Donate for the Cryptome archive of files from June 1996 to the present

24 March 2013

NSA Cryptologs Indexes 1974-1997

Part 2 -- Cryptologs 76 - 136, 1983 - 1997

1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985
1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997

Part 1 -- Cryptologs 1 - 75, 1974 - 1982

Indexes of Authors, Titles and Keywords of Cryptologs 1974-1982:

CUMULATIVE INDEX, PART ONE: AUTHORS (U) [Cryptome mirror 8.2MB]

CUMULATIVE INDEX, PART TWO: TITLES (U) [Cryptome mirror 3MB]

CUMULATIVE INDEX, PART THREE: KEYWORDS (U) [Cryptome mirror 13MB]

And

CRYPTOLOG 1983 INDEX (U) [Cryptome mirror 5.5MB]


1983

76. Vol. X, Nos. 1 - 2 - January - February 1983

Special Issue: CISI Essay Contest

The Future Brightens for Flat-Panel Displays (U)

Improving Raster Graphics Images by Anti-Aliasing (U)

Current Local Area Network Status (U)

Logic Design Exceeding Boolean Capabilities (U)

Ada: Conquering the Tower of Babel (U)

Managing Our Systems for Performance (U)

Getting Personal (U)

Menu Selection as a Tool for Human/Machine Interaction (U)

A Tutorial on Color Theory and Human Color Perception for the Color Graphics Programmer (U)

Computer Graphics to Enhance Collection Management (U)

The NSA High-Level Display File (U)

A Survey of Parallel Sorting (U)

ADA News (U)

Puzzle (U) D.H.W.


77. Vol. X, No. 3 - March 1983

VIDEO TELECONFERENCING: NSA APPLICATIONS (U)

THE GLASS HALF EMPTY OR HALF FULL? (U)

CUMULATIVE INDEX, PART ONE: AUTHORS (U) [Cryptome mirror 8.2MB]

STUDENTS! (U)

[redacted]

CRYPTIC CROSSWORD #3 (U)

SHELL USING IF

E. T. AT NSA

SIGINT CHALLENGE: A SCENARIO (U)

KRYPTOS SPRING MEETING (U)

MORE ON PASSWORDS (U)

TDY TRAVAIL (U) by Vera R. Filby

WEATHER: A KEY INTELLIGENCE INDICATOR (U)


78. Vol. X, No. 4 - April 1983

UIS : USER INTERFACE SYSTE M (U)

PART ONE: CONCEPT (U)

PART TWO: ARCHITECTURE (U)

CUMULATIVE INDEX, PART TWO: TITLES (U) [Cryptome mirror 3MB]

GOVERNMENT OF THE PEOPLE, BY THE PARTY, FOR THE LEADERSHIP (U)

SPECIFYING COLORS FOR COMPUTER GRAPHICS (U)

[redacted]

[redacted]

NSA IN THE SPACE AGE

MY STAFF--IT COMFORTS ME (U) by Zebulon Zilch

WORD PEOPLE AT NSA (U) by 'Dickson Airy'

NSA-CROSTIC NO. 46 (U) by David H. Williams


79. Vol. X, No. 5 - May 1983

CONFESSIONS OF A BRIEFER (U)

STILL MORE ABOUT PASSWORDS (U)

CRYPTOGRAPHY AT GLOBECOM 82 (U)

REVIEW: DIGITAL TELEPHONY (U)

CUMULATIVE INDEX, PART THREE: KEYWORDS (U) [Cryptome mirror 13MB]

OUT OF MY DEPTH (U)

THE INTELLIGENCE WATCH OFFICER (U)

COMPUTERIZING TRAFFIC ANALYSIS (U)

NSA-CROSTIC NO. 47 (U) by David H. Williams


80. Vol. X, Nos. 6 - 7 - June - July 1983

WHY PASCAL? (WHY NOT?) (U)

REDBARON, ROADRUNNER, BRONZ STAR: WHAT'S IN A NAME? (U)

LETTER TO THE EDITOR

DO YOU KNOW THE DIFFERENCES? (U)

SOME TIPS ON GETTING PROMOTED (U)

[redacted]

PUNCHING THE BIOLOGICAL TIMECLOCK (U)

[redacted]

LETTER TO THE EDITOR

NSA-CROSTIC NO. 48 (U) by Vera R. Filby


81. Vol. X, No. 8 - August 1983

THE CASE OF THE 'FOWLED-UP' CRITIC (U)

DOES YOUR OFFICE MAKE YOU SICK? (U)

LETTERS TO THE EDITOR (U)

I REMEMBER MABEL BABEL (U)

REVIEW: THE BATTLE FOR THE FALKLANDS (U)

NSA-CROSTIC NO. 49 (U) by David H. Williams


82. Vol. X, No. 9 - September 1983

[redacted]

[redacted]

DO YOU REALLY MEAN JULIAN? (U)

MANAGEMENT OF COORDINATION (U)

ON HOW THE 'GAME' OF THE AGENCY SHOULD BE PLAYED (U) by Ramon Santiago-Ortiz

WRANGLER ... ONE TOUGH CUSTOMER (U)

