skip to content

United States National Security Agency/Central Security Service

Overview
Works: 137 works in 200 publications in 8 languages and 13,480 library holdings
Genres: History  Sources  Biography  Military history  Personal narratives‡vAmerican  Criticism, interpretation, etc 
Classifications: U163, 355.3430973
Publication Timeline
Key
Publications about United States
Publications by United States
Most widely held works about United States
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by United States
The Voynich manuscript : an elegant enigma by M. E D'Imperio( Book )
2 editions published in 1978 in English and held by 246 libraries worldwide
In spite of all the papers that others have written about the manuscript, there is no complete survey of all the approaches, ideas, background information and analytic studies that have accumulated over the nearly fifty-five years since the manuscript was discovered by Wilfrid M. Voynich in 1912. This report pulls together all the information the author could obtain from all the sources she has examined, and to present it in an orderly fashion. The resulting survey will provide a firm basis upon which other students may build their work, whether they seek to decipher the text or simply to learn more about the problem
Information operations : warfare and the hard reality of soft power by Leigh Armistead( Book )
5 editions published in 2004 in English and held by 193 libraries worldwide
Fourteen American and Australian educators and practitioners--most associated with the Joint Forces Staff College, others with various branches of the U.S. or Australian national security communities--contribute six chapters on information operations (IO)--the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior in national security affairs. Originally conceived as a textbook for Joint Forces Staff College students, the text traces the history of IO from a doctrinal standpoint and with regard to organizational changes and educational efforts, and covers the capabilities and related activities of information warfare
Attack on the U.S.S. Liberty by William D Gerhard( Book )
2 editions published between 1981 and 1985 in English and held by 17 libraries worldwide
Securing record communications the TSEC/KW-26. - Description based on print version record. - Imprint suggested by NSA on OCLC. by Melville Klein( file )
2 editions published in 2003 in English and held by 12 libraries worldwide
The quest for cryptologic centralization and the establishment of NSA: 1940-1952 by Thomas L Burns( file )
1 edition published in 2005 in English and held by 12 libraries worldwide
"An account of the evolution of a national SIGINT effort following WWII. A discussion of the fragile trends toward unification of the military services after the war and the unsatisfactory experience under the Armed Forces Security Agency"--[Source inconnue]
Eavesdropping on hell : historical guide to western communications intelligence and the Holocaust, 1939-1945 by Robert J Hanyok( file )
1 edition published in 2005 in English and held by 12 libraries worldwide
"A study of how Allied communications intelligence organizations reported intelligence on the Holocaust. Explains how the Western COMINT system operated during WWII; describes how the wartime records of SIS and GC&CS are organized in the U.S. and UK; summarizes what information is available from SIGINT records about the Holocaust"--Resource description page
The invisible cryptologists : African Americans, WWII to 1956 by Jeannette Williams( file )
1 edition published in 2001 in English and held by 12 libraries worldwide
"The story of African-Americans employed by the National Security Agency and its predecessors. It tells of the movement of African-Americans from low-level jobs in segregated work units to their rise to key positions in NSA's structure"--Resource description page
American signal intelligence in Northwest Africa and Western Europe by George F., (George Frederick) Howe( file )
1 edition published in 2010 in English and held by 12 libraries worldwide
Masked dispatches : cryptograms and cryptology in American history, 1775-1900 by Ralph E Weber( file )
1 edition published in 2002 in English and held by 12 libraries worldwide
"A collection of essays dealing with episodes in early U.S. history in which cryptology played a notable role"--[Source inconnue]
The Venona story by Robert Louis Benson( file )
1 edition published in 2001 in English and held by 11 libraries worldwide
Venona release ( serial )
in English and held by 11 libraries worldwide
Consists of declassified transcripts of U.S. Army's Signal Intelligence Service cryptanalysis project code-named VENONA, partially deciphered intercepts of Soviet KGB and GRU transmissions to Moscow from the U.S. and elsewhere during the period 1941-1946, notably on atomic espionage
American cryptology two centuries of tradition. - Description based on print version record ( file )
1 edition published in 1998 in English and held by 10 libraries worldwide
The quiet heroes of the Southwest Pacific Theater an oral history of the men and women of CBB and FRUMEL. - Description based on print version record by Sharon A Maneki( file )
