NSA Cryptologic Histories

Internal histories (both declassified and unclassified) produced by NSA's Center for Cryptologic History or predecessor agencies. Histories are listed by their canonical series entry; histories will be left unsorted if no series is found. Click here for an index of internal NSA publications and articles.


Abbreviations in NSA Bibliographies

Army Security Agency Histories

Series I - Pre-World War I

Volume 1 - Masked Dispatches: Cryptograms and Cryptology in American History, 1775–1900

Series II - World War I

Series III - Interwar Period

Series IV - World War II

Volume 1 - American Signal Intelligence in Northwest Africa and Western Europe
Volume 3 - German Clandestine Activities in South America in World War II
Volume 4 - The Cryptology of the German Intelligence Services
Volume 5 - A Priceless Advantage: U.S. Navy Communications Intelligence and the Battles of Coral Sea, Midway, and the Aleutians
Volume 6 - Pearl Harbor Revisited: United States Navy Communications Intelligence, 1924-1941
Volume 7 - The Quiet Heroes of the Southwest Pacific Theater: An Oral History of the Men and Women of CBB and FRUMEL
Volume 8 - A History of U.S. Communications Intelligence during World War II: Policy and Administration
Volume 9 - Eavesdropping on Hell: Historical Guide to Western Communications Intelligence and the Holocaust, 1939-1945
Volume 10 - West Wind Clear: Cryptology and the Winds Message Controversy - A Documentary History
Volume 11 - Cryptologic Aspects of German Intelligence Activities in South America during World War II

Series V - Early Postwar Period

Volume 1 - The Origins of the National Security Agency, 1940-1952
Volume 2 - BOURBON to Black Friday: The Allied Collaborative COMINT Effort Against the Soviet Union, 1945-1948
Volume 3 - The Korean War: The SIGINT Background
Volume 4 - So Power Can Be Brought into Play: SIGINT and the Pusan Perimeter
Volume 5 - The Invisible Cryptologists: African-Americans, WWII to 1956
Volume 6 - The Quest for Cryptologic Centralization and the Establishment of NSA: 1940-1952

Series VI - The NSA Period

Volume 1 - NSA Actions During the Iranian Hostage Crisis: An Interim History
Volume 2 - PURPLE DRAGON: The Origin and Development of the United States OPSEC Program
Volume 4 - NSA's Involvement in U.S.-Foreign SIGINT Relationships through 1993
Volume 5 - American Cryptology During the Cold War, 1945-1989 Book I: The Struggle for Centralization, 1945-1960
Volume 5 - American Cryptology During the Cold War, 1945-1989 Book II: Centralization Wins, 1960-1972
Volume 5 - American Cryptology During the Cold War, 1945-1989 Book III: Retrenchment and Reform, 1972-1980
Volume 5 - American Cryptology During the Cold War, 1945-1989 Book IV: Cryptologic Rebirth, 1981-1989
Volume 7 - Spartans in Darkness: American SIGINT and the Indochina War, 1945-1975
Volume 8 - Pullin' Ponyals: A History of Russian Voice Transcription at the National Security Agency and Its Predecessors, 1949-1970
Volume 12 - Candle in the Dark: COMINT and Soviet Industrial Secrets, 1946-1956
Volume 13 - Learning from the Enemy: The GUNMAN Project

Special Research Histories

SRH 002 - War Secrets in the Ether Parts I-II
SRH 002 - War Secrets in the Ether Part III
SRH 364 - History of the Signal Security Agency, Volume I: Organization, 1939-1945
SRH 364 - History of The Signal Security Agency, Volume II: General Cryptanalytic Problems
SRH 366 - The History of Army Strip Cipher Devices (July 1934 - October 1947)
SRH 368 - Evaluation of the Role of Decryption Intelligence in the Operational Phase of the Battle of the Atlantic