PARPRO: RECONNAISSANCE PROGRAMS (U)

FOREIGN MICROWAVE RADIO (U)

NSA-CROSTIC NO. 50 (U) by David H. Williams


83. Vol. X, No. 10 - October 1983

CRISIS MANAGEMENT: REMARKS (U) by Lincoln D. Faurer

SOVIET MILITARY GOALS AND THEIR EFFECT ON NEGOTIATIONS FOR ARMS LIMITATIONS

TIPS ON TOPICAL REPORTING (U)

THOUSANDS MISS DEMONSTRATION (U)

LOOKING AROUND: TELECOM 83 (U)

BANNERS, COWBOY HATS, AND ELINT NOTATIONS (U)


84. Vol. X, No. 11 - November 1983

STATIC MAGIC: THE WONDERFUL WORLD OF TEMPEST (U) by Thomas M. Donahue

TEMPEST FOR EVERY OFFICE (U)

I REMEMBER JFK (U) by H. G. R.

MBTI: THE MANAGEMEMNT TOOL OF THE FUTURE (U)

ACRONYMANIA (U)

THE WHITE HOUSE IS SINGING OUR SONG (U) by Albert I. Murphy

THE LITERARY BENDS (U) Albert I. Murphy

CIRCA 1949 (U)

5-4-3 PUZZLE by Watt Zizname


85. Vol. X, No. 12 - December 1983

THE ISLAMIC TIME BOMB (U)

OUT OF MY DEPTH (U)

NON POSSE VS. POSSE NON (U)

SOVIET PSI EXPERIMENTS (U)

[redacted]

SHELL GAME: SYSTEM SHELLS (U)

DCL: THE DIRECT COMMUNICATIONS LINK (U)

NSA-CROSTIC NO. 51 by David H. Williams


1984

86. Vol. XI, No. 1 - January 1984

COMMUNICATIONS INTELLIGENGE AND TSARIST RUSSIA (U)

PRESENT STATUS AND FUTURE DEVELOPMENT OF CHINA'S TELECOMMUNICATIONS (U) by Zhu Gaofeng

1983 CISI ESSAY AWARDS (U)

1983 CISI ESSAY ABSTRACTS (U)

THE LANGUAGE PROBLEM AT NSA (U)

[redacted]

NSA-CROSTIC NO. 52


87. Vol. XI, Nos. 2 - 3 - February - March 1984

ADMIRAL A.I. NEPENIN: FATHER OF MODERN RUSSIAN NAVAL INTELLIGENCE (U)

THE CRYPT BUG (U)

USER-FRIENDLY WRITING (U)

NATIONAL SUPERCOMPUTING RESEARCH CENTER

SHELL GAME: TIME SHELLS (U) by W.E.S.

NSA-CROSTIC NO. 53 by David H. Williams

AUTOMATED INFORMATION SECURITY (U)

CRYPTOLOG 1983 INDEX (U) [Cryptome mirror 5.5MB]


88. Vol. XI, No. 4 - April 1984

OIL AND DEVELOPMENT: EFFECTS ON NIGERIAN . ECONOMY (U)

ARMS CONTROL IN THE WAKE OF KAL 007 (U)

GOLDEN OLDIE (U)

RESERVATIONS ABOUT THE MBTI (U)

NUMEROLOGY (U)

THE STAFF IN TODAY'S BUREAUCRACIES (U)

THE MAGDEBURG INCIDENT (U)

THE POSITION OF NSA/CSS IN THE US GOVERNMENT (U)

DO YOU KNOW THE DIFFERENCE? (U)

NSA-CROSTIC NO. 54 (U) by David H. Williams


89. Vol. XI, No. 5 - May 1984

MEXICAN OIL & US ENER9Y SECURITY (U)

GOLDEN OLDIE (U)

SHELL GAME: SUICIDE SHELL (U)

[redacted]

[redacted]

'I SPY' A LA MOSCOW (U)

NSA-CROSTIC NO. 55 (U)  by David H. Williams


90. Vol. XI, Nos. 6 - 7 - June - July 1984

TRAFFIC ANALYSIS: A CURRENT PERSPECTIVE (U)

ESPIONAGE AS A TOOL OF TECHNOLOGY TRANSFER (U)

INTELLIGENCE ANALYSIS IN THE COMPUTER AGE (U) by Jack Gurin

NAMING SOVIET CITIES (U)

THE BOOKBREAKER (U) by Stuart Buck

WORD PROCESSING PLAIN AND SIMPLE (U)

UNLESS TEXTS HANG TOGETHER, LINGUISTS WILL ALL HANG SEP(ARA)TELY (U)

NSA-CROSTIC NO. 56 U


91. Vol. XI, Nos. 8 - 9 - August - September 1984

DIRECTOR'S REMARKS: 1984 CISI SPRING CONFERENCE (U) by Lincoln D. Faurer

THE SOVIET CENSORSHIP DILEMMA: MOTIVATION VS. SECRECY (U)

LONG-RANGE PLANNING AND NSA (U)

THE AT&T DIVESTITURE AND NATIONAL SECURITY (U)

QUALIFICATIONS OF A CRYPTANALYST (U)

LINGUISTS AND OTHER MINORITIES (U)

STUMBLING INTO SPACE (U) by Nathaniel C. Gerson

NSA-CROSTIC NO. 57 (U) by D.H.W.