1 edition published in 2007 in English and held by 10 libraries worldwide
"A look at COMINT production in the Pacific theater during WWII and how diverse aspects of the process combined to produce intelligence distributed to commanders. The story is told primarily through the words of cryptologists who served in the Pacific area"--Resource description page
Silent warriors the Naval Security Group Reserve, 1945-2005. - Cover title. - Introd. signed: John R. Schindler. - Publication information from cover verso by John R Schindler( file )
1 edition published in 2005 in English and held by 10 libraries worldwide
"This book recounts a unique and untold story, that of Naval Reserve (NR) cryptologists--the professional term for codebreakers and codemakers. This has always been a small and select community, one little known to outsiders, and even less understood. Cryptologists have long constituted the most secretive fraternity in America's armed forces, and Naval Reservists permitted to enter the cryptologic ranks set sail on a journey that placed them apart from the rest of the Naval Reserve, and far apart from their civilian lives. For six decades, through the Cold War and into the age of terrorism, Naval Reserve cryptologists have stood the watch for the Navy and the nation. Yet the highly secretive nature of their work has rendered their service in defense of freedom almost unknown to the public. This volume aims to fill this knowledge gap by telling their story. The Naval Security Group Reserve is an exclusive club with tight lips, and few of its exploits are discussed openly. This work cannot tell the full story--that will have to wait decades until archives are opened and top secret operations are declassified--yet it strives to illuminate what it can, and render an account of Naval Reserve cryptology and its sailors that will be accurate and accessible to all who served in silence."--Page 3
Unclassified report on the President's Surveillance Program ( Book )
2 editions published in 2009 in English and held by 5 libraries worldwide
American signal intelligence in Northwest Africa and Western Europe by George F Howe( Book )
2 editions published in 2010 in English and held by 2 libraries worldwide
A delicate balance : portfolio analysis and management for intelligence information dissemination programs by Eric Landree( file )
1 edition published in 2009 in English and held by 0 libraries worldwide
This publication describes the application of the RAND Corporation's Portfolio Analysis and Management Method (PortMan) to the evaluation of the National Security Agency's (NSA) information dissemination program portfolio, which is managed by the NSA Information Sharing Services (ISS) division. RAND's PortMan method enables the data-driven analysis of project portfolios and provides a means to monitor the progress of potentially high-value projects. It also allows portfolio managers to monitor the impact of any mitigation strategies they undertake, ensuring that the portfolio's highest potential value is achieved. For this project, RAND researchers first employed the Delphi method, a process for eliciting group opinion by a series of questionnaires with selective feedback from earlier responses, to collect expert opinion from the ISS Senior Leadership Group. This allowed for an estimation of value and risk for each project. RAND then used these estimates, together with cost information provided by ISS, to develop project rankings and to estimate the expected value-to-cost ratio for each project. RAND selected portfolios of projects that maximized the total expected value for the available program budget using a linear programming method and compared these results to ISS management's funding priorities
Space surveillance SIGINT Program (C) [strikethrough] by H. D Wagoner( file )
1 edition published in 1980 in English and held by 0 libraries worldwide
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names

controlled identity United States. Department of Defense

controlled identity United States. National Security Agency

États-Unis Central security service
États-Unis Department of defense National security agency / Central security service
États-Unis National security agency
Maryland Procurement Office
N.S.A./C.S.S.
National security agency
National Security Agency/Central Security Service (Spojené státy americké)
National Security Agency/Central Security Service (U.S.)
NSA
NSA/CSS
Spojené státy americké. Central Security Service
Spojené státy americké. Dept. of Defense. National Security Agency/Central Security Service
Spojené státy americké. National Security Agency (1972-)
United States Central Security Service
United States. Department of Defense. National Security Agency/Central Security Service
United States. Dept. of Defense. National Security Agency/Central Security Service
United States National Security Agency (1972- )
United States National Security Agency/Central Security Service
Languages
English (86)
French (2)
Chinese (1)
Croatian (1)
Arabic (1)
Serbian (1)
Russian (1)
Dutch (1)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.