Brought to you by The Memory Hole www thememoryhole org nsa bibs htm DOCID 3020956 NSA TECHNICAL 10URNAL CUMULATIVE INDEX I ' pproved for Release by NSA on 08-17-2006 FOlA Case # 12848 - APRIL 1956 FALL 1980 I Dervived From I Declassify On NSAICSSM 123-2 Dated 3 Sep 91 Source Marked OADR Date of Source 3 Sep 91 -- DOCID 3020956 REF ID A398598 Note t o Readers This is the second published cumulative index of NSA Technical Journal articles This index aims a t readability and ease of use It is sorted three ways by title of article by author and by keywords Its purpose is twofold to give readers a general view of the scope of subjects that appeared in the NSA Technical Journal and to provide readers with a means to locate articles they may wish to use as general information on the job or as research tools for operational projects We hope you find the index useful and that you will contact the publications staff of the Center for Cryptologic History if you would like copies of an article You may reach the publications staff a t 972-2895s or 688-2338b If you send a written request for an article address it to Center for Cryptologic History E322 SAB 2 Door 22 Our e-mail address is bdcarle@e3 e nsa Barry D Carleen Chief Publications DOCID 3020956 REF IDtA398598 NSA Technical Journal Contents Title Index 1 Author Index KeywordIndex 59 123 LLL REF IDzA398598 NSA TECHNICAL JOURNAL CUMULATIVE INDEX Vol I No 1 April 1956 to Vol XXV No 4 Fall 1980 DOCID 3020956 REF NSA Technical Journal TITLE INDEX DOCID 3020956 NSA Technical Journal Indexed by Title Title I Author ' b 3 -P L 86-36 Reference Keyword ABC of Cifax The U Vol I No 2 July 1956 Communications Facsimile Privacy ABC of Ciphony The U Vol I No 2 July 1966 and Special Linguistics Issue Ciphony Coding Processing Signals ABNER The ASA Computer Part 1 Design U Snyder Samuel S Vol XXV Computers No 2 Spring Cryptologic history 1980 The ASA Computer Part 2 Fabrication Operation and Impact U Snyder Samuel S Vol XXV Computers No 3 Cryptologic history Summer 1980 ABNER About NSA U Vol IV No 1 January 1959 History NSA Abstract Groups Defined by Generating Operators U Sinkov Abraham April 1960 Groups Operators Addendum to A Cryptologic Fairy Tale U Tiltman John H Vol XVIII Cryptanalysis Brigadier No 1 Winter 1973 African Language Problem at NSA The U Vol XI No 3 Summer 1966 African language ALRIGHT - A Map Overlay Vol XI No 2 Spring 1966 Mapping Generator U Ambiguity Reduction by Markov Analysis of TEMPEST Signals U Vol XVI No 1 Winter 1971 Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System U Vol XII No 4 Fall 1967 Signals Analysis of a Transistor Monostable Multivibrator U Vol IV No 3 July 1959 Circuits Transistors Signals TEMPEST TEMPEST DOCID 3020956 Title I Author Callimahos Lambros D Reference Keyword Vol XIV No Cryptanalysis 2 Spring Plain text 1969 Analysis of Lexical Meaning across Cultures An U Vol XIII No Communications 4 Fall 1968 Language Analysis of Sorting Techniques for Multiple Signal Intercept If Val XII NO 3 Summer 1967 Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride U Vol VIII No Physics 2 Spring 1963 COMINT target identification I Vol VIII No Ciphers 2 Spring Computer 1963 Anglicisms in Puerto Rico U Vol XVII Spanish language No 1 Winter Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio foe Various Modulation Schemes Vol X No 3 Collection Summer 1965 Signal-to-noise ratio U Antipodal Propagation U Gerson Nathaniel C Vol IV No 1 January 1959 Computer languages Vol XVII No 3 Summer 1972 APL Mechanization of Indirect Symmetry U Apparent Paradox of Bayes Factors The U Application of Cluster Analysis and Multidimensional Scaling to the Question of Hands and Languages in the Voynich Manuscript An U Radio waves Transmitters I I Application of Fourier Transforms to Combiners U - Vol X No 1 Bayes factors Winter 1965 Cryptanalysis Cluster analysis Vol XXIII Voynich Manuscript No 3 Summer 1978 Special Fast Fourier Transform Issue Augvsl Title I Author Reference Vol XXIV No 4 Fall Application of Human Factors to the Specification and Design of Interactive Computer Systems Keyword Computers Human factors 1979 Vol XIX No Cr tianalysis 4 Fall 1974 F b l p r i t h m Em25$w D'Imperio Mary 7 n Manuscript 1979 Vol XIV No Computers 2 Spring Queuing theory Application of Queuing Theory to Computer Systems An U 1969 Vd XXIV Cryptanalysis No 3 Key generators Summer 1979 Vol IV No 4 October Approximation of Central Limits U Random variables 1959 Vol X No 2 Spring 1965 Approximations to the Distjibution Function of Sums of Independent Identically Distributed Random Variables APT System The U I I Mathematics Vol XXIII Computers No 3 Data processing Summer 1978 Are the Russians Gaining Wordwise U Salemme Arthur Spring 1961 Aristocrat -An Intelligence Test for Computers U Campaigne Howard H Vvl VII No 2 Spring Russian language Computers Cryptanalysis 1962 I Vol 11 No 1 Mathematics January 1957 Arithmetic of a Generation Principle for an Electronic Key Generator The U Arithmetic of the Addition Generation Principle for Electronic Key Generators U I I o l11 No 3 Mathematics I July 1957 DOCID 3020956 Title Author Referehee I Keyword Vol 11 No 4 Mathematics October 1957 Arithmetic of the Linear Generation Principle for Electronic Key Generators The U I I Arithmetic of the Multiplication Generation Principle in the Koken Key Generator The U Vol Il No 2 April 1957 Art of Automatic Bearing Instrumentation The U Vol XVlII No 4 Fall Mathematics b 1 Mathematics 1973 86-36 Asian Communist Aircraft Location Systems U Vol XX No 1 Winter 1975 Aircraft tracking Assignment Algorithm Applied to Manual Cryptosystems U Vol XX No 1 Winter 1975 Computers Cryptanalysis Assignment of Storage Space in Rapid-Access Memory Systems Vol 11 No 2 April 1957 Addressing Systems Memory U Association Factor in Information Retrieval The U Attack on Blair-Huffman Encipherments An U I1 Winter 1961 S i n g 1961 Vol I No 1 April 1956 Automatic Maintenance U Meyer Joseph A Vol IX No 1 Winter 1 7 Automa ic Signal Identification Bar Statistics The U Bar Statistics The U b 1 i jt - I 1 U S C 403 b 31-13 IJSC 748 'K - 3 - P L eG-36 Computers Information retrieval Cipher Hagelin machines Computers Maintenance Special Issue Signal identification January 1971 Vol XXIV No 2 Spring 1979 Cryptosystem identification Vol VIII No Mathematics 2 Spring 1963 L Vol VIII No 4 Fall 1963 b 3 - 5 0 U S C 403 b 3 - P L Mathematics DOCID 3 0 2 0 9 5 6 9 8 5 9 8 bl 3 -P L 86-36 Title I Author Reference Keyword Bayes Marches On U January 1960 Cryptanalysis Mathematics Binary System for Complex Numbers A U Vol X No 2 Spring 1965 and Computer and Information Siences Issue Mathematics Bipolar Coding and Baseband Recovery U Vol XII No 1 Winter Basebands Codes 1967 Vol XVIII Computers No 1 Winter Cryptanalysis Birth of ATLAS I U 1973 Vol X No 3 Ciphers Summer 1965 Cryptologic history and Vol X No 4 Fall Boer War Cipher A U 1965 Book Review A History of NSA General-Purpose Electronic Digital Computers 7C3XTW Vol IX No 2 May 1964 Book review Computers Book Review Basic Crrptologic Glossary Vol XI No 1 Winter Book review Cryptology 1966 Vol VII No 3 Summer 1962 Book Review Cloak Cipher U Book Reuiew Cryptanalysis of the Single Columnar Transposition Cipher U Book Review Lincos Design of a Language for Cosmic Intercourse Part I U Book Review Lost Languages I Callimahos Lambros D 1- Summer 1961 Book review Cryptanalysis Vol VII No 1 Winter 1962 Statistics U Book review Communications Extraterrestrial intelligence Fall 1960 Book review Cry l0g Vol VII No 4 Fall 1962 Book review U Book Review Mathematical Book review Cryptanalysis Mathematics DOCID 3020956 Title Book Review Mechanical Resolution of Linguistic Problems UI 1 Author Campaigne Howard H Reference Vol 111 No 4 December Keyword Book review Computers Language 1958 Book Review Military Cryptanalytics Part I1 U Book Review Modern Probability Theory and Its Applications U Book Review Norse Medieval Cryptography in Runic Carvings U Book Review Probability An Introduction U Book Review Recent Literature on Algebraic Cryptography U Book Review The Broken Seal U Campaigne Howard H -lt Vol IV No 4 October 1959 Book review Cryptanalysis Military Fall 1960 Book review Probability theory Vol XIII No Book review 3 Summer Cryptologic history 1968 I u I Callimahos Lambros D Fall 1960 Book review Probability theory Vol VII No 2 Spring 1962 Book review cr tof3raphy Mathematics Vol XII No 3 Summer Book review Cryptologic history 1967 Vol XI No 2 Spring Book Review TRATADO DE CRIPTOGRAFIA u Book review Spanish cryptography 1966 Book Review Analyses of the Case n 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet Journal fiir die Reine und Angewandte Mathemtik U Campaigne Howard H Book Review How to Estimate Probabilities Journal of the Institute of Mathematics and Zts Application U Campaigne Howard H Book Review Involutory Cornmutants with Some Applications to Algebraic Cryptography I Journal fiir Reine und Angewandte Mathemtik U Campaigne Howard H Vol IX No 3 August Book review Cryptanalysis 1964 Vol XII No 2 Spring Book review Mathematics 1967 Vol XII No 1 Winter 1967 Book review Mathematics DOCID 3020956 b 3 - P L 86-36 Author Title Reference Keyword - B m k Review Some Applications of High Speed Computers to the Case n 2 of Algebraic Cryptography Mathematics of Computation Vol 15 No 75 U Mathematics Book Review Some Further Methods in Algebraic Cryptography Journul of the Mitchell Scientifi Society No 74 U Campaigne Howard H Fall 1960 Book review Mathematics Book Review Variable Matrix Substitution in Algebraic Cryptography U Campaigne Howard H Vol IV No 4 October 1959 Bookreview Cryptography Unknown Book Reviews reviewer Pearl Harbor Warning and Decision Roberta Wohlstetter But Not in Shume John Toland The Secret War Sanche de Gramont CIA - The Inside Story Andrew Tully Now It Can Be TOM Leslie R Groves Thinking About the Unthinkable Herman Kahn Strike in the West James Daniel and John G Hubbell U Vol VIII No Book review Cryptologic history 1 Winter 1963 Bookbreaking Improvisations Part I U Vol XI No 3 Summer 1966 Bookbreaking Code - Vol XI No 4 Fall 1966 Bookbreaking Code Borders of Cryptology The U Vol IV No 4 October 1959 Cryptology Electronic warfare Broadband Planar Log-Periodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory U Vol X No 3 Antennas Summer 1965 Collection CAM I1 U Vol IX No 2 May 1964 Computers Memory Val XII No 3 Summer 1967 Computers Translation Bookbreaking Improvisations Part I1 U CAMINO U Virginia Jenkins DOCID 3020956 Title I Author Reference Can Cryptologic History Repeat Itself U Friedman William F Can We Lick the Voice Problem 1 Yol XVII Keyword Vol XMII Cryptologic history No 3 Summer 1973 L Communications b 1 i b 3 -50 USC No 3 Summer 197 U 403 b 3 -18 USC A Methodology for Evaluating HF Collection Potential U Vol XXII HF collection NO 3 Summer 1977 CAPER Software Support Vol XXII Software support No 2 Spring Soviet 1977 CANDEW System The U Meyer Joseph A Capture-Jamming of SICINT Targets U Categories of Cryptographic Phenomena -with a Few Examples of Effect and Cause U Computer Analysis Target Networks Intercept Probability U CATNIP Communications Cryptanalysis Vol XII No 4 Fall 1967 Cryptography 1 b 3 -P L $6-36 Vol XVI No Collection 1 Winter Intercept 1971 Special Computer systems Council of Field sites Learned Organization Issue 1972 Centralized Computer Support of Field Activities U Cepstrum Vocoder A U Chaco A Horrible Example U Channel Modeling and Code Performance Evaluation U Vol XII No 2 Spring 1967 798 I Special Issue Communications January 1971 Vol XVIII Translation errors No 3 Summer 1973 i Vol XXIII Channels No 2 Spring Communications 1978 and Special Mathematics and Engineering Issue 19811983 I DOCID 3020956 Title Author Reference Keyword characteristic Features of the Russian Language of the Last Decade U Vol XI No 2 Spring Russian language Chatter Patterns A Last Resort Vol 11 No 4 Chatter October 1957 Traffic 1966 U Cipher Signal Phase Modulation Vol XIV No Ciphers Modulation 2 Spring U 1969 Classes of Rotors without Parallels U Vol X No 4 Cryptanalysis Fall 1965 Mathematics Cleaning the Augean Stables or How Much TA Can a Computer Do U Vol XIII No Computers Traffic analysis 3 Summer Climbing Jacob's Ladder U Vol XII No 3 Summer 1968 Computers Telecipher analysis 1967 Cluster Analysis Introduction to Models and Methods U Vol XXII No 2 Spring Mathematics 1977 Cold-Cathode Counter Tube Study A U Vol 111 No 4 December Pulses 1958 Collected Editorials of Sydney Fairbanks U Collection Management U Fairbanks Sydney April 1956 July 1959 - Editorials Vol XIV No Collection management 1 Winter 1969 Collection of LINCOMPEX Signals U Vol XVII Collection No 2 Spring Signals 1972 Combining Functions in Key Generators U Spring 1961 COMNT Analysis and Reporting on the Developing Nations U Analysis Vol XVII No 2 Spring COMINT 1972 Reporting - C M I N Satellites T A Space Problem U Vol IV No 4 October 1959 Keys Shift registers Communications satellite DOCID 3020956 Title 1 Author Reference Keyword I COMINTSignals rends' 'SBCQ - Hard Facts in the Cold I COMINT Vol XXV No 2 Spring 1980 COMINT Spring 1961 Communications Ethics War U Signals trends Vol 11 No 2 April 1957 Vol 11 No 2 COMINT April 1957 Intercept Communications Intelligence U Special Council of Learned Organization Issue 1972 Communications Security and Computers U Communications with Extraterrestrial Intelligence U I Callimahos Lambros D Vol XI No 1 Winter 1966 Computers COMSEC Communications Extraterrestrial Intelligence Community Impacts on NSA Systems U Vol XXIII Computers No 3 Data processing Summer 1978 Networking Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters A Vol IX No 2 May 1964 Mathematics U Vol XVII Compilers No 1 Winter FORTRAN 1972 Compiler Object Code Optimization U Composition of Boolean Functions I U Composition of Boolean Functions I1 U Computer Applications The Insatiable Appetite of the Analyst U Computer Automation of Circuit Analysis U I 1 Special Fast Mathematics Fourier Issue August 1973 Special Fast Mathematics Fourier Issue August 1973 Vol XIX No Computers 4 Fall 1974 u Vol VII No 4 Fall 1962 Circuit analysis Computers I DOCID 3020956 Title I Author Reference Keyword Computer Generation of Unrelated Latin Squares U Vol X No 3 Cryptanalysis Summer 1965 Latin squares Computer Graphics in an Engineering Simulation Program U Vol XVII No 2 Spring Computer Processing of Natural Languages U Special Council of Learned Organization Issue 1972 Computer Processing of Soviet Telemetry U Vol XIII No Computers Soviet telemetry 3 Summer Computer programming 1972 Computers Language processing 1968 Computer Program Debugging A New Era U Vol XIII No Computers Debugging 2 Spring 1968 and Special Computer and Information Sciences Issue Computer Scripting U Vol XXIV No 1 Winter 1979 Vol x x v No 4 Fall Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer 1980 Computer Sorting U I Computer Transcription of Manual Morse U I Computer There Is Thy Sting U Computer-Aided Bookbreaking of Two-Part Codes U Computers Language Working aids Communications Frequency hopping Jamming Vol XIII No Computers 3 Summer 1968 Vol 111 No 3 July 1958 Computers Manual morse Transcription Salemme Arthur Vol XVI No Computers 4 Fall 1971 Russian J Translation Vol XVII Bookbreaking No 2 Spring Computers 1972 DOCID 3020956 Title Author Reference Keyword Vol XVII Computers No 1 Winter Cryptanalysis Computerized Depth Reading U Computers and Advanced Weapons Systems U Special Advanced weapons Council of systems Learned Computers Organization Issue 1972 Computers and Linguists Do Mix U Vol XVI No Computers 3 Summer Linguists 1971 Computers and Queues U Computers -The Wailing Wall January 1960 Computers Processes Queues Meyer Joseph A U COMSECat W D S i t e s w Nathaniel C Vol I No 3 Codes October 1956 Cryptanalysis Vol VII No 4 Fall 1962 COMSEC Conjugate Codebooks U Vol XXII Cryptanalysis No 3 Summer 1977 Content - Addressed Memaries v Vol IX No 1 Winter Computers Memory 1964 Contextual Testing in Establishing Minimum Working Level Language Proficiency U Vol XXV Language proficiency No 1 Winter Testing Continued Fractions and Mills' Algorithm U Vol XXV Mathematics No 3 Summer 1980 Convergence Techniques for Finding Linear Approximations Special Fast Mathematics Fourier Issue August 1973 U 1980 Convolutions Cube Roots and Computer Cryptography U Vol XVIII Computers CryptotZra h No 3 Summer 1973 Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4 2 U Vol XVII No 4 Fall 1972 Mathematics Author Title -- Reference Keyword - Correlation and Power Spectra of Randomly Sampled and Held Signals U Vol XIV No Signals analysis 2 Spring Correlation of Frequency of Appearance of Military Unit Addresses to Unit Echelon and Combat Readiness Status U Vol XVII Military addresses No 3 Summer 1972 Cost-Effectiveness Study of Spectrum Surveillance Systems A U Vol XIV No 3 Summer Cosymmetric pproximationsto Combining Functions U Vol XVI No Mathematics 4 Fall 1971 1969 Collection 1969 I I Coupon Collecting and Cryptology U Cover and Deception U Cranks Nuts and Screwballs U Vol XI No 4 Fall 1966 Cryptanalysis Mathematics Vol IV No 3 July 1959 Communications Deception Vol XI No 1 Winter Security 1966 Creation of a n Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC The U Crisis Management in the National Senior Cryptologic Course U Vol XI No 2 W i n g Communications 1966 I Zoebelein Arthur J Crisis management Vol XXII No 1 Winter Decision making 1977 Vol X No 1 Computers Winter 1965 On-line processing Vol IV No 2 April 1959 Cryptanalysis in the German Air Force U Cryptanalyst's Nightmare An Oneiric Problem and Its Solution A U Cryptanalytic Applications of Sequential Analysis U Callimahos Lambros D Cryptanalysis German air force Vol XVI No Ciphers Cryptanalysis 4 Fall 1971 Vol IX No 3 August Cryptanalysis Mathematics 1964 Cryptanalytic Use of HighSpeed Digital Computing Machines U Vol IX No 3 August 1964 Computers Cryptanalysis DOCID 3020956 9 h 3 - k I 8 h - G Title Cryptologic Fairy Tale A U Author Reference Tiltman John H Vol VII No 2 Spring Brigadier 1962 Keyword Cryptologic history Germany Cryptologist Can He Exist The U Vol 11 No 3 Cryptologists July 1957 Curiosa Scriptorum Sericorum To Write But Not to Communicate U Vol XVI No Communications 3 Summer Writing 1971 cxco Story The U Vol XVI No Cryptanalysis 4 Fall 1971 Cryptologic history CY-600 View of Language A U Vol XVIII Language No 3 Linguists Summer 1973 Cybernetics and Problems of Diagnostics the Parallels between Medicine and Cryptanalysis U I Callimahos Lambros D Vol XIV No Cryptanalysis 1 Winter Information analysi 1969 Cycles from Nonlinear Shift Registers U Special Mathematics and Engineering Issue 19811983 Shift registers Darlington Compound Transistor as a Current Controlled Voltage Source A Vol IX No 4 Fall 1964 Electricity U Data Management Challenge The U Vol XVI No Computers 2 Spring Data management 1971 Data Standardization and the Trace Factor U Vol XVI No 2 Spring 1971 Data Standards for SICINT Activities - Some Conflicting Objectives U Vol XVI No Data standardizatia 1 Winter 1971 Data Structures and Their D'Imperio Mary Representation in Storage Part Voi IX No 3 August 1964 I U Data standards Information management Computers Memory DOCID 3020956 Reference Keyword 11 U Data Transmission over Telephone Circuits U Vol IV No Digital data Database Services U De Profundis or the ABC of Depth Reading U Vol 11 No 1 Cryptography January 1957 Monoalphabetic substitution Debugging Made Easier U Vol 111 No 4 December Computers Debugging Degrees of Freedom in an N-b Frequency Distribution U Vol I No I April 1956 Frequency Distribution Deposited Films -Magnetic Elements for the Memory oft Future U Vol I No 3 Films October 1956 Storage Der Fall WICHER German Knowledge of Polish Success Meyer Joseph A Vol XX No 2 Spring Cryptologic history ENIGMA ENIGMA U Design and Implementation o Digital Demodulator for Use against On-Off Keyed Signals The UI Vol XXIII No 2 Spring Morse Signals Designing Secure Reliable Software - A Methodology U Vol XXI No 4 Fall 1976 Computer security Software Determination of Missile and Earth Satellite Trajectories from Radar Observations U April 1960 Earth satellites Orbits Determining Intercept Assignments U Vol XII No Intercept Development of Automatic Telegraph Switching Systems Vol 11 No 3 Circuits July 1957 Switching systems U u DOCID 3020956 I I I 31-P L 86-36 ib 1 b 3'-50 USC 403 b 3 -18 USC Reference 798 b 3 -P L 86-36 April 1956 translators Communications Vol XXIV No 1 Winter Morse code Dialect A Data Type for the Person-Machine Interface U Vol XXII Did Alexander Popov Invent Radio U January 1960 Radio Digitizer Queuing Model for Vol XIV No Collection 4 Fall 1969 Queuing theory FROSTING U Computers Distribution of Letters in Shor Messages of English The U Vol XIV No Ciphers Distribution of the Maximum Bulge in a Flat Random Binary Stream The U Vol VII No 4 Fall 1962 Binary stream Probability Distribution of C b4 u f The Special Fast Mathematics U Don't Be Too Smart U January 1960 Codes Japanese military Tiltman John H Vol XVII Brigadier No 4 Fall 1972 Double Transposition - A Special Case U Drama in Cryptologic Life U - Drawing to a Straight Flush A Study in Technical Intelligence u Earliest Applications of the Computer a t NSA U b Callimahos Lambros D Cryptanalysis Vol XIX No Cryptologic history 1 Winter 1974 Vol XXI No ELINT 3 Summer Technical intelligence 1976 Snyder Samuel S Vol XVIII No 1 Winter 1973 Computers DOCID 3020956 -398598 Title Author Reference Key word - Education in Diagnosis U 1 Winter 1969 Vol IX Nu Ekctrical and Magnetic Projpertb of Comput@rTa I Wintrr 198$ u Digital r e c o r d i n IBM Electrical Design of Random Sequence Generators U Val IX No 3 August 1964 Electron Beam Recording for Wideband Analog Signals U Vol XIV No Recording 3 Summer Signals 1969 Electronic Calligraphy U Vol XI No 1 Winter 1966 Elements of Shift Register Cryptology U Vol XVI No Cryptology 2 Spring Mathematics 1971 Emergency Destruction of Documents U Vol I No 1 April 1956 Document destruction Vol XIII No 4 Fall 1968 and Special Linguistics Issue 11 Military linguists Entropy of German The U Vol I No 2 July 1956 Frequency Probability Enumeration of the Square Permutations of the Symmetric Group U Vol XVIII No 4 Fall 1973 Cryptomathematics Error Formula for Iterative Prefiltering Frequency Estimates An U Vol XXII Frequency No 3 Linear prediction Summer 1977 Error in a Capacitor-Type Totalizer U Vol 111 No 4 December 1958 Pulses Waves Errors in High Frequency Direction Finding U Vol IV No 1 January 1959 Direction finding Employment of Military Linguists U Gurin Jacob Encryption Calligraphy DOCID 3020956 98 iti 3I-P L 8 6 - 3 6 I Title Author Refe ence Keyword Estimating the Number of Solutions in GF 2 Pof a System of Equations over the Integers U Mathematics Euclidean Algorithm and Distances between Wheel Settings The U Cryptanalysis Mathematics Evaluating Intercept Systems Signals U Evaluating Intercept Techniques U Intercept evaluation Exact Markoff Probabilities from Oriented Linear Graphs Mathematics U Example of Computer Graphics as Applied to Key Analysis An Computer graphics U Example of Substantive Analysis An U Analysis Soviet Experimental Approach to an 'Environment Study in the HF Band U Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector U Extensible Model of a Hand Cryptosystem An U 1 Cryptologic history Tiltman John H Val XVII No 3 Brigadier Summer 1972 Experiences 1920-1939 U Vol VIII No Collection 4 Fall 1963 Signals 1 Extraterrestrial Intelligence Ul Campaigne Howard H I Vol X No 2 Spring 1965 Vol XXIII Computers No 1 Winter Cryptanalysis 1978 Vol XI No 2 Spring 1966 I Extreme Values in Cryptanalysis U Intercept Signals Vol IV No 4 October 1959 Communications Extraterrestrial Intelligence Cryptanalysis DOCID 3020956 e l 4 3 9 8n 5 9 8 Title Author Reference Keyword Vol I No 3 Antenna gain October 1956 VHF intercept Factors Affecting Required Antenna Gain in VHF Intercept U Vol XIV No Bookbreaking 1 Winter Faithful Mirror The U 1969 False Friends of the Translator in the English and Russian Languages A Translation from the Russian of V V Akulenko U Vol XVI No Russian translation 4 Fall 1971 Fallacy of the One-Time-Pad Excuse The U Vol XIV No Cryptanalysis 3 Surntner 1969 Fallacy of the Systems Approach The U Meyer Joseph A Vol VII No 3 Summer Engineering 1962 Famous First Facts NSA Part I Pre-Computer Machine Cryptanalysis U Vol XVII No 4 Fall 1972 Computers Fast Dynamic Programming Algorithm and Its Mathematical Basis A U Vol XXI No Mathematics 1 Winter Fast Look-up in a Threaded Dictionary U Vol XVI No 1 Winter 1976 Dictionary references 1971 FDM Activity Detection U Vol XXI No FDM signals 1 Winter 1976 Vol XI No Russian language Translation Few Tricks of the Trade for the Translator of Russian A U 4 Fall 1966 Finding the Best-Scoring Permutation U Vol XIV No Mathematics 4 Fall 1969 Fingerprinting Code Croups