{"id":397,"date":"2015-02-24T05:44:36","date_gmt":"2015-02-24T05:44:36","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=397"},"modified":"2015-03-04T18:02:09","modified_gmt":"2015-03-04T18:02:09","slug":"cryptologic-quarterly-articles","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/cryptologic-quarterly-articles\/","title":{"rendered":"Cryptologic Quarterly Articles"},"content":{"rendered":"<p>The following are documents from the Cryptologic Quarterly, declassified by the NSA.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/disclaimer.pdf\">Disclaimer<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/johnhtiltman.pdf\">John H. Tiltman: A Reminiscence<\/a> &#8211; Summer\/Fall 1982-Vol. 1, Nos. 2-3<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/computervirus.pdf\">Computer Virus Infections: Is NSA Vulnerable?<\/a> &#8211; Fall 1985-Vol. 4, No. 3<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/trafficanalysis.pdf\">The Origination and Evolution of Radio Traffic Analysis: The World War I Era<\/a> &#8211; Spring 1987-Vol. 6, No. 1<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/pearlharbor.pdf\">What Every Cryptologist Should Know About Pearl Harbor<\/a> &#8211; Summer 1987 &#8211; Vol. 6, No. 2<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/digitalcomputer_industry.pdf\">Influence of US Cryptologic Organizations on the Digital Computer Industry<\/a> &#8211; Fall\/Winter 1987-1988 Vol. 8, Nos. 3-4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/third_part_nations.pdf\">Third Party Nations: Partners and Targets<\/a> &#8211; Winter 1989 &#8211; Vol. 7, No. 4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/meteo_burst.pdf\">Meteor Burst Communications: An Ignored Phenomenon?<\/a> &#8211; Fall 1990 &#8211; Vol. 9, No. 3<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/geo_info.pdf\">Geographic Information Systems<\/a> &#8211; Fall\/Winter 1991 &#8211; Vol 10, Nos. 3-4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/dos_unix.pdf\">DOS\/UNIX Interoperability and Email in the Agency<\/a> &#8211; Spring 1992 &#8211; Vol. 11, No.1<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/solving_xa.pdf\">Solving xa=b(mod c) for x and Undecimating Recursions<\/a> &#8211; Winter 1992 &#8211; Vol. 11, No. 4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/solving_xa.pdf\">The First US Government Manual on Cryptography<\/a> &#8211; Winter 1992 &#8211; Vol. 11, No. 4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/tele_codes.pdf\">Telephone Codes and Safe Combinations: A Deadly Duo<\/a> &#8211; Spring 1993 &#8211; Vol 12, No.1<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/search_acquisition.pdf\">Sub-HF Search and Acquisition<\/a> &#8211; &#8211; Summer 1994 &#8211; Vol.13, No2<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/world_war_II.pdf\">A World War II German Army Field Cipher and How We Broke It<\/a> &#8211; Winter 1995 &#8211; Vol. 14, No. 4<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/guerillas_in_mist.pdf\">Guerillas in the Mist: COMINT and the Formation of Evolution of the Viet Minh, 1941-45<\/a> &#8211; Spring 1996 &#8211; Vol. 15, No. 1<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/br_century_spies.pdf\">Book Review: A Century of Spies: Intelligence in teh Twentieth Century<\/a> &#8211; Fall 1996 &#8211; Vol. 153, No. 3<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/limits_forecasting.pdf\">Dealing with the Future: The Limits of Forecasting<\/a> &#8211; Fall 1996 &#8211; Vol. 153, No. 3<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/><a href=\"http:\/\/www.theblackvault.com\/documents\/cryptography\/bs_attitudes.pdf\">The BS Attitudes: How Things Work in Bureaucracies<\/a> &#8211; Winter 1996 &#8211; Vol. 15, No. 4<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following are documents from the Cryptologic Quarterly, declassified by the NSA. Disclaimer John H. Tiltman: A Reminiscence &#8211; Summer\/Fall 1982-Vol. 1, Nos. 2-3 Computer Virus Infections: Is NSA Vulnerable? &#8211; Fall 1985-Vol. 4, No. 3 The Origination and Evolution of Radio Traffic Analysis: The World War I Era &#8211; Spring 1987-Vol. 6, No. 1<\/p>\n","protected":false},"author":1,"featured_media":398,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[34,3,4,40],"tags":[202,203],"class_list":{"0":"post-397","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cryptology","8":"category-history","9":"category-intelligence","10":"category-national-security-agency-nsa-collection","11":"tag-cryptology","12":"tag-nsa"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/ba0ed8841021dcef434b2261593f7eeb.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=397"}],"version-history":[{"count":0,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/398"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}