Previously
unreleased bibliographies and indexes of National Security Agency publications
All files are searchable Acrobat/PDF
format
Right-click to save files to
your hard drive Mac users: Control-click to save
Cryptologic Quarterly Index (Spring 1982 - Winter 1996)
Click here to download the document [171 pages 5.9 meg]
Originally classified Top Secret Umbra
Index contains three sections, listing articles by title, by author, and by keyword
|
Sample article titles: "The BS Attitudes: How Things Work in Bureaucracies" · "Computer Virus Infections: Is NSA Vulnerable?" · "The Cryptologic Origin of Braille" · "Design and Evaluation of INFOSEC Systems" · "Examples of Lattices in Computer Security Models" · "The Fall of the Shah: A Chaotic Approach" · "The First US Government Manual on Cryptography" · "Influence of U.S. Cryptologic Organizations on the Digital Computer Industry" · "INTERROGRAPH: An Information Tool for Counter-Terrorism Intelligence Centers" · "KAL 007 Shootdown: A View from [redacted]" · "Meteor Burst Communications: An Ignored Phenomenon?" · "NSA: How Much Do We Really Know about the Software Capability of Our Contractors?" · "NSA in the Cyberpunk Future" · "Obscenities in COMINT: A Need for Cognitive Knowledge" · "Predicting Terrorism: An Indications and Warning Model" · "SIGINT and the Holocaust" · "Telephone Codes and Safe Combinations: A Deadly Duo" · "Translating by the Seat of Your Pants" · "Video Teleconferencing: NSA Applications" · "What Every Cryptologist Should Know About Pearl Harbor"
|
NSA Technical Journal Cumulative Index (April 1956 - Fall 1980)
Click here to download the document [202 pages 6.2 meg]
Originally classified Top Secret Umbra
Index contains three sections, listing articles by title, by author, and by keyword
|
Sample article titles: "The Arithmetic of a Generation Principle for an Electronic Key Generator" · "CATNIP: Computer Analysis - Target Networks Intercept Probability" · "Chatter Patterns: A Last Resort" · "COMINT Satellites - A Space Problem" · "Computers and Advanced Weapons Systems" · "Coupon Collecting and Cryptology" · "Cranks, Nuts, and Screwballs" · "A Cryptologic Fairy Tale" · "Don't Be Too Smart" · "Earliest Applications of the Computer at NSA" · "Emergency Destruction of Documents" · "Extraterrestrial Intelligence" · "The Fallacy of the One-Time-Pad Excuse" · "GEE WHIZZER" · "The Gweeks Had a Gwoup for It" · "How to Visualize a Matrix" · "Key to the Extraterrestrial Messages" · "A Mechanical Treatment of Fibonacci Sequences" · "Q.E.D.- 2 Hours, 41 Minutes" · "SlGINT Implications of Military Oceanography" · "Some Problems and Techniques in Bookbreaking" · "Upgrading Selected US Codes and Ciphers with a Cover and Deception Capability" · "Weather: Its Role in Communications Intelligence" · "Worldwide Language Problems at NSA"
|
Cryptologic Spectrum Index (1969-1981)
Click here to download the document [35 pages 1 meg]
Originally classified Confidential
Index contains three sections, listing articles by author, by issue, and by title
|
Sample article titles: "Automatic Translation of Morse Code" · "Boners Wanted" · "Communication with Extraterrestrial Intelligence" · "Fabrication of Traffic--It Can and Did Happen" · "Historical Impact of Revealing the ULTRA Secret" · "History of Applesauce" · "Is Yugoslav President Tito Really a Yugoslav?" · "Look at the Pacific Experimental Facility" · "Photon 901" · "Soviet Defector at NSA" · "TEMPEST: A Signal Problem" · "Why Some Projects Fail"
|
Cryptologic Almanac Index (Jan/Feb 2002 - Apr/Jun 2003)
Click here to download the document [4 pages 180K]
unclassified
|
Sample article titles: "The Effort to Create a Smoke-Free NSA" · "Madame X: Agnes Meyer Driscoll" · "Defense Special Missile and Astronautics Center" · "The Yom Kippur War of 1973" · "Dining at NSA" · "No Such Agency" · "SIGINT Support to the White House"
|
Center for Cryptologic History Publications
Click here to download the document [15 pages 575K]
unclassified
|
Sample publication titles: "American Cryptology: Two Centuries of Tradition" · "Listening to the Rumrunners" · "Shield and Storm: The Cryptologic Community in the Desert Operations" · "Attack on a SlGlNT Collector the USS Liberty" · "The Invisible Cryptologists: African-Americans WWII to 1956" · "PURPLE DRAGON: The Origin and Development of the United States OPSEC Program" · "Space Surveillance SlGlNT Program"
|
Technical Note: These documents were released in paper format by the NSA on 17 August 2006 in response to FOIA request 42848, filed 23 May 2003. |
Sample Request Letter
[DATE]
[YOUR CONTACT INFO]
Pamela N. Phillips
NSA FOIA Office/DC34
9800 Savage Road, Suite 6248
Ft. George G. Meade, MD 20755-6248
FREEDOM OF INFORMATION ACT REQUEST
Dear Ms. Phillips:
Pursuant to the provisions of the Freedom of Information Act, I hereby request the following NSA document(s):
___________________________________________
___________________________________________
___________________________________________
These documents are cited in [CHECK ONE OR MORE]:
__ Cryptologic Quarterly Index
__ NSA Technical Journal Cumulative Index
__ Cryptologic Spectrum Index
__ Cryptologic Almanac Index
__ Center for Cryptologic History Publications
These indexes are located at www.thememoryhole.org/nsa/bibs.htm
If the requested document(s) is/are marked classified, please review for declassification.
This is an individual request for noncommercial purposes and my request thereby falls into the "all other
requests" fee category. [OR INSTEAD INDICATE IF YOUR REQUEST IS FROM A NEWS ORGANIZATION OR UNIVERSITY OR OTHER EDUCATIONAL INSTITUTION] Although I understand that I am entitled to the first 100 pages and first two hours of search time at no charge, I also
agree that I am willing to pay up to $25 [OR GREATER OR LESSER AMOUNT] if it becomes necessary.
Sincerely,
|
posted at the memoryhole.org
No comments:
Post a Comment