by Computer U Vol XVII Bookbreaking No 3 Computers Summer 1972 FIR A CDC 1604 Program for Vol X No 1 Computers Winter 1965 Mathematics Solution of Systems of Linear Equations U DOCID 3020956 98 9 b 31-P T 96-36 Author Title Flattening Effect The U Reference Keyword Val X No 1 Cryptology Winter 1965 Mathematics Kullback Solomon Food for Thought in LVHF Reception U Vol XX No 4 Fall 1975 LVHF collection Foreign vs U S Computers An Appraisal U Special Council of Learned Organization Issue 1972 Computers Fourier Analysis on Finite Abelian Groups U Vol XXI No 3 Summer 1976 Mathematics Fourier Coefficients and Function Decomposition U Special Fast Mathematics Fourier Issue August 1973 Fourier Modulus Method of Cage Identification U April 1960 Cryptanalysis Frame Versus Corpus U Vol XVII No 1 Winter Bookbreaking Computers 1972 Vol XXI No Translation 3 Summer Freedom in Translation U 1976 Vol XVI No 1 Winter Frequency Analysis of a Set of Harmonically Related Tones U Signals analysis 1971 Vol IV No 4 October Fundamentals of Majority Logic U Digital circuits Logic 1959 Vol VIII No COMINT 1 Winter ELINT Future Problems of Intercept U Gerson Nathaniel C 1963 FUZZY An Evolutionary Model for Data Structures U Vol XXIV Programming No 3 Software Summer 1979 Garden Paths I Have Followed Vol IX No 3 August U GEE System - I The U -t Cryptanalysis 1964 Unknown Fall 1961 Cryptologic history Germany 20 -- - - -- - i DOCID 3 0 2 0 9 5 6 9 9 I Title GEE System - 11 The U GEE System - V The U Author Reference 8 Keyword Cryptologic history Germany Unknown Vol VII No 2 Spring 1962 Cryptologic history Germany unknown Vol VII No 3 Summer 1962 Cryptologic history Germany Vol VII No 4 Fall 1962 Cryptologic history Germany 1 1 - 1I b I GEE WHIZZER U 9 Vol VII No 1 Winter 1962 - - 5 Unknown GEE System 111 The U GEE System IV The U 8 1 I Unknown 9 3 1 - P L 66-36 Vol VIII No Cryptanalysis 1 Winter 1963 Signal theory Generalizations of MaximumEntropy Pattern Analysis U Vol XXIV No 2 Spring 1979 Generating Function Approach to GRETAG A U Mathematics Vol XXII No 1 Winter 1977 Generating Random Characters on a Computer U Vol XII No 1 Winter 1967 Generation of Permutations U Vol IX No 2 May 1964 Genesis of Mobile Magoo The tU Vol XX No 3 Summer 1975 Telemetry processing Geodetic Latitude and Altitude from Geocentric Coordinates LJ Vol XX No 1 Winter 1975 Astrodynamics Mathematics Geometric Approach to Waveform Recognition A U Vol VIII No Mathematics 2 Spring 1963 German Agent Systems of World War II Vol VII No 3 Summer 1962 Cryptologic history Germany South America German Radio Intelligence U Vol x x v No 4 Fall 1980 Cryptologic history German COMINT Code generation Computers DOCID 3 0 2 0 9 5 6 Reference Author Title Keyword -- Vol XIX No Cryptanalysis 3 Summer 1974 German Tiresand Black Cats Estimation of Population Size U Graceful Degradation through Distributed Intelligence U Vol XXIII No 3 Summer 1978 Computers Vol XII No 3 Summer 1967 Mathematics Special Computers Graph Theory U I Growing up with Computers a t NSA EU 1Council of Eachus Joseph I Organization Learned Jacobs E Dale Issue 1972 Marston Charles J Schierlmann Samuel S Snyder Moderator Howard H Campaigne Gweeks Had a Gwoup for It The Filby P W Vol XXI No Bletchley Park Cryptologic history 2 Spring 1976 U Handle with Care Russian Transliteration U Help Stamp Out Programming U Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Saling The Salemme Arthur Vol XII No 4 Fall 1967 1 Jacobs Walter Russian transliteration Vol XIV No Computer t g r n e r programming Vol XXI No Cryptanalysis 4 Fall 1976 U High-Speed Automatic Scanning of Speech Bandwidth Channels U Vol XX No 4 Fall 1975 Speech scanning Hill Climbing U Vol X No 4 Fall 1965 Mathematics DOCID 3 0 2 0 9 5 6 -A398598 A Author Title Keyword Reference Hoopscotch U Vol XII No 2 Spring 1967 Games Vol XX No 2 Spring Collection 1975 How Can the Communications Sciences Contribute to the Study of Natural Systems U Vol VIII No Communications Cybernetics 3 Summer How the Germans Broke a U S Code U Fall 1960 Codes Germans How the Japanese Army Water Transport Code 2468 Was Broken U Vol XVIII No 4 Fall Cryptologic history Japan How to Choose a Cood Crib U Vol X No 4 Cryptanalysis Fall 1965 How to Visualize a Matrix U Vol MII No Mathematics 3 Summer 1963 1973 1963 Human-Machine Interfaces for NSA Computer Systems U D'Imperio Mary Vol XXIV No 4 Fall Computers SOLIS 1979 Vol 111 No 1 January Hybrid Circuits U Circuits 1958 IFF A New Branch of Cryptology U Vol 11 No 4 IFF October 1957 Planes In General t h n t e r a t i o n Vol XII No 1 Winter Mathematics 1967 I January 1960 Computer graphics Inexpensive Device for Pictorial Input and Output An U Informa tion Storage and Retrieval U Information Theory and the Packing of Spheres U I VIII No 11 Vol 4 Fall 1963 Vol IV No 2 April 1959 Information retrieval Information theory - DOCID 3020956 -98 ibi 3 -P L 86-36 Title Author Information Theory Applied to Computer Data Compression U Reference Vol XXIII No 4 Fall 1978 and Special Mathematics and Engineering Issue 1981- Keyword Computers Data compression 1983 Insolvable Problem An U Instant Expertise U Vol VIII No Computers 3 Summer Cryptology 1963 Turing machine r Unknown Vol XII No 1 Winter Buzzwords 1967 Integrated and Guided Wave Optics and Device Applications U Vol XXIV No 2 Spring 1979 and Special Mathematics and Engineering Issue 1981- Optics Signals processing 1983 Intercept and Electtomagnetics U Intercept of USSR Missile Transmissions U Intercept System Analysis U Gerson Nathaniel C Vol XX No 2 Spring 1975 b Gerson Nathaniel C Electricity Optics Vol IV No 3 July 1959 E lectrornagnetics Missile radiation Vol XI No 2 Spring Communications Intercept 1966 Interference and Intercept U Gerson Nathaniel C Vol XVI No 1 Winter Intercept Noise 1971 International or Cross-Country Depths U Introduction To APL An U Introduction to Computer Binary Arithmetic An U r l n Vol I No 3 Cryptanalysis October 1956 Vol XVI No 4 Fall 1971 Computers Cryptanalysis Vol 111 No 2 April 1958 Computers Mathematics DOCID I Title Author Introduction to Cryptology -I An U Vol IV No 4 October 1959 Cryptologic history Friedman William F April 1960 Cryptologic history Fall 1960 Cryptologic history Friedman William F Winter 1961 Cryptologic history Friedman William F Summer 1961 Cryptologic history Friedman William F Fall 1961 - - Introduction to Cryptology 111 Friedman William F An U - - I Introduction to Cryptology V An U - Introduction to Cryptology VI An U 1 Introduction to Diagnosis U Introduction to Log-Linear Models in Cryptanalysis U I i i No Callimahos Lambros D 1 Introduction to Programming of a Digital Computer U Introduction to Semiconductor Physics and Diode Theory U I phase-lock ascillators Vol II No 3 July 1957 Cryptanalysis Vol XXV No 2 Spring I980 Computing Cryptanalysis b 3 -P L 86-36 Vol I No 3 Communications October 1956 Recording Introduction to Magnetic Tape Recording and Its Use in Intercept Activities An U Introduction to Psycholinguistics Paralinguistics and Kinesics An U Cryptologic history Vol XIII No Cryptanalysis 3 Summer 1968 Introduction to Electronic Phase-Lock Oscillators An U Introduction to IBM Methods in Cryptanalysis An U Keyword Friedman William F Introduction to Cryptology 11 An U Introduction to Cryptology IV An U Reference I Val 11 No 3 Computer programming July 1957 1 Vol XII No U Communications 2 Spring 1967 Vol 11 No 2 April 1957 Electronics DOCID 3 0 2 0 9 5 6 -50 USC 1 0 3 b 31-18 USC 798 Author Title Reference Keyword Introduction to Statistical Pattern Recognition U Vol XXII Pattern No 3 recognition Summer 1977 and Special Mathematics and Engineering Issue 1981- Introduction to the Fast Fourier Transform An U Special Issue Computers January 1971 Mathematics Introduction to the Methods of Thin Film Analysis An U Introduction to the Special Issue I I U Introduction to Traffic Analysis U Callimahos Lambros D Summer 1961 Thin film analysis SpecialFast Mathematics Fourier Issue August 1973 Vol 111 No Trafficanalysis 2 April 1958 Introduction to Hairpin Registers U Vol XX No 1 Winter 1975 Intuitive Exposition of Zierler's Method for Finding Linear Recursions An U Vol XIII No Cryptography 1 Winter Linear recursions 1968 Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key An Vol XIX No Cryptomathematics 4 Fall 1974 Cryptovariables U Investigation of Techni ues for the Analysis ofthe- Vol XX No 4 Fall 1975 Investigations into Adult Language Learning Acquisitions U Vol XXIV Language acquisition No 3 Summer 1979 T I u Ionospheric Propagation U It Is Obvious That A Painless Approach to Cryptanalytic Diagnosis U Gerson Vol 111 No Nathaniel C and 4 December 1958 Vol 111 No 2 April 1958 Signals Soviet Communications Ionosphere Codes Messages Author Title Reference - A Yates Algorithm Machine U JACQUARD Keyword JACQUARD machine Fourier Issue Mathematics August 1973 I John Dee Consultant to Queen Elizabeth I U _ Key to the Extraterrestrial Messages U Labeled Oriented Graphs Which are Onto u II Campaigne Howard H I Vol XII No 4 Fall 1967 Cryptologic history Vol XXIV No 1Winter Chinese communists Korean War 1979 Vol XIV No Communications Extraterrestrial 1 Winter intelligence 1969 Vol X No 1 Mathematics Winter 1965 Language and the COMINT Production Process U Vol XIX No 3 Summer 1974 COMINT Language as a Bulk Commodity Vol XX No 3 Summer Language U Language 1975 Salemme Arthur Vol IV No J 2 April 1959 Language Files A Basic COMINT Aid U Tetrault Emery W Language Levels and Cryptologic Jobs U 1 1- Language Problem a t NSA The u Layman's Guide to the Mysteries of Linguistics A U Learn with BOOK U Learning Machines U '-I Jacobs Walter Learning Machines - Part I1 U Jacobs Walter Russian language Vol XVIII Language No 3 Qualification standards Summer 1973 Vol I No 1 April 1956 Gurin Jacob COMINT Esperanto Language Vol XXIII Language No 1 Winter Linguistics 1978 Vol XI No 3 Summer Light reading 1966 Vol 111 No 3 July 1958 Learning machines Vol IV No 2 April 1959 Learning machines DOCID 3020956 b 3 - P L 9 9 8 86-36 1 Title Least Squares Analysis of a Probability Matrix The U Author Reference Vol IV No 1 January 1959 1 I Keyword Mathematics I I Vol XIII No 2 Spring 1968 Library Research Vol IV No 3 July 1959 Computers Vol VIII No 1 Winter 1963 Computers Linear and Quadratic ElectroOptic Effects Pockels and Kerr Effects U Vol IX No 4 Fall 1964 Optics Linear Approximation Attack on a n Irregularly Stepping Key Generator A U Special Fast Mathematics Fourier Issue August 1973 Linear Approximations and the Degree of the Function U Special Fast Mathematics Fourier Issue August 1973 Linear Approximations Using Continuous Functions U Special Fast Mathematics Fourier Issue August 1973 Linearly Induced Nonlinear Cycles U Vol XXII No 4 Fall 1977 Linguistic Canonical Forms Tools for Analytic Progress U Vol XIII No Communications 1 Winter Language 1968 and Special Linguistics Issue I1 Library and the User The U Campaigne Howard H LIGHTNING U G H T N I N GProgram hew List of Properties of BayesTuring Factors A U I Vol X No 2 Spring 1965 Mathematics Mathematics Logarithmic Scoring and Preliminary Testing U Vol 11 No 1 Cryptanalysis January 1957 Long and Short of Single Transpositions The U Vol XXI No Cryptanalysis Mathematics DOCID 3020956 Title Author Reference Vol XVIII No 1 Winter 1973 I Vol VIII No Mathematics 1 Winter 1963 Vol XVI No LVHF Propagation and Collection Techniques U LVHF collection 4 Fall 1971 Machine Translation U Machine-Aided Translation Where Is I t Today U Dictionaries Foreign languages Vol 11 No 1 Circuits January 1957 Law Cost Process for Printed Circuits A U Low Weight Linear Recursions in Key U Keyword - Magic Digraphs U Wild Norman U Maps and the Conversion of Gauss-Kriiger Grid Coordinates Machine translation Vol XVIII No 2 Spring 1973 and Special Linguistics Issue I1 Machine translation Vol XII No 1 Winter 1967 Cryptanalysis rn Magnetic Core Memories U Management of Magnetic Tape Vol XII No 2 Spring 1967 Vol 11 No 1 Computers January 1957 Memory II Vol X No 4 Fall 1965 Tape management Vol 111 No 1 January 1958 Mapping Markov Chain - The Models with the Short Memories U Vol XVII Mathematics No 1 Winter 1972 Markov Models for Phonetic Text U Vol XVIII No 1 Winter 1973 Communications Speech - - b 3 - P L b 3 -P L 86-36 86-36 b i 31-7 1 86-36 Title I Reference Author Keyword Mathematical Analysis of Jitter in a Digital Frequency Source U Vol VIII No Frequency 2 Spring 1963 Mathematical Modeling of Vol XVI No Signals 3 Summer TEMPEST 1971 TEMPEST Channels U Mathematics and Computers in Cryptanalysis U Special Council of Learned Organization Issue 1972 Matric Recursions U Vol XXII Mathematics No 3 Summer 1977 Matrix Business Part 11 This Vol 111 No 3 July 1958 Mathematics Vol XXIV No 4 Fall 1979 Computers Encryption U Computers Mathematics Matter Transmission U Vol VIII No Cryptosecurity 1 Winter 1963 Maximum Likelihood Estimation of a Trajectory and Its Variance U Vol XIII No Satellite trajectory 1 Winter 1968 Maximum Likelihood Estimation of a n Orbit U Fall 1961 Maya Astronomical Computer The U Vol XXII Astronomy No 1 Winter Cryptologic history 1977 Maybe It's Related to the Phase of the Moon U Vol XVII No 4 Fall Measurement of Insecurity for Imperfect Erasure A U Vol XXII Degaussing No 1 Winter Tape storage 1977 Mechanical Translation U 1 Vol I No 1 April 1956 Celestial mechanics I PRC Translation I DOCID 3020956 Title - - Mechanical Treatment of Fibonacci Sequences A U Mechanization Systems and a New Look a t Management and Organization U Metalin A Draftof a Metalanguage U I I I Author Reference Keyword 1 Vol 11 No 4 Cryptanalysis I I Vol VII No 2 Spring Management Vol Xi No 4 Fall 1966 Artificial language Method of Recovery of Fibonacci Key A U Vol 1 No 3 Cryptanalysis October 1956 Mickle-Muckle Principle in Hagelin Cryptanalysis The U 4 Fall 1964 MICROCOMPUTER General- Purpose Signal Process The U Midway and Yarnamoto Properly Revisited U Minimizing Noise Effects in PCM U Minimizing Wasted Space in Information Files U Vol IX No I Vol XXII No 2 Spring Cryptanalysis Hagelin machine Signal processing Vol XIII No Cryptologic history Midway 3 Summer 1968 I Vol 11 No 2 Collection April 1957 Vol XIV No File storage 4 Fall 1969 Missile Trajectories U Vol 11 No 1 Missile trajectory January 1957 Model 204 -The Analyst's Computer U Vol XXI No Analysis Computers 3 Summer 1976 Modification of a Phantastmn Generator A U Vol IV No 4 October 1959 Circuits Modified Normal Curves U Spring 1961 Cryptanalysis Mathematics Mokusatsu One Word Two Lessons U Vol XIII No Translation 4 Fall 1968 and Special Linguistics Issue I1 MP-14 Unlimited Random Source U Vol XVII Computers Cryptanalysis No 3 Summer 1972 DOCID 3 0 2 0 9 5 6 Title I Author Reference MUFFLER BANDAID LVHF and HF Communications Aid U Vol XX No Multichannel Language Processing As a System U Vol XVII No 4 Fall Keyword 3 Summer Language processing 1972 Multilingual Codes U Vol X No 4 Codes Language Fall 1965 Multipath Differential Doppler Data U Vol XXI No Signals 3 Summer 1976 Vol XVI No Cryptomathematics 3 Summer Multiple Hypothesis Testing and the Bayes Factor U 1971 Narrow-Band Speech S U Need for System Approach The U Vol 111 No 4 December 1958 and Special Linguistics Issue Cipher equipment Security Vol VII No 2 Spring SIGINT bi 13 3GA 1962 Nest of Dragons A The Voice Problem U Gurin Jacob Vol XXI No Language 1 Winter Voice problem 1976 Net Reconstruction - A Basic Step in Traffic Analysis U Vol 111 No 3 July 1958 New Approach to the One-Time Pad A U Vol XIX No Ciphers 3 Summer One-time pads Traffic analysis 1974 New Concept in Computing A 1 Vol 111 No 4 December Computing 1958 New Mode of Operations in Junction Transistors A U No Not Again U Vol 11 No 3 Circuits July 1957 Callimahos Lambros D Vol I No 1 April 1956 Ciphers DOCID 3 0 2 0 9 5 6 Author Reference Keyword 7 Vol VII No Communications Title Noise Communicatioa Technique for Speech U 1 I Noisy Pluggings U I Note on a Solution of a Polyalphabetic Dinome System A U Note on Chinese Language Reform and NSA A U 4 Fall 1962 Vol 111 No 2 April 1958 Noise Vol I No 3 Ciphers October 1956 I Vol I No 2 July 1956 Wild Norman Chinese language Note on Curve Fitting A U Vol XIII No Mathematics 4 Fall 1968 Note on Product Sequences A Vol XVI No 2 Spring U Mathematics 1971 I Vol XVII Note on the English VCCCC Pattern or Maximum PostVocalic Consonant Clustering in Monosyllabic English Words A I No 1 Winter Language identification U Note on Univariant Interpolation U Vol 111 No 4 December 1958 Note on A Low Cost Process for Printed Circuits U Vol 11 No 3 Circuits July 1957 I I Interpolation Vol 11 No 4 October 1957 Mathematics Vol 11 No 3 July 1957 Cryptanalysis Vol IX No e t r Missile trajectory Vol I No 2 July 1956 Cryptology Number of Components in a Random Linear Graph The U Vol IV No 2 April 1959 Cryptanalysis Offsets of Differences Summation and Difference Methods U Vol 11 No 4 Encipherment October 1957 Note on Logarithmic Scoring and Preliminary Testing U Notes on Chi-Square in Cryptanalysis U Notes on Missile Terminal Ballistics Soviet U Null Hypothesis The U 1 Campaigne Howard H DOCID 3 0 2 0 9 5 6 Author Title On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms U On Cipher U On Comparing Two Observed Frequency Counts U On Cryptanalysis and Redundancy U On Key Analysis U Keyword Reference 1 I I Special Fast Mathematics b Fourier Issue August 1973 January1960 Ciphem I I Vol 111 No Chi-squares 2 April 1958 u Callimahos Lambros D Vol IV No 3 July 1959 Cryptanalysis Vol XIX No Cryptanalysis 4 Fall 1974 On Milking the Sacred Cow U Vol XVII No 2 Spring 1972 On Operatorless Computers U Vol I No 1 Computers Storage April 1956 On Tests of Sequences U Kullback On the Distribution of n-Digit Groups by the Sum of Their Digits U On the Expected Number of Random Stops Corresponding to a Given Menu U On the Maximization of X'AX over the Vertices of the Cube U On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors U Collection Vol VII No Cryptanalysis F Cryptography 01 I No 2 uly 1956 01 VIII No Cryptanalysis 6% 01 VIII No Cryptanalysis Winter Mathematics o 1 Winter On the Selection of Cryptanalysts - Part I1 U pril1960 Cryptanalytic personnel On the Selection of Personnel for Cryptanalysis U anuary 1960 Cryptanalytic personnel On Understanding the Null Hypotheses of Test Statistics U Fall 1963 01 VIII No Mathematics r Title Reference Author Keyword bj1 3 1 - P L 86-36 One Model for an Artificial Ionosphere U Vol XI No 2 Spring Operation Babel U Vol IV No 3 July 1959 Computers Vol I No 2 July 1956 Communications Earth satellites Operation VANGUARD U O erationsResearch in NSA Radio intercept 1966 I 1 Optical Data Processing - A Cryptanalytic Perspective U I Vol X No 1 Management Winter 1965 Operations Vol XX No 3 Summer Cryptanalysis Data processing 1975 Vol XVIII Mathematics No 3 Summer 1973 Optical Fourier Transform and Periodic Phenomena U Vol XXV Spread spectrum No 1 Winter 1980 Vol XIII No Optical receiver 2 Spring Optical Receiver The U 1968 Vol IX No 3 August Optimum Use of h g Weights U Computers Plain text 1964 Orbit Computation with the Vinti Potential and Universal Variables U Vol XIX No Astrodynamics 1 Winter Orbit Fitting ta Angular Data Vol XXI No Astrodynamics 2 Spring 1974 U Order Statistics for Cell Counts I 1976 Vol XXIII No 4 Fall Mathematics 1978 OVERLORD the Programmer's Friend An Extension of the DASYSOperating System U Parabolic Mock Design for an FFT - Implemented Filter Scheme U Vol XXII No 2 Spring Computer operating systems 1977 Special Issue Filters January 1971 DOCID 3020956 i b 3 -50 USC 403 0 9 8 b 1 3 - P 1 Author Title 86-36 Reference Keyword Parity as an Operation Checking Code U Vol VIII No Mathematics Patent Matters and the Technical Employee U Vol X No 3 Inventions Summer 1965 Patents Pattern Recognition U Winter 1961 Pattern recognition Vol XII No 1 Winter Cryptanalysis Penney-Ante U 3 Summer 1963 r 1967 Perpetuation of Bias in Shift Register Devices U Vol XIV No Shift registers 4 Fall 1969 Personal Contribution to the Bombe Story A U Philosophy of U S Cryptography and Cryptographic Usage A U Phonemic Structure of Nootka The U Polar Ionosphere The U Possible Applications of Keyword Recognition in Voice Intercept U I Vol XX No Cryptologic history 4 Fall 1975 ENIGMA Vol XII No 3 Summer Cryptography 1967 C Fall 1960 American Indian language VO IX NO 2 May 1964 ELINT Signal analysis Gerson Nathaniel C Summer 1961 Ionosphere Physics Gurin Jacob Vol XXII Keywords No 1 Winter Voice intercept 1977 Potential of Interactive Computer Programs in the Decryption Process of SIGINT The F43WW Vol XXV No Computers 3 Summer Cryptanalysis 1980 SIGINT Potential of Tropospheric Ducting as a Collection Technique The U Vol XX No 1 Winter Collection PPM Telemetry Simulator U Fa11 1960 Preamble for Push-to-Talk Ciphony A U Vol XII No 2 Spring 1975 1967 - telemetry Communications REF ID A398598 DOCID 3020956 bi - Title 3 -P 86-36 I Author Reference Key word Cryptologic history Communications Intelligence U Preliminary Historical Report on the Solution of the B Machine U Privacy and Protection i n Operating Systems U Probabilities of Hypotheses and Kullback-Leibler InformationStatistics in Multinomial Samples U PROBE DATA h U Unknown Vol IX No 2 May 1964 Cryptologic history Vol XVIII No 2 Spring 1973 Operating systems Privacy Vol I No 3 October 1956 Vol XI No 1 Winter 1966 Meyer Joseph A Problem Solving with On-line Systems U Special Council of Learned Organization Issue 1972 On-line systems Problem solving Problems of Meaning in Interlingual Dictionaries U Vol 111 No 1 January 1958 Language dictionaries Processes for Random and Sequential Accessing in Dynamic Memories U Vol XXII No 4 Fall 1977 Dynamic memory Mathematics Product Sequences I1 U Vol XX No 4 Fall 1975 Mathematics Program Complexity Measure A U Vol XXI No 4 Fall 1976 Software engineering Program for Correcting Spelling Errors A U Vol IV No 4 October 1959 Computers Programmatic Control of Parallel Processes U Vol XVII No 2 Spring 1972 Computer programming Programming Concepts for Verification and Security U Vol XXII No 4 Fall 1977 Programming Software I ' % d a z 7092 3 09 5 6 b i3 -P Ha-3C REF IDzA398598 L b 1 2 - P L Title I 86-36 Author Reference Keyword - Vol XVI No Cryptologic history 2 Spring Vietnam 1971 Project EXPLORER U Project TENNIS and External Influences on NSA Systems Development U 7 VOI XXIII No 2 Spring 1978 I Vol XXIV Crwtjmathematics No 3 Summer 1979 o l t e i l l i a m M 1 I U I Public Key Cryptosystems I Q E D - 2 Hours 41 Minutes U Callimahos Lambros D Vol XXIV Cryptosystems No 1 Winter Vol XVIII No 4 Fall Ciphers b 1 b 3 -50 USC 403 b 3 - 1 8 USC 798 Quick Check for Transposal Garbles A U m h Case e for Bad Grammar U b 3 -P L 01 IV No April 1959 nd Special inguistics 01 IX No May 1964 d Special inguistics Russian grammar RAKE System for Tropospheric Scatter A U 01 X No 4 Collection Random and Algebraic Coverings of Binary Vectors U 01 XXIII Mathematics 0 3 ummer 1978 Mathematics Engineering Issue 1981- Random Walks with Restraining Barrier as Applied to the Biased Binary Counter Vol 111 No 2 April 1958 Computers Sampling DOCID 3 0 2 0 9 5 6 Title i Author Reference Keyword 3 -P L 86-36 Randomization Made to Order Random Numbers Are Too Important to be Left to Chance U Special ryptanlysis Council of Randamization Learned Organization Issue 1972 Range Dependence on System Temperatures U Vol IV No 1 January Communications Rationale for and Preliminary Implementation of HYPERCAN High Performance Cryptanalysis U Vol XXIII No 4 Fall Computers Cryptanalysis 1959 1978 Readinga Depth By Computer U Jacobs Walter W Vol X No 2 Computer Spring 1965 programming Reading TUNNY U Campaigne Howard H Vol VII No 4 Fall 1962 Cryptologic history Germany Vol XXf V ELlNT collection No 1 Winter Real-Time Raster U 1979 Vol XIII No Filters 4 Fall 1968 Frequency Special Mathematics and Engineering Issue 1981- Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters U 1983 Vol X No 1 Receivers Winter 1965 Receiving System Analysis U Reciprocal Alphabets and Friedman Squares U Kullback Solomon Vol 111 No 1 January Reciprocal alphabets 1958 Recognition of Latin Square Equivalence Classes U Vol XVI No Cryptanalysis 3 Summer 1971 Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography U Vol I No 2 July 1956 Cryptography DOCID 3020956 Title Author Reference Keyword Recording T e c v Affecting Total Intercept Vol IX No 1 Winter 1964 Recovering the Structure of a Linear Shift Register U Vol XIV No Cryptanalysis 4 Fall 1969 Recovery of Pre-Detection Signals in the Optical Receiver Vol XIII No Signals 4 Fall 1968 Intercept Recording U I Recurrent Events and Baudot Streams U Red China's Drive for Literacy U Vol 11 No 2 April 1957 Baudot streams Vol XVI No Communist China 2 Spring 1971 REDMAN Program The U Vol IX No 1 Winter 1964 Data processing Redundancy Exploitation in the Computer Solution of DoubleCrostics U Vol VII No 2 spring 1962 Computers Reference Patterns for Nearest Neighbor