92. Vol. XI, No. 10 - October 1984

THOUGHTS OLD AND NEW, RANDOM AND CAUSAL (U)

DEVELOPMENT OF ON-LINE PROCESSING SYSTEMS (U)

A PARTING SHOT (U) by E. Leigh Sawyer

I REMEMBER ... (U) W.P. Meyer

ON SPELLING "PLAIN?TEXT" (U)

NATIONAL INTERESTS: CORNERSTONE OF OUR FOREIGN POLICY (U)

PROGRAMMING, CREATIVITY, AND HUMOR (U)

NSA-CROSTIC NO. 58 (U) by D.H.W


93. Vol. XI, Nos. 11 - 12 - November - December 1984

TRENDS IN HF COMMUNICATIONS (U)

SWITCHBOARD: PAST, PRESENT AND FUTURE (U)

OUT OF MY DEPTH (U)

[redacted]

EXPLORING A DOS DISKETTE (U)

HUMAN FACTORS (U)

CAN YOU TOP THIS? (U) by E. Leigh Sawyer

PERSONAL COMPUTING IN A GROUP (U)

FACTION LINE (U) by Cal Q. Lator

NSA-CROSTIC NO. 59 (U) by D.H.W.


1985

94. Vol. XII, Nos. 1 - 3 - January - March 1985

VIDEO TELECONFERENCING (U)

LETTER TO THE EDITOR (U)

A MESSAGE TO CRYPTANALYSTS EVERYWHERE (U) by 'THE MAD HATTER'

I WOULDN'T HAVE MISSED IT FOR THE WORLD! (U) by Mary Ann Harrison

SHELL GAME (U) by W.E.S.

BOOK REVIEW: EASE MY SORROWS (U)

BULLETIN BOARD (U)

A NOTE ON IMPROVING CRYPTOLOGIC RESEARCH (U) by Nathaniel C. Gerson

FOOD FOR THOUGHT (U)

A TRAVELER'S TALE (U)

TYME SHELL (U)

ON EXCELLENCE (U)

FROM THE PAST (U)

NSA-CROSTIC NO. 60 (U) by D.H.W.


95. Vol. XII, No. 4 - April 1985

FINDING A HOME FOR AFSA 1949-1952 (U)

SUPPORT TO LANGUAGE ON THE ASTW (U)

BULLETIN BOARD (U)

A UNIQUE HUMINT ORGANIZATION (U)

IMPROVING LIFE WITH AN ASTW (U)

... AND THERE WE WERE! (U)

GOLDEN OLDIE (U)

NSA-CROSTIC NO. 61 (U) by D.H.W.


96. Vol. XII, No. 5 - May 1985

THE G4 PLAN FOR CAREER DEVELOPMENT (U)

THE CRYPTOLOGIC LINGUIST PROGRAM (U)

THE SUMMER LANGUAGE PROGRAM (U)

COPING WITH CAREER CHANGE (U)

CA SKILLS ENHANCEMENT PROGRAM (U)

GALAXY (U)

THE FUTURE OF TRAFFIC ANALYSIS (U)

LETTER TO THE EDITOR (U) by Robert J. Hanyok

FROM THE PAST (U)

CRYPTO-PUZZLE NO. 29 (U) by William Lutwiniak

NSA INTERN TRAINING PROGRAM [1955] (U)


97. Vol. XII, Nos. 6 - 8 - June - August 1985

NSA'S INITIATIVE ON SECURE VOICE (U)

TELEPHONE SECURITY, 1918 (U)

BULLETIN BOARD (U)

SHOPWORK (IV) (U)

AN APPLICATION OF PINSETTER (U)

VALEDICTORY OF A TRAFFIC ANALYST (U) by Joseph Starr

BACK UP YOUR DATA FILES (U) by Norman P. Smith

ESCHEW OBFUSCATORY SCRIVENERY, PLEASE (U)

NSA-CROSTIC NO. 62 (U) by D .R. W.


98. Vol. XII, Nos. 9 - 10 - September - October 1985

UNDERSTANDING THE FREEDOM OF INFORMATION ACT (U)

QUOTE WITHOUT COMMENT (U)

LETTER TO THE EDITOR (U) by Albert T. Murphy

THE WORLD-WIDE SOFTWARE SUPPORT SYSTEM (U)

BOOK REVIEW: THE NEW KGB (U)

BULLETIN BOARD (U)

ON THE LIGHTER SIDE (U) by Vera R. Filby

FROM THE PAST (U)

ETYMOLOGIST'S DELIGHT II (U)


99. Vol. XII, Nos. 11 - 12 - November - December 1985

SEMESTER: A QUANTUM LEAP FORWARD (U)

BULLETIN BOARD (U)

WHY DO WE NEED THOSE FUNNY ALPHABETS? (U)

SHELL GAME: HYPHENATION (U) by WES

BOOK REVIEW: KRYPTOLOGIE (U)

