{"id":845,"date":"2015-02-28T18:39:05","date_gmt":"2015-02-28T18:39:05","guid":{"rendered":"http:\/\/www.theblackvault.com\/documentarchive\/?p=845"},"modified":"2020-06-10T13:14:38","modified_gmt":"2020-06-10T13:14:38","slug":"nsa-technical-journals","status":"publish","type":"post","link":"https:\/\/www.theblackvault.com\/documentarchive\/nsa-technical-journals\/","title":{"rendered":"NSA Technical Journals"},"content":{"rendered":"<h3>Background<\/h3>\n<p>From April of 1956, to the Fall of 1980, the NSA published the &#8220;NSA Technical Journal&#8221; which contained articles and intelligence on all sorts of topics.<\/p>\n<p>Below, you will find an archive of those articles and full NSA Technical Journals which have been released.<\/p>\n<h3>Document Archive<\/h3>\n<p><strong>Misc. Military Intelligence Publications<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/trailofmilintell.pdf\">On The Trail of Military Intelligence History<\/a> [44 Pages, 7.45 MB]<\/p>\n<p><strong>NSA Technical Journal Full Article Index<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/NSATechnicalJournalIndex.pdf\">Full Index of NSA Technical Journal Articles<\/a> [202 Pages, 5.87MB]<\/p>\n<p><strong>NSA Technical Journals (Full Release)<\/strong><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Fall1980.pdf\">Fall 1980, Volume 25, Number 4<\/a> [47 Pages, 3MB]<\/p>\n<p><strong>NSA Technical Journal Table of Contents<\/strong><\/p>\n<p>(NSA lists the contents of the journals as classified. Each article, or full journal, can be requested with a Mandatory Declassification Review Request to the NSA)<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Apr1956.pdf\">NSA Technical Journal, April 1956, Volume 1, Number 1<\/a>\u00a0[1 Page, 123kb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Jul1956.pdf\">NSA Technical Journal, July 1956, Volume 1, Number 2<\/a>\u00a0[1 Page, 117kb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Oct1956.pdf\">NSA Technical Journal, October 1956, Volume 1, Number 3<\/a>\u00a0[1 Page, 113kb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Jan1957.pdf\">NSA Technical Journal, January 1957, Volume 2, Number 1<\/a>\u00a0[1 Page, 108kb]<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/Apr1957.pdf\">NSA Technical Journal, April 1957, Volume 2, Number 2<\/a>\u00a0[1 Page, 113kb]<\/p>\n<p><strong>\u00a0NSA Technical Journal Articles Individually Released<\/strong><\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/emergency_destruction.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Emergency Destruction of Documents<\/a> &#8211; April 1956 &#8211; Vol. I, No. 1 [3 Pages, 294kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/development_automatic.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Development of Automatic Telegraph Switching Systems<\/a> &#8211; July 1957 &#8211; Vol. II, No. 3 [13 Pages, 454kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/chatter_patterns.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Chatter Patterns: A Last Resort<\/a> &#8211; October 1957 &#8211; Vol. II, No. 4 [7 Pages, 301]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/intro_traffic_analysis.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Introduction to Traffic Analysis<\/a> &#8211; April 1958 &#8211; Vol. III, No. 2 [6 Pages, 346kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/signals_outer_space.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Signals from Outer Space<\/a> &#8211; April 1958 &#8211; Vol. III, No. 2 [4 Pages, 379kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/science_cryptology.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Science and Cryptology<\/a> &#8211; July 1958 &#8211; Vol. III, No. 3 [4 Pages, 231kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/new_concept_computing.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0A New Concept in Computing<\/a> &#8211; December 1958 &#8211; Vol. III, No. 4 [10 Pages, 375kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/about_nsa.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0About NSA<\/a> &#8211; January 1959 &#8211; Vol. IV, No. 1 [5 Pages, 300kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/data_transmission.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Data Transmission Over Telephone Circuits<\/a> &#8211; January 1959 &#8211; Vol. IV, No. 1 [8 Pages, 395kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/soviet_science.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Soviet Science and Technology: Present Levels and Future Prospects<\/a> &#8211;<br \/>\nJanuary 1959 &#8211; Vol. IV, No. 1 [13 Pages, 686kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cryptanalysis_in_german_af.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Cryptanalysis in The German Air Force<\/a> &#8211; April 1959 &#8211; Vol. IV, No. 2 [9 Pages, 788kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/correcting_spelling_errors.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0A Program for Correcting Spelling Errors<\/a> &#8211; October 1959 &#8211; Vol. IV, No. 4 [4 Pages, 331kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/borders_cryptology.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0The Borders of Cryptology<\/a> &#8211; October 1959 &#8211; Vol. IV, No. 4 [4 Pages, 190kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/aleksandr_popov.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Did Aleksandr Popov Invent Radio?<\/a> &#8211; January 1960 &#8211; Vol. V, No. 1 [4 Pages, 219kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/book_review_lost_languages.