Rule U Vol XXII Signals analysis No 1 Winter 1977 Reliability and Checking in Computing Systems U Vol 11 No 4 Computer October 1957 diagnostics Remarks Concerning Substantialization U Vol IX No 4 Fall 1964 Mathematics Repagination U 1 Report of the Second Computer Study Group U Various Vol XIX No Computer use 1 Winter NSA 1974 Report on the Keyword System A U Kullback Solomon and F W Lewis Vol IV No 3 July 1959 Codes Keywords Vol IX No Signals Representation of Signals on Orthonormal Bases The U Vol XVIII No 4 Fall 1973 Bookbreaking Computers REF IDtA398598 b 3 - P L DOCID 3020956 Author Reference Keyword Callimahos Lambros D Vol 111 NO 1 January 1958 Cipher machines Vol 111 No 1 January 1958 Data representation Title Representative Machine Cipher Systems U Representing Data in Computers U I Research a t NSA U 86-36 Vol XfII No Research Campaigne Howard H 2 Spring j 1968 Vol VIII No Signals 1 Winter 1963 Response of a Non-Linear Device to a n Emitter Environment i n the High Frequency Spectrum The U Reverse Sort Machine Listings U - Revision de novo A U Computer working aids D'Imperio Mary Vol XVIII No 1 Winter 1973 Wray W D Vol I No 3 Cryptanalysis October 1956 RF Interference Phenomenon and Intelligence Applications Vol XXIII No 4 Fall Collection u 1978 Rocheford's Cipher A Discovery Gaddy David W in Confederate Cryptography Vol XVIII No 4 Fall 1973 Civil war Cryptologic history Rocket Motion and Newton's Second Law U Fall 1960 Rocket motion Role of Carrier VCh Telephony in Soviet World War I1 Strategic Communications U Vol XIX No Communications 3 Summer Soviets 1974 U - I Cryptologic history Room 40 Compromise The U Meyer Joseph A Vol XXV No 1 Winter 1980 Rosetta Stone and Its Decipherment The U Rotation Problem in Pattern Recognition The U Vol XVI No Cryptologic history 1 Winter Rosetta Stone 1971 Callimahos Lambros D I I Vol VII No 1 Winter 1962 Pattern recognition Author Title Reference Keyword Roughness of Visitations in a Markov Chain The U Vol VIII No Mathematics 2 Spring 1963 Russian Diamond A CU Vol XII No 2 Spring 1967 Russian navy codes RYE a n Extended Capacity Vol IX No 2 May 1964 Computer programming Scaling Matrix for the Analog Computer U Vol VII No 1 Winter 1962 Computer programming Scheduling Function in a TimeSharing Environment The U Vol XVI No Computer systems 2 Spring 1971 Science and Cryptology U Vol 111 No 3 July 1958 ScientXc and Engineering Information Management in the Department of Defense U Vol X No 2 Information Spring 1965 management Scoring Function and Its Distribution A U Vol XIII No Mathematics 4 Fall 1968 Remote Access System U Security Architecture in SrGrNT Collection and Processing U Selected SIGINT Intelligence Highlights U Meyer Joseph A Vol XX No 1 Winter Jr 1975 Tordella Louis Cryptology Science Collection Security Vol XIX No SIGINT 4 Fall 1974 Fall 1960 Personnel A Man-Machine Communication System for ELINT Data U Vol WII No 4 Fall 1963 ELINT Sequential Least Squares Estimates U Vol XII No 2 Spring 1967 Mathematics Setwise Transitive Groups U Vol X No 2 Spring 1965 Mathematics SIGINTComputer Processing in Vol XXII No 2 Spring 1977 Computer processing Selection and Placement of Cryptanalytic Personnel U SELLNOW - the 1980's U DOCID 3 0 2 0 9 5 6 9 Title 3 I 9 8 Author 5 8 Reference Oceanography U Meyer Joseph A Vol XII No 4 Fall 1967 SIGINT System Logic U Unknown SlGINT Implications of Military 9 Keyword Oceanography Vol X No 2 SIGINT Spring 1965 b 3 - P L 86-36 srG1N ingwith SACO Experiences with the Rice Paddy Navy U Vol XXI No Cryptologic history 1 Winter 1976 Signals from Outer Space U Sputnik Vol 111 No 2 April 1958 Simple Homogeneity Test Using Log-Factors A U Vol VIII No Ciphers 4 Fall 1963 Simple Test for Slide or Kick A Vol VIII No 4 Fall 1963 Mathematics U Simplified Exposition of a New Cycle Search Technique U Vol I No 1 April 1956 Teleprinter cipher analysis Simulation of Cryptoprinciples Special Communicatio 40 3 Council of security jb 3 1 - 1 9 usc 798 Learned 0 1 3 - P L 86-36 Organization Issue 1972 i i - U Simultaneous Error Insinuation in Electronic Cipher Machines U J E ' I Meyer Jweph A Vol XIV No Cipher machines Vol XXI No Cryvtologic history 1 Winter Six Characteristics of Information Handling Systems U Vol XIV No Information systems 3 Summer 1969 Six Point Program for Improved Gerson Intercept Part I U Nathaniel C Vol VII No 3 Summer 1962 Intercept Sliding Strips Additive Subtractive and Minuend U Vol XI No 2 Spring 1966 Cryptanalysis Slow Look at Fast Transforms A U Special Fast Mathematics Fourier Issue August 1973 DOCID 3020956 Title I Author Reference Keyword So You Want to Correlate U Vol X No 2 Waveform Spring 1965 recognition Software Maintenance -The Other Side of Acquisition U Vol XXIII Software maintenance No 3 Summer 1978 Solution of a Fractionated Monome-Dinome System U Vol 11 No 2 April 1957 Solution of a Polyalphabetic Monome-Dinome System U Lutwiniak William Cryptanalysis Vol I No 3 Cryptanalysis October 1956 I Vol 111 No 1 January 1958 Cryptanalysis Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs U Vol I No 2 July 1956 Encipherment Solution of the Japanese PURPLE Friedman William F Machine The U Vol XIX No Cryptologic history PURPLE machine 1 Winter 1974 Solution of VEJX-0 or the Uses of Lutwiniak William Delta U Vol XVIII No 2 Spring 1973 Solving a Playfair Cipher by Computer U Vol XIV No Computer 4 Fall 1969 cryptanalysis Solution of Additive-Minuend Busts U Cryptanalysis Some Applications of Information Theory U Kullback Solomon Vol I No 1 April 1956 Information theory Some Applications of the ChiSquare Test in Cryptanalysis Callimahos Lambros D Vol XIV No 4 Fall 1969 Cryptanalysis U Some Contributions towards a Course in COMINT Translation U Vol XVI No Translation 3 Summer 1971 Some Cribbing Techniques U Vol XXIII Cribbing techniques No 1 Winter 1978 Some Formulas concerning Bulges of Combining Functions U Special Fast Mathematics Fourier Issue August 1973 Some Graphical Display Techniques for Fourier Analysis Special Issue Computer graphics January 1971 U1 DOCID 3020956 Title REF IDzA398598 9 - Author Reference Keyword U Vol VIII No Chi-squares 3 Summer 1963 Some Noks on Information Theory U Vol IV No 1 January 1959 Information theory Some Observations on Computer Aids to Indicator Recovery U Vol XVII No 4 Fall 1972 Cryptanalysis Vol IV No Mathematicians Some Notes about Chi-square Some of My Best Friends Are Mathematicians U Lewis Frank W Some Principles of Cryptographic Security U Tiltman John H Brigadier 2 April 1959 Vol XIX No Cryptographic 3 Summer security 1974 Vol XI No 1 Winter 1966 Some Problems and Techniques in Bookbreaking U Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses U Salemme Arthur Fall 1960 J Bookbreaking Machine translation Some Properties of Sample Bulges U Special Fast Mathematics Fourier Issue August 1973 Some Properties of the TwoState First-Order Markav Chain U Vol IX No 4 Fall 1964 Vol XIII No Vocoders 2 Spring 1968 Some Recent Vocoder Studies a t the National Security Agency U Some Reminiscences U Tiltman John H Vol XI No Brigadier 3 Summer 1966 Vol XI No 3 Summer 1966 Some Thoughts concerning Traffic Analysis Mechanization u Something May Rub Mf U Soviet Communications Journals as Sources of Intelligence U Information transmission Lewis Frank W I Cryptanalysis Traffc analysis Vol X No 1 Cryptanalysis Winter 1965 Vol IX No 3 August A 1964 Communications Soviet USC 403 USC 798 Title Author Reference Keyword i Vol XXV No 4 Fall 1980 - 4 Fall 1971 Soviet Science and Technology Present Levels and Future Prospects U Spacecraft Passenger Television from Laika to Gagarin U Sinkov Abraham Vol IV No 1 January n I I 1959 Science and technology Soviet Vol XXI No Space flights 2 Spring 1976 Spanish Languages The U Vol XIII No Spanish language 1 Winter 1968 Speaker Identification by Machine Where Do We Stand U Gurin Jacob Vol XIV No Speaker 4 Fall 1969 identification Special Felix System The U Kullback Solomon Vol IV No 2 April 1959 Special Purpose C r y p W l y t i c Computers State of the Art U German code VOI XXIII Computers No 1 Winter 1978 A New AND OR NOT Language for Use with Computers U Vol XII No 1 Winter Spectral Analysis and the Fast Fourier Transform U Vol XIV No Mathematics 1 Winter 1969 Spoken Russian The Other Grammar U Vol XIV No Russian language 3 Summer SPECOL Computer language 1967 1969 Spread Spectrum System Jamming Response U Vol XXII Signals Spread spectrum No 3 Summer 1977 Standard for Evaluating the Intelligence Content of Equipment Emanations U Vol IX No 3 August 1964 Equipment emanations REF ID A398598 DOCID 3020956 b 3 -P L Author Title Reference Keyword Statistical Description of the Noise and Emitter Environment A U Vol X No 4 Collection Fall 1965 Status of Optical Logic Elements for Nanosecond Computer Systems U Vol V111 No Computers 3 Summer Stirling Numbers of the Second Kind U Vol 111 No 1 January 1963 Stirling numbers 1958 Strategic Warning An Intelligence Gap That NSA Might Fill U Vol XVIIE Strategic warning No 3 Summer 1973 Strategy for Program Decomposition for a Distributed Pipeline A U Vol XXII No 4 Fall Strength of the Bayes Score The Vol XVlI Mathematics No 1 Winter Mathematics 1977 U 1972 Study of Character-Handling by Computer a t NSA A U Vol XIV No Computers 2 Spring r 1969 Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions U Study of Japanese Nominalization A U VoJ XIV No Signals 2 Spring 1969 I Subnanosecond Instrumentation U Vol XXIII Japanese No 2 Spring language 1978 Vol IX No 1 Winter Pulses 1964 Substantive Analysis U Vol IV No 2 April 1959 Supporting the Support Facilities U Vol XVIII Computer test No 3 equipment Summer 1973 I Survey of Bent Functions A U Analysis Special Fast Mathematics Fourier Issue August 1973 86-36 DOCID 3020956 Reference Author Title 1' Keyword - I atherafiik Survey of Multinomial Vol XX No Estimation for Code Weighting A U 3 Summer 1975 Survey of the Distance Problem A U Vol XVIII CryptoNo 2 Spring mathematics 1973 Survey of the Status of the Voice Problem A U Vol XII No 4 Fall 1967 e Symmetric A proximations to Boolean Func 'ons U Voice communications 1 Vol XIX No Mathematics 3 Summer 1974 Systems Approach to Training Radiotelephone Technicians The U Vol XVIII No 1 Winter 1973 Tail Probabilities for the Binomial Distribution U Vol VIII No Mathematics 3 Summer 1963 Take Care of Your Pennies Vol 111 No 1 January 1968 U Target in Space A U Special Council of Learned Organization Issue 1972 Technology of Future Powerful Personal Computers The U Telecommunications from the Tom-Tape to the Computer U Teletype Processing in the FROSTINGSystem U Communications Training Computers U sate ltes Vol XXV Computers No 3 Summer 1980 I Special CRlTICOMM Council of Learned Organization Issue 1972 Vol XVIII Signals processing No 2 Spring 1973 b i 1 b i 3 - 5 0 USC 4 0 3 bi 3 1 - 1 8 USC 7 9 8 bi 3 -P L 8 6 - 3 6 DOCID 3020956 REF IDzA398598 9 Title TEMAC Text Macro Compiler A Machine Language for Processing Text U TEMPEST Considerations in Automatic Data Processing Equipment Installations U Tetrahedral Plugging U Author D'Imperio Mary Reference Keyword Vol X No 3 Computers Summer 1965 Machine language and b 3 - P L 8 6 - 3 6 Computer and Information Science Issue Vol XIV No COMSEC TEMPEST 1 Winter 1969 Vol VIII No Ciphers 2 Spring Key 1963 Text Recognition Procedure for Cryptanalysis A U Vol XI No 3 Summer Cryptanalysis 1966 Textual Criticism and NSA U Vol XIV No Editing 3 Summer 1969 Theoretical Linguistics and Language Universals U Vol XXII No 2 Spring Linguistics 1977 Theory and Applications of Three-Way Multidimensional Scaling U Vol XXI No Cryptanalysis 2 Spring Theory of Secondary Testing The U Vol XIII No 3 Summer 1968 Cryptanalysis Thermal Noise U Vol VII No 3 Summer Electricity 1976 1962 Thin Film Shifting Matrix A U Vol VII No 4 Fall 1962 Currents Thin Film Thermocouple U Vol VII No 4 Fall 1962 Physics Third Revolution Prospects for Continued SIGlNT Productivity The U Vol XIII No srGINT 3 Summer productivity 1968 lbi 131-50 USC 403 Author Title Reference Keyword This Is a Recording U Vol XVII1 No 2 Spring 1973 This Matrix Business U Cryptanalysis Vol 111 No 2 April 1958 This Matrix Business Part I1 U Vol 111 No 4 December 1958 Thoughts about Systems and Program Design U Vol XVIII Computer No 2 Spring programming 1973 Threaded File Retrieval System U Vol XII No 2 Spring 1967 Thrusts and Boggles of Outrageous Escalation The VOCABUZARY SURYEY ATTHE Vol XIII No Vocabulary 2 spring 1968 A e c o k - 86 ' Cryptanalysis Document storage NATIONAL WAR COLLEGE U Vol XII No 2 spring 1967 Time Coordination of SCINT Sites U Time Is -Time Was -Time Is Past Computers for Intelligence U Intercept sites Vol X No 1 Artificial Winter 1 9 a intelligence and Computers Computer and Information Science Issue Campaigne Howard H Time-Element Scramble U Vol VII No 4 Fall 1962 Encipherment Speech privacy Times of Shadow Passage for Earth Satellites U Vol VIII No Satellite 3 Summer tracking IS63 Salemme Arthur Vol XIV No Russian 4 Fall 1969 Translation J Tour of Some Russian Translation Traps A U Vol XXIII 1 1 collection No 1 Winter and processing 1978 Trade-off Approach to Quality Intercept versus Quantity Intercept A U u1 Traffic Analysis on Sovie r a n s m i s s i o 1 Vol XIII No Traffic analysis 1 Winter 1968 -- p - REF ID A398598 DOCID 3020956 A Title I Author Reference Keyword Transient Analysis of Coaxial Cables Considering Skin Effect U Vol I No 2 July 1956 Coaxial cables b 31-P L 86-36 Transient Response of Tunnel Diodes with Resistive Loading Vol VII No 1 Winter 1962 Circuits Vol IV No 2 April 1959 Circuits Vol XI No 2 Spring 1966 Literature Translation Vol XXIV No 4 Fall 1979 Mapping U Transistor Phantastrons U Translation of a Classic A Matter of Ethics The U Gurin Jacob Transverse Mercator Projection The U Trends Developments and Pressures in SIGINT Reporting Today U Trots in Foreign Language Study U Oliver Donald B Vol XXI No MGINT reporting 1 Winter 1976 1 Vol 11 No 1 Language aids January 1957 and Special Linguistics Issue I Vol VIII No Tunnel Diode Characteristic Function Generator U Summer 1961 Computers Logic Tunnel Diode Dynamic Logic Module A U TUNNY Machine and Its Solution The U Computers 1 Winter 1963 Spring 1961 Brigadier Cipher machines Germany Turing's Contributions to Cryptology U Vol VIII No Cryptology 3 Summer Mathematics 1963 Two New Language Models U Vol XXIV Language modeling No 3 Summer 1979 Typewriter Key and the Stereotype The U Vol IV No 4 October 1959 Code groups DOCID 3020956 Title U S Program in Direction Finding A U I Author Gerson Nathaniel C I Keyword Vol X No 2 Direction finding Spring 1965 Wullenweber systems Spring 1961 Ciphers Cryptanalysis Under-Developed Languages Under-Utilized Computers U Vol XX No 1 Winter 1975 Computers LWPge UNNA -An Introspective Signal Processor U Vol XX No 2 Spring 1975 Signal processing U p g r a d q Selected U S Codes and Ciphers with a Cover and Deception Capability U Vol XXI No Ciphers 1 Winter Deception 1976 Use of Bayea Factors with a Composite Hypothesis U Vol IX No 4 Fall 1964 Use of Optical Density Measurements of Thin Films to Determine Vapor Distributions The U Vol VIII No Physics 3 Summer 1963 Use of Production Methods in Reading Transposed Letter Codes U Vol II No 1 Codes January 1957 and Special Linguistics Issue Use of Special Identification Techniques SIT in the Solution of Specific SICINT Problems The U Vol XII No 4 Fall 1967 Use of the B-Coefficient in Information Retrieval The U Vol XIII No Information 4 Fall 1968 retrieval UTIL of English A Study of the Quality of SIGINT Product U Vol XVII No 4 Fall 1972 Utilization of Code Limitations in Solving Bust Messages U January 1960 Codes and Special Linguistics Issue Unbreakable Cipher The U Output String Campaigne Howard H Reference Cryptanalysis Signal identification SIGINT reporting Vol XXI No Mathematics 4 Fall 1976 - - - '1 REF IDzA398598 DOCID 3020956 I Title Author Reference Keyword ' b 3 - P L Variance of the Number of Ones in a Derived Stream of Zeros and Ones U Vol XII No 2 Spring 1967 Mathematics Verified Intercept Predictions U Yol XII No 1 Winter 1967 Intercept A New Information Storage System U Vol XIII No Informstion storage Video VIDEOFILE Viet Minh Cover Terms and Their Solution U Vol IV No 3 July 1959 and Special Lingxiistics Isssue Viet Minh cover terms Voice Problem The U Special Council of Learned Organization Issue 1972 Voice communications Voynich Manuscript Revisited The U Vol XXI No 3 Summer 1976 Voynich Manuscript Vol XII No 3 Summer 1967 and Special Linguistics Voynich Manuscript Gaddy David W I -1 Voynich Manuscript The 'The Most Mysterious Manuscript in the World U Tiltman John H Jr Brigadier Waiting Times for Polygraphic Repeats U 86-t Vol XXIV Cryptomathematics No 2 Spring 1979 Vol XIII No 1 Winter 1968 Introduction WARsAN I1 - An Implementation Cipher machines Special Issue Digital signals January 1971 analysis of the FFT and Other Tools for Digital Signals Analysis U Way the Ball Bounces The An Experiment in Deconvolution Filtering U Special Issue Mathematics January 1971 I Weather or Not - Encrypted U Vol XII No 4 Fall 1967 COMSEC North Vietnam I g8 DOCID 3 0 2 0 9 5 6 Author Title Reference Keyword b 3 - P L Weather Its Role i n Communications Intelligence U Vol 111 No 3 July 1968 eathei What Is Good TraCfic Analysis U Vol XXIV No 4 Fall Tfaffic analysis What Next Dr Trithemius U Lewis Frank W Vol XI No 4 Fall 1966 Cryptanalysis Whole New World of Speech A Or Maybe 1984 Will Be a Good Year After All U Vol XXI No 4 Fall 1976 Keyword recognition Why Analog Computation U Vol VII No 3 Summer Analog computers 1979 1962 Wideband and the SlGINT System U Vol VIII No Intercept 4 Fall 1963 Will the Real 53 Stand Up U Vol XIX No Cryptanalysis 1 Winter 1974 Vol XXV Communications No 2 Spring Modems 1980 and Special Mathematics and Engineering Issue 1981- Wireline Modem with Harmonic Distortion Equalization A U 1983 Vol XII No 1 Winter With Love and Parentheses from Peking U Chinese language Codes 1967 Gurin Jacob Words and the Intelligence Value of Conversations U Word Spotter A U Vol XXIII No 2 Spring 1978 Language Vol IV No 4 October Computers 1959 Work Breakdown Structure A Better Implementation to Manage Software Overruns U 1-1 Vol XXV g F U Software acquisition 86- REF IDrA398598 DOCID 3020956 - Title - Author Reference Keyword Worldwide Language Problems at NSA U Voi XIII No Language 4 Fall 1968 training Writing Efficient FORTRAN U Vol XVII FORTRAN No 2 Spring 1972 ZFlags in Hagelin Cryptanalysis U Fairbanks Sydney Vol IX No 1 Winter 1964 Cryptanalysis Ib 3 - p L - -- - - _ _ _ _ _ _ - -__ AL DOCID 3020956 REF ID A398598 R Y 2 NSA Technical Journal AUTHOR INDEX 3 h DOCID 3020956 b i 11 b 3 -5CUSC 403 b 13 -P L 86-36 b 3 -P L 86-36 N S A Technical Journal Indexed by Author V O IX NO 2 May1964 ELINT I Signalanalysis Fourier Coefficients and Function Decomposition U Special Fast Mathematics Fourier Issue August 1973 Use of Optical Density Vol VIII No Physics Signals from Outer Space U Vol 111 No 2 April 1958 Sputnik Communications Intelligence Vol 11 No 2 April 1957 COMINT Data Standards for StGINT Vol XVI No Data standardization Mechanization Systems and a New Look a t Management and Organization U Vol VII No 2 Spring 1962 Management Number of Components in Random Linear Graph The U Vol IV No 2 April 1959 Cryptanalysis Model 204 - The Analyst's Vol XXI No Analysis 3 Summer Computers 1976 Intercept i I Random and Algebraic Vol XXIII Mathematics Coverings of Binary Vectors U No 3 Summer 1978 and Special Mathematics and Engineering Issue 19811983 i I I 1 i I 1979 I I 59 I DOCID 3 0 2 0 9 5 6 b 3 - P L 0 8 36-36 Author Title Reference Keyword On Cipher U January 1960 Ciphers This Is a Recording U Vol XVIII Recording No 2 Spring 1973 Computer Program Debugging A New Era U Vol XIII No Computers 2 Spring Debugging 1968 and Special Computer and Information Sciences Issue Theory of Secondary Testing The U Vol XIII No Cryptanalysis 3 Summer 1968 Communications Can We Lick the Voice Problem Vol XVII Russian U No 3 Summer 1972 - Deposited Films Magnetic Elements for the Memory of the Future U Vol I No 3 Films October 1956 Storage Fast Dynamic Programming Vol XXI No Mathematics Algorithm and Its Mathematical 1 Winter 1976 Basis A U Measurement of Insecurity for Imperfect Erasure A U Degaussing Vol XXII No 1 Winter Tape storage 1977 Estimating the Number of Solutions in GF 2 lnofa System of Equations over the Integers U Vol VIII No Mathematics 3 Summer 1963 In General th4-Iteration Convergesw- Vol XII No 1 Winter 1967 On the Maximization of X'AX over the Vertices of the Cube u Vol VIII No Cryptanalysis 1 Winter 1963 Systems Approach to Training Radiotelephone Technicians The Ul Vol XVIII No 1 Winter 1973 Mathematics Communications Training DOCID 3 0 2 0 9 5 6 -98598 b 3 -P L 86-36 Author I Reference Title Study of Japanese Nominalization A u Linearly Induced Nonlinear Cycles U Keyword Vol XXIII Japanese No 2 Spring language 1978 Vol XXII No 4 Fall Mathematics 1977 Vol XXIV Signal theory Generalizations of MaximumEntropy Pattern Analysis U No 2 Spring 1979 Some Thoughts concerning Vol XI No Traffic Analysis Mechanization 3 Summer U 1966 Integrated and Guided Wave Optics and Device Applications Vol XXIV No 2 Spring 1979 and Special Mathematics and Engineering Issue 1981- Tr c analysis Optics Signals processing 1983 Potential of Interactive Computer Programs in the Decryption Process of SIGINT The 4P0WtW Vol XXV No Computers 3 Summer Cryptanalysis 1980 SIGINT Bipolar Coding and Baseband Recovery U Vol XII No 1 Winter Basebands Codes 1967 i Another Derivation of Binary Error Rates a s a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes Vol X No 3 Collection Summer 1965 Signal-to-noise ratio U Noise Communication Technique for Speech U Vol VII No 4 Fall 1962 Communications Preamble for Push-to-Talk Ciphony A U Vol XII No 2 Spring Communications 1967 I System for Tropospheric Scatter A U RAKE Vol X No 4 Collection Fall 1965 DOCID 3020956 b 3 - P L 86-36 Author I Title Reference Keyword Computers Manual morse Transcription Transcription of Manual Morse U Vol 111 No 3 July 1958 Inexpensive Device for Pictorial Input and Output An U January 1960 Computer graphics On Cryptanalysis and Redundancy U Vol IV No 3 July 1959 Cryptanalysis On Operatorless Computers U Vol I No 1 Computers April 1956 Storage Program for Correcting Spelling Vol IV No 4 October Errors A U 1959 Computers Take Care of Your Pennies Vol 111 No 1 January 1958 Computers Vol XII No 2 Spring 1967 Document storage U Euclidean Algorithm and Distances between Wheel Settings The U Vol VIII No Cryptanal ysis Mathematics 1 Winter 1963 U Threaded File Retrieval System Vol XXI No Fast Dynamic Programming Algorithm and Its Mathematical 1 Winter 1976 Basis A U Mathematics Generation of Permutations U Vol IX No 2 May 1964 Cryptography Time-Element Scramble U Vol VII No 4 Fa11 1962 Encipherment Speech privacy Maya Astronomical Computer The U Vol XXII Astronomy No 1 Winter Cryptologic history 1977 Application of Queuing Theory to Computer Systems An U Vol XIV No Computers 2 Spring Queuing theory 1969 Book Review Lincos Design of a Language for Cosmic Intercourse Part I U Vol VII No 1 Winter 1962 I Book review Communications Extraterrestrial intelligence Cosymmetric Approximations to Vol XVI No Mathematics 4 Fall 1971 Combining Functions U REF IDgA398598 DOCID 3020956 h 3 -tl 6 Rh-36 Title Author Reference Enumeration of the Square Permutations of the Symmetric Group U - Optical Data Processing A Cryptanalytic Perspective U Vol XVIII No 4 Fall Keyword Cryptomathematics 1973 Vol XX No 3 Summer 1975 Cryptanalysis Data processing Recovering the Structure of a Linear Shift Register U 4 Fall 1969 Degrees of Freedom in an N-bit Frequency Distribution U Vol I No 1 April 1956 Frequency Distribution Hill Climbing U Vol X No 4 Fall 1965 Mathematics Penney-Ante U Vol XII No 1 Winter 1967 Cryptanalysis Recurrent Events and Baudot Streams U Vol 11 No 2 April 1967 Baudot streams CRISP1 U V O X NO 1 Computers Winter 1965 On-line processing TEMPEST Considerations in Vol XIV No COMSEC 1 Winter TEMPEST Automatic Data Processing Equipment Installations U Thin Film Shifting Matrix A Vol XIV No Cryptanalysis 1969 Vol VII No 4 Fall 1962 Currents U Privacy and Protection in Operating Systems U Vol XVIII No 2 Spring Operating systems Privacy 1973 Application of Fourier Transforms to Combiners U Special Fast Mathematics Fourier Transform Issue August 1973 Distribution of the Maximum Bulge in a Flat Random Binary Stream The U Vol VII No 4 Fall 1962 Mathematical Analysis of Jitter in a Digital Frequency Source Vol VIII No Frequency 2 Spring u Binary stream Probability 1963 Simple Homogeneity Test Using Vol VIII No Ciphers 4 Fall 1963 Log-Factors A U DOCID 3 0 2 0 9 5 6 Author I Title Introduction to the Fast Fourier Transform An U IBook Review Lo Languages I Multipath Differential Doppler Keyword Reference Special bsue Computers January 1971 Mathematics Fall 1960 Book