LETTER TO THE EDITOR (U)

OPPORTUNITY (U)

PUZZLE (U)


1986

100. Vol. XIII, Nos. 1 - 2 - January - February 1986

WHAT I PERCEIVE TO BE HAPPENING IN THE PACIFIC (U)

DIARY OF A GEISHA (U)

CAREER OPPORTUNITY (U)

A CASE OF FORENSIC SIGINT (U)

CRYSCOM-86 (U)

A MORALITY PLAY IN ONE ACT (U)

A PROBLEM IN RETRIEVAL (U)

IMPROVING TRAINING IN TECHNICAL ELINT (U)

BULLETIN BOARD (U)

LETTERS (U)

PUZZLE (U)


101. Vol. XIII, Nos. 3 - 4 - March - April 1986

TIGHTENING OUR BELT (U)

[redacted]

EXPERT SYSTEMS -- FOR NSA? (U)

BULLETIN BOARD (U)

AN INTRODUCTION TO AI (U)

LEVELS OF CLASSIFICATION (U)

THE 39 STEPS (U)

PUZZLE (U)


102. Vol. XIII, Nos. 5 - 7 - May - July 1986

ODYSSEY (U)

BULLETIN BOARD (U)

ORGANIZING FOR EFFECTIVE C3 ANALYSIS (U)

A LINGUIST MEETS THE ASTW (U)

AI AT NSA (U)

PRESERVING VALUABLE NSA/CSS PAPER RECORDS (U)

TEAM BUILDING (U)

USER-FRIENDLY PASSWORDS (U)

ERRATUM (U)

LETTERS (U)

OUT OF MY DEPTH #4 (U) by WES

READERS' SURVEY (U)


103. Vol. XIII, Nos. 8 - 9 - August - September 1986

SOMETHING NEW (U)

RUM RUNNERS, 1930 (U)

ENTER YOUR PASSPHRASE, PLEASE (U)

EXTENDED HOURS AT LEARNING CENTER #1 (U)

COLLECTION MANAGEMENT (U)

BULLETIN BOARD (U)

SENIOR PROFESSIONAL CAREER PROGRAM (U)

BACK-UP SHELLS FOR THE ASTW (U)

CONFERENCE REPORT (U)

BOOK REVIEWS: OUT OF THE INNER CIRCLE (U)

SECRECY, AUTHENTICATION, AND PUBLIC KEY SYSTEMS (U)

THE COMPUTATION OF STYLE (U)

ITALIAN FOR EDUCATED GUESSERS (U)

LETTERS (U)

A PRIVATE GERMAN CIPHER OF WW I (U)


104. Vol. XIII, Nos. 10 - 11 - October - November 1986

[redacted]

A NEW KIND OF JAPANESE (U)

SIREN No. 5 (U)

A SUMMER LANGUAGE COURSE (U)

ON THE LIGHTER SIDE (U)

THE REPRESENTATION OF PREFIXES

CONFERENCE REPORT (U) by N.C. Gerson

TECHNICAL LITERATURE REVIEW (U)

SOFTWARE REVIEW (U)

BULLETIN BOARD (U)

LETTERS (U)

FROM THE PAST

RESULTS OF READERS' SURVEY (U)

PUZZLE (U)


105. Vol. XIII, No. 12 - December 1986

TECHNOLOGY SEEPAGE (U)

WHO IS SHE? (U)

CRYSCOM (U)

QUOTE WITHOUT COMMENT (U)

THE LANGUAGE IDENTIFICATION PROBLEM (U)

PRODUCT vs PROCESS (U)

CHANGING JOBS (U)

ODE TO THE CA INTERN PROGRAM (U)

A COMPOSITE CONVERSATION (U)

BOOK REVIEW (U) by Vera Filby

CONFERENCE REPORT (U)

LETTER (U)

OPPORTUNITY (U)

BULLETIN BOARD (U)

CISI CONFERENCE

THE STORY OF A PRIVATE GERMAN CIPHER (U)

NSA-CROSTIC No. 63 PLUS (U)


1987

106. Vol. XIV, No. 1 - 1st Issue 1987

[redacted]

HOW TO WRITE A MEMO (U)

CHECKLIST FOR NON-PROFESSIONAL INTERPRETERS (U) by Obst and van Reigersberg

GOLDEN OLDIE (U)

HOW DID A NICE CRYPPIE LIKE YOU

BULLETIN BOARD (U)

FROM THE PAST (U)

CONFERENCE REPORT (U)

'NSA' PUZZLE (U)


107. Vol. XIV, No. 2 - 2nd Issue 1987

THRUST FOUR (U)

BULLETIN BOARD (U)

INFORMATION MANAGEMENT FOR THE FUTURE (U)

FOOD FOR TBOUGHT (U)

MODEM COMMUNICATIONS (U) by Frederick Rodean

LETTERS (U)

THE RECKONING (U)

SOME TIPS ON GETTING PROMOTED, 3rd ed. (U)

CONTRIBUTIONS SOLICITED

GETTING STARTED

GOLDEN OLDIE (U)

NSA-CROSTIC No. 64 (U)

HOW RUSSIANS VIEW THEIR LEADERS (U)


108. Vol. XIV, No. 3 - 3rd Issue 1987

ON THE CONSTITUTION

GOLDEN OLDIE

IS PACKET RADIO ALIVE AND WELL ON SP?

