962</a><br />
March &#8211; April 2002, Part 4</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/essential_for_morale_of_the_workforce.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />Essential for Morale of the Workforce</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/the_formation_of_nsoc.pdf">The Formation of NSOC</a><br />
July &#8211; August 2002</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/nothing_left_to_give_up_part_1.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />Nothing Left to Give Up: SIGINT and the Fall of Saigon, April 1975</a><br />
July &#8211; August 2002, Part 1</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/nothing_left_to_give_up_part_2.pdf">Nothing Left to Give Up: SIGINT and the Fall of Saigon, April 1975</a><br />
July &#8211; August 2002, Part 2</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/operation_billy_budd.pdf">Operation Billy Budd: NSA and the U.S. Army&#8217;s Secret </a><br />
July &#8211; August 2002</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/yom_kippur_war_1.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />The Yom Kippur War of 1973 (Part One) </a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/yom_kippur_war_2.pdf">The Yom Kippur War of 1973 (Part Two)</a><br />
July &#8211; August 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/dining_at_nsa.pdf">Dining at NSA</a><br />
September &#8211; October 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/time_of_investigations_part_1.pdf">The Time of Investigations</a><br />
September &#8211; October 2002, Part 1</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/time_of_investigations_part_2.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />The Time of Investigations</a><br />
September &#8211; October 2002, Part 2</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/A_Brief_Look_at_ELINT_at_NSA.pdf">A Brief Look at ELINT at NSA</a><br />
November &#8211; December 2002</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Night_of_the_Living_Coup.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />Night of the Living Coup: The 18/19 August 1991 Coup in Moscow</a><br />
November &#8211; December 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/No_Such_Agency.pdf">No Such Agency</a><br />
November &#8211; December 2002</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/NSAs_First_Inspector_General.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />NSA&#8217;s First Inspector General</a><br />
November &#8211; December 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_First_Round.pdf">The First Round: NSA&#8217;s Effort against International Terrorism in the 1970s</a><br />
November &#8211; December 2002</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Velva_Klaessy.pdf">Velva Klaessy</a><br />
November &#8211; December 2002</p>
<p><strong>2003</strong></p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Luna_9.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />Luna 9, the First Soft Landing on the Moon</a><br />
January &#8211; March 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Pre_Pre_Modern_Era.pdf">The Pre-Pre-Modern Era</a><br />
January &#8211; March 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/J._Rives_Childs.pdf">J. Rives Childs</a><br />
April &#8211; June 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/Save_the_Bismarck.pdf">Save the Bismarck! German Communications Intelligence Support to Operations Rheinubung May 1941</a><br />
April &#8211; June 2003</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/SIGINT_Support_to_the_White_House.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" />SIGINT Support to the White House</a><br />
April &#8211; June 2003</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptoalmanac/The_Longest_Search.pdf">The Longest Search: The Story of the Twenty-one-Year Pursuit of the Soviet Deep Space Data Link</a><br />
April &#8211; June 2003</p>
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptologic-almanac-50th-anniversary-series/">Cryptologic Almanac 50th Anniversary Series</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">391</post-id>	</item>
		<item>
		<title>Cryptology and the United States Intelligence Community</title>
		<link>https://www.theblackvault.com/documentarchive/cryptology-and-the-united-states-intelligence-community/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cryptology-and-the-united-states-intelligence-community</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:31:30 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[cryptology]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=388</guid>