Series VII - Special and Miscellaneous Collections

Series VIII - Crisis Files

Series X - References

Series XI - Papers Collected by NSA and pre-NSA Officials

Series XII - Papers Collected by NSA Historians

CCH Series XII.S, Box 22

Series XIV - COMSEC Documents

Series XVI - Cryptologic Papers from Presidential Libraries

On Watch: Profiles from the National Security Agency's Past 40 Years

Special Series

Number 2 - Technical Research Ships, 1956-1969
Number 3 - Space Surveillance SIGINT Program
Number 4 - Operation REGAL: The Berlin Tunnel
Number 5 - Essential Matters: A History of the Cryptographic Branch of the People’s Army of Viet Nam, 1945-1975
Volume 6 - It Wasn't All Magic: The Early Struggle to Automate Cryptanalysis, 1930s-1960s
Volume 7 - The Dawn of American Cryptology, 1900–1917
Volume 10 - The Neglected Giant: Agnes Meyer Driscoll
Volume 11 - Issues in British and American Signals Intelligence, 1919-1932
Volume 12 - The First Americans: The 1941 US Codebreaking Mission to Bletchley Park
Volume 13 - Ann's War: One Woman's Journey to the Codebreaking Victory over Japan
The Joint SOBE Processing Center, 1961-1971: A Brief Overview of a Successful Experiment
The Soviet Land-Based Ballistic Missile Program, 1945-1972

Special Series - Crisis Collection

Volume 1 - Attack on a Sigint Collector, the U.S.S. Liberty
Volume 2 - The Suez Crisis: A Brief Comint History
Volume 3 - The National Security Agency and the EC-121 Shootdown
Volume 4 - The Falklands, 1982: An American Perspective
Volume 5 - Shield and Storm: The Cryptologic Community During the Desert Operations
Volume 6 - Supporing the Desert Warriors: The Role of the National Security Agency's Information Systems Security Organization in Operation DESERT SHIELD/DESERT STORM
Volume 7 - The Capture of the USS Pueblo and Its Effect on SIGINT Operations
Volume 8 - The Soviet Invasion of Afghanistan: A Cryptologic History

Sources in Cryptologic History

Number 1 - The Collected Writings of Brigadier John H. Tiltman
Volume 2 - A Reference Guide to Selected Historical Documents Relating to NSA/CSS, 1931-1985
Volume 3 - The Friedman Legacy: A Tribute to William and Elizebeth Friedman
Number 4 - A Collection of Writings on Traffic Analysis

Southeast Asia

In The Shadow of War (To The Gulf of Tonkin)
Focus on Cambodia
Focus on Khe Sanh
SIGINT Applications in U.S. Air Operations, Part One: Collecting the Enemy's Signals
Working Against the Tide (COMSEC Monitoring and Analysis) (Working title: Dangerous Signals)

Miscellaneous

A Brief 50-Year (1960-2010) History of the Defense Special Missile and Aerospace Center (DEFSMAC)
A Dangerous Business: The U.S. Navy and National Reconnaissance During the Cold War
A History of U.S. Communications Security - The David G. Boak Lectures, Volume I
A History of U.S. Communications Security - The David G. Boak Lectures, Volume II
American Cryptology: Two Centuries of Tradition
Fifty Years of Mathematical Cryptanalysis
German Cipher Machines of World War II
History of Collaboration among French Cryptologic Agencies, 1909-1939
History of Venona
Listening to the Rumrunners: Radio Intelligence during Prohibition
NSA 50th Anniversary Brochure
NSA 60th Anniversary Book
NSA and the Cuban Missile Crisis
NSA In Space
Presidential Transition 2001: NSA Briefs a New Administraion
Revolutionary Secrets: Cryptology in the American Revolution
Silent Warriors: The Naval Security Group Reserve, 1945-2005
Sharing the Burden: Women in Cryptology during World War II
Solving the Enigma: History of the Cryptanalytic Bombe
Telemetry Intelligence (TELINT) During the Cold War
The Cipher Disk
The Cryptological Mathematics of Enigma
The History of Traffic Analysis: World War I - Vietnam
The Origins of NSA
The Venona Story
The Voynich Manuscript: An Elegant Enigma
Women Telephone Operators in World War I France

Primary Source Finding Aids

Crane Library
Crane CSNG Library
Crane Material, Active Stations
Crane Material, Inactive Stations
Cryptologic Documents in the Navy Department Library
NSA OPENDOOR Transfers to NARA, 1996
Radio Intelligence Publications