BIG LOOK

THE JOYS OF US GOVERNMENT TRAVEL

BULLETIN BOARD

A ROPE BY ANY OTHER NAME

ODE TO STONEHOUSE

CRYSCOM

LETTERS ON PC USERS' MANUALS

SAMPLE PAGES OF PC USERS' MANUALS

REQUIRDlBNTS FOR A GOOD SETr OF DIRECTIONS

BOOR REVIEWS:

HER MAJESTY'S SECRET SERVICE by Vera Filby

TELECONFERENCING

FROM THE PAST

NSA-CROSTIC NO. 65


109. Vol. XIV, No. 4 - 4th Issue 1987

HOW TO WIN WITHOUT PLAYING THE GAME

LETTERS

PROJECT TIPONI

THE EFFECTS OF DETONATIONS ON METEOR SCATTER by N. C. Gerson

BULLETIN BOARD

ALAS, WADE GILES, I KNEW YOU WELL by Leigh Sawyer

HOPEPULLY, FOR ALL OF WE

THE MATTER OF STYLE

HOW TO MEASURE CLARITY IN WRITING

TWO TIPS ON WRITING

POINTERS ON GRAMMAR by Ralph Jollensten

THE HERO OF THE SENTENCE

GIMME REWRITE! by Va

BOOK REVIEW: MACHINE TRANSLATION

PROM THE PAST

BUSMAN'S HOLIDAY: A BRITISH CIPHER OF 1783


1988

110. Vol. XV, No. 1 - 1st Issue 1988

THE DIRECTOR'S MAJOR THRUSTS

BULLETIN BOARD

AN OVERSEAS TOUR: A PERSONAL CHRONICLE

STU-III, THE NEW TELEPHONE SYSTEM

GOLDEN OLDIE

AN OPEN LETTER TO ALL SENIOR TECHNICIANS

LETTERS

ABOUT CRYSCO

REVIEWS:

FOUR WORKS OF CRYPTOLOGY

THE STATISTICAL PRECISION OF MEDICAL SCREENING PROCEDURES

THE LINGALA CODE

CRASHING THE SYSTEM

LANGUAGE BRIEF: LINGALA

NSA-CROSTIC #66


111. Vol. XV, No. 2 - 2nd Issue 1988

THREE PROGRAMS IN SUPPORT OF LANGUAGE

NOT CRASHING THE SYSTEM

THE CLAN ON THE FAR SIDE OF THE PARKING LOT

THE FALSE FRIEND: A TRUE STORY

BULLETIN BOARD

SOFTWARE ACQUISITION: A REFORM IN NEED OF REFORM

IN RE LACONIC

A LESSON IN COMPUTER SECURITY

DATA FOR THE LANGUAGE AND LINGUISTIC SECTION by P.H. Currier

PARTHIAN SHOT by Peter Jenks

HARDWARE REVIEW: PROJECTORS OF SCREEN IMAGES

TECHNICAL LITERATURE REPORT by David Harris

THE LIGHTER SIDE

CRYPTO-"LOG" PUZZLE


112. Vol. XV, No. 3 - 3rd Issue 1988

CHANGES IN AGENCY REPORTING

SIGINT REPORTING PRINCIPLES

UPDATE ON PACKET RADIO

EMBARGOED INFORMATION

BULLETIN BOARD

THE SHORT BUT HAPPY LIFE OF WIDEBAND

[redacted] by W.C. Gerson

LANGUAGE BRIEF: XHOSA

EXPO 88

CONFERENCE REPORTS:

MATHEMATICS

LINGUISTICS

COMMUNICATIONS

THE LIGHTER SIDE

CALL FOR SPEAKERS

"LEFTOVERS"