					<description><![CDATA[<p>The following documents detail the use of Cryptology inside the United States Intelligence Community. Declassified Documents A History of U.S. Communications Security Volume I [94 Pages, 3.18mb] A History of U.S. Communications Security Volume II [61 Pages, 2.37mb] American Cryptology During the Cold War 1945-1989, Book I-IV The Cryptology of the German Intelligence Services [38 Pages, [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/cryptology-and-the-united-states-intelligence-community/">Cryptology and the United States Intelligence Community</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The following documents detail the use of Cryptology inside the United States Intelligence Community.</p>
<h3>Declassified Documents</h3>
<p><a name="hist"></a><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/history_comsec.pdf">A History of U.S. Communications Security</a> Volume I [94 Pages, 3.18mb]</p>
<p><a href="https://documents.theblackvault.com/documents/nsa/history_comsec_ii.pdf"><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> A History of U.S. Communications Security</a> Volume II [61 Pages, 2.37mb]</p>
<p><a href="https://www.theblackvault.com/documentarchive/american-cryptology-during-the-cold-war-1945-1989/">American Cryptology During the Cold War</a> 1945-1989, Book I-IV</p>
<p><a name="gis"></a><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/cryptology_of_gis.pdf">The Cryptology of the German Intelligence Services</a> [38 Pages, 2.01mb]</p>
<p><a name="clandestine"></a><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/german_clandestine_activities.pdf">German Clandestine Activities in South America in World War II</a> [78 Pages, 4.80mb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/cryptography/in_shadow_ward.pdf">In the Shadow of War</a></p>
<p><a name="nsaorigins"></a><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/origins_of_nsa.pdf">The Origins of the National Security Agency 1940-1952</a> [155 Pages, 9.83mb]</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/purple_dragon.pdf"> Purple Dragon</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="http://www.theblackvault.com/documents/cryptography/spartans_in_darkness_8152884.pdf"> Spartans in Darkness</a></p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="http://www.theblackvault.com/documents/cryptography/work_against_tide.pdf">Working Against the Tide</a></p><p>The post <a href="https://www.theblackvault.com/documentarchive/cryptology-and-the-united-states-intelligence-community/">Cryptology and the United States Intelligence Community</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">388</post-id>	</item>
		<item>
		<title>John Forbes Nash, Jr. Letters, National Security Agency</title>
		<link>https://www.theblackvault.com/documentarchive/john-forbes-nash-jr-letters-national-security-agency/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=john-forbes-nash-jr-letters-national-security-agency</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:30:00 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[john nash]]></category>
		<category><![CDATA[letters]]></category>
		<category><![CDATA[NSA]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=385</guid>

					<description><![CDATA[<p>John Forbes Nash, Jr. (born June 13, 1928) is an American mathematician whose works in game theory, differential geometry, and partial differential equations have provided insight into the forces that govern chance and events inside complex systems in daily life. His theories are used in market economics, computing, evolutionary biology, artificial intelligence, accounting, politics and [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/john-forbes-nash-jr-letters-national-security-agency/">John Forbes Nash, Jr. Letters, National Security Agency</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>John Forbes Nash, Jr. (born June 13, 1928) is an American mathematician whose works in game theory, differential geometry, and partial differential equations have provided insight into the forces that govern chance and events inside complex systems in daily life. His theories are used in market economics, computing, evolutionary biology, artificial intelligence, accounting, politics and military theory. Serving as a Senior Research Mathematician at Princeton University during the latter part of his life, he shared the 1994 Nobel Memorial Prize in Economic Sciences with game theorists Reinhard Selten and John Harsanyi.</p>
<p>Nash is the subject of the Hollywood movie A Beautiful Mind. The film, loosely based on the biography of the same name, focuses on Nash&#8217;s mathematical genius and struggle with paranoid schizophrenia.</p>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /><a href="https://documents.theblackvault.com/documents/nsa/nash_letters1.pdf">All Letters from John Nash to and from the National Security Agency</a> [18 Pages, 6.1 MB]</p>
<div class="ead-preview"><div class="ead-document" style="position: relative;padding-top: 90%;"><div class="ead-iframe-wrapper"><iframe src="//docs.google.com/viewer?url=https%3A%2F%2Fdocuments.theblackvault.com%2Fdocuments%2Fnsa%2Fnash_letters1.pdf&amp;embedded=true&amp;hl=en" title="Embedded Document" class="ead-iframe" style="width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;"></iframe></div>			<div class="ead-document-loading" style="width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;">
				<div class="ead-loading-wrap">
					<div class="ead-loading-main">
						<div class="ead-loading">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/loading.svg" width="55" height="55" alt="Loader">
							<span>Loading...</span>
						</div>
					</div>
					<div class="ead-loading-foot">
						<div class="ead-loading-foot-title">
							<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/EAD-logo.svg" alt="EAD Logo" width="36" height="23"/>
							<span>Taking too long?</span>
						</div>
						<p>
							<div class="ead-document-btn ead-reload-btn" role="button">
								<img decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/reload.svg" alt="Reload" width="12" height="12"/> Reload document							</div>
							<span>|</span>
							<a href="https://documents.theblackvault.com/documents/nsa/nash_letters1.pdf" class="ead-document-btn" target="_blank">
								<img loading="lazy" decoding="async" src="https://www.theblackvault.com/documentarchive/wp-content/plugins/embed-any-document/images/open.svg" alt="Open" width="12" height="12"/> Open in new tab							</a>
					</div>
				</div>
			</div>
		</div><p class="embed_download"><a href="https://documents.theblackvault.com/documents/nsa/nash_letters1.pdf" download>Download [6.02 MB] </a></p></div><p>The post <a href="https://www.theblackvault.com/documentarchive/john-forbes-nash-jr-letters-national-security-agency/">John Forbes Nash, Jr. Letters, National Security Agency</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">385</post-id>	</item>
		<item>
		<title>Wasn&#8217;t All Magic: The Early Struggle to Automate Cryptanalysis</title>
		<link>https://www.theblackvault.com/documentarchive/wasnt-all-magic-the-early-struggle-to-automate-cryptanalysis/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wasnt-all-magic-the-early-struggle-to-automate-cryptanalysis</link>
		