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Book Review: Lost Languages<\/a> &#8211; Fall 1960 &#8211; Vol. V. Nos. 3 &amp; 4 [4 Pages, 296kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/gee_system_i.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0The GEE System I<\/a> &#8211; Fall 1961, Vol. VI, No. 4 [20 Pages, 1.49mb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/book_review_lincos_design.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Book Review: Lincos, Design of a Language for Cosmic Intercourse, Part 1<\/a> &#8211; Winter 1962 &#8211; Vol. VII, No. 1 [5 Pages, 209kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/cryptologic_fairy_tale.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0A Cryptologic Fairy Tale<\/a> &#8211; Spring 1962 &#8211; Vol. VII, No. 2 [12 Pages, 328kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/aristocrat.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Aristocrat &#8211; An Intelligence Test for Computers<\/a> &#8211; Spring 1962 &#8211; Vol. VII, No. 2 [4 Pages, 169kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/why_analog_computation.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Why Analog Computation?<\/a> &#8211; Summer 1962 &#8211; Vol. VII, No. 3 [4 Pages, 314kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/book_review_pearl_harbor.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Book Review: Pearl Harbor: Warning and Decision<\/a> &#8211; Winter 1963 &#8211; Vol. VIII, No. 1 [3 Pages, 234kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/soviet_communications.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Soviet Communications Journals as Sources of Intelligence<\/a> &#8211; August 1964 &#8211; Vol. IX, No. 3 [4 Pages, 164kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/something_mayruboff.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Something May Rub Off!<\/a> &#8211; Winter 1965 &#8211; Vol. X, No. 1 [5 Pages, 303kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/time_is.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Time Is &#8211; Time Was &#8211; Time Is Past Computes for Intelligence<\/a> &#8211; Winter 1965 &#8211; Vol. X, No. 1 [13 Pages, 687kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/communications_extraterrestrial_intelligence.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Communications with Extraterrestrial Intelligence<\/a> &#8211; Winter 1966 &#8211; Vol. XI, No. 1 [9 Pages, 413kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/extraterrestrial_intelligence.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Extraterrestrial Intelligence<\/a> &#8211; Spring 1966 &#8211; Vol. XI, No. 2 [2 Pages, 140kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/library_and_%20user.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0The Library and the User<\/a> &#8211; Spring 1968 &#8211; Vol. XIII, No. 2 [5 Pages, 267kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/mokusatsu.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Mokusatsu: One Word, Two Lessons<\/a> &#8211; Fall 1968 &#8211; Vol. XIII, No. 4 [6 Pages, 327kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/extraterrestrial_messages.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Key to The Extraterrestrial Messages<\/a> &#8211; Winter 1969 &#8211; Vol. XIV, No. 1 [11 Pages, 383kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/qed.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0Q.E.D. &#8211; 2 Hours, 41 Minutes<\/a> &#8211; Fall 1973, Vol. XVIII, No. 4 [22 Pages, 916kb]<\/p>\n<p><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/qed.pdf\"><img decoding=\"async\" src=\"https:\/\/www.theblackvault.com\/images\/pdf.gif\" alt=\"\" \/>\u00a0<\/a><a href=\"https:\/\/documents.theblackvault.com\/documents\/nsa\/earliest_applications.pdf\">Earliest Applications of the Computer at NSA<\/a> &#8211; Winter 1973 &#8211; Vol. XVIII, No. 1 [3 Pages, 186kb]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Background From April of 1956, to the Fall of 1980, the NSA published the &#8220;NSA Technical Journal&#8221; which contained articles and intelligence on all sorts of topics. Below, you will find an archive of those articles and full NSA Technical Journals which have been released. Document Archive Misc. Military Intelligence Publications \u00a0On The Trail of<\/p>\n","protected":false},"author":1,"featured_media":11249,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"episode_type":"","audio_file":"","transcript_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3,40],"tags":[61,432,204,203,431],"class_list":{"0":"post-845","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-history","8":"category-national-security-agency-nsa-collection","9":"tag-history","10":"tag-journal","11":"tag-national-security-agency","12":"tag-nsa","13":"tag-technical"},"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/www.theblackvault.com\/documentarchive\/wp-content\/uploads\/2015\/02\/6-10-2020-6-13-09-AM.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/845","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/comments?post=845"}],"version-history":[{"count":0,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/posts\/845\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media\/11249"}],"wp:attachment":[{"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/media?parent=845"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/categories?post=845"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.theblackvault.com\/documentarchive\/wp-json\/wp\/v2\/tags?post=845"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}