113. Vol. XV, No. 4 - 4th Issue 1988

PROJECT RELOAD

HOW TO MAKE A MORSE OP

BULLETIN BOARD

LOTUS 1-2-3: A FANTASTIC RESEARCH TOOL

THE NEW CRAYONS: AN ALLEGORY

RESUMES AND. JOB APPLICATIONS

THE QUESTION OF LEADERSHIP

SCRIBE

SOFTWARE REVIEW: RIGHTWRITER by Leroy Ferguson

CONFERENCE REPORT: AMS CENTENNIAL CELEBRATION by David Harris

QUOTE WITHOUT COMMENT

LETTERS

FROM THE PAST

BONUS PUZZLE: MINICRYPTS by Bill Lutwiniak

NSA-CROSTIC (plus) No 67


1989

114. Vol. XVI, No. 1 - 1st Issue 1989

WHERE ARE OUR TEXTBOOKS? by David Gaddy

QUOTE WITHOUT COMMENT

PROJECT TOTEMPOLE

GOLDEN OLDIE

DEFSMAC'S 25th ANNIVERSARY

BULLETIN BOARD

OUR NEIGHBORHOOD: ASQ 20 by Vera Filby

FROM THE PAST

ONE CRYPTANALYST'S ONE-FOOT SHELF

CONFERENCE REPORTS: by David Harris

DARPA ON LANGUAGE

MATHEMATICS

REVIEW: BOOKS ON SIGINT HISTORY

LETTERS

CLASSIFICATION QUIZ

BONUS PUZZLE: MINICRYPTS #2 by Bill Lutwiniak

NSA-CROSTIC No. 68

ON THE LIGHTER SIDE


115. Vol. XVI, No. 2 - 2nd Issue 1989

IN HONOR OF WOMEN IN SCIENCE AND ENGINEERING by Elizabeth Rindskopf

ABOUT CLASSIFICATION

COMPUSEC POLICY FOR THE INTELLIGENCE COMMUNITY

ACROSS THE POND

A NOTE TO CONTRIBUTORS

THE EXCITEMENT OF INFOSEC

HOW TO BUILD A USER-SEDUCTIVE ARCHITECTURE

GOLDEN OLDIE

BELATED THANKS

CAMBODIA IN PEACE AND WAR

BULLETIN BOARD

HARDWARE REVIEW: OCR DEVICES.

FROM THE PAST

GETTING STARTED

LETTERS

ON THE LIGHTER SIDE


116. Vol. XVI, No. 3 - 3rd Issue 1989

50 YEARS WITH UNCLE SAM

ERRATUM

MAPS AS VITAL RECORDS

DINOSAURS ARE ALIVE AND WELL

PORTABILITY PROBLEMS IN C PROGRAMMING

SPECIAL INTEREST GROUP ON FUSION

COGITATIONS OF A CONTUMACIOUS CABALIST

LETTERS

ANSWERS TO TA EXERCISE

HARDWARE: REVIEW: THE NeXT COMPUTER

BULLETIN BOARD

REVIEW: STRUCTURE AND INTERPRETATION OF COMPUTER PROGRAMS

CLA ESSAY CONTEST

TA EXERCISE


1990

117. Vol. XVII, No. 1 - 1st Issue 1990

BRAVE NEW WORLD by Gerald R. Young

CRYSCOM '89 RECOMMENDATIONS

THE COLUMBUS DAY VIRUS by C313

THE CRYPTOLOGIC LINGUIST PROGRAM

TO NEW AUTHORS

A NOTE ON THE LINGUIST PROBLEM

THE ROLE OF OPSEC

DEPUTY DAWG

KRYPTOS ESSAY COMPETITION

DAVID HARRIS: IN MEMORIAM

BULLETIN BOARD

THE MYSTERIES OF GAMMA by Richard Sylvester

SORTING, ORDERING, AND HEAPING ON CRAY

TECHNICAL LITERATURE REPORT

BOOK REVIEWS: by Vera Filby

THE CUCKOO'S EGG

REFLECTIONS ON INTELLIGENCE

SOFTWARE REVIEW: MATHEMATICA by Robert Ward

LETTERS


118. Vol. XVII, No. 2 - 2nd Issue 1990

A PERCEPTION OF THE TECH TRACK

NSA/CSS AND COUNTERNARCOTICS

THE NEED FOR INTELLIGENCE by W.C. Gerson

HELP WANTED by David Hatch

PLANNING FOR THE MILLENIUM

REASSIMILATION by David L. Hackner

EXCELLENCE THROUGH EVALUATION

BULLETIN BOARD

CRUCIBLE/MOSTAR

RAW TRAFFIC AND REMOTE COLLECTION

EXPERT VLSI DESIGNER HIRED FOR THREE DAYS

REBUTTAL TO 'A NOTE ON THE LINGUIST PROBLEM'

SHORT-ORDER TRANSLATION

BALLOON-INT, CIVIL WAR STYLE

LETTERS


119. Vol. XVII, No. 3 - 3rd Issue 1990

HAIRCLOTH

UNCLASSIFIED FACTS

QUOTE WITHOUT COMMENT

AURAL LANGUAGE IDENTIFICATION

SIFTING WHEAT FROM CHAFF

LETTERS

THE MAYAGUEZ INCIDENT

THE THREE FACES OF COLLECTION

HOW IT STARTED by David Gaddy

HOW THE FRIEDMAN AUDITORIUM DID NOT GET ITS NAME!

TECHNICAL LITERATURE REPORT by David Harris

EDITORIAL

BOOK REPORTS:

DOUBLESPEAK

HOW TO EDIT A SCIENTIFIC JOURNAL

GOLDEN OLDIE-


1991

120. Vol. XVIII, No. 1 - 1st Issue 1991

GISTER

50

JOINT -- THE FUTURE OF INTELLIGENCE? YOU BET!