review Cryptology Vol XXI No 3 Summer 1976 Signals I Vol X No 2 Scientific and Engineering Information Management in the Spring 1965 Department of Defedse U Information management 11 Some Graphical Display Special Issue Computer graphics Techniques for Fourier Analysis January 1971 1 iu Teletype Processing in the FROSTING System U Vol XVIII No 2 Spring 1973 Signals processing ABC of Ciphony The U Vol I No 2 July 1956 and Special Linguistics Issue Ciphony Coding Processing Sials Part I U Vol XI No 3 Summer 1966 Bookbreaking Code Bookbreaking Improvisations Part 11 U Vol XI No 4 Fall 1966 Bookbreaking Code Faithful Mirror The U Vol XIV No 1 Winter 1969 Bookbreaking Red China's Drive for Literacy Vol XVI No 2 Spring 1971 Communist China Vol XXIII No 4 Fall 1978 Collection 11 Bookbreaking Improvisations - U RF Interference Phenomenon and Intelligence Applications U Vol XIII No Communications Linguistic Canonical Forms Tools for Analytic Progress U 1 Winter L ww3e 1968 and Special Linguistics Issue 11 REF IDzA398598 DOCID 3020956 Title Author Reference Keyword Vol XVII Language identification Note on the English VCCCC No 1 Winter Pattern or Maximum PostVocalic Consonant Clustering in 1972 Monosyllabic English Words A U I Computer Automation of Circuit Vol VII No Analysis U 4 Fall 1962 Introduction to Semiconductor Physics and Diode Theory U Vol 11 No 2 April 1957 Circuit analysis Computers Electronics Vol XIV No Cryptanalysis 2 Spring Plain text 1969 Callimahos Lambros D 1 Book Review Cryptanalysis of the Single Columnar Transposition Cipher U Book Review The Broken Seal U Communications with Extraterrestrial Intelligence IU Summer 1961 Book review Cryptanalysis Vol XII No 3 Summer 1967 Book review Cryptologic history Vol XI No 1 Winter 1966 Communications Extraterrestrial intelligence Cryptanalyst's Nightmare An Oneiric Problem and Its Solution A U1 Vol XVI No Ciphers 4 Fall 1971 Cryptanalysis Cybernetics and Problems of Diagnostics the Parallels between Medicine and Cryptanalysis U Vol XIV No Cryptanalysis Information analysis 1 Winter 1969 De Profundis or the ABC of Depth Reading U Vol 11 No 1 Cryptography January 1957 Monoalphabetic substitution Vol XIX No Cryptologic history 1 Winter 1974 I 1 Introduction to IBM Methods in Cryptanalysis An U Vol 11 No 3 Cryptanalysis July 1957 Introduction to Tiaffic Analysis Traffic analysis Vol 111 No 2 April 1958 U I No Not Again U Vol I No 1 April 1956 Ciphers 9 DOCID 3 0 2 0 9 5 6 Author 9 I 1 Title On Key Analysis U 8 Reference Keyword Vol XIX No Cryptanalysis 4 Fall 1974 Q E D -2 Hours 41 Minutes U Vol XVIII Ciphers No 4 Fall 1973 Campaigne Howard H Cipher machines Representative Machine Cipher Systems U Vol 111 No 1 January 1958 Rosetta Stone and Its Decipherment The U Vol XVI No Cryptologic hiatory Rosetta Stone 1 Winter 1971 Some Applications of the ChiSquare Test in Cryptanalysis b U Vol XIV No Cryptanalysis 4 Fall 1969 - Aristocrat An Intelligence Test for Computers U Vol VII No 2 Spring 1962 Computers Cryptanalysis Book Review Analyses of the Case n 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet Jourml fur die 'Reine und Angewandte Mathematik U Vol IX No 3 August 1964 Book review Cryptanalysis Book Review How to Estimate Probabilities Journal of the Institute of Mathematics and Its Application U Vol XII No 2 Spring 1967 Book review Mathematics Book Review Involutory Commutants with Some Applications to Algebraic Cryptography I Journalfur Reine u d Angewandte Matkmatik U Vol XII No 1 Winter 1967 Book review Mathematics Book Review Mechanical Resolution of Linguistic Problems U Vol 111 No 4 December 1958 Book review Computers Book Review Military Cryptanalytics Part I1 U Vol IV No 4 October 1959 Book review Cryptanalysis L kruaee Military DOCID 3020956 Author REF IDzA398598 Title Reference Keyword Book Reuiew Some Further Methods in Algebraic Cryptography Journal of the Mitchell Scientific Society No 74 U Fall 1960 Book Review Variable Matrix Substitution in Algebraic Cryptography U Vol IV No 4 October 1969 Distribution of Letters in Short Messages of English The U 2 Spring1969 Plaintext Mathematics Book review Cryptography Vol XIV No Ciphers Extraterrestrial Intelligence U Vol XI No 2 Spring 1966 I Book review Communications Extraterrestrial intelligence Key to the Extraterrestrial Messages U Vol XIV No Communications 1 Winter Extraterrestrial 1969 intelligence LIGHTNING U Vol IV No 3 July 1959 Computers Null Hypothesis The U Vol I No 2 July 1956 Cryptology Reading TUNNY U Vol VII No 4 Fall 1962 Cryptologic history Germany Research a t NSA U Vol XIII No Research 2 Spring 1968 Time Is -Time W a s - Time Is Past Computers for Intelligence Vol X No 1 Artificial Winter 1966 intelligence and Computers Computer and Information Science Issue Unbreakable Cipher The U Spring 1961 Ciphers Cryptanalysis Vol XI No 4 Fall 1966 Cryptanalysis Mathematics I I I I Coupon Collecting and Cryptology U I Special Fast Mathematics Fourier Issue August 1973 Composition of Boolean Functions I U 67 'b 3 - P L 6 86-36 DOCID 3 0 2 0 9 5 6 Author - I Title Reference Keyword - Generating Function Approach to CRETAG A U Vol XXII ' Mathematics No 1 Winter 1977 Matric Recursions U n Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters U Vol XXII Mathematics No 3 Summer 1977 Vol XIII No 4 Fall 1968 and Special Mathematics and Engineering Issue 19811983 FIR A CDC 1604 Program for Solution of Systems of Linear Equations U Filters Frequency - Vol X No 1 Computer Winter 1965 Mathematics Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs U Vol I No 2 July 1956 Composition of Boolean Functions I U Special Fast Mathematics Fourier Issue August 1973 Composition of Boolean Functions I1 U Special Fast Mathematics Fourier Issue August 1973 Distribution of Letters in Short Messages of English The U Vol XIV No 2 Spring Encipherment Ciphers Plain text 1969 I Distribution of C bd a fl The Solution of Additive-Minuend Busts U Special Fast Mathematics Fourier Issue August 1973 Vol 111 No 1 January Cryptanalysis 1958 Contextual Testing in Establishing Minimum Working Level Language Proficiency U Vol XXV Language proficiency No 1 Winter Testing Voynich Manuscript Revisited The U Vol XXI No Voynich Manuscript 3 Summer 1980 1976 - - - - ibl ill DOCID 3020956 h 3 - 5 0 USC 403 REF IDtA398598 b l 31-18 usc 7 9 8 9 bl 3 - L 86-36 ibi 3 -P L 86-36 Author 1 Title Reference Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals The U Vol XXIII No 2 Spring 1978 I Keyword Morse Signals Vol XVI No Signals analysis Frequency Analysis of a Set of Harmonically Related Tones U 1 Winter 1971 African Language Problem a t NSA The U Vol XI No 3 Summer 1966 African language I Vol XII No 1 Winter 1967 Cryptanalysis Magic Digraphs U Spread spectrum Vol XXV No 1 Winter Ism Wireline Modem with Harmonic Vol XXV Distortion Equalization A UI No 2 Spring 1980 and Special Mathematics and Engineering Issue 19811983 Communications Modems Traffic Analysis on Sovie N O r a n s m i s s i o n 1968 Traffic analysis 1- Note on a Solution of a Polyalphabetic Dinome System A U Voi I No 3 Ciphers October 1956 Variable-Length Output String Vol XXI No Mathematics 4 Fall 1976 Vol IX No Encryption 3 August 1964 3 - Electrical Design of Random Sequence Generators U One Model for an Artificial Ionosphere U Vol XI No 2 Spring 1966 Radio intercept Trade-off Approach to Quality Intercept versus Quantity Intercept A U Vol XXIII SICINT collection No 1 Winter and processing 1978 DOCID 3 0 2 0 9 5 6 m r n 3 9 8 5- 9 8 Title Author Control of Reference Vol XVII No 2 Spring 1972 Keyword Computer programmnig Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System U Vol XII No Signals 4 Fall 1967 TEMPEST Cluster Analysis Introduction to Models and Methods U Vol XXII Mathematics No 2 Spring 1977 Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling The Vol XXI No Cryptanalysis 4 Fall 1976 U Introduction-toStatistical Pattern Recognition U Vol XXII Pattern No 3 recognition Summer 1977 and Special b i I 1i Mathematics b 3 -5@usc4 C 3 b 3 -1E USC 798 and b 3 - P L 8 6 - 3 6 Engineering Issue 19811983 Investigation of Nonrandom Features in the Optical Fourier Transform of Shift Register Sequences and Binary Key An Vol XfX No Crypto4 Fa11 1974 mathematics U Investigation of Techni ues for td1of h Vol XX No 4 Fall 1975 Theory and Applications of Three-Way Multidimensional Scaling U Vol XXI No Cryptanalysis 2 Spring 1976 CANDEW A Methodology for Evaluating tlF C ollection Potential 11 Vol XXII HF collection No 3 Summer 1977 Support System The U1 Software support Voi Y XII No 2 Spring Soviet 1977 CAPER %ftw irt Signals Soviet DOCID 3020956 Author 9 9 8 Title 5 9 8 Reference Key word - - On the Expected Number of Random Stops Corresponding to a Given Menu U Vol VIII No Cryptanalysis 1 Winter 1963 Thin Film Thermocouple U Vol VII No 4 Fall 1962 Application of Human Factors to Vol XXIV the Specification and Design of No 4 Fall Interactive Computer Systems 1979 U Physics Computers Human factors Data Standardization and the Trace Factor U Vol XVI No Data standards 2 Spring Information 1971 management Some Properties of Sample Bulges U Special Fast Mathematics Fourier Issue August 1973 Wideband and the SIGINT System U Vol VIII No Intercept 4 Fall 1963 Linear and Quadratic ElectroOptic Effects Pockels and Kerr Effects U Vol IX No 4 Fall 1964 Optics Vol IV No Random variables Approximation of Central Limits 4 October 1959 Exact Markoff Probabilities from Oriented Linear Graphs U Vol 11 No 3 July 1957 Mathematics Stirling Numbers of the Second Kind U Vol 111 No 1 January 1958 Stirling numbers Survey of Multinomial Estimation for Code Weighting A U Vol XX No 3 Summer 1975 Mathematics Transient Analysis of Coaxial Cables Considering Skin Effect U Vol I No 2 July 1956 Coaxial cables Some Properties of the TwoVol IX No State First-Order Markov Chain 4 Fall 1964 U Information transmission DOCID 3020956 tb 3 - F L 98 1 b 31-50USC --I Author 403 b 3 -18 USC 798 86-3n I Title 1 Reference Keyword Software Maintenance -The Vol XXIII Other Side of Acquisition U No 3 maintenance Summer 1978 Vol XVI No 4 Fall 1971 Work Breakdown Structure A Vol XXV Better Implementation to No 4 Fall Manage Software Overruns U 1980 Software l vie navy Software acquisition On the Selection of Personnel for January 1960 Cryptanalytic Cryptanalysis U personnel Cryptanalytic personnel On the Selection of Cryptanalysts - Part 11 U April 1960 Real-Time Raster U Vol XXIV ELINT collection No 1 Winter 1979 1I Note on Product Sequences A Vol XVI No Mathematics 2 Spring 1971 Slow Look at Fast Transforms A U Special Fast Mathematics Fourier Issue August 1973 Survey of Bent Functions A U Special Fast Mathematics Fourier Issue August 1973 Experimental Approach ta an Environment Study in the HF Band U Vol VIII No Collection Signals 4 Fall 1963 Art of Automatic Bearing Instrumentation The U Vol XVIII No 4 Fall Mathematics 1973 Introduction to Psycholinguistics Paralinguistics and Kinesics An U Vol XII No 2 Spring Communications Introduction to the Methods of Thin Film Analysis An U Summer 1961 Thin film analysis 1967 DOCID 3 0 2 0 9 5 6 9 3 9 8 Title Author I 5 9 8 Reference Keyword IFF A New Branch c f Cryptology U Vol 11 No 4 IFF October 1957 Planes Low Weight Linear Recursions in Key U Vol VIII No Mathematics 1 Winter 1963 Hoopscotch U Vol XII No 2 Spring Games 1967 Scientific and Engineering Vol X No 2 Information Information Management i n the Spring 1965 management Department of Defense U Assignment of Storage Space in Rapid-Access Memory Systems Vol 11 No 2 Addressing Systems Memory April 1957 U Computer Sorting U Vol XIII No Computers 3 Summet 1968 Magnetic Core Memories U Vol 11 No 1 Computers January 1957 Memory Cribbing techniques Some Cribbing Techniques U Vol XXIII No 1 Winter 1978 D'Imperio Mary Hybrid Circuits U Vol 111 No 1 January 1958 Application of Cluster Analysis and Multidimensional Scaling to the Question of Hands and Languages in the Voynich Manuscript An U Vol XXIII Cluster analysis No 3 Voynich Manuscript Summer 1978 Application o the Voynich Manuscrlp An Ub vol XXIV No 2 Spring - 4 3 Circuits Voynic Manuscript Data Structures and Their Vol IX No Representation in Storage Part 3 August 1964 I U Computers Memory Data Structures and Their Vol IX No Representation in Storage Part 4 Fall 1964 I1 U Computers Memory DOCID 3 0 2 0 9 5 6 Author 9 I 8 Title Vol XXIV No 4 Fall 1979 Reverse Sort Machine Listings U Vol XVIII No 1 Winter 1973 Study of Character-Handling by Computer at NSA A U Vol XIV No Computers 2 Spring 1969 TEMAC Text Macro Compiler Vol X No 3 Computers Summer 1966 Machine language and Computer and Information Science Issue Growing Up with Computers a t NSA U ' ri I Computers SOLIS Computer working aids Special Computers Council of Learned Organization Issue 1972 Mathematics In General the PCAH Iteration Converges U Vol XII No 1 Winter 1967 Tunnel Diode Characteristic Function Generator U Computers Vol VIII No 1 Winter 1963 Symmetric Approximations to Boolean Functions U Vol XIX No Mathematics 3 Summer 1974 Operation Babel U Vol IV No 3 July 1959 Generalizations of Maximum- Vol XXIV Entropy Pattern Analysis U No 2 Spring 1979 Engstrom H T Keyword Human-Machine Interfaces for NSA Computer Systems U A Machine Language for Processing e x U t Eachus Joseph Reference I Computers Signal theory Science and Cryptology U Vol 111 No 3 July 1958 Cryptology Science Arithmetic of the Addition Generation Principle for Electronic Key Generators U Vol 11 No 3 July 1957 Mathematics u REF ID p398598 DOCID 3020956 A Author I Title Reference Keyword Arithmetic Qfa Generation Principle for a n Electronic Key Generator The U Vol 11 No 1 Mathematics January 1957 Arithmetic of the Linear Generation Principle for Electronic Key Generators The Vol 11 No 4 October 1957 Mathematics Arithmetic of the Multiplication Vol 11 No 2 April 1957 Generation Principle in the Koken Key Generator The U Mathematics U Book Review Some Applications of High Speed Computers to the Case n 2 of Algebraic Cryptography Mathematics of Computation Vol 15 No 75 U II II Fall 1961 Book review Mathematics Vol IVYNo Cryptanal ysis Number of Components in Random Linear Graph The U 2 April 1959 Vol 111 No 2 April 1958 Computers Sampling Collected Editorials of Sydney Fairbanks U April 1956 July 1959 Editorials Z-Flags in Hagelin Cryptanalysis U Vol IX No 1 Winter Cryptanalysis Random Walks with Restraining Barrier a s Applied II 1964 I I Communications Security and Computers Special COMSEC Council of Learned Organization Issue 1972 II Vol XXIII No 2 Spring 1978 and Special Mathematics and Engineering Issue 1981- Computers U Channel Modeling and Code Performance Evaluation U 1983 Channels Communications DOCID 3 0 2 0 9 5 6 9- b i3 -1 L 86-36 Author 1 Title Continued Fractions and Mills' Algorithm U I Filby P W Reference Vol XXV Mathematics No 3 Summer 1980 Gweeks Had a Gwoup for It The Vol XXI No 2 Spring U 1976 Book Review Norse Medieval Cryptography in Runic Carvings U I1 Keyword Eletchley Park Cryptologic history Vol XIII No Book review 3 Summer Cryptologic history 1968 UTIL of English A Study of the Quality of SICINT Product U Vol XVII No 4 Fall 1972 SIGINTreporting Precursor of Modern Communications Intelligence Vol 111 No 3 July 1958 Cryptologic history U Third Revolution Prospects for Continued SICINT Productivity The U Vol XIII NO srCrNT 3 Summer productivity 1968 Response of a Non-Linear Device to a n Emitter Environment in the High Frequency Spectrum The U Vol VIII No Signals 1 Winter 1963 Statistical Description of the Noise and Emitter Environment A U Vol XI No 4 Fall 1965 Collection I Vol XXII Computer graphics No 1 Winter I Special Advanced weapons Council of systems Learned Computers Organization Issue 1972 Example of Computer Graphics as Applied to Key Analysis An 1977 Computers and Advanced Weapons Systems U Vol XVIII No 1 Winter 1973 Computers Cryptanalysis Remarks concerning Substantialization U Vol IX No 4 Fall 1964 Mathematics - A Man-Machine Communication System for ELINT Data U Vol VIII No 4 Fall 1963 ELINT I SELLNOW REF ID A398598 DOCID 3020956 1 Author Title Reference Keyword I Matter Transmission U II Friedman William F Vol VIII No Cryptosecurity 1 Winter 1963 Automatic Signal Identification Special Issue Signal identScation January 1971 FDM Activity Detection U Vol XXI No 1 Winter 1976 Reference Patterns for Nearest Neighbor Rule U Signals analysis Vol XXII No 1 Winter 1977 Can Cryptologic History Repeat Itself U Vol XVIII Cryptologic history No 3 Summer 1973 Introduction to Cryptology -I An U Vol IV No 4 October 1959 Cryptologic history April 1960 Cryptologic history - Introduction to Cryptology 11 An U - Introduction to Cryptology 111 Fall 1960 An U I I FDM signals Cryptologic history - Winter 1961 - Summer 1961 Cryptologic history Introduction to Cryptology IV An i u i Introduction to Cryptology V An Ui I Introduction to Cryptology - VI An U Fall 1961 Cryptologic history Cryptologic history Solution of the Japanese PURPLE Vol XIX No Cryptologic history 1 Winter PURPLE machine Machine The U 1974 Gaddv David W 1 Rocheford's Cioher A Discovery Vol XVIII h 4 allin o n f e d e r a t r y p t o r-a No 1973 Viet Minh Cover Terms and Their Solution U Vol IV No 3 July 1959 and Special Linguistics Isssue Civil war Cryptologic history Viet Minh cover terms DOCID 3020956 98 6 Ib 3 1 - P L 86-36 I Author Title Multichannel Language Processing as a System U Vol XVII Rocket Motion and Newton's Second Law U Fall 1960 Correlation and Power Spectra of Randomly Sampled and Held I Reference Keyword Language processing No 4 Fall 1972 Rocket motion Vol XIV No Signals analysis 2 Spring 1969 XII NO Analysis of Sorting Techniques VO for Multiple Signal Intercept U 3 Summer 1967 COMINT target identification Vol XIV No Collection Cost-Effectiveness Study of Spectrum Surveillance Systems 3 Summer 1969 Gerson Nathaniel C Antipodal Propagation U Vol IV No 1 January 1959 Radio waves Transmitters CoMsEC a t IUD Sites- Vol VII No 4 Fall 1962 COMSEC Future Problems of Intercept U Vol VIII No COMINT 1 Winter ELINT 1963 Ionospheric Propagation U Vol 111 No 4 December 1958 Communications Ionosphere Intercept and Electromagnetics U Vol XX No 2 Spring 1975 Electricity Optics Intercept of USSR Missile Transmissions U Vol IV No 3 July 1959 Electromagnetics Missile radiation Interference and Intercept U Vol XVI No 1 Winter 1971 Intercept Noise I Polar Ionosphere The U Summer 1961 Ionosphere Physics Six Point Program for Improved Intercept Part I U Vol VII No 3 Summer 1962 Intercept REF IDzA398598 9 DOCID 3020956 Title Author U S Program in Direction Finding A U 1 Determination of Missile and Earth Satellite Trajectories from Radar Observations U Reference Key word Vol X No 2 Spring 1965 Direction finding Wullenweber systems April 1960 Earth satellite Orbits Vol XX No Geodetic Latitude and Altitude from Geocentric Coordinates U 1 Winter Astrodynamics Mathematics 1975 Least Squares Analysis of a Probability Matrix The U Vol IV No 1 January Mathematics 1959 Logarithmic Scoring and Preliminary Testing U Vol 11 No 1 Cryptanalysis January 1957 Maps and the Conversion of Gauss-KrQger Grid Coordinates Vol 111 No 1 January u 1958 Maximum Likelihood Estimation of an Orbit U Fall 1961 Mechanical Treatment of Fibonacci Sequences A U Vol 11 No 4 Cryptanalysis October 1957 Orbit Computation with the Vinti Potential and Universal Variables U Vol XIX No 1 Winter Orbit Fitting to Angular Data U Sequential Least Squares Estimates U Mapping Celestial mechanics Astrodynamics 1974 Vol XXI No Astrodynamics 2 Spring 1976 Vol XII No 2 Spring Mathematics 1967 Times of Shadow Passage for Earth Satellites U Vol VIII No 3 Summer 1963 Transverse Mercator Projection Vol XXIV No 4 Fall The U Satellite tracking Mapping 1979 I On the Expected Number of Random Stops Corresponding to a Given Menu U Vol VIII No 1 Winter 1963 Cryptanalysis DOCID 3020956 Title Author Characteristic Features of the Russian Language of the Last Decade U Reference Keyword Vol XI No 2 Spring 1966 Russian language ' The Case for Bad Grammar Vol IX No 2 May 1964 and Special Linguistics Issue bi 1 bi 3 -50 USC 403 b Z -13 USC 799 Vol XIV No Russian language 3 Summer 1969 Spoken Russian The Other Grammar U I Russian grammar Weather or Not - Encrypted U Vol XII No 4 Fall 1967 COMSEC North Vietnam Vol IX No 3 August 1964 Equipment emanations Book Review Basic Cryptologic Vol XI No 1 Winter Glossary C 1966 Book review Cryptology Standard for Evaluating the Intelligence Content of Equipment Emanations U I I Exact Markoff Probabilities from Oriented Linear Graphs I List of Properties of BayesTuring Factors A U Mickle-Muckle Principle in Hagelin Cryptanalysis The Vol 11 No 3 July 1957 Mathematics Vol X No 2 Spring 1965 Mathematics Vol IX No Cryptanalysis Hagelin machines U 4 Fall 1964 Roughness of Visitations in a Markov Chain The U Vol VIII No Mathematics 2 Spring 1963 Turing's Contributions to Cryptology U Vol VIII No Cryptology 3 Summer Mathematics 1963 COMINT Analysis and Reporting Vol XVII Analysis No 2 Spring COMINT Reporting 1972 on the Developing Nations U 1 Fourier Analysis on Finite Abelian Groups U Vol XXI No 3 Summer 1976 Mathematics Computer Generation of Unrelated Latin Squares U Vol X No 3 Cryptanalysis Summer 1965 Latin squares b i - P L DOCID 3020956 REF ID A398598 A A a Author I Title Reference Keyword Generating Random Characters on a Computer U Vol XII No 1 Winter 1967 Code generation Computers Rationale for and Preliminary implementation of HYPERCAN High Performance Cryptanalysis U Vol XXIII No 4 Fall 1978 Computers Cryptanalysis Special Computers Council of Learned Organization Issue 1972 Vol X No 2 Scientific and Engineering Information Management in the Spring 1965 Department of Defense U Gurin Jacob Information management Employment of Military Linguists U Vol XIII No 4 Fall 1968 and Special Linguistics Issue I1 Military linguists Layman's Guide to the Mysteries of Linguistics A U Vol XXIII Language No 1 Winter Linguistics 1978 Language Voice problem Nest of Dragons A The Voice Problem U Vol XXI No 1 Winter 1976 Possible Applications of Keyword Recognition in Voice Intercept U Keywords Vol XXII No 1 Winter Voice intercept 1977 Speaker Identification by Machine Where Do We Stand Vol XIV No Speaker identification 4 Fall 1969 U Translation of a Classic A Matter of Ethics The U Vol XI No 2 Spring 1966 Literature Translation Words and the Intelligence Value of Conversations U Vol XXIII No 2 Spring Language 1978 Maybe It's Related to the Phase Vol XVII No 4 Fall of the Moon U 1972 Callsign generation PRC DOCID 3020956 Author I I Title Reference Keyword Growing Up with Computers a t Special NSA U Council of Learned Organization Issue 1972 Use of Production Methods in Reading Transposed Letter Codes U Vol 11 No 1 Codes January 1957 and Special Linguistics Issue I Electron Beam Recording for Wideband Analog Signals U Computers Vol XIV No Recording 3 Summer Signals 1969 Optical Receiver The U Vol XIII No Optical receiver 2 Spring 1968 Recovery of Pre-Detection Signals in the Optical Receiver Vol XIII No 4 Fall 1968 Signals U Did Alexander Popov Invent Radio U January 1960 Radio Soviet Communications Journals as Sources of Intelligence U Vol IX No 3 August I Communications Soviet 1964 Combining Functions in Key Generators U Spring 1961 Keys Shift registers LVHF Propagation and Collection Techniques U Vol XVI No 4 Fall 1971 LVHF collection On Milking the Sacred Cow U Vol XVII No 2 Spring Collection 1972 On an Algorithm for Approximate Polybit Scoring Using Fourier Transforms U Special Fast Mathematics Fourier Issue August 1973 Electrical and Magnetic Properties of Computer Tape U Vol IX No 1 Winter I Range Dependence on System Temperatures U Digital recordings IBM 1964 Vol IV No 1 January 1959 Communications DOCID 3020956 Author 1 REF IDgA398598 9 Title Markov Chain -The Models with the Short Memories U I Reference Keyword Vol XVII Mathematics No 1 Winter 1972 Learn with BOOK U Vol XI No 3 Summer 1966 Light reading Hybrid Circuits U Vol 111 No 1 January 1958 Circuits Low Cost Process for Printed Circuits A U Vol 11 No 1 Circuits January 1957 Modifhation of a Phantastron Genetator A U Vol IV No 4 October 1959 New Mode of Operations in Junction Transistors A U Vol 11 No 3 Circuits July 1957 Transistor Phantastrons U Vol IV No 2 April 1959 Circuits Vol IV No 3 July1959 Communications Deception I Cover and Deception U Circuits b O A New Approach to the One-Time Pad A U Vol XIX No Ciphers 3 Summer One-time pads 1974 Problem Solving with On-line Systems U Special Council of Learned Organization Issue 1972 Reliability and Checking in Computing Systems U Vol 11 No 4 Computer October 1957 diagnostics Threaded File Retrieval System Vol XII No 2 Spring 1967 Document storage Vol IX No 3 August 1964 Cryptanalysis Mathematics Vol XVI No 3 Summer 1971 Cryptomathematics U Cryptanalytic Applications of Sequential Analysis U I Multiple Hypothesis Testing and the Bayes factor U On-line systems Problem solving DOCID 3020956 