The following are documents from the Cryptologic Quarterly, declassified by the NSA.

blankDisclaimer

blankJohn H. Tiltman: A Reminiscence – Summer/Fall 1982-Vol. 1, Nos. 2-3

blankComputer Virus Infections: Is NSA Vulnerable? – Fall 1985-Vol. 4, No. 3

blankThe Origination and Evolution of Radio Traffic Analysis: The World War I Era – Spring 1987-Vol. 6, No. 1

blankWhat Every Cryptologist Should Know About Pearl Harbor – Summer 1987 – Vol. 6, No. 2

blankInfluence of US Cryptologic Organizations on the Digital Computer Industry – Fall/Winter 1987-1988 Vol. 8, Nos. 3-4

blankThird Party Nations: Partners and Targets – Winter 1989 – Vol. 7, No. 4

blankMeteor Burst Communications: An Ignored Phenomenon? – Fall 1990 – Vol. 9, No. 3

blankGeographic Information Systems – Fall/Winter 1991 – Vol 10, Nos. 3-4

blankDOS/UNIX Interoperability and Email in the Agency – Spring 1992 – Vol. 11, No.1

blankSolving xa=b(mod c) for x and Undecimating Recursions – Winter 1992 – Vol. 11, No. 4

blankThe First US Government Manual on Cryptography – Winter 1992 – Vol. 11, No. 4

blankTelephone Codes and Safe Combinations: A Deadly Duo – Spring 1993 – Vol 12, No.1

blankSub-HF Search and Acquisition – – Summer 1994 – Vol.13, No2

blankA World War II German Army Field Cipher and How We Broke It – Winter 1995 – Vol. 14, No. 4

blankGuerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45 – Spring 1996 – Vol. 15, No. 1

blankBook Review: A Century of Spies: Intelligence in teh Twentieth Century – Fall 1996 – Vol. 153, No. 3

blankDealing with the Future: The Limits of Forecasting – Fall 1996 – Vol. 153, No. 3

blankThe BS Attitudes: How Things Work in Bureaucracies – Winter 1996 – Vol. 15, No. 4

Comments are closed.

Follow by Email
YouTube
YouTube
RSS