BULLETIN BOARD

THE DIGITAL DRAGON

ICH SPRECHE DEUTCH

A MATTER OF COMPRESSION

ALL YOU WANTED TO NOAH ABOUT ARC

ERRATA

CRYSCO '90

LETTERS

NORMALIZATION

in re PROFORMA

CROSSWORD PUZZLE: BUSMAN'S HOLIDAY by RLW

EDITORIAL

TO CONTRIBUTE


121. Vol. XVIII, No. 2 - 2nd Issue 1991

SEA HUNT

BOOKBREAKERS' FORUM ON MACHINE AIDS

TEXTURE REPORTING

THE TEN MOST WANTED

MILLIMETER WAVE DETECTION SYSTEMS

ON BECOMING A WELL-ROUNDED CHINESE LINGUIST

CRYSCOM REQUIREMENTS FOR UNIX-TO-UNIX

DATA ENCRYPTION-DECRYPTION EXCHANGE

DATA FUSION

ON THE LIGHTER SlDE

FlNGERTIP INTELLIGENCE

COMMENT ON GISTER

USING C++ FOR COMPUTE-INTENSIVE CODE

BOOK REVIEW: SEIZING THE ENIGMA by Vera Filby

BULLETIN BOARD

ON THE ENIGMA

BREAKING INTO OUR PAST: AN ENIGMA OF ANOTHER KIND by David Gaddy

EDITORIAL

LETTER

TO CONTRIBUTE


122. Vol. XVIII, No. 3 - 3rd Issue 1991

EDITORIAL

KEYNOTE ADDRESS by Robert E. Rich

FAREWELL TO THE TROOPS

ACHIEVEMENT THROUGH PEOPLE

THE LANGUAGE ANALYST AND, AUTOMATION

SIGINT IN AN OPEN SOCIETY

THE WAY IT WAS

A VIEW OF L by Dale Seaberg

KEYNOTE ADDRESS by Gerald R. Young

FROM THE PAST

ODE TO SIGINT by Al Friendly

A MODERN FAIRY STORY

GOLDEN OLDIE

TO CONTRIBUTE


1992

123. Vol. XIX, No. 1 - 1st Issue 1992

UNDER NEW MANAGEMENT

THE CONVERSATION

OPSEC AS A MANAGEMENT TOOL

WHERE WAS THE BOGEYMAN?

THERE NEVER WAS A BOGEYMAN by Peter D. Nolan

SANDLOT

THE ALMANAC APPROACH

FURTHER TO 'THE TEN MOST WANTED'

WL: IN MEMORIAM by Doris Miller

CLASSIFYING YOUR PERSUM by Richard Sylvester

SHELL GAME

LETTER

SIGINT IN THE NOVELS OF JOHN LE CARRE

TECHNICAL LITERATURE REPORT

CONFERENCE REPORT: ITCC '91

FROM THE PAST

EDITORIAL

GOLDEN OLDIE

TO CONTRIBUTE


124. Vol. XIX, No. 2 - 2nd Issue 1992

GRADUATION ADDRESS

SEVEN ARGUMENTS FOR PUBLISHING by George Jeles

[redacted] by Marian Brown

THE ACCIDENTAL LEXICOGRAPHER by Stuart Buck

WHO AM I AND WHAT AM I DOING HERE?

MAJOR BREAKTHROUGH IN COMBINATORIAL MATHEMATICS

STRATEGIC CONSIDERATION FOR NSA PROCESSING

LETTER

MISSIONS/FUNCTIONS/ORGANIZATIONS/PERSONNEL

ON THE TAXONOMY OF THE OYSTER

VALEDICTORY

A VISIT TO TIME

ELECTRONIC PUBLISHING QUIZ

CONFERENCE REPORT: RADIO BROADCASTERS

A SIDEBAR TO SIGINT HISTORY by Betty Wanat

EDITORIAL

TO CONTRIBUTE


125. Vol. XIX, No. 3 - 3rd Issue 1992

THE THIRD OPSEC CONFERENCE by George Jelen

A QUANTITATIVE APPROACH FOR EVALUATING A FACILITY'S TECHNICAL SECURITY

GOLDEN OLDIE

[redacted]

WRITING IN A JOURNALISTIC STYLE

MINIMIZING THE BURDEN OF MAINTAINING SOFTWARE by Christine McCormick

CETA

A HISTORY OF CRYPTOLOGY by L.D. Callimahos

HARDWARE-SOFTWARE REVIEW: MAT

NSA AND COMPUTER VIRUSES by Richard Sylvester

FROM THE PAST

LETTER

BULLETIN BOARD

EDITORIAL

TO CONTRIBUTE


1993

[No issues in 1993]


1994

126. Vol. XX, No. 1 - 1st Issue 1994

The Director's Summer Program

Open Systems: What Does It Mean?

The CIM TRM and the NSA Profile

The Closing of NSGA Philippines

Eurocrypt '92 Reviewed

An Agnostic Look at TQM

Technical Literature Report

Principles for Successful Guidance

Lexicography at Second Hand: Producing an "Exotic Language" Glossary

Book Review: English-Arabic Scientific & Technical Dictionary

Letters to the Editor


127. Vol. XX, No. 2 - 2nd Issue 1994

A Note From the Chairman

Intelligence and Combat: Lessons Learned from DESERT STORM

Information Warfare: A New Line of Business for NSA

Tour of Duty

Target Development in the Field

Spring '94 SRTD Conference Reviewed

Opportunities for Publication

OPSEC in the Post-Cold War World

A Linguist's Look at the Internet

[redacted]

[redacted]