Author Reference Title - - Keyword -- Vol XIII No Mathematics 4 Fall 1968 Distribution A U 1 Vol XVI No Cryptologic history 2 Spring Vietnam Project EXPMRER' U 1971 Introduction to Computer Binary Arithmetic An U Vol 111 No Computer 2 April 1958 Mathematics Assignment Algorithm Applied to Manual Cryptosystems U Vol XX No 1 Winter Computers Cryptanalysis 1975 Introduction to Hairpin Registers U Vol XX No 1 Winter Cryptovariables 1975 for Operation Dialect A Data Type for the Person-Machine Interface U Vol 11 No 2 April 1957 Vol XXII Computers No 2 Spring 1977 Extensible Model of a Hand Cryptosystem An U Vol XXIII Computers No 1 Winter Cryptanalysis 1978 I FUZZY An Evolutionary Model for Data Structures U 2 - GEE System V The Jacobs Walter W U Finding the Best-Scoring Permutation U IGrowing up with Computers a t NSA U Vol XXIV Programming Software No 3 Summer 1979 Vol VII No 4 Fall 1962 Cryptologic history Germany Vol XIV No Mathematics 4 Fall 1969 Special Computers Council of Learned Organization Issue 1972 Vol XIV No Computer 3 Summer programming 1969 Insolvable Problem An U Vol VIII No Computers 3 Summer Cryptology 1963 Turing machine Title Author Learning Machines U Reference Vol 111 No 3 July 1958 Keyword Learning machines Learning Machines - Part I1 U Vol IV No 2 April 1959 Learning machines Pattern Recognition U Winter 1961 Pattern recognition Reading a Depth by Computer Vol X No 2 Spring 1965 Computer programming Vol XII No 3 Summer Computers Translation U Jenkins Virginia CAMINO U 1967 On the Distribution of n-Digit Groups by the Sum of Their Digits U Vol I No 2 July 1956 Cryptography Some Notes about Chi-Square Vol VIII No Chi-Squares U 3 Summer 1963 Variance of the Number of Ones Vol XII No in a Derived Stream of Zeros and 2 Spring 1967 Ones U Mathematics Role of Carrier VCh Telephony Vol XIX No Communications Soviets in Soviet World War I1 Strategic 3 Summer 1974 Communications U On the Maximization of AX over the Vertices of the Cube u Vol VIII No Cryptanalysis 1 Winter 1963 Automatic Crib-Dragging Device for Hagelin Machines An U Vol I No 1 April 1956 Hagelin machines Cycles from Nonlinear Shift Registers U Special Mathematics and Engineering Issue 19811983 Shift registers Public Key Cryptosystems U Vol XXIV No 1 Winter Cryptosystems 1979 Thin Film Shifting Matrix A Vol VII No 4 Fall 1962 Currents 9 9 DOCID 3 0 2 0 9 5 6 t ' 3 - P L 56-36 1 Author I Title Reference About NSA U IText Recognition Procedure for I Cryptanalysis A U I Vol IV No 1 January 1959 History NSA Vol XI No Cryptanalysis 3 Summer 1966 Vol XII No 1 Winter 1967 Magic Digraphs U 1-4 Keyword Cryptanalysis Computer Processing Telemetry U Vol XIII No Com uter 3 Summer 1968 Fast Look-up in a Threaded Dictionary U Vol XVI No Dictionary references 1 Winter 1971 1Cost-Effectiveness Study of Vol XIV No Collection Spectrum SurveiIlance Systems 3 Summer 1969 A UI I Data Transmission Over Telephone Circuits U I Analysis of Lexical Meaning across Cultures An U 1 CY-600 View of Language A Vol IV No 1 January 1959 Digital data Transmission Vol XIII No Communications Language 4 Fall 1968 Language Vol XVIII No 3 Linguists Summer 1973 False Friends of the Translator in the English and Russian Languages A Translation from the Russian of V V Akulenko U Vol XVI No 4 Fall 1971 Russian translation Freedom in Translation U Vol XXI No Translation 3 Summer 1976 Problems of Meaning in Interlingual Dictionaries U Kullback Solomon I Flattening Effect The U Vol 111 No 1 January 1958 Language dictionaries Vol X No 1 Cryptology Winter 1965 Mathematics DOCID 3 0 2 0 9 5 6 9 A 3 9 8 5 9 8 Title Author On Tests of Sequences U Reference Val VII No 1 Winter Keyword Cryptanalysis 1962 Reciprocal Alphabets and Friedman Squares U Vol III No 1 January Reciprocal alphabets 1958 I Some Applications of Information Theory U Vol I No 1 April 1956 Information theory Report on the Keyword System A U Vol IV No 3 July 1959 Codes Keywords Special Felix System The U Vol IV No 2 April 1959 German code Vol I No 2 July 1956 Frequency Probability Book Review Mathematical Statistics U Vol VII No 4 Fall 1962 Book review Mathematics Book Review Modern Probability Theory and its Applications U Fall 1960 Book review Probability theory Fall 1960 Book review Probability theory Entropy of German The U I Book Review Probability An Introduction U Book Review Recent Literature Vol VII No on Algebraic Cryptography U 2 Spring 1962 Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters A Vol IX No 2 May 1964 Book review Cryptography Mathematics Mathematics U On Comparing Two Observed Frequency Counts U Vol 111 No Chi-squares 2 April 1958 On Tests of Sequences U Vol VII No 1 Winter Cryptanalysis 1962 Probabilities of Hypotheses and Kullback-Leibler InformationStatistics in Multinomial Samples U Vol I No 3 Cryptology October 1956 Simple Test for Slide or Kick A Vol VIII No Mathematics 4 Fall 1963 9 DOCID 3 0 2 0 9 5 6 ' bi 3 -P L 86-36 Author I Title Reference Special Fast Keyword Mathematics Linear Approximation Attack on a n Irregularly Stepping Key Generator A U Fourier Issue August 1973 Maya Astronomicdl Computer The U Vol XXII Astronomy No 1 Winter Cryptologic history 1977 ABC of Cifax The U Vol I No 2 July 1956 Communications Facsimile Privacy OVERLORD the Programmer's Vol XXII No 2 Spring Computer operating systems Friend An Extension of the IDASYS Operating System U II 1977 Error Formula for Iterative Prefiltering Frequency Estimates An U Vol XXII Frequency No 3 Linear prediction Summer 1977 Typewriter Key and the Stereotype The U Vol IV No 4 October Code groups 1959 Utilization of Code Limitations in Solving Bust Messages U II Apparent Paradox of Bayes Factors The U II Bayes Marches On U II January 1960 Codes and Special Linguistics Issue Vol X No 1 Bayes factors Winter 1965 Cryptanalysis January 1960 Cryptanalysis Mathematics Notes on Chi-square in Cryptanalysis U Vol 11 No 3 July 1957 Cryptanalysis Optimum Use of Log Weights Vol IX No 3 August Computers Plain text U 1964 Solving a Playfair Cipher by Computer U Vol XIV No Computer 4 Fall 1969 cryptanalysis Use of Bayes Factors with a Composite Hypothesis U Vol IX No 4 Fall 1964 Cryptanalysis Note on A Low Cost Process for Vol 11 No 3 Circuits Printed Circuits U July 1957 DOCID 3 0 2 0 9 5 6 Author TO-398598 I Title Random Walks with Restraining Barrier as Applied to the Biased Binary Counter Reference Vol 111 No 2 April 1958 Keyword Computers Sampling U Mathematics and Computers in Cryptanalysis U Lewis Frank W I Special Computers Council of Mathematics Learned Organization Issue 1972 Book Review Cloak Cipher Vol VII No 3 Summer 1962 Book review Cryptanalysis Categories of Cryptographic Phenomena with a Few Examples of Effect and Cause U Vol XII No 4 Fall 1967 Cryptography Fallacy of the One-Time-Pad Excuse The U Vol XIV No 3 Summer 1969 Cryptanalysis Garden Paths I Have Followed Vol IX No 3 August 1964 Cryptanalysis German Agent Systems of World War I1 Vol VII No 3 Summer 1962 Cryptologic history Germany South America It Is Obvious That A Painless Approach to Cryptanalytic Diagnosis U Vol 111 No Codes 2 April 1958 Messages Report on the Keyword System Vol IV No 3 July 1959 Codes Keywords Vol IV No 2 April1959 Mathematicians - U I Some of My Best Friends Are Mathematicians U I Something May Rub O f l U Vol X No 1 Cryptanalysis Winter 1965 What Next Dr Trithemius U Vol XI No 4 Fall 1966 Introduction to Magnetic Tape Recording and Its Use in Intercept Activities An U Cryptanalysis Vol I No 3 Communications October 1956 Recording DOCID 3020956 Title Author Reference Recording Techniques Affecting Total Intercept fet Vol IX No 1 Winter Keyword Intercept Recording 1964 Long and Short of Single Transpositions The U Vol XXI No Cryptanalysis 2 Spring Mathematics 1976 Quick Check for fiansposal Garbles A U Vol IV No 2 April 1969 and Special Linguistics Issue 9 1 Net Reconstruction -A Basic Step in Tr c Analysis U Val 111 No 3 July 1958 Garbles Traffic analysis 7 C g m a t h e s n a t i c s No 3 CAM 11 Lutwiniak William U Vol IX No 2 May 1964 Solution of a Polyalphabetic Monome-Dinome System U Computers Memory Vol I No 3 Cryptanalysis October 1956 Solution of VEJX-0 or the Uses of Vol XVIII No 2 Spring Delta U Cryptanalysis 1973 Vol XXII Signal processing Purpose Signal Process The U No 2 Spring MICROCOMPUTER General- 1977 Introduction to Log-Linear Models in Cryptanalysis U Vol x x v Computing No 2 Spring Cryptanalysis 1980 Midway and Yamamoto Properly Revisited U Vol XIII No 3 Summer Cryptologic history Midway 1968 I Classes of Rotors without Parallels U Vol X No 4 Cryptanalysis Fall 1965 Mathematics Prograinming Concepts for Verification and Security U Vol XXII No 4 Fall 1977 90 TOP-ES Programming Software DOCID 3 0 2 0 9 5 6 Author I -Q A398598 Title Reference Keyword Broadband Planar Log-Periodic Feed for the Spherical Reflector Used a t r e c i b oIonospheric Laboratory U Vol X No 3 Antennas Summer 1965 Collection Creation of a n Artificial Ionosphere to Extend the Radio Horizon for Frequencies Below 100 MC The U Vol XI No 2 Spring 1966 Extending the Radio Horizon for Vol X No 2 Intercept Purposes by Using the Spring 1965 Moon as a Reflector U Vol XXlV No 1 Winter Communications Intercept Signals Chinese communists Korean War 1979 b 1 t 3 - 5 0 USC 4 0 3 1 iij I Study of Hourly Correlation of Trans-Horizon VHF-UHF Signals and Meteorological Conditions U Vol XIV No 2 Spring 1969 Signals Linearly Induced Nonlinear Cycles U Vol XXII No 4 Fall Mathematics 1977 I Marston E Dale Inexpensive Device for Pictorial Input and Output An U January 1960 Computer graphics Growing up with Computers a t NSA U Special Council of Learned Organization Issue 1972 Computers Exposition of a New ycle Search Technique U Vol I No 1 April 1956 Teleprinter cipher analysis the Augean Stables or ow Much TA Can a Computer Vol XIII No 3 Summer 1968 Computers Traffic analysis Vol 111 No 4 December 1958 and Special Linguistics Issue Cipher equipment Security tF1 arrow-Band Speech Security DOCID 3020956 Author I Title Reference Keyword - Evaluating Intercept Techniques U Vol XI No 2 Spring Intercept evaluation 1966 I American Indian language Phonemic Structure of Nootka The U Fall 1960 APL Mechanization of Indirect Symmetry U Vol XVII Computer languages No 3 Summer 1972 Compiler Object Code Optimization U Compilers Vol XVII No 1 Winter FORTRAN I 1972 Program Complexity Measure UI Vol XXI No Software engineering 4 Fall 1976 Thoughts about Systems and Program Design U Vol XVIII No 2 Spring Computer programming 1973 Collection of LINCOMPEX Signals Vol XVII No 2 Spring Collection Signals 1972 Introduction to Log-Linear Models in Cryptanalysis U Vol x x v No 2 Spring Computing Cryptanalysis 1980 Recognition of Latin Square Equivalence Classes U Vol XVI No Cryptanalysis 3 Summer 1971 Machine Translation U Vol XII No 2 Spring Machine translation 1967 Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies below 100 MC The U Vol XI No 2 Spring Factors Affecting Required Antenna Gain in VHF Intercept Vol I No 3 Antenna gain October 1956 VHF intercept Communications 1966 U Cranks Nuts and Screwballs U Vol XI No 1 Winter 1966 Security g8 DOCID 3 0 2 0 9 5 6 ' b 3 - P L 26-26 Author I Title Reference Vol XIII No Vocabulary Thrusts and Boggles of Outrageous Escalation The Keyword A 2 Spring VOCABULARY SURVEY AT THE NATIONAL WARCOLLEGE U 1968 Computers and Queues U January 1960 Computers Queues Extreme Values in Cryptanalysis U Vol IV No 4 October Cryptanalysis 1959 How to Visualize a Matrix U Vol VI I No 3 Summer Mathematics 1963 Modified Normal Curves U Spring 1961 Convergence Techniques for Finding Linear Approximations Special Fast Mathematics Fourier Issue August 1973 u Collection Management U Cryptanalysis Mathematics Vol XIV No Collection management 1 Winter 1969 Evaluating Intercept Systems U Vol IX No 4 Fall 1964 Intercept System Analysis U Vol XI No 2 Spring Signals Communications intercept 1966 Receiving System Analysis U Vol X No 1 Winter 1965 IVerified Intercept Predictions Vol XI No 1 Winter Receivers lntercept 1967 Vol IV No Computers 4 October 1959 Meyer Joseph A Automatic Maintenance U Vol IX No 1 Winter Computers Maintenance 1964 Capture-Jamming of SIGINT Targets ti Vol XII No 2 Spring 1967 Communications Cryptanalysis DOCID 3020956 Title Reference Keyword COMINT Hard Facts in the Cold Spring 1961 War U Communications Ethics Author - U Vol I No 3 Codes October 1956 Cryptanalysis Der Fall WICHER German Knowledge of Polish Success on Vol XX No 2 Spring ENIGMA U 1975 Fallacy of the Systems Approach The U Val VII No 3 Summer Computers -The Wailing Wall Cryptologic history ENIGMA Engineering 1962 Vol XI No 1 Winter SIGINT 1966 Room 40 Compromise The U Vol XXV Cryptologic history No 1 Winter 1980 Security Architecture in SlGINT Collection and Processing U Val XX No 1 Winter Collection Security 1975 SIGINT Implications of Military Oceanography U Vol XII No 4 Fall 1967 Oceanography Simultaneous Error Insinuation in Electronic Cipher Machines Vol XIV No Cipher machines 1 Winter u 1969 Strategic Warning An Intelligence Gap That NSA Might Fill U Vol XVIII Strategic warning No 3 Summer 1973 CAMINO U Vol XII No 3 Summer Computers Translation 1967 Language and the COMINT Production Process U Vol XIX No COMINT 3 Summer Language 1974 Language as a Bulk Commodity U Vol XX No 3 Summer Language 1975 Look at It This Way U Vol XVIII No 1 Winter 1973 Dictionaries Foreign languages DOCID 3020956 Author 9 9 8 Title 5 9 8 Reference Keyword Some Contributions towards a Vol XVI No Translation Course in COMINT Translation 3 Summer u 1971 Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals The U Vol XXIII No 2 Spring Setwise Transitive Croups U Vol X No 2 Spring 1965 Mathematics Debugging Made Easier U Vol 111 No 4 December Computers Debugging Morse Signals 1978 1958 Elements of Shift Register Cryptology U Vol XVI No 2 Spring Cryptology Mathematics 1971 Thermal Noise U Vol VII No 3 Summer Electricity 1962 Computerized Depth Reading U Computers Vol XVII No 1 Winter Cryptanalysis 1972 Processes for Random and Sequential Accessing in Dynamic Memories U Vol XXII No 4 Fall Dynamic memory Mathematics Generating Function Approach GRETAG A U Vol XXII Mathematics No 1 Winter 1977 1977 Matric Recursions U Vol XXII Mathematics No 3 Summer 1977 Slow Look a t Fast Transforms A U Special Fast Mathematics Fourier Issue August 1973 High-speed Automatic Scanningof Speech Bandwidth Channels U Vol XX No 4 Fall 1975 Bar Statistics The U Vol VIII No Mathematics 2 Spring 1963 Speech scanning Title Author Keyword Reference Bar Statistics The U Vol VIII No 4 Fall 1963 Mathematics Sliding Strips Additive Subtractive and Minuend U Vol XI No 2 Spring Cryptanalysis 1966 1 Intuitive Exposition of Zierler's Method for Finding Linear Recursions An U Vol XIII No 1 Winter Textual Criticism and NSA U Vol XIV No 3 Summer Cryptography Linear recursions 1968 Editing 1969 Vol 11 No 1 Language aids January 1957 and Special Linguistics Issue II I Personal Contribution to the Bombe Story A U Vol XX No 4 Fall 1975 Cryptologic history Maps and the Conversion of Gauss-Kriiger Grid Coordinates U Vol 111 No 1 January Mapping Missile Trajectories U Vol 11 No 1 Missile trajectory January 1957 Note on Curve Fitting A U Vol XIII No Mathematics 4 Fall 1968 I Order Statistics for Cell Counts ENIGMA 1958 Vol XXIII No 4 Fall Mathematics 1978 Vol XIV No Ciphers Modulation 2 Spring 1969 II Analysis of a Transistor Monostable Multivibrator U Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer U Vol IV No 3 July 1959 Vol XXV No 4 Fall 1980 Circuits Transistors Communications Frequency hopping Jamming DOCID 3 0 2 0 9 5 6 -98598 Author Title REDMAN Program The U Reference Vol IX No Keyword Data processing 1 Winter 1964 Intuitive Exposition of Zierler's Method for Finding Linear Recursions An U Vol XIII No 1 Winter 1968 Cryptography Linear recursions Markov Models for Phonetic Text U Vol XVIII No 1 Winter 1973 Communications Speech Graceful Degradation Through Distributed Intelligence U Vol XXIII No 3 Summer 1978 Computers Use of Special Identification Vol XII No Techniques SIT in the Solution 4 Fall 1967 of Specific S I I N T Problems The Signal identification U Nolte William M Subnanosecond Instrumentation U Vol fX No 1 Winter 1964 Project TENNISand External Influences on NSA Systems Development U Vol XXIII No 2 Spring 1978 Error in a Capacitor-Type Totalizer U Vol 111 No 4 December 1958 Factors Affecting Required Antenna Gain in VHF Intercept Antenna gain Vol I No 3 October 1956 VHF intercept Pulses Pulses Waves U Survey of the Status of the Voice Vol XII No 4 Fall 1967 Problem A U Voice communications A New Information Storage System U Val XIiI No 2 Spring 1968 Information storage Video Solution of Additive-Minuend Busts U Vol 111 No 1 January 1958 Cryptanalysis Information Theory and the Packing of Spheres U Vol IV No 2 April 1959 Information theory VIDEOFILE u DOCID 3 0 2 0 9 5 6 Author I Title Key word Reference Vol 11 No 2 April 1957 Collection PCM U Classes of Rotors without Parallels U Vol X No 4 Fall 1965 Cryptanalysis Mathematics Trends Developments and Pressures in SICINT Reporting Today U Vol XXI No 1 Winter 1976 SIGINT Rotation Problem in Pattern Recognition The U Vol VII No 1 Winter 1962 Pattern recognition Minimizing Noise Effects in Survey of the Distance Problem Vol XVIII No 2 Spring 1973 I Darlington Compound Transistor a s a Current Controlled Voltage Source A U I Vol IX No reporting Cryptomathematics Electricity 4 Fall 1964 Representation of Signals on Orthonormal Bases The U Vol IX No 1 Winter 1964 Signals Tunnel Diode Characteristic Function Generator U Vol VIII No 1 Winter 1963 Computers Why Analog Computation U Vol VII No 3 Summer 1962 Analog computers Weather Its Role in Communications Intelligence Vol 111 No 3 July 1958 Weather Vol XII No 3 Summer 1967 Cryptography Vol XXI No Cryptanalysis U Philosophy of U S Cryptography and Cryptographic Usage A U Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling The RYE a n Extended Capacity Remote Access System U 4 Fall 1976 Vol IX No 2 May 1964 Computer programming DOCID 3020956 Author REF ID A398598 9 Title Development of Automatic Telegraph Switching Systems Reference Keyword Vol 11 No 3 Circuits July 1957 Switching Systems U Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography UI Vol 1 No 2 July 1956 Cryptography Some Notes on Information Theory L' Vol IV No 1 January 1959 Information theory Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters U Vol XIII No 4 Fall 1968 Special Mathematics and Engineering Issue 19811983 Filters Frequency Vol XIII No Vocoders Some Recent Vocoder Studies a t the National Security Agency u 2 Spring 1968 Note on a Solution of a Polyalphabetic Dinome System A U Vol I No 3 Ciphers October 1956 Randomization Made to Order Random Numbers Are Too Important to be Left to Chance U Special Council of Learned Organization lssue 1972 Cryptanalysis Randomization Introduction to Electronic Phase-Lock Oscillators An U Vol VIII No 2 Spring 1963 Phase-lock oscillators Introduction to Programmingof a Digital Computer U Vol 11 No 3 Computer programming July 1957 Cryptanalytic Use of HighSpeed Digital Computing Machines U Vol IX No 3 August 1964 Computers Cryptanalysis DOCID 3020956 Author 1 Title Number of Components in Random Linear Graph The U I Perpetuation of Bias in Shift Register Devices U1 Vol X No 2 Spring 1965 and Computer and Information Sciences Issue Mathematics Vol IV No 2 April 1959 Cryptanalysis Vol XIV No 4 Fall 1969 Shift registers Vol VIII No Ciphers 2 Spring Key 1963 Vol IX No 2 May 1964 Computer programming I Fundamentals of Majority Logic Vol IV No 4 October 1959 Digital circuits Logic I Vol 111 No 4 December 1958 Communications Ionosphere Vol XXII No 2 Spring 1977 Computer processing Vol XIV No 4 Fall 1969 Collection Queuing theory RYE an Extended Capacity Remote Access System U Phillips Cecil Keyword Reference Ionospheric Propagation U1 I SiGlNT Computer Processing in the 1980s U Digitizer Queuing Model for FROSTING U - A Yates Algorithm Machine U JACQUARD On Understanding the Null 3 Hypotheses of Test Statistics U I Special Fast JACQUARD machine Fourier Issue Mathematics August 1973 Vol VIII No Mathematics 4 Fall 1963 Spread Spectrum System Jamming Response U Vol XXII Signals No 3 Spread spectrum Summer 1977 Computer Graphics in a n Engineering Simulation Program U Vol XVII No 2 Spring 1972 Computer programming DOCID 3020956 TOP SEC- REF ID A398598 ib 1 oj 3 -50 USC 403 b 3 -18 USC 799 b 3 -P L 86-35 'bi 3 1 - PL 86-36 Author I Title Reference Writing Efficient FORTRAN U Vol XVII No 2 Spring Keyword FORTRAN 1972 Experimental Approach to an Environment Study in the HF Band U Vol VIII No 4 Fall 1963 Collection Signals Drawing to a Straight Flush -A Study in Technical Intelligence Vol XXI No 3 Summer Technical intelligence u 1976 Genesis of Mobile Magoo The Vol XX No U 3 Summer 1975 Vol XXI No 1 Winter 1976 Spacecraft Passenger Television from Laika to Gagarin U Vol XXI No ELiNT Telemetry processing Cr tolo ic histor fEel Space flights 2 Spring 1976 Two New Language Models U Vol XXIV Language modeling No 3 Summer 1979 German Radio Intelligence U Vol XXV No 4 Fall Cryptologic history German COMINT 1980 A Operation V A C U A R D Vol I No 2 July 1956 Linear Approximations and the Degree of the Function U Special Fast Mathematics Fourier Issue August 1973 Simulation of Cryptoprinciples U Special Council of Learned Organization Issue 1972 Communications security Analysis ofThin Film Germanium Epitaxially Deposited onto Calcium Fluoride U Vol VIII No 2 Spring 1963 Physics Scaling Matrix for the Analog Computer U Vol VII No 1 Winter Computer programming 1962 Communications Earth satellites DOCID 3020956 Author I Reference Title Keyword Status of Optical Logic Elements for Nanosecond Computer Systems U Vol VIII No 3 Summer 1963 Computers Asian Communist Aircraft Location Systems U Vol XX No 1 Winter 1975 Aircraft tracking Conjugate Codebooks U Cryptanalysis Vol XXII No 3 Summer 1977 Boer War Cipher A U Vol X No 3 Ciphers Summer 1965 Cryptologic history and Vol X No 4 Fall 1965 SELLNOW - A Man-Machine Communication System for ELINT Data U Vol VIII No 4 Fall 1963 ELINT Theoretical Linguistics and Language Universals U Vol XXII No 2 Spring 1977 Linguistics How to Choose a Good Crib U Vol X No 4 Fall 1965 Cryptanalysis With Love and Parentheses from Peking U Vol XII No 1 Winter 1967 Chinese language Codes Vol XII No 2 Spring 1967 Intercept sites Vol IX No 1 Winter 1964 Missile trajectory Language Problem a t NSA The U Vol I No 1 April 1956 Esperanto Language Metalin A Draft of a Metalanguage U Vol XI No 4 Fall 1966 Artificial language Multilingual Codes U Vol X No 4 Fall 1965 Codes Language Worldwide Language Problems at NSA U Vol XIII No 4 Fall 1968 Language training II I I Time Coordination of SIGIN'T I I Ballistics Soviet U I DOCID 3020956 -298598 Author Title Algorithm U Reference Keyword Mathematics Vol XXV No 3 Summer 1980 Product Sequences I1 U Vol XX No 4 Fall 1975 Mathematics How the Japanese Army Water Transport Code 2468 Was Broken LT Vol XVIII No 4 Fall Cryptologic history Japan Computer Analysis Target Networks Intercept Probability U Vol XVI No 1 Winter Number of Components in Random Linear Graph T h e U Vol IV No 2 April 1959 Optical Fourier Transform a n d Periodic Phenomena U Vol XVIII Mathematics No 3 Summer 1973 Anglicisms i n Puerto Rico U Vol XVII No 1 Winter CATNIP 1973 Collection Intercept 1971 Cryptanalysis Spanish language 1972 Book Review A History of NSA General-Purposc Electronic Digital Computers RSf2 Q- I Low Cost Process for Printed Circuits A U I Vol IX No 2 May 1964 Book review Computers Vol It No 1 Circuits J a n u a r y 1957 On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors U Vol XXV Mathematics No 1 Winter Cooley-Tukey F a s t Fourier Transform for Base 4 and Base 4 2 U Vol XVII No 4 Fall Book Review TRATADO DE CRIPTOCRAFIA U 1980 Mathematics 1972 Vol XI No 2 Spring 1966 Book review Spanish cryptography Chaco A Horrible Example U Vol XVIII Translation errors No 3 S u m m e r 1973 DOCID 3020956 L I 9 9 8 3 - r e c - 3 6 Title Author Reference Keyword Mokusatsu One Word Two Lessons L' Vol XIII No Translation 4 Fall 1968 and Special Linguistics Issue 11 Spanish Languages The U Vol XIII No 1 Winter 1968 Spanish language Vol III No 4 December 1958 Interpolation Vol XX No 2 Spring 1975 Collection Scheduling Function in a TimeSharing Environment The U Vol XVI No 2 Spring 1971 Computer systems Attack on Blair-Huffman Encipherments An U Spring 1961 Ciphers Don't Be Too S m a r t U January 1960 Codes Japanese military I I Note on Univariant II II I1 II II 0 Method of Recovery of Fibonacci Key A U Vol I No 3 October 1956 Cryptanalysis John Dee Consultant to Queen Elizabeth I U Vol XII No 4 Fall 1967 Cryptologic history Vol IV No 4 October 1959 Cryptology Electronic warfare Special Purpose Cryptanaly tic Computers State of the Art U Salemme Arthur Are the Russians Gaining Wordwise U J Computer There is