		<dc:creator><![CDATA[John Greenewald]]></dc:creator>
		<pubDate>Tue, 24 Feb 2015 05:27:34 +0000</pubDate>
				<category><![CDATA[Cryptology]]></category>
		<category><![CDATA[National Security Agency (NSA) Collection]]></category>
		<category><![CDATA[cryptanalysis]]></category>
		<category><![CDATA[cryptology]]></category>
		<guid isPermaLink="false">http://www.theblackvault.com/documentarchive/?p=382</guid>

					<description><![CDATA[<p>The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.  Special thanks and courtesy of GovernmentAttic.org  for allowing The Black Vault to post it here as well. Excerpt INTRODUCTION: I am one of those &#8220;outsiders&#8221; I talk about so much in the later chapters of this [...]</p>
<p>The post <a href="https://www.theblackvault.com/documentarchive/wasnt-all-magic-the-early-struggle-to-automate-cryptanalysis/">Wasn’t All Magic: The Early Struggle to Automate Cryptanalysis</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></description>
										<content:encoded><![CDATA[<p>The National Security Agency has declassified an eye-opening pre-history of computers used for code-breaking between the 1930s and 1960s.  <em>Special thanks and courtesy of <a href="http://www.governmentattic.org/" target="_blank" rel="noopener noreferrer">GovernmentAttic.org</a> </em> for allowing The Black Vault to post it here as well.</p>
<h3>Excerpt</h3>
<p style="padding-left: 30px;"><em><strong>INTRODUCTION: I am one of those &#8220;outsiders&#8221; I talk about so much in the later chapters of this book. I was fortunate to be brought into the National Security Agency as one of the Center for Cryptologic History&#8217;s first Scholars in Residence. I was borrowed from my university because I had spent a decade working on the history of computers at NSA&#8217;s predecessors. I even had the courage to write a book about the subject. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>That monograph was on the machines, policies, and relationships that led to the U.S. Navy&#8217;s cryptanalytic machine (computer) program in World War II. The book was also about the first major attempts to automate the American library. It had to be about both because the same people built bibliographic and cryptanalytic machines. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>My study covered events in the history of the machines through the 1940s, but its focus was on the period between 1930 and 1945. An important conclusion was that the relationship between the efforts of America&#8217;s codebreakers and the emergence of the modern digital electronic computer was more complex than had been thought. The navy&#8217;s cryptanalysts were in a push-me, pull-me situation. Their work made mechanization a necessity, but the pressures of war and the refusal of the government bureaucracy to sponsor long term research and development programs prevented the navy from becoming the inventor of the modern computer. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>During World War II American cryptanalysts built some of the most sophisticated electronic machines in the world, but the need to address cryptanalytic crises blocked them from creating the general-purpose digital electronic computer. </strong></em></p>
<p style="padding-left: 30px;"><em><strong>Just as my book was published, I was asked to come to the National Security Agency. One purpose of my year in residence was to see if it was possible to write a complete history of computers at the Agency. The goal was a monograph that covered the entire life of NSA and its predecessors. The thought of finally being able to see the many highly classified documents that had been withheld from me more than balanced the pledge I had to give: I had to promise to refrain from publishing without the approval of NSA&#8217;s censors. </strong></em></p>
<p>&nbsp;</p>
<h3>Download the Document</h3>
<p><img decoding="async" src="https://www.theblackvault.com/images/pdf.gif" alt="" /> <a href="https://documents.theblackvault.com/documents/nsa/NSA-WasntAllMagic_2002.pdf">Wasn&#8217;t All Magic: The Early Struggle to Automate Cryptanalysis</a> [ 362 Pages, 49MB ]</p>
<p>&nbsp;</p>
<p>&nbsp;</p><p>The post <a href="https://www.theblackvault.com/documentarchive/wasnt-all-magic-the-early-struggle-to-automate-cryptanalysis/">Wasn’t All Magic: The Early Struggle to Automate Cryptanalysis</a> first appeared on <a href="https://www.theblackvault.com/documentarchive">The Black Vault</a>.</p>]]></content:encoded>
					
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">382</post-id>	</item>
	</channel>
</rss>