The NSA Broadcast Center

SIGINT Glossary: The GUHOR Stick


1995

128. Vol. XXI, No. 1 - Issue 1 1995

Publisher's Welcome

Information Technology: Into the Next Millennium, by William P. Crowell, Deputy Director

Signals Collection Career Panel Update: A Look at Some Goals, by Ken Williams, B46

Signals Analysis: A Cornerstone for the Future, by E43

Mathematics: Reaching Out in Space and Time, by Z31

Cryptanalysis Conference, 1994, by Z211,CACP Chairman

Linguists and a Changing Future, by LCP

Intelligence Research + Traffic Analysis = Intelligence Analysis, by lACP

Production and Reporting in a Changed Environment, by Bill Nolte, P054

Signals Research and Target Development: Past, Present, and Future, by PO54, TARS

The Telecommunications Professional of The Future, by former Technical Director for Q

Global Network Intelligence and Information Warfare: SIGINT and INFOSEC in Cyberspace, by former chief G4


129. Vol. XXI, No. 2 - Summer 1995

Interview with NSA:s Chief Information Officer

Writing as a Continuation of Analysis

Journalistic style, yes; creeping Clancyism, no!

Managing Linguists in Low-Density Languages

The National Information Infrastructure (NII)

What'sThis New Intercept I'm Seeing?

The Unfocused Eye: [redacted]

Intelligence Analysis Off-site and Open Forum

IA vs. TA/IR: An Editorial

The Phoenix HF: An Editorial by N.G. Gerson

NSA's "Lessons Learned" Database

The 1995 Joint Mathematics Meetings, ed. by

SIGINT Bloopers

Book Reviews

SIGINT Glossary: The Chun Wheel


130. Vol. XXI, No. 3 - Fall 1995

The Future of Cryptanalysis

Machine Translation

Software Development: We Can Do It Better

Foreign Language Testing at NSA: Time for Change

SIGINT That Matters: Whats the Angle?

SIGINT and the Information Explosion

Book Reviews:

Recent Publications on Information Warfare, reviewed by

China's Air Force Enters the 21st Century, reviewed by

Lessons Learned [redacted] from N25's data base

SIGlNT Bloopers


131. Vol. XXI, No. 4 - Winter 1995

Interview With Dr. David Kahn (U)

Scripting ATLANTIC RESOLVE (FOUO)

Hitting the [redacted] (FOUO)

The Nature and Process of Analytic Thought (U), by Hugo Keesing

Three V's for SIGINT (U)

American Translators Association Conference (U)

How I Helped Trigger a Greater Involvement in Vietnam (U)

Book Review (U): High Seas, reprinted from Air War Col/ege Newsletter

Letters to the Editor (U)

SIGINT Bloopers (U)


1996

132. Vol. XXII, No. 1 - Spring 1996

Publisher's Note, Louis W. Tordella and the Making of NSA, by William Nolte

Eulogy for Louis W Tordella, by Walter Pforzheimer

Biography of Dr. Tordella, by Thomas R. Johnson

KBE Presentation Ceremony

"Louis Tordella Led By Example"

Louis Tordella: As Colleagues Remember Him

Dr. T: The Man

"If Lou Tordella Says It's OK, That's Good Enough For Me", by Gene Becker


133. Vol. XXII, No. 2 - Summer 1996

Confronting the Intelligence Future: An Interview With NSA's Deputy Director (U)

Special Feature: Information Warfare (U)

NSA Hosts JIWTAWG Conference (U)

IW The War of the Future (U)

Some Thoughts on IW (U), by William Black

Joint Reporting and Inter-Agency Collaboration: Moving Out ofthe Box (U)

An OPENROAD to Research (U)

The Changing Timbre of Conflict and Conflict Resolution in Sub-Saharan Africa (U)

Calling All Publishers! (U)

[redacted]

An Appeal From the Editor (U)


134. Vol. XXII, No. 4 - Winter 1996

A Wealth of Experience: An Interview With Former DIRNSA Adm. Studeman (U), by Bill Nolte

Humanitarian Crises: IC Support to U.S. Foreign Policy (U), by Toby Gati

FOLKLORE: An Innovative Approach to A User Interface (U)

Church State Relations in the [redacted]: Image vs. Reality (U)

Book Reviews: (U)

The Legacy of Tiananmen: China in Disarray (U)

Intelligence Analysis: Estimation and Prediction (U)


1997

135. Vol. XXIII, No. 1 - Spring 1997

Thinking Out Loud About Cyberspace (U), by Bill Black

IO, IO, It's Off To Work We Go... (U)

The Infowar Revolution(s) (U)

The Role of Information Warfare in Strategic Warfare (U)

Thoughts on a Knowledge Base To Support Information Operations In the Next Millennium (U)

Information Operations Training (U)


136. Vol. XXIII, No. 2 - Summer 1997

Interview with "Ski" [redacted] by BiII Nolte

Signals Analysis: The Untold Success Story (U)

Adventure in the Attic: An Example of IC Synergy (U)

SENTINEL: A Look at Database Security (U)

[redacted]

Book Review: Rapid Development: Taming Wild Software Schedules (U)