Thy Sting u I Vol XXIII Computers No 1 Winter 1978 Spring 1961 Russian language Vol XVl No 4 Fall 1971 Computers Russian Translation COMIPiT Aid Language Files A Basic U Vol IV No 2 COMINT April 1959 Russian language Few Tricks of the Trade for the Translator of Russian A U Vol XI No 4 Fall 1966 Russian language Translation i b 1 b 3 - 5 0 USC 403 b 3 - P L 8 6-36 REF ID A398598 DOCID 3020956 Author I Title Key word Handle with Care Russian Transliteration U Vol XII No 4 Fall 1967 Russian transliteration Some Problems in the Field of Machine Translation or the Case of the Volatile Mouses U Fall 1960 Machine translation Tour of Some Russian Translation Traps A U Vol XIV No 4 Fall 1969 Russian Translation Use of the B-Coefficient in Information Retrieval The U Vol XIII No 4 Fall 1968 Information retrieval On the Maximization of X'AX over the Vertices of the Cube Vol VIII No 1 Winter 1963 Cryptanalysis Midway and Yamamoto Properly Revisited L Vol XIII No 3 Summer 1968 Cryptologic history Midway Parabolic Mock Design for a n FFT -Implemented Filter Scheme U Special Issue Filters January 1971 Database Services U Vol XII No 1 Winter 1967 LT Schierlmann Charles J Reference Databases Soviet b 1 b 3 -5C USC 403 t 13 -P L 86-36 APT System The U Vol XXIII Computers No 3 Data processing Summer 1978 Growing up with Computers a t NSA U Special Council of Learned Organization Issue 1972 Computers Wandering Wheel The An Introduction a t-TMT Vol XIII No 1 Winter 1968 Cipher machines Cold-Cathode Counter Tube Study A L Vol 111 No 4 December 1958 Cathode Pulses PPM Telemetry Simulator U Fall 1960 Computer Scripting U Vol XXIV No 1 Winter 1979 Computers Language Working aids DOCID 3 0 2 0 9 5 6 Author I Title COMINT Signals Trends Reference Val XXV No 2 Spring Keyword COMlNT Signals trends 1980 How Can the Communications Vol VIII No Communications Sciences Contribute to the Study 3 Summer Cybernetics of Natural Systems U 1963 Parity a s a n Operation Checking Code U Vol VIII No 3 Summer Mathematics 1963 II Substantive Analysis U Vol IV No Analysis 2 April 1959 MP-14 Unlimited Random Source U German Tires and Black Cats Estimation of Population Size u Computers Vol XVII No 3 Cryptanalysis Summer 1972 Vol XIX No Cryptanalysis 3 Summer 1974 Conjugate Codebooks U Vol XXII Cryptanalysis No 3 Substitution Summer 1977 Convolutions Cube Roots and Computer Cryptography U Vol XVIII Computers No 3 Cryptography Summer 1973 Introduction to the Special Issue Special Fast Mathematics Fourier Issue August 1973 Linear Approximation Attack on a n Irregularly Stepping Key Generator A U Special Fast Mathematics Fourier Issue August 1973 Strength of the Bayes Score The Vol XVII No 1 Winter U Mathematics 1972 Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables Vol X No 2 Spring 1965 Mathematics DOCID 3020956 REF ID A398598 BRA Title Author Reference Telecommunications from the Special Torn-Tape to the Computer U Council of Learned Organization Issue 1972 Keyword CR TICOMM Determining Intercept Assignments U Vol XII No 2 Spring 1967 Intercept Management of Magnetic Tape Vol X No 4 Fall 1965 Tape management u Minimizing Wasted Space in Infortnation Files U Vol XIV No 4 Fall 1969 File storage Need for System Approach The Vol VII No 2 Spring 1962 SrGINT Vol X No 1 Winter 1965 Management Operations Representing Data in Computers U Vol 111 No 1 January 1958 Data representation Six Characteristics of Information Handling Systems Information systems u Vol XIV No 3 Summer 1969 Cryptologist Can He Exist The U Vol 11 NO 3 Cryptologists July 1957 Curiosa Scriptorum Sericorum To Write But Not to Communicate U Vol XVI No 3 Summer 1971 Communications Writing What Is Good Traffic Analysis' Vol XXIV No 4 Fall 1979 Traffic analysis U Developments in the Automatic Acquisition and Translation of Hand-Keyed Morse Code U Vol XXIV No 1 Winter 1979 Communications Morse code Conjugate Codebooks C' Vol XXII Cryptanalysis Substitution No 3 Summer 1977 Emergency Destruction of Documents U Vol I No 1 April 1956 U Operations Research in NSA u Document destruction 9T DOCID 3020956 5 9 8 'b '3 -P L 86-36 Author I Title Keyword Linear Approximations Using Continuous Functions U Special Fast Mathematics Fourier Issue August 1973 Designing Secure Reliable Software - A Methodology LT Vol XXI No 4 Fall 1976 International or Cross-Country Depths U Vol I No 3 Cryptanalysis October 1956 Computer security Software April 1960 Groups Operators Soviet Science and Technology Present Levels and Future Prospects U1 Vol IV No I January 1959 Science and technology' Soviet Potential of Tropospheric Ducting as a Collection Technique The U Vol XX No 1 Winter 1975 Collection Vol XVI No 4 Fall 1971 Cry ptanalysis Cryptologic history SPECOL A New AND OR NOT Language for Use with Computers U Vol XII No 1 Winter 1967 Computer language Ambiguity Reduction by Markov Analysis of TEMPEST Signals U Vol XVI No Signals TEMPEST 1 Winter 1971 Mathematical Modeling of Vol XVI No Signals TEMPEST 3 Summer 1971 Sinkov Abraham Abstract Groups Defined by Generating Operators U Icxco Story The U TEMPEST Channels U Snyder Samuel S Reference Tail Probabilities for the Binomial Distribution U Vol VIII No 3 Summer 1963 Mathematics ABNER The ASA Computer Part 1 Design U Vol XXV No 2 Spring 1980 Computers Cryptologic history ABNER The ASA Computer Part 2 Fabrication Operation and Impact U Vol XXV Computers No 3 Cryptologic history Summer 1980 Earliest Applications of the Computer a t KSA U Vol XVIII No 1 Winter 1973 Computers DOCID 3020956 Author REF IDzA398598 9 I Title Reference Keyword Famous First Facts NSA Part I Pre-Computer Machine Cryptanalysis U Vol XVII No 4 Fall Growing up with Computers a t NSA U Special Computers Council of Learned Organization Issue 1972 1 Computers 1972 Offsets of Differences Summation and Difference Methods U Vol 11 No 4 October 1957 Encipherment Development of High Speed Automatic Morse Translators The U Vol I No 1 April 1956 Morse translators Analytic Computer Technique for Anagramming Columnar Transposition U Vol VIII No 2 Spring Cipher Computer Simple Test for Slide or Kick A Mathematics U Vol VIII No 4 Fall 1963 Computer-Aided Bookbreaking of Two-Part Codes U Vol XVII No 2 Spring Bookbreaking Computers 1963 1972 Computers and Linguists Do Mix U Vol XVI No Computers Linguists 3 Summer 197 1 Frame versus Corpus U Vol XVII Bookbreaking No 1 Winter Computers 1972 Redundancy Exploitation in the Computer Solution of DoubleCrostics U Vol VII No 2 Spring Repagination U Vol XVIII No 4 Fall Computers 1962 Bookbreaking Computers 1973 Under-Developed Languages Under-Utilized Computers U Vol XX No 1 Winter Computers Language 1975 Will the Real 53 Stand Up C Vol XIX No Cryptanalysis 1 Winter 1974 pTOP DOCID 3 0 2 0 9 5 6 8-50 s c L o j b 31-18 TJSC 798 b 13 -P 86-36 b 13 -P 86-36 Author I Title Reference I Vol XXIV Cryptanalysis Key generators No 3 Summer 1979 Vol 111 No 2 April 1958 Noise Mathematics Special Fast Fourier Issue August 1973 Some Formulas concerning Bulges of Combining Functions u Keyword Vol XXIV No 2 Spring Cryptosy stem identification 1979 Information Theory Applied to Computer Data Compression U Computers Data compression Vol XXIII No 4 Fall 1978 and Special Mathematics and Engineering Issue 1981- i b 1 b 3 -18 USC 1 9 8 D 3 -P L 85-36 1983 I System for Tropospheric Scatter A U Val X No 4 Climbing Jacob's Ladder U Vol XII No 3 Summer RAKE Collection Fall 1965 Computers Telecipher analysis 1967 Association Factor in Information Retrieval The U Winter 1961 Computers Information retrieval Information Storage and Retrieval U Vol VIII No 4 Fall 1963 Information retrieval Use of the B-Coefficient in Information Retrieval The U Vol XIII No 4 Fall 1968 Information retrieval Chatter Patterns A Last Resort Vol 11 No 4 Chatter October 1957 Traffic I Target in Space A U Special Council of Learned Organization Issue 1972 I satellites I DOCID 3 0 2 0 9 5 6 Author TOPS I 1 II -8598 Reference Keyword Errors in High Frequency Direction Finding U Vol IV No 1 January 1959 Direction finding Voice Problem The U Special Council of Learned Organization Issue 1972 Voice communications Titie g t h of the ayes s o r e he Vol XVII No 1 Winter 1972 Mathematics How the Germans Broke a U S Code U Fall 1960 Codes Germans Some Problems and Techniques in Bookbreaking U Vol XI No 1 Winter 1966 Bookbreaking Example of Substantive Analysis An U Vol XI No 3 Summer 1966 Analysis Soviet Vol XXIV No 1 Winter 1979 Computers Language Working aids Special Issue Computer graphics Some Graphical Display Techniques for Fourier Analysis January 1971 U Technology of Future Powerful Personal Computers The U Vol XXV Computers No 3 Summer 1980 Investigations into Adult Language Learning Acquisitions U Language acquisition Vol XXIV No 3 Summer 1979 Language Levels and Cryptologic Jobs U Vol XVIII Language No 3 Qualification standards Summer 1973 COMlNT Satellites - A Space Problem U 1 Library and the User The Vol IV No 4 October Communications satellite 1959 U Vol XIII No 2 Spring 1968 Library Research DOCID 3 0 2 0 9 5 6 Author I Title Maximum Likelihood Estimation of a Trajectory and Its Variance U Reference Vol XIII No 1 Winter Keyword Satellite trajectory 1968 I Whole New World of Speech A Or Maybe 1984 Will Be a Good Year After All U Fourier Modulus Method of Cage Identification U April 1960 I Tunnel Diode Dynamic Logic Module A U Summer 1961 Computers Transient Response of Tunnel Diodes With Resistive Loading Vol VII No 1 Winter 4 Fall 1976 Vol XXI No Keyword recognition Cryptanalysis 403 b 3 -18 USC Circuits Tiltman John H Addendum to A Cryptologic Fairy Tale U Brigadier Vol XXIII No 1 Winter SIGINTcollection and processing 1978 Vol XVIII No 1 Winter Cryptanalysi 1973 Vol VII No 2 Spring 1962 Development of the Additive The U 4 Fall 1963 Double Transposition - A Special Case U Vol XVII No 4 Fall Cryptologic history Germany Cryptanalysis 1972 Experiences 1920-1939 U Vol XVII Cryptologic history No 3 Summer 1972 Some Principles of Cryptographic Security U Vol XIX No 3 Summer Cryptographic security 1974 Some Reminiscences U Vol XI No 3 Summer Cryptanalysis 1966 I TUNNY Machine and Its Solution The U Spring 1961 798 b 3 -P L 86-36 1962 Trade-off Approach to Quality Intercept Versus Quantity Intercept A U b 1 b 3 -50 USC Cipher machines Germany DOCID 3020956 Author REF ID A398598 9 Most Mysterious Manuiscript in the World I Unknown Unknown Voynich Manuscript Vol VIII No Computers 3 Summer 1963 Geometric Approach to Waveform Recognition A U Vol VIII No 2 Spring 1963 Mathematics So You Want to Correlate U Vol X No 2 Spring 1965 Waveform recognition WARSAN 11 -An Implementation of the FFT and Other Tools for Digital Signals Analysis U Special Issue Digital January 1971 signals analysis Tunnel Diode Dynamic Logic Module A U1 Summer 1961 Computers Logic Selected SlClNT intelligence Highlights U Vol XIX No SICINT 4 Fall 1974 Randomization Made to Order Random Numbers Are Too Important to be Left to Chance U Special Council of Learned Organization Issue 1972 Some Recent Vocoder Studies a t the National Security Agency Vol XIII No Vocoders 2 Spring 1968 Graph Theory L' Vol XII No 3 Summer 1967 Mathematics Fall 1961 Cryptologic history Germany GEE System - 11 The L'1 Vol VII No 1 Winter 1962 Cryptologic history Germany GEE System - 111 The C' Vol VII No 2 Spring 1962 Cryptologic history Germany 1 U Unknown Vol XII No 3 Summer 1967 and Special Linguistics Issue I1 Status of Optical Logic Elements for Nanosecond Computer Systems U uI Tordella Louis W Keyword Reference Title I GEE System - 1 The u Cryptanalysis Randomization - - DOCID 3 0 2 0 9 5 6 Author Unknown rn I - - - -8 I Title GEE System Reference - IV The U a U Vol VII No 3 Summer 1962 Keyword Cryptologic history Germany Val VIH NO Cryptanalysis 1 Winter 1963 Unknown GEE WHIZZER Unknown Instant Expertise U Vol XII No 1 Winter 1967 Buzzwords Unknown Preliminary Historical Report on the Solution of the B Machine U Vol IX No 2 May 1964 Cryptologic history Unknown SIGINT System Logic U Vol X No 2 SICINT Spring 1965 Unknown reviewer Book Reviews Pearl Harbor Warning and Decision Roberta Wohlstetter But Not in Shume John Toland The Secret War Sanche de Gramont CIA - The Inside Story Andrew Tully Now It Can Be Told Leslie R Groves Thinking About the Unthinkable Herman Kahn Strike in the West James Daniel and John G Hubbell U Vol VIII NO Book review 1 Winter Cryptologic history 1963 Patent Matters and the Technical Employee U Vol X No 3 Inventions Summer 1965 Patents Vol XXIV No 4 Fall Computers Encryption Vol XXII No 4 Fall I977 Dynamic memory Mathematics Upgrading Selected U S Codes and Ciphers with a Cover and Deception Capability U Vol XXI No 1 Winter 1976 Ciphers Deception Report of the Second Computer Study Group C Vol XIX No 1 Winter 1974 Computer use NSA Processes for Random and Sequential Accessing in Dynamic Memories U Various 1 b 1 b 3 -18 3SC 798 b 3 -P L 86-36 DOCID 3020956 Author I 1 REF ID A398598 S- Title Reference Keyword Some Observations on Computer Aids to Indicator Recovery U Vol XVII No 4 Fall 1972 Data Management Challenge The U Vol XVI No Computers 2 Spring Data management I GEE System - V The lj Vol VII No 4 Fa11 1962 Cryptanalysis Cryptologic history Germany Computer Processing of Natural Languages U Special Council of Learned Organization Issue 1972 Computers Language processing Spectral Analysis and the Fast Fourier Transform U Vol XIV No 1 Winter 1969 Mathematics Way the Ball Bounces The An Experiment in Deconvolution Filtering U Special Issue Mathematics January 1971 Note on Logarithmic Scoring and Preliminary Testing U Vol 11 No 4 October 1957 Mathematics UNNA - An Introspective Signal Processor U Vol XX No 2 Spring 1975 Signal processing Way the Ball Bounces The An Experiment in Deconvolution Filtering U Special Issue Mathematics January 1971 I Solution of a Fractionated Monome-Dinome System U II Vol 11 No 2 April 1957 Cryptanalysis Conjugate Codebooks U Vol XXII Cryptanalysis No 3 Summer 1977 Selection and Placement of Cryptanalytic Personnel L' Fall 1960 Personnel Labeled Oriented Graphs Which Vol X No 1 Mathematics are Onto U Winter 1965 9 DOCID 3 0 2 0 9 5 6 fk ' - I 5 9 8 bh-36 Title Author Reference Keyword - Centralized Computer Support of Field Activities U Special Council of Learned Organization Issue 1972 Computer systems Field sites Cryptanalysis in the German Air Force U Vol IV No 2 April 1959 Cryptanalysis German air force Content Addressed Memories U Vol IX No 1 Winter 1964 Computers Memory Strategy for Program Decomposition for a Distributed Pipeline A U Vol XXII No 4 Fall 1977 Mathematics Introduction to Diagnosis U Vol XIII No Cryptanalysis 3 Summer 1968 Russian Diamond A U Vol XII No 2 Spring 1967 Russian navy codes Introduction To APL An U Vol XVI No 4 Fall 1971 Computers Cryptanalysis Fundamentals of Majority Logic U Vol IV No 4 October 1959 Digital circuits Logic LIGHTNING Program kVol VIII No Computers 1 Winter 1963 - h e New Concept in Computing A u Vol 111 No Computing 4 December 1958 Transient Analysis ofcoaxial Cables Considering Skin Effect Vol I No 2 July 1956 Coaxial cables Vol XVIII No 2 Spring 1973 and Special Linguistics Issue 11 Machine translation U Wild Norman Machine-Aided Translation Where Is It Today U DOCID 3020956 9 3 9 8 S G I N with T SACO 5 9 Vol XXI No 8 Cryptologic history 1976 Magnetic Core Memories U Vol 11 No 1 Computers J a n u a r y 1957 Memory ALRIGHT - A Map Overlay Generator U Vol XI No 2 Spring Mapping 1966 Electronic Calligraphy U Vol XI No 1 Winter 1966 Calligraphy Representing Data in Vol 111 No I January 1958 Data representation Food for Thought in L V H F Vol XX No L V H F c ollection LVHF and H F Communications Aid U Vol XX No 3 Summer 1975 MUFF1 ER BANDAID Computer Applications The Insatiable Appetite of the Education in Diagnosis U Vol XIX No Computers 4 Fall 1974 Vol XIV No Cryptanalysis 1 Winter 1969 Wireline Modem with Harmonic Vol XXV No 2 Spring Distortion Equalization A C 1980 and Special Mathematics and Engineering Issue 1981- Communications Modems 1983 Receiving System Analysis U Vol X No 1 Winter 1965 Receivers cd jl b 3 - 5 0 USC 4 C 3 b $33-18 USC '98 b 3 -P L 86-36 DOCID 3020956 D 3 -P 86-36 Title Author ppppp Integrated and Guided Wave Optics and Device Applications U Matric Recursions U Wray W D Reference Keyword - Special Optics Mathematics and Engineering Issue 19811983 Signals processing Vol XXII Mathematics No 3 Summer 1977 Vol XXIV No 4 Pal1 1979 Computers Encryption Processes for Random and Sequential Accessing in Dynamic Memories U Val XXII No 4 Fall 1977 Dynamic memory Mathematics Fingerprinting Code Croups by Computer U Vol XVII Bookbreaking No 3 Computers Summer 1973 Revision - de novo A U Vol I No 3 Cryptanalysis October 1956 Matrix Business Part 11 This Vol 111 No 3 July 1958 Mathematics This Matrix Business U Vol 111 No 2 April 1958 Cryptanalysis This Matrix Business Part 11 Vol 111 No 4 December Cryptanalysis u U b l b 3 -18 USC 798 1958 Vol x x v No 4 Fall Simulation of Cryptoprinciples U Community Impacts on NSA Systems U Special Council of Learned Organization Issue 1972 Computers Vol XXIII No 3 Data processing Summer 1978 Networking I Mechanical Translation U Communications security Vol I No 1 April 1956 Translation DOCID 3020956 9 3 9 8 5 9 8 b c3 -P L F6-36 Author I I Title Zoebelein Arthur J Keyword Supporting the Support Facilities U Vol XVIII Computer test No 3 equipment Summer 1973 Correlation of Frequency of Vol XVII Military addresses No 3 Summer 1972 Appearance of Military Unit 1 Addresses to Unit Echelon and 1 Reference Combat Readiness Status U Cepstrum Vocoder A U Special Issue Communications January 1971 Crisis Management in the National Senior Cryptologic Course U Vol XXII No 1 Winter 1977 Crisis management Decision making DOCID 3020956 REF NSA Technical Journal KEYWORD INDEX DOCID 3020956 N S A Technical Journal Indexed by Keyword Keyword Author Title Reference Addressing Systems Assignment of Storage Space in Rapid-Access Memory Systems U Vol 11 No 2 April 1957 Advanced Weapons Systems Computers and Advanced Weapons Systems U Special Council of Learned Organization Issue 1972 African Language African Language Problem a t NSA The U Vol XI No 3 Summer 1966 Aircraft Tracking Asian Communist Aircraft Location Systems U Vol XX No 1 Winter 1975 American Indian Language Phonemic Structure of Nootka The U Fall 1960 Analog Computers Why Analog Computation U Vol VlI No 3 Summer 1962 Analysis COMlNT Analysis and Vol XVII No 2 Spring Reporting on the Developing Nations U Example of Substantive Analysis An U 1972 Vol XI No 3 Summer 1966 Model 204 -The Analysts's Computer LT Vol XXI No 3 Summer 1976 Substantive Analysis U Vol IV No 2 April 1959 Antenna Gain Factors Affecting Required Antenna Gain in VHF Intercept U Vol I No 3 October 1956 Antennas Broadband Planar LogPeriodic Feed for the Spherical Reflector Used a t Arecibo lonospheric Laboratory U Vol X No 3 Summer 1965 123 TOP SECHE'I' UlHRRA DOCID 3020956 Keyword Title Author Artificial Intelligence Time Is -Time Was -Time Is Campaigne Past Computers for Howard H Intelligence UI Artificial Language Metalin A Draft of a Metalanguage U Astrodynamics Reference Vol X No 1 Winter 1965 and Computer and Information Science Issue Vol XI No 4 Fall 1966 Geodetic Latitude and Altitude from Geocentric Coordinates U Vol XX No 1 Winter Orbit Computation with the Vinti Potential and Universal Variables U Vol XIX No 1 Winter Orbit Fitting to Angular Data U Vol XXI No 2 Spring 1975 1974 1976 Astronomy Vol XXII No 1 Winter Maya Astronomical Computer The U 1977 Basebands Cornrnunications for oPeratiorj- Vol 11 No 2 April 1957 Bipolar Coding and Baseband Recovery Vol XII No 1 Winter U 1967 Baudot Streams Recurrent Events and Baudot Streams U Vol 11 No 2 April 1957 Bayes Factors Apparent Paradox of Bayes Factors The U Vol X No 1 Winter 1965 Binary Stream Distribution of the Maximum Bulge in a Flat Random Binary Stream The U Vol VII No 4 Fall 1962 Bletchley Park Gweeks Had a Gwoupfor It The U Filby P W Vol XXI No 2 Spring 1976 Book Review Book Review A History of NSA General-Purpose Electronic Digital Computers C-CCO Vol IX No 2 M a y 1964 - -- -- DOCID 3020956 REF IDzA398598 v Author Reference Book Review Analyses of Campaigne Howard H the Case n 3 in Algebraic Cryptography with Involutory Key-Matrix a n d Known Alphabet Journal fur die Reine und Angewandte Mathematik U Vol IX No 3 August Title Keyword I 1964 Vol XI No 1 Winter Book Review Basic Cryptologic Glossary C 1966 Book Review Cloak Cipher U Lewis Frank W Vol VII No 3 Summer 1962 Rook Reuiew Cryptanalysis of the Single Columnar Transposition Cipher U Callimahos Lambros D Book Review IIow to Estimate Probabilities Journal of the Institute of Mathematics a n d Its Application U Campaigne Howard H Book Review Involutory Commutants with Some Applications to Algebraic Cryptography I Journal fiir Reine und Angewandte Mathernatik U Campaigne Howard H Book Review Lincos Design of a Language for Cosmic Intercourse P a r t I U Summer 1961 Vol XII No 2 Spring 1967 Vol XII No 1 Winter 1967 Vol VII No 1 Winter 0 1962 Fall 1960 Book Review Lost Languages L' Book Review Mathematical Statistics U Book Review Mechanical Resolution of Linguistic Problems L' Vol VII No 4 Fall 1962 Campaigne Howard H Vol 111 No 4 December 1958 Book Revlew Military Cryptanalytics P a r t I1 U Campaigne Howard H Vol IV No 4 October 1959 125 'I'C lJ S E C U MBKA I DOCID 3 0 2 0 9 5 6 Keyword I Title Book Review Modern Probability Theory and Its Applications U Book Review Norse Medieval Cryptography in Runic Carvings U n u Author Reference Fall 1960 Vol XIII No 3 Summer 1968 Book Reviews Pearl Harbor Unknown Warning and Decision reviewer Roberta Wohlstetter But Not i n Shame John Toland T h e Secret War Sanche de Gramont CIA - T h e Inslde Story Andrew Tully N o w It C a n Be Told Leslie R Groves Thinking About the Unthinkable Herman Kahn Strike i n the West James Daniel and John C Hubbell U Vol VIII No 1 Winter Book Review Probability An Introduction U Fall 1960 Book Review Recent Literature on Algebraic Cryptography U Vol VII No 2 Spring Book Review Some Applications of High Speed Computers to the Case n 2 of Algebraic Cryptography Mathematics o f Computation Vol 15 No 75 Fall 1961 1963 1962 Book Review Some Further Methods in Algebraic Cryptography Jaurnalo f the Mitchell Scientific Society No 74 U Campaigne Howard H Fall 1960 Book Review The Broken Seal U Callirnahos Lambros D Vol XII No 3 Summer 1967 Book Review CRIITOCRAFIA I TRATADO DE U Vol XI No 2 Spring 1966 - DOCID 3 0 2 0 9 5 6 Keyword - p 3 9 8 5 9 8 B A I Title Book Review Variable Matrix Substitution in Algebraic Cryptography U Author Reference Campaigne Howard H Vol IV No 4 October 1959 Vol XI No 3 Summer 1966 Bookbreaking Improvisations - Part I U Bookbreaking I 4 Fall 1966 Computer-Aided Bookbreaking of Two-Part Codes U Vol XVII No 2 Spring 1972 Faithful Mirror The U Vol XIV No 1 Winter 1969 Fingerprinting Code Groups by Computer U Vol XVII No 3 Summer 1972 Frame versus Corpus U Vol XVII No 1 Winter 1972 Repagination U Vol XVIII No 4 Fall 1973 Some Problems and Techniques in Bookbreaking Vol XI No 1 Winter 1966 1 Vol XI No Bookbreaking Improvisations - Part I1 U IUI A Buzzwords Instant Expertise U Calligraphy Electronic Calligraphy U Vol XI No 1 Winter 1966 Callsign Generation Maybe It's Related to the Phase of the Moon C' Vol XVII No 4 Fall 1972 Celestial Mechanics Maximum Likelihood Estimation of an Orbit U Fall 1961 Unknown Vol XII No I Winter 1967 DOCID 3020956 -598 fb 13 -P L 86-36 Title Keyword K 3- I L 1' -lK usc 4JS ll 77P k 3- L ' Reference Vol XXIII No 2 Spring 1978 and Special Mathematics and Engineering Issue 1981- Channel Modeling and Code Performance Evaluation U Channels bl 1 Author ti -36 1983 Chatter Chi-Squares I Chatter Patterns A Last Resort U Vol 11 No 4 October 1957 On Comparing Two Observed Frequency Counts U Vol 111 No 2 April 1958 Vol VIII No Some Notes about ChiSquare U 3 Summer 1963 Vol XXlV No 1 Winter 1979 Chinese Language Note on Chinese Language Reform and NSA A U Wild Norman Vol I No 2 July 1956 Vol XII No 1 Winter With Love and Parentheses from Peking U 1967 Vol Ill No 4 December 1958 and Special Linguistics Issue Cipher Equipment Narrow-Band Speech Security U Cipher Machines Simultaneous Error Insinuation in Electronic Cipher Machines U Meyer Joseph A TUNNY Machine and Its Solution The U Tiltman John H Spring 1961 Brigadier Introduction t Vol XIV No 1 Winter 1969 Vol XIII No 1 Winter 1968 DoC4 -3 0 956 Keyword REF I D A 3 9 8 5 9 8 9 Author Reference Callimahos Lambros D Vol 111 No 1 J a n u a r y 1958 Title Representative Machine Cipher Systems U Ciphers Analytic Computer Technique fbr Anagrarnrning Columnar Transposition U Vol VIII No 2 Spring 1963 Attack on Blair-Huffman Encipherments An U Spring 1961 Boer War Cipher A UI Vol X No 3 Summer 1965 and Vol X No 4 Fall 1965 Cipher Signal Phase Modulation LT Vol XIV No 2 Spring1969 Vol XVI No 4 Fall 1971 Cryptanalyst's Nightmare An Oneiroic Problem and its Solution A U Callirnahos Lambros D Development of the Additive T h e U Tiltman John H Vol VIII No Brigadier 4 Fall 1963 Distribution of Letters in Short Messages of English T h e U 1- and Vol XIV No 2 Spring1969 Howard H Campaigne ibi 3 OGA Vol XIX NO 3 Summer 1974 New Approach to the OneTime Pad A U No Not Again IU Callimahos Lambros D Vol I No 1 April 1956 Note on a Solutionofa Polyalphabetic Dinome System A U On Cipher U Vol 1 No 3 October 1956 I Q E D -2 Hours 41 Minutes U Simple Homogeneity Test Using Log-Factors A U I Tetrahedral Plugging U IJ a n u a r y 1960 Callimahos Lambros D I Vol XVIII No 4 Fall Vol VIII No 4 Fall 1963 I h N O DOCID 3020956 Keyword Ciphony 9 I 9 Title 8 b 8 3 - i L 86-36 Author Reference Unbreakable Cipher The U Campaigne Howard H Spring 1961 Upgrading Selected U S Codes and Ciphers with a Cover and Deception Capability U Vol XXI No 1 Winter 1976 I ABC of Ciphony The U Vol I No 2 July 1956 and Special Linguistics Issue Circuit Analysis Computer Automation of Circuit Analysis U Vol VII No 4 Fall 1962 Circuits Analysis of a Transistor Monostable Multivibrator U Vol IV No 3 July 1959 Development of Automatic Telegraph Switching Systems U Vol 11 No 3 July 1957 Hybrid Circuits U Vol 111 No 1 January 1958 Low Cost Process for Printed Circuits A U Vol 11 No 1 January 1957 Modification of a Phantastron Generator A Vol IV No 4 October U 1959 I Civil War New Mode of Operations in Junction Transistors A U Vol 11 No 3 July 1957 Note on A Low Cost Process for Printed Circuits U Vol 11 No 3 July 1957 Transient Response of Tunnel Diodes with Resistive Loading U Vol VII No 1 Winter Transistor Phantastrons U Vol IV No 2 April 1959 Rocheford's Cipher A Discovery in Confederate Cryptography U 1962 Gaddy David W Vol XVIII No 4 Fall 1973 REF IDzA398598 DOCID 3020956 9 I Title Author Reference Cluster Analysis Application of Cluster Analysis and Multidimensional Scaling to the Question of Hands and Languages in the Voynich Manuscript An U D'Imperio Mary E Vol XXIII No 3 Summer 1978 Coaxial Cables Transient Analysis of Coaxial Cables Considering Skin Effect U Vol I No 2 July 1956 Code Bookbreaking Improvisations Part I U Vol XI No 3 Summer 1966 and Vol XI No 4 Fall 1966 Bookbreaking Improvisations Part 11 U Vol XI No 3 Summer 1966 and Vol XI No 4 Fall 1966 Generating Random Characters on a Computer Vol XII No 1 Winter U 1967 Typewriter Key and the Stereotype The U Vol IV No 4 October Keyword - - Code Generation Code Groups 1959 Vol XII No I Winter Bipolar Coding and Baseband Recovery ti Codes 1967 Computers -The Wailing Wall U Don't Be Too Smart U How the Germans Broke a 1 U S Code U I Meyer Joseph A El January 1960 Fall 1960 Lewis F W It Is Obvious T h a t A Painless Approach to Cryptanalytic Diagnosis U I Vol 111 No 2 April 1958 Vol X No 4 Fall 1965 Multilingual Codes U Report on the Keyword System A U Vol I No 3 October 1956 Kullback Solomon and F W Lewis Vol IV No 3 July 1959 -98 DOCID 3020956 33 3 - P L 36-36 Author Title Keyword Reference Use of Production Methods in Reading Transposed Letter Codes U Vol 11 No 1 January 1957 and Special Linguistics Issue Utilization of Code Limitations in Solving Bust Messages U January 1960 and Special Linguistics Issue With Love and Parentheses from Peking U Vol XII No 1 Winter 1967 Coding ABC of Ciphorly The U Vol I No 2 July 1956 and Special Linguistics Issue Collection Another Derivation of Binary Error Rates a s a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes U Vol X No 3 Summer 1965 Broadband Planar LogPeriodic Feed for the Spherical Reflector Used a t Arecibo Ionospheric Laboratory U Vol X No 3 Summer 1965 Computer Analysis Target Networks Intercept Probability U CATNIP - Collection of LINCOMPEX Signals U Cost-Effectiveness Study of Spectrum Surveillance Systems A U Digitizer Queuing Model for FROSTING U Experimental Approach to a n Environment Study in the H F Band U Val XVI No 1 Winter 1971 V O XVH No 2 Spring 1972 Vol XIV No 3 Summer 1969 u Vol XIV No 4 Fall 1969 Vol VIII No 4 Fall 1963 DOCID 3020956 REF IDzA398598 9 Keyword Title Author Reference a Vol XX No 2 Spring 1975 1%Minimizing Noise Effects in PCM U Vol 11 No 2 April 1957 On Milking the Sacred Cow U Vol XVII No 2 Spring 1972 Potential of Tropospheric Ducting a s a Collection Technique The C Vol XX NO 1 Winter 1975 RAKE System for Tropospheric Scatter A U V O X NO 4 Fall 1965 RF Interference Phenomenon and Intelligence Applications Vol XXIIE No 4 Fall 1978 u Security Architecture in SICINT Collection and Processing U Meyer Joseph A Vol XX No Jr 1 Winter 1975 Statistical Description of the Noise and Emitter Environment A U Vol X No 4 Fall 1965 Collection Management Collection Management U Vol XIV No 1 Winter 1969 COMINT COMINT Analysis and vol XVH No 2 Spring 1972 Reporting on the Developing Nations L' COMINT Signals Trends- vof x x v No 2 Spring 1980 Communications Intelligence Anonymous Vol 11 No 2 April 1957 e€w u Future Problems of Intercept u Language and the C M I N T Production Process U Gerson Nathaniel C Vol VIII No 1 Winter 1963 Vol XIX No 3 Summer 1974 DOCID 3 0 2 0 9 5 6 lb 3 1 - P L 86-36 Keyword I Title Author Reference -- Salemme Arthur Vol IV No 2 April 1959 J Language Files A Basic U COMINT Aid COMINT Target Identification Communications I Analysis of Sorting Techniques for Multiple Signal Intercept U Vol XII No 3 Summer ABC of Cifax The U Vol I No 2 J u l y 1956 Analysis of Lexical Meaning across Cultures An U 4 Fall 1968 1967 Vol XIU No Book Review Lincos Design of a Language for Cosmic Intercourse P a r t I U Vol VII No 1 Winter C a n We Lick the Voice Problem f U Vol XVII No 3 Summer 1972 I 1962 Capture-Jammingof SICINT Targets U Meyer Joseph A Vol XII No 2 Spring 1967 I Special Issue J a n u a r y 1971 Cepstrum Vocoder A U Channel Modeling and Code Performance Evaluation U Vol XXIII NO 2 Spring 1978 and Special Mathematics and Engineering Issue 19811983 - Hard Facts in the Cold War U Meyer Joseph A COMINT Communications for Operation - j Vol I No 2 April 1957 h Communications with Extraterrestrial Intelligence u I - Callimahos Lambros D h Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower J a m m e r U - - Spring 1961 Vol XI No 1 Winter 4 1966 Vol XXV No 4 Fall 1980 DOCID 3020956 REF ID A398598 7 ibl 31-P L 86-36 Keyword Title Author Reference Vol IV No 3 July 1959 Cover and Deception U Vol XI No Creation of an Artificial Ionosphere to Extend the Radio Horizon for Frequencies Below 100 MC The U 2 Spring 1966 Curiosa Scriptorum Serihorum To Write But Not to Communicate U Vol XVI No 3 Summer 1971 Developments in the Automatic Acquisition and Translation of Hand-Keyed Morse Code C Vol XXIV No 1 Winter 1979 Extraterrestrial Intelligence How Can the Communications Sciences Contribute to the Study of Natural Systems U Intercept System Analysis U Campaigne Howard H Vol XI No 2 Spring 1966 I Vol VIII No 3 Summer 1963 Vol XI No 2 Spring 1966 I Introduction to Magnetic Tape Recording and Its Use in Intercept Activities An U Introduction to Psycholinguistics Paralinguistics and Kinesics An U Vol I No 3 October 1956 Vol XII No u 2 Spring Ionospheric Propagation U Gerson Vol 111 No 4 December 1958 Key to the Extraterrestrial Messages U Vol XIV No 1 Winter 1969 mand 135 TOP A - Campaigne Howard H DOCID 3020956 - T REF IDgA398598 5 3 - J I 36-36 Keyword I Title Author Reference Linguistic Canonical Forms Tools for Analytic Progress Vol XIII No 1 Winter 1968 and Special Linguistics Issue 11 Markov Models for Phonetic Text U Vol XVIII No 1 Winter 1973 1 Noise Communication Technique for Speech U Vol VII No 4 Fall 1962 operation VANGUARD Vol I No 2 J u l y 1956 Preamble for Push-to-Tal k Ciphony A U Range Dependence on System Temperatures U Vol XII No 2 Spring 1967 Vol IV No 1 J a n u a r y 1959 1 k 3 - % WSC 103 k - I 8 JSf i9H b i 3 - P I 86-36 C Role of Carrier VCh Telephony in Soviet World W a r 11 Strategic Communications U Soviet Communications Journals a s Sources of Intelligence U Vol XIX No 3 Summer 1974 Vol IX No 3 August 1964 Vol XXV No 4 Fall 1980 Systems Approach to Training Radiotelephone Technicians The U Vol XVIII No 1 Winter Wireline Modem with Harmonic Distortion Equalization A U Vol x x v No 2 Spring 1980 and Special Mathematics and Engineering Issue 1981- 1973 1983 DOCID 3020956 b 3 - P L REF IDzA398598 P 86-26 Keyword Title Author Reference Comfiunications Satellites COMINTSatellites - A Space Communications Security Simulation of Cryptoprinciples LT Special Council of Learned Organization Issue 1972 Communist China Red China's Drive for Literacy U Vol XVI No 2 Spring 1971 Compilers Compiler Object Code Optimization Vol XVII No 1 Winter 1972 Computer Analytic Computer Technique for Anagramming Columnar Transposition U Vol VIII No 2 Spring 1963 FIR A CDC 1604 Program Vol X No 1 Winter 1965 Val IV No 4 October 1959 Problem L' for Solution of Systems of Linear Equations U Insolvable Problem An U Jacobs Walter W Computer Cryptanalysis Vol VIII NO 3 Summer 1963 Vol XIV No Solving a Playfair Cipher by Computer U 4 Fall 1969 Computer Diagnostics Reliability and Checking in Computing Systems U Vol 11 No 4 October 1957 Computer Graphics Example of Computer Graphics as Applied to Key Analysis An U Vol XXII No 1 Winter 1977 Inexpensive Device for Pictorial Input and Output An U January 1960 Some Graphical Display Techniques for Fourier Analysis U Computer Language APL Mechanization of Indirect Symmetry U U pecial Issue anuary 1971 01 0 3 XVII DOCID 3020956 REF ID A398598 9 Title Keyword - Author Reference Vol XII No 1 Winter 1967 SPECOL A New AND OR NOT Language for Use with Computers U Computer Operating Systems the Programmer's Friend An Extension of the IDASYS Operating System U OVERLORD Computer Processing 1 1 T C o r n p uProcessing ter in the 1980s U1 Computer Programming Computer Graphics in an Engineering Simulation Program U Help Stamp Out Programming U Phillips Cecil Vol XXII No 2 Spring 1977 Voi XXII No 2 Spring 0 1 Vol XVII No 2 Spring Jacobs Walter W Vol XIV No 3 Summer 1969 Introduction to Programming of a Digital Computer U Vol 11 No 3 July 1957 Programmatic Control of Parallel Processes U Vol XVII No 2 Spring 1972 Reading a Depth by Computer U Jacobs Walter W Vol X No 2 Spring 1965 Remote Access System U Vol IX No 2 May 1964 Scaling Matrix for the Analog Computer U Vol VII No 1 Winter RYE an Extended Capacity 1962 Thoughts about Systems and Program Design U Vol XVIII No 2 Spring 1973 Computer Security Designing Secure Reliable Software - A Methodology Vol XXI No 4 Fall 1976 U Computer Systems Centralized Computer Support of Field Activities U Special Council of Learned Organization Issue 1972 DOCID 3 0 2 0 9 5 6 Keyward -A398598 I Title Author Reference Scheduling Function in a Time-Sharing Environment The U Vol XVI No 2 Spring 1971 Computer Test Equipment Supporting the Support Facilities U Vol XVIII No 3 Summer 1973 Computer Use Report of the Second Computer Study Croup U Computer Working Aids Reverse Sort Machine Listings U Computers ABNER The ASA Computer Part 1 Design U Snyder Samuel S Vol XXV No 2 Spring 1980 The ASA Computer Part 2 Fabrication Operation and Impact U Snyder Samuel S Vol XXV No 3 Summer 1980 ABNER Various Vol XIX No 1 Winter 1974 Vol XVIII No 1 Winter 1973 Application of Human Factors to the Specification and Design of Interactive Computer Systems U Vol XXIV No 4 Fall 1979 Application of Queuing Theory to Computer Systems An U Vol XIV No 2 Spring 1969 APT System The U Vol XXIII No 3 Summer 1978 - Aristocrat An Intelligance Test for Computers U Campaigne Howard Vol VII No 2 Spring 1962 Assignment Algorithm Applied to Manual Cryptosystems U Val XX No 1 Winter 1975 Association Factor in Information Retrieval The U Winter 1961 Automatic Maintenance U Meyer Joseph A Vol IX No 1 Winter 1964 DOCID 3020956 b 3 - P L 86-36 Keyword I Title Author Reference Birth of ATLAS I U Vol XVIII No 1 Winter 1973 Book Review A History of Vol IX No 2 May 1964 NSA General-Purpose Electronic Digital Computers Book Review Mechanical Resolution oTLinguistic Problems U CAM I1 U Campaigne Howard H Vol 111 No 4 December 1958 r l Vol IX No 2 May 1964 CAMINO U Cleaning the Augean Stables or How Much TA Can a Computer Do U Vol XIII No 3 Summer 1968 Climbing Jacob's Ladder U Vol XII No 3 Summer 1967 Communications Security and Computers U Special Council of Learned Organization Issue 1972 Community Impacts on NSA Systems U Vol XXIII No 3 Summer 1978 Computer-Aided Bookbreaking of Two-Part Codes U Vol XVII No 2 Spring 1972 Computer Applications The Insatiable Appetite of the Analyst U Vol XIX No 4 Fall 1974 Computer Automation of Circuit Analysis U Vol VII No 4 Fall 1962 DOCID 3020956 REF IDzA398598 P k i ' - P L 86-36 Keyword Title Author Reference Computer Processing of Natural Languages U Special Council of Learned Organization Issue 1972 C o m u t e Processing r of l e l e m e t r y U Vol XIII No 3 Summer 1968 ib 1 i h 3 -50 IJSC 403 b 3 -P L 86-36 Computer Program Debugging A New Era U Vol X111 No 2 Spring 1968 and Special Computer and Information Sciences Issue Computer Scripting U Vol XXIV No 1 Winter 1979 Computer Sorting E Vol XIII No 3 Summer 1968 Computer There Is Thy Sting U Salemme Arthur Vol XVI No J 4 Fall 1971 Computer Transcription of Manual Morse U Vol 111 No 3 July 1958 Computerized Depth Reading U Vol XVII No 1 Winter 1972 Computers and Advanced Weapons Systems U Special Council of Learned Organization Issue 1972 Computers and Linguists Do Mix U Vol XVI No 3 Summer 1971 Computers and Queues U January 1960 DOCID 3020956 Keyword I Author Title Memories U Convolutions Cube Roots and Computer Cryptography U Reference Vol IX No 1 Winter I 1964 Vol XVIII No 3 Summer 1973 I Vol X No 1 Winter 1965 Vol IX No 3 August Cryptanalytic Use of HighSpeed Digital Computing Machines U Data Management Challenge T h e U 1964 I Vol XVI No 2 Spring 197 1 Data Structures and Their Representation in Storage P a r t I U D'Imperio Mary Data Structures a n d Their Representation in Storage P a r t I1 U D'Imperio Mary Vol IX No 3 August 1964 Vol IX No 4 Fall 1964 Vol 111 No 4 December Debugging Made EasierlU 1958 Vol XXII No 2 Spring 1977 Dialect A Data Type f o r t he Person-Machine Interface U Earliest Applications of the Computer a t NSA U Snyder Samuel S Vol XVIII No 1 Winter 1973 Vol XXiII No 1 Winter Extensible Model of a Hand Cryptosystem An U 1978 Famous First Facts NSA P a r t I Pre-Computer ' Machine Cryptanalysis U Fingerprinting Code Groups by Computer U I Snyder Samuel S Vol XVII No 4 Fall 1972 Vol XVII No 3 Summer 1972 DOCID 3020956 TOP-98598 Reference Author Title Keyword Foreign VS U S Computers An Appraisal U Special Council of Learned Organization Issue 1972 Frame versus Corpus U Vol XVII No 1 Winter Generating Random Characters on a Computer C Vol XII No 1 Winter 1967 Graceful Degradation through Distributed Growing up with Computers at NSA U I Eachus Joseph L2 Jacobs E Dale Marston Charles J Schierlmann Samuel S Snyder Moderator Howard H Campaigne Human-Machine Interfaces for NSA Computer Systems LT Information Theory Applied to Computer Data Compression U Introduction to APL An U D'Imperio Mary E Vol XXIII No 3 Summer 1978 Special Council of Learned Organization Issue 1972 Vol XXIV No 4 Fall 1979 Vol XXIII No 4 Fall 1978 and Special Mathematics and Engineering Issue 19811983 Vol XVI No 4 Fall 1971 Introduction to Computer Binary Arithmetic An C Vol 111 No 2 April 1958 REF IDzA398598 DOCID 3020956 b 3 - P 86-36 Keyword Title - Author Special Issue January 1971 Introduction to the Fast Fourier Transform An U LIGHTNING U LIGHTNING Program The Reference Campaigne Howard H Vol IV No 3 July 1959 Vol VIII No 1 Winter 1963 i b 1 b 3 - P L Magnetic Core Memories U Vol 11 No 1 January 1957 Mathematics and Computers in Cryptanalysis U Special Council of Learned Organization Issue 1972 V O XXIv No 4 Fall 56-36 1979 Model 204 -The Analyst's Computer U Vol XXI No 3 Summer 1976 MP-14 Unlimited Random Source U Vol XVII No 3 Summer 1972 On Operatorless Computers Vol I No 1 April 1956 Operation Babel U Vol IV No 3 July 1959 Optimum Use of Log Weights U Vol IX No 3 August 8 u 1964 Potential of Interactive Computer Programs in the Decryption Process of SIGINT The-WHBF Vol XXV No 3 Summer Program for Correcting Spelling Errors A U Vol IV No 4 October 1980 1959 DOCID 3020956 Key word 9 I 9 8 5 9 8 Author Title Reference Vol 111 No 2 April 1958 Restraining Barrier as Applied to the Biased Binary Counter U Rationale for and Preliminary Implementation of HYPERCAN High Performance Cryptanalysis U Vol XXIII No 4 Fall Redundancy Exploitation in the Computer Solution of Double-Crostics U Vol VII No 2 Spring 1962 Repagination Li Vol XVIII No 4 Fall 1978 1973 Special Purpose Cryptanalytic Computers State of the Art U Status of Optical Logic Elements for Nanosecond Computer Systems U Vol XXIII No I Winter I Study of Character-Handling D'Imperio Mary by Computer at NSA A U E I 1978 Vol VIII No 3 Summer 1963 Vol XIV No 2 Spring 1969 Take Care of Your Pennies U Vol 111 No 1 January Technology of Future Powerful Personal Computers The U Vol XXV No 3 Summer 1980 TEMAC Text Macro Compiler A Machine Language for Processing Text U D'Imperio Mary Vol X No 3 Summer 1965 and Computer and Information Science Issue REF ID A398598 DOCID 3020956 Keyword 9 I Title Author Reference Time Is -Time Was -Time Is Campaigne Past Computers for Howard H Intelligence U Vol X No 1 Winter 1965 and Computer and Information Science Issue Tunnel Diode Characteristic Function Generator U Vol VIII No 1 Winter 1963 Summer 1961 Tunnel Diode Dynamic Logic Module A U Under-Developed Languages Under-Utilized Computers u Word Spotter A U Computing I Vol XX No 1 Winter 1975 I Vol IV No 4 October Introduction to Log-Linear Models in Cryptanalysis Ul Vol x x v No 2 Spring 1980 Vol 111 No 4 December New Concept in Computing A U 1958 COMSEC Special Council of Learned Organization Issue 1972 Communications Security and Computers U COMSEC a t RID S i t e s R TEMPEST Considerations in - Cribbing Techniques Some Cribbing Techniques U Vol VII No 4 Fall 1962 n I Automatic Data Processing Equipment Installations U Weather or Not Encrypted Gerson Nathaniel C Vol XIV No 1 Winter 1969 Vol XII No 4 Fall 1967 Vol XXIII No 1 Winter 1978 REF IDrA398598 DOCID 3020956 w I Title Keyword Author Reference b 11 b 3 - 5 0 USC 403 Crisis Management Crisis Management in the National Senior Cryptologic Course U Zoebelein Arthur J 1977 Special Council of Learned Organization Issue 1972 Telecommunications from the Torn-Tape to t h e Computer L Cryptanalysis Addendum to A Cryptologic Fairy Tale U Vol XXII No 1 Winter Tiltman John H Vol XVIII Brigadier No 1 Winter 1973 I Analysis of Digital Plaintext Autokey Systems T h e U Callimahos Lambros D Vol XIV No 2 Spring 1969 Vol X No 1 Winter 1965 Apparent Paradox of Bayes Factors T h e L' Vol XIX No 4 Fall 1974 Vol XXIV No 3 Summer 1979 Aristocrat - An Intelligence Test for Computers L' Carnpaigne H Vol VIl No 2 Spring 1962 Assignment Algorithm Applied to Manual Cryptosystems U Bayes Marches On L Birth of ATLAS I LT 1 Vol XX No 1 Winter 1975 J a n u a r y 1960 Vol XVIII No 1 Winter 1973 b 3 - P L 86-36 DOCID 3020956 Keyword Author Reference Book Review Analyses of Campaigne Howard H the Case n 3 in Algebraic Cryptography with Involutory Key-Matrix and Known Alphabet Journal fur die Reine und Angewandte Mathematik U Vol IX No 3 August Title 1964 Vol VII No 3 Summer Lewis Frank W Book Reuiew Cloak Cipher U 1962 Book Review Cryptanalysis of the Single Columnar Transposition Cipher U Callimahos Lambros D Book Review Military Cryptanalytics Part I1 U Campaigne Howard H Capture-Jamming of SIGINT Targets U Meyer Joseph A Summer 1961 Vol IV No 4 October 1959 Vol XII No 2 Spring Classes of Rotors without Parallels U Val X No 4 Fall 1965 Computer Generation of Unrelated Latin Squares U Vol X No 3 Summer 1965 Computerized Depth Reading U Vol XVII No 1 Winter 1972 Computers -The Wailing Wall U Meyer Joseph A Vol I No 3 October 1956 Vol XXII No 3 Summer 1977 Conjugate Codebooks U Vol XI No Coupon Collecting and Cryptology U 4 Fall 1966 Cryptanalysis in the German Air Force U 2 April 1959 Vol IV No I Cryptanalysts Nightmare An Oneiroic Problem and Its Solution A U I Callimahos Lambros D Vol XVI No 4 g $ % i usc -At3 bi 3 - P L E DOCID 3020956 Keyword -398598 1 Title Author Vol IX No Cryptanalytic Applications of Sequential Analysis U I Reference 3 August 1964 Vol IX No 3 August Cryptanalytic Use of HighSpeed Digital Computing Machines U 1964 Vol XVI No CXCO Story The U 4 Fall 1971 Vol XIV No 1 Winter Cybernetics and Problems of Diagnostics the Parallels between Medicine and Cryptanalysis U Callimahos Lambros D Double Transposition - A Special Case U Tiltman J o h n H Vol XVII Brigadier No 4 Fall I 1969 1972 Education in Diagnosis ILJ Vol XIV No 1 Winter 1969 Euclidean Algorithm and Distances between Wheel Settings The U Vol VIII No 1 Winter Extensible Model of a Hand Cryptosystem An U Vol XXIII No 1 Winter 1963 1978 Extreme Values in Cryptanalysis U Fallacy of the One-Time-Pad Excuse T h e U Fourier iVIodulus Method of Cage Identification u Garden Paths 1 Have Followed U Vol IV No 4 October 1959 Lewis Frank W n - Lewis Frank W Vol XIV No 3 Summer 1969 April 1960 Vol IX No 3 August 1964 GEE WHIZZER U Unknown Vol VIII No 1 Winter 1963 DOCID 3020956 Author Title Keyword Reference German Tires and Black Cats Estimation of Population Size U Vol XIX No 3 Summer Hierarchical Clustering of Cryptanalytic Data and Comparison with Multidimensional Scaling The U Vol XXI No 4 Fall 1976 I How to Choose a Good Crib U Vol X No 4 Fall 1965 International or CrossCountry Depths U Vol I No 3 October 1956 1974 Vol XVI No Introduction to APL An U 4 Fall 1971 Introduction to Diagnosis U 3 I Introduction to IBM Methods in Cryptanalysis An U Introduction to Log-Linear Models in Cryptanalysis U Callimahos Lambros D Vol 11 No 3 July 1957 Vol x x v No 2 Spring 1980 Logarithmic Scoring and Preliminary Testing U Vol 11 No 1 January 1957 Long and Short of Single Transpositions The U Vol XXI No 2 Spring 1976 Magic Digraphs U Vol XII No 1 Winter 1967 I Mechanical Treatment of Fibonacci Sequences A U Vol 11 No 4 October 1957 Method of Recovery of Fibonacci Key A U Vol I No 3 October 1956 1 Mickle-Muckle Principle in I I Hagelin r y t a n a l The sis LI Modified Normal Curves U Vol IX No 4 Fall 1964 Spring 1961 DOCID 3 0 2 0 9 5 6 98598 Keyword Title Author Reference MP-14 Unlimited Random Source U Vol XVII No 3 Summer 1972 Notes on Chi-square in Cryptanalysis U Vol 11 No 3 July 1957 Number of Components in Random Linear Graph The Vol IV No 2 April 1959 U Vol IV No July 1959 On Cryptanalysis and Redundancy U On Key Analysis U On Tests of Sequences U Vol XIX No Callimahos Lambros D 4 Fall 1974 Kullback Solomon and Vol VII No 1 Winter 1962 On the Expected Number of Random Stops Corresponding to a Given Menu U Val VIII No 1 Winter On the Maximization of X AX over the Vertices of the Cube Vol VIII No 1 Winter u Optical Data Processing - A Cryptanalytic Perspective u Penney-Ante U 1963 1963 Vol XX No 3 Summer 1975 Vol XII No 1 Winter 1967 Potential of Interactive Computer Programs in the Decryption Process of SIGINT The TFT3Wj Vol XXV No 3 Summer Randomization Made to Order Random Numbers Are Too Important to be Left to Chance U Special Council of Learned Organization Issue 1972 1980 DOCID 3020956 Keyword I Author Title Rationale for and Preliminary Implementation of HYPERCAN High Performance r i t a n a l y s i s Vol XXIII No 4 Fall 1978 U Vol XVI No 3 Summer 1971 Recognition of Latin Square Equivalence Classes U I Reference Recovering the Structure of a Linear Shift Register U Vol XIV No I Revision - d e novo A U 4 Fall 1969 Wray W D Vol I No 3 October 1956 Vol XI No 2 Spring 1966 Sliding Strips Additive Subtractive and Minuend U Solution of AdditiveMinuend Busts U Vol 111 No I January 1958 Solution of a Fractionated Monome-Dinome System U Vol 11 No 2 April 1957 Lutwiniak Solution of a Polyalphabetic Monome-Dinome System U William Vol I No 3 October 1956 Solution of VEJX-0 or the Uses of Delta U Vol XVIII No 2 Spring 1973 Lutwiniak William Vol XIV No Some Applications of the Chi- Callimahos Square Test in Cryptanalysis Lambros D U 4 Fall 1969 Some Observations on Computer Aids to indicator Recovery U Vol XVII No 4 Fall 1972 Some Reminiscences U Something'May Rub Off u Tiltman John H Vol XI No Brigadier 3 Summer 1966 Lewis F W Text Recognition Procedure for Cryptanalysis A U W E T UMBRA Vol X No 1 Winter 1965 Vol XI No 3 Summer 1966 - DOCID 3020956 n-398598 $ b 31-P I 86-36 Key word I Title Author ReferenCe Vol XXI No 2 Spring Theory and Applications of Three-Way Multidimensional Scaling 1976 Vol XIII No 3 Summer 1968 Vol 111 No 2 April 1958 This Matrix Business Part I1 U Vol 111 No 4 December 1958 Unbreakable Cipher The U Campaigne Howard H Spring 1961 Use of Bayes Factors with a Composite Hypothesis U Vol IX No 4 Fall 1964 What Next Dr Trithemiu Lewis Frank W Vol XI No 4 Fall 1966 U Vol XIX No 1 Winter Will the Real 53 Stand Up U 1974 Z-Flags in Hagelin Cryptanalysis U Fairbanks Sydney Vol IX No 1 Winter 1964 Cry ptanalytic Personnel Cryptographic Security On the Selection of Cryptanalysts -Part I1 U April 1960 On the Selection of Personnel for Cryptanalysis U January 1960 Some Principles of Cryptographic Security U Tiltman John H Brigadier Vol XIX No 3 Summer 1974 Cryptography Book Review Recent Literature on Algebraic Cryptography U Book Review Variable Campaigne Matrix Substitution in Howard H Algebraic Cryptography U Vol VII No 2 Spring 1962 Vol IV No 4 October 1959 DOCID 3020956 Title Author Categories of Cryptographic Lewis Frank W Phenomena - With a Few Examples of Effect and Cause Reference Vol XII No 4 Fall 1967 U Vol XVIII No 3 Summer 1973 Convolutions Cube Roots and Computer Cryptography UI De Profundis or the ABC of Depth Reading U Callimahos Lambros D I Generation of Permutations Vol IX No U 2 May 1964 Intuitive Exposition of Zierler's Method for Finding Linear Recursions An U Vol XIII No 1 Winter On the Distribution of nDigit Groups by the Sum of Their Digits U Vol I No 2 July 1956 Philosophy of U S Cryptography and Cryptographic Usage A U Vol XII No 3 Summer Recollections Concerning the Birth of One-Time Tape and Printing-Telegraph Machine Cryptography U Cryptologic History Vol 11 No 1 January 1957 ABNER The ASA Computer Part 1 Design U 1968 1967 u Vol I No 2 July 1956 Snyder Samuel S Vol XXV No 2 Spring 1980 The ASA Cbmputer Part 2 Fabrication Operation and Impact U ABNER About NSA U Snyder Samuel S Vol XXV No 3 Summer 1980 Vol IV No 1 January 1959 Boer War Cipher A U Vol X No 3 Summer 1965 and Vol X No 4 Fall 1965 Book Review Norse Medieval Cryptography in Runic Carvings U Vol XIII No 3 Summer -- -- ------ DOCID 3 0 2 0 9 5 6 Keyword - - - - 1COE-98598 I Author Title Book Reviews Pearl Harbor Unknown reviewer Warning and Decision Roberta Wohlstetter But Not in Shame John Toland The Secret War Sanche de Cramont CIA - The lnside Story Andrew Tully Now It Can Be Told Leslie R Groves Thinking A bout the Unthinkable Herman Kahn Strike in the West James Daniel and John G Hubbell Reference Vol VIII No 1 Winter 1963 U Book Review The Broken Seal L' Callimahos Lambros D Yol XII No 3 Summer 1967 Can Cryptologic History Repeat Itself U I Cryptologic Fairy Tale A Friedman William F Vol XVIII NO 3 Summer 1973 Tiltman John H Vol VII No 2 Spring Brigadier 1962 Vol XVI No 4 Fall 1971 Der Fall WICHER German Knowledge of Polish Success on ENIG IA L Meyer Joseph A Vol XX No 2 Spring 1975 Drama in Cryptologic Life Callimahos Lambros D Vol XIX No 1 Winter U 1974 Experiences 1920-1939 U Tiltman John H Vol XVII No 3 Brigadier Summer 1972 GEE System - I The U1 Unknown Fall 1961 - 11 The U Unknown Vol VII No 1 Winter GEE System 1962 GEE System - 111 The U 155 TOP Sh- Unknown Vol VII N o 2 Spring 1962 -598 DOCID 3 0 2 0 9 5 6 ' b '1-t 1 86- 6 Keyword I Title Author 1 GEE System - IV The U Unknown Reference Vol v11 No 3 Summer 1962 GEE System - V The U Vol VII No 4 Fall 1962 German Agent Systems of World War I I W I Lewis Frank W Vol VII No 3 Summer 1962 Vol x x v No 4 Fall German Radio Intelligence iui 1980 Gweeks Had a Gwoup for It The U Filby P W Vol XXI No 2 Spring 1976 How the Japanese Army Water Transport Code 2468 Was Broken U Introduction to Cryptology I An U Vol XVIII No 4 Fall 1973 Friedman William F Vol IV No 4 October 1959 Introduction to Cryptology 11 An U Friedman William F April 1960 Introduction to Cryptology 111 An U Friedman William F Fall 1960 Introduction to Cryptology IV An U Friedman William F Winter 1961 Introduction to Cryptology V An L' Friedman William F Summer 1961 Introduction to Cryptology VI An U Friedman William F Fall 1961 John Dee Consultant to Queen Elizabeth I U Vol XII No 4 Fall 1967 Maya Astronomical Computer The U Vol XXII No 1 Winter 1977 Midway and Yamamoto Properly Revisited U Vol XIII No 3 Summer 1968 DOCID 3020956 9 8 5 9 8 i Keyword I Title Author Reference Personal Contribution to the Bombe Story A U Vol XX No Precursor of Modern Communications Intelligence Vol 111 No 3 July 1958 4 Fall 1975 U Preliminary Historical Report on the Solution of the B Machine U Unknown Project EXPLORER U Vol 1X No 2 May 1964 Vol XVI No 2 Spring 1971 Ib 31-P I 86-36 Reading TUNNY U Campaigne Howard H Vo VII No 4 Fall 1962 Rocheford's Cipher A Discovery in Confederate Cryptography U Gaddy David W Vol XVIII No 4 Fall Rosetta Stone and Its Decipherment The U Callimahos Lambros D 1973 Vol XVI No 1 Winter 1971 SIGINTing with SACO Experiences with the Rice Paddy Navy U1 Vol XXI No 1 Winter 1976 Vol XXI No 1 Winter 1976 Solution of the Japanese PURPLE Machine The U Friedman William F Val XIX No 1 Winter 1974 Room 40 Compromise The U Meyer Joseph A Vol XXV No 1 Winter 1980 Cryptologist Can He Exist The Ul Book Review Basic Cryptologic Glossary n Vo 11 No 3 July 1957 Vol XI No 1 Winter 1966 Book Review Lost Languages u U DOCID 3020956 Keyword 9 Title Author Borders of Cryptology The U Reference Vol IV No 4 October 1959 Elements of Shift Register Cryptology U Vol XVI No 2 Spring 1971 Flattening Effect The U Kullback S Insolvable Problem An U Jacobs Walter W Null Hypothesis The U Campaigne Howard H Probabilities of Hypotheses and Kullback-Leibler Information-Statistics in Multinomial Samples U Science and Cryptology U Turing's Contributions to Cryptology U Vol X No 1 Winter 1965 Vol VIII No 3 Summer 1963 Vol I No 2 J u l y 1956 Vol I No 3 October 1956 Engstrom Howard T Vol 111 No 3 July 1958 Vol VIII No 3 Summer 1963 Cryptomathematics - 1 3 -13 USC 7 8 Enumeration of the Square Permutations of the Symmetric Group U Vol XVIII No 4 Fall 1973 Vol XIX No 4 Fall 1974 Multiple Hypothesis Testing and the Bayes factor U Vol XVI No 3 Summer 1971 Vol XXIV No 3 Summer 1979 Survey of the Distance Problem A U Vol XVIII No 2 Spring 1973 I DOCID 3020956 b l 9 3 9 8 5 9 8 -P L 86-36 Author Cryptosecurity Reference Matter Transmission U b 1 b 3 -50 USC 403 b 3 -P L 86-36 Cryptosystem identification Cryptosysterns No 1Winter Cryptovariables Currents Thin Film Shifting Matrix A Cybernetics Communications Sciences Contribute to the Study of Natural Systems U Data Compression Information Theory Applied to Computer Data Compression U Vol XXIII No 4 Fall 1978 and Special Mathematics and Engineering Issue 19811983 Data Management Data Management Challenge The U Vol XVI No 2 Spring 1971 Data Processing AR System The U Community Impacts on NSA Systems U Vol XXIII No 3 Summer 1978 Vol XXIII No 3 Summer 1978 DOCID 3020956 REF ID A398598 TFP RA Keyword Title Integrated and Guided Wave Optics and Device Applications U Author Reference Vol XXIV No 2 Spring 1979 and Special Mathematics and Engineering Issue 19811983 Optical Data Processing - A Cryptanalytic Perspective u REDMAN Vol XX No 3 Summer 1975 Program The U Vol IX No 1 Winter 1964 Data Representation Representing Data in Computers U Vol 111 No 1 January 1958 Data Standardization Data Standards Databases Data Standards for SICINT Activities - Some Conflicting Objectives U Data Standardization and the Trace Factor U Database Services U Vol XM No 1 Winter 1971 Vol XVI No 2 Spring 1971 Vol XII No 1 Winter 1967 Debugging Computer Program Debugging A New Era U Vol XILI No 2 Spring 1968 and Special Computer and Information Sciences Issue Debugging Made Easier U Vol 111 No 4 December 1958 Deception Cover and Deception U Vol IV No 3 July 1959 DOCID 3020956 REF IDzA398598 -BRA Keyword I Title Author Reference Vol XXI No 1 Winter 1976 Upgrading Selected U S Codes and Ciphers with a Cover and Deception Capability U Zoebelein Arthur J Vol XXII No 1 Winter 1977 Decision Making Crisis Management in the National Senior Cryptologic Course LT Degaussing Measurement of Insecurity for Imperfect Erasure A U Vol XXII No 1 Winter 1977 Dictionaries Look a t It This Way C Vol XVIII No 1 Winter 1973 Dictionary References Fast Look-up in a Threaded Dictionary U Vol XVI No 1 Winter 1971 Digital Circuits Fundamentals of Majority Logic U Vol IV No 4 October 1959 Digital Data Data Transmission Over Telephone Circuits U Vol IV No 1 January 1959 Digital Recordings Electrical and Magnetic Properties of Computer Tape Vol IX No 1 Winter 1964 U Digital Signals Analysis Specia 1 Issue January 1971 WARSAN I1 -An Implementation of the FFT and Other Tools for Digital Signals Analysis U Direction finding Vol IV No I January 1959 Errors in High Frequency Direction Finding U U S Program in Direction Finding A U Distribution Degrees of Freedom in an Nbit Frequency Distribution U Document Destruction Emergency Destruction of Documents U Gerson Nathaniel C Vol X No 2 Spring 1965 Vol I No 1 April 1956 Shinn L E Vol I No 1 April 1956 DOCID Keyword Document Storage Title Author Reference Vol XII No 2 Spring Threaded File Retrieval System U 1967 Dynamic Memory Earth Satellites Editing Processes for Random and Sequential Accessing in Dynamic Memories U Vol XXII No 4 Fall Determination of Missile and Earth Satellite Trajectories from Radar Observations U April 1960 Operation VANGUARD Vol I No 2 July 1956 Textual Criticism and NSA U Vol XIV No 3 Summer 1977 1969 Editorials Collected Editorials of Sydney Fairbanks U Electricity Darlington Compound Transistor a s a Current Controlled Voltage Source A U Intercept and Electromagnetics U Fairbanks Sydney April 1956 July 1959 Vol IX No 4 Fall 1964 Gerson Nathaniel C Vol XX No 2 Spring 1975 Thermal Noise U Electromagnetics Intercept of USSR Missile Transmissions U Electronic Warfare Borders of Cryptology The U Vol VII No 3 Summer 1962 Gerson Vol IV No 3 July 1959 Vol IV No 4 October 1959 Electronics ELINT Introduction to Semiconductor Physics and Diode Theory U Vol 11 No 2 April 1957 - A Study in Technical Drawing to a Straight Flush Vol XXI No 3 Summer Intelligence U 1976 DOCID 3 0 2 0 9 5 6 9 9 8 5 9 8 b 3 -E L 86-36 u 1 b jj-53 USC 403 5 3 -P L 16-36 Keyword I Title Future Problems of Intercept SELLNOW Author Reference Vol VIII No 1 Winter Gerson Nathan iel C I - A Man-Machine Communication System for ELINT Data U Vol IX No 2 May 1964 li3 Vol VIII No 4 Fall 1963 ELINT Collection Real-Time Raster U Vol XXIV No 1 Winter 1979 Encipherment Offsets of Differences Summation and Difference Methods U Vol 11 No 4 October 1957 Solution of Hill's Basic Algebraic Methods for Enciphering Polygraphs UI Vol I No 2 July 1956 Time-Element Scramble U Vol VII No 4 Fall 1962 Electrical Design of Random Sequence Generators U Vol IX No 3 August 1964 Encryption Vol XXIV No 4 Fall 1979 Engineering Meyer Joseph A Vol VII No 3 Summer 1962 Meyer Joseph A Vol XX No 2 Spring 1975 Approach The U ENIGMA Equipment Emanations Esperanto Der Fall WICHER German Knowledge of Polish Success on ENIGMA Li Personal Contribution to the Bombe Story A U Vol XX No 4 Fall 1975 Standard for Evaluating the Intelligence Content of Equipment Emanations U Vol IX No 3 August 1964 I Language Problem a t NSA The U Vol I No 1 April 1956 DOCID 3020956 Keyword Ethics Title COMINT - Hard Facts in the Author Meyer Joseph A Reference Spring 1961 Cold War U Extraterrestrial Intelligence Vol VII No 1 Winter Book Reuiew Lincos Design of a Language for Cosmic Intercourse Part 1 U Communications with Extraterrestrial Intelligence 1962 Callimahos Lambros D Vol XI No 1 Winter 1966 U Extraterrestrial Intelligence U Campaigne Howard H Vol XI No 2 Spring 1966 Key to the Extraterrestrial Messages U Campaigne Howard H Vol XIV No 1 Winter 1966 Facsimile ABC of Cifax The U Vol I No 2 July 1956 FDM Signals FDM Activity Detection U Vol XXI No 1 Winter 1976 Field Sites Centralized Computer Support of Field Activities U File Storage Minimizing Wasted Space in Information Files U Special Council of Learned Organization Issue 1972 Vol XIV No 4 Fall 1969 Films Deposited Films - Magnetic Elements for the Memory of the Future U Vol I No 3 October 1956 Filters Parabolic Mock Design for an FFT Implemented Filter Scheme U Special Issue January 1971 Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters U Vol XIII No 4 Fall 1968 Special Mathematics and Engineering Issue 1981- - 1983 Keyword I REF IDzA398598 DOCID 3020956 I Title Author Reference Foreign Languages Look a t It This Way U Vol XVIII No 1 Winter 1973 FORTRAN Compiler Object Code Optimization U Vol XVII No 1 Winter 1972 Writing Efficient FORTRAN U Vol XVII No 2 Spring 1972 Degrees of Freedom in an Nbit Frequency Distribution Vol I No 1 April 1956 Frequency U Entropy of German The U Vol I No 2 July 1956 Error Formula for Iterative Prefiltering Frequency Estimates An U Vol XXII No 3 Summer 1977 I Mathematical Analysis of Jitter in a Digital Frequency Source U Vol VIII No 2 Spring 1963 Realization and Optimization of the Audio Frequency Microminiature Thin Film Band-Pass Filters U Vol XIII No 4 Fall 1968 Special Mathematics and Engineering Issue 19811983 Frequency Hopping Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer U Vol x x v No 4 Fall 1980 Games Hoopscotch U Vol XII No 2 Spring 1967 Garbles Quick Check for Transposal Garbles A U Vol IV No 2 April 1959 and Special Linguistics Issue REF 1 3 9 8 5 9 8 6 DOCID 3020956 b -F L 66-36 Title Keyword Author Reference r German Air Force Cryptanalysis in the German Air Force U Vol IV No 2 April 1959 German Code Special Felix System The U Kullback Solomon Vol IV No 2 April 1959 German COMINT German Radio Intelligence U Vol x x v No 4 Fall Germans I Fall 1960 How the Germans Broke a U S Code U Cryptologic Fairy Tale A Germany Ul I 0 I 1980 Tiltman John H Vol VII No 2 Spring Brigadier 1962 GEE System - I The U1 Unknown Fall 1961 G E E System - 11 The U Unknown Vol VII No 1 Winter b 13 -50 USC 4 C 3 h - I 5 iJS l F 1962 -E L 6- 6 GEE System - 111 The U Unknown Vol VII No 2 Spring 1962 GEE System - IV The U Unknown Vol VII No 3 Summer I 1962 GEE System - V The U Vol VII No 4 Fall 1962 German Agent Systems of World War I I T S f ' Lewis Frank W Vol VII No 3 Summer 1962 Reading TUNNY U TUNNY Machine and Campaigne Howard H Its Solution The U Vol VII No 4 Fall 1962 Tiltman John H Spring 1961 Brigadier Vol XVI No 4 Fall 1971 Groups Abstract Groups Defined by Generating Operators U Sinkov Abraham April 1960 DOCID 3 0 2 0 9 5 6 Keyword I Title Author Reference J Automatic Crib-Dragging Device for Hagelin Machines An U Vol I No 1 Mickle-Muckle Principle i n Hagelin Cryptanalysis The U Vol IX No 4 Fall 1964 H F Collection CANDEW A Methodology for Evaluating H F Collection Potential U Vol XXII No 3 Summer 1977 History About NSA U Vol lv No 1 January 1959 H u m a n Factors Application of Human Factors to t h e Specification and Design of Interactive Computer Systems U Vol XXIV No 4 Fall 1979 IBM Electrical a n d Magnetic Properties of Computer Tape U Vol IX No 1 Winter Hagelin Machines IFF IFF A New Branch of Cryptology U Information Analysis Cybernetics a n d Problems of Diagnostics the Parallels between Medicine and Cryptanalysis U Information Management Data Standardization and t h e Trace Factor U Scientific a n d Engineering Information Management in t h e Department of Defense April 1956 1 I Callimahos Lambros D 1964 Vol 11 No 4 October 1957 Vol XIV No 1 Winter 1969 r Vol XVI No 2 Spring 1971 Vol X No 2 Spring 1965 L' Information Retrieval Association Factor in Information Retrieval The Winter 1961 U Information Storage and Retrieval U Use of t h e B-Coefficient in Information Retrieval The U Vol VIII x o 4 Fall 1963 I Vol XIII No 4 Fall 1968 DOCID 3 0 2 0 9 5 6 - Author Title Key word Reference - Vol XIII No VIDEOFILE A New Information Storage Information Systems Information Storage System 2 Spring Six Characteristics of Information Handling Systems U Vol XIV No 3 Summer Information Theory and the Packing of Spheres U Vol IV No 2 April 1959 1969 I Information Theory Some Notes on Information Theory U Information Transmission Some Properties of the TwoState First-Order Mslrkov Chain U Intercept CATNIP Computer Analysis - Target Networks Intercept Probability U Vol I No 1 April 1956 Kullback Solomon Some Applications of Information Theory U 7 1 I Vol IV No 1 January 1959 Vol IX No 4 Fall 1964 u Vol XVI No 1 Winter 1971 Communications Intelligence Anonymous U Vol 11 No 2 April 1957 Determining Intercept Assignments U Vol XII No 2 Spring 1967 Vol X No 2 Spring 1965 Extending the Radio Horizon for Intercept Purposes by Using the Moon as a Reflector C Intercept System Analysis U Interference and Intercept U Recording Techniques Affecting Total Intercept I Vol XI No 2 Spring 1966 I Gerson Nathaniel C Vol XVI No 1 Winter 1971 Vol IX No 1 Winter 1964 Six Point Program for Improved Intercept Part I u Cerson Nathaniel C Vol VII No 3 Summer 1962 1 I I DOCID 3020956 - -398598 b 3 - P L Keywords Title 86-36 Author Reference Vol XII No 1 Winter Verified Intercept Predictions U 1967 intercept Evaluation Wideband and the SlClNT System U Vol VIII No 4 Fall 1963 Evaluating Intercept Techniques U Vol XI No 2 Spring 1966 Intercept Sites Time Coordination of SIGINT Sites U Interpolation Note on Univariant Interpolation U Vol X u NO 2 Spring 1967 Vol 111 No 4 December 1958 Vol X No 3 Summer 1965 Inventions Patent Matters and the Technical Employee U Ionosphere Ionospheric Propagation U 1Polar Ionosphere The U JACQUARD Machine Jamming Japan Japanese Language Cerson Vol 111 No Nathaniel C and 4 December 1958 Gerson Nathaniel C Summer 1961 JACQUARD - A Yates Algorithm Machine U Special Fast Fourier Issue August 1973 Computer Simulation of the Vulnerability of Frequency Hopping Communications Systems to a Follower Jammer U Vol x x v No 4 Fall How the Japanese Army Water Transport Code 2468 Was Broken U Vol XVIII No 4 Fall Study ofJapanese Nominalization A U Vol XXIII No 2 Spring 1980 1973 1978 Japanese Military Key Don't Be Too Smart U Tetrahedral Plugging U January 1960 Vol VIII No 2 Spring 1963 c8 DOCID 3 0 2 0 9 5 6 ibi 131-50 USC 403 b l 11 b 3 -ie USC 798 b 3 -P L 86-36 Keywords 1 Title Author Reference I Vol XXIV No 3 Summer 1979 Key Generators m b i n i n gFunctions in Key I Generators U Spring 1961 u Vol XXI No 4 Fall 1976 Keyword Recognition Whole New World of Speech A Or Maybe 1984 Will Be a Good Year After All U Keywords Possible Applications of Keyword Recognition in Voice Intercept U Gurin Jacob Report on the Keyword System A U Kullback Solomon and F W Lewis Korean W a r Vol XXII No 1 Winter 1977 Vol IV No 3 J u l y 1959 En Vol XXIV No 1 Winter 1979 Language na ysis o exlca eaning Across Cultures An U Book Review Mechanical Resolution of Linguistic Problems U u Campaigne Ifoward H Vol XIII No 4 Fall 1968 Vol 111 No 4 December 1958 Computer Scripting U Vol XXIV No 1 Winter 1979 Vol XVIII No 3 Summer 1973 Vol XIX No 3 Summer Language a n d the COMlNT Production Process U 1974 Language as a Bulk Commodity U Language Levels and Cryptologic Jobs U 1 Vol XX No 3 Summer 1975 Vol XV II No 3 Summer 1973 REF ID A398598 9 DOCID 3020956 ' b 3 -P L 86-36 Title Keywords Author u I Language Problem a t NSA The U Lay man's Guide to the Mysteries of Linguistics A u I Linguistic Canonical Forms Tools for Analytic Progress IUI Multilingual Codes U Gurin Jacob Reference r Vol I No 1 April 1956 Vol XXIII No 1 Winter n 1978 Vol XIII No 1 Winter 1968 a n d 1 Special Linguistics Issue I1 u I Nest of Dragons A T h e Voice Problem U Vol X No 4 Fall 1965 Curin Jacob Vol XXI No 1 Winter 1976 Vol XX No 1 Winter Under-Developed Languages Under-Utilized Computers Ul Words a n d the Intelligence Value of Conversations U 1975 Gurin Jacob Vol XXIII No 2 Spring 1978 Language Acquisition Investigations into Adult Language LearningIAcquisitions U Vol XXIV No 3 Summer 1979 Language Aids Trots in Foreign Language Study U Vol 11 No 1 J a n u a r y 1957 and Special Linguistics Issue Language Dictionaries Problems of Meaning in Interlingual Dictionaries U Vol 111 No 1 J a n u a r y 1958 Language Identification Note on the English VCCCC Pattern or Maximum PostVocalic Consonant Clustering in Monosyllabic English Words A U Vol XVII No 1 Winter 1972 Language Modeling Two New Language Models Vol XXIV No 3 Summer 1979 U I DOCID 3020956 Keywords 1 Author Title Reference Special Council of Learned Organization Issue 1972 Language Processing Natural Languages U Language Proficiency Multichannel Language Processing as a System U Vol XVII No 4 Fall Contextual Testing in Establishing Minimum Working Level Language Proficiency U Vol x x v No 1 Winter Language Training Worldwide Language Problems a t NSA U Latin Squares Computer Generation of Unrelated Latin Squares U Learning Machines Learning Machines U - Learning Machines Part I1 1972 1980 Vol XIII No 4 Fall 1968 u Vol X No 3 Summer 1965 Jacobs Walter W Vol 111 No 3 July 1958 Jacobs W W Vol IV No 2 April 1959 U Vol XIII No 2 Spring Library and the User The Library U 1968 Light Reading Learn with BOOK U Vol XI No 3 Summer Linear Prediction Error Formula for Iterative Prefiltering Frequency Estimates An U Vol XXII No 3 Summer 1977 Linear Recursions Intuitive Exposition of Zierler's Method for Finding Linear Recursions An U Linguistics Layman's Guide to the Mysteries of Linguistics A I I Gurin Jacob 1 Vol XIII No 1 Winter 1968 Vol XXIII No 1 Winter u 1978 Theoret lcal Linguistics and Language Universals U Vol XXII No 2 Spring 1977 DOCID 3020956 Keywords Linguists Literature Logic LVHF Collection Machine Language REF ID A398598 Title Author Computers and Linguists Do Mix U Vol XVI No 3 Summer CY-600 View of Language A U Vol XVIII No 3 Summer 1973 1971 Gurin Jacob Translation of a Classic A Matter of Ethics The U Vol XI No 2 Spring 1966 Fundamentals of Majority Logic U Vol IV No 4 October Tunnel Diode Dynamic Logic Module A U Summer 1961 Food for Thought in LVHF Reception U Vol XX No 4 Fall 1975 LVHF Propagation and Collection Techniques U Vol XVI No 4 Fall 1971 1959 TEMAC Text Macro D'lmperio Mary Compiler A Machine Language for Processing Text U Machine Translation Reference Machine-Aided Translation Where Is It Today U Machine Translation U - Vol X No 3 Summer 1965 and Computer and Information Science Issue Vol XVIII No 2 Spring 1973 and Special Linguistics Issue It Vol XII No 2 Spring 1967 Some Problems in the Field of Machine Translation orThe Case of the Volatile Mouses U Salemme Arthur Fall 1960 J DOCID 3 0 2 0 9 5 6 Keywords Maintenance I Title Author Automatic Maintenance U Meyer Joseph A Reference Vol IX No 1 Winter 1964 Mechanization Systems and a New Look a t Management and Organization U Vol VII No 2 Spring Operations Research in NSA U Vol X No 1 Winter 1965 Manual Morse Computer Transcription of Manual Morse U Vol 111 No 3 July 1958 Mapping ALRIGHT - A Map Overlay Generator U Vol XI No 2 Spring Management 1962 1966 Maps and the Conversion of Gauss-Kriiger Grid Coordinates U Vol 111 No 1 January Transverse Mercator Projection The U Vol XXIV No 4 Fall 1958 1979 Mathematicians Mathematics I Some of My Best Friends Are Mathematicians U Application of Fourier Transforms to Combiners U Lewis Frank W Vol IV No 2 April 1959 Special Fast Fourier Transform Issue August 1973 Approximations to the Distribution Function of Sums of Independent Identically Distributed Random Variables U Vol X No 2 Spring 1965 Art of Automatic Bearing Instrumentation The U Vol XVIII No 4 Fall 1973 Arithmetic of a Generation Principle for a n Electronic Key Generator The U Vol 11 No 1 January 1957 Arithmetic of the Addition Generation Principle for Electronic Key Generators Vol 11 No 3 July 1957 U DOCID 3020956 -98598 h 13 -P L 86-36 Keywords I Reference Author Title Arithmetic of the Linear Generation Principle for Electronic Key Generators The U Vol 11 No 4 Arithmetic of the Multiplication Generation Principle in the Koken Key Generator The U Vol 11 No 2 April 1957 October 1957 Bar Statistics The U1 Vol VIII No 2 Spring 1963 Vol VIII No Bar Statistics The U 4 Fall 1963 Bayes Marches On U January 1960 Binary System for Complex Numbers A U Vol X No 2 Spring 1965 and Computer and Information Sc lences ' Issue Book Review How to Estimate Probabilities Journal of the Institute of Mathemat csand its Application U Campaigne Howard H Book Review Involutory Commutants with some Applications to Algebraic Cryptography I Journal fur Reine und Angewande Mathematik U Campaigne Howard H Book Review Mathematical Statistics ti Book Review Recent Literature on Algebraic Cryptography U 175 TOP --kS Vol XII No 2 Spring 1967 Vol XII No 1 Winter 1967 n Vol VII No 4 Fall 1962 Vol VII No DOCID 3 0 2 0 9 5 6 Keywords I Author Title Book Review Some Applications of High Speed Computers to the Case n 2 of Algebraic Cryptography Mathematics of Computation Vol 15 No 75 U Book Review Some Further Methods in Algebraic Cryptography Journal of the Mitchell Scientific Society No 74 U Classes of Rotors without Parallels U Cluster Analysis Introduction to Models and Methods U Reference Fall 1961 Campaigne Howard H Fall 1960 n Vol X No 4 Fall 1965 Vol XXII No 2 Spring 1977 Comparison of the Efficiency of Two Methods of Estimating Certain Time Parameters A U Vol IX No 2 May 1964 Composition of Boolean Functions I U Special Fast Fourier Issue August 1973 Composition of Boolean Functions I1 U Special Fast Fourier Issue August 1973 Continued Fractions and Mills' Algorithm U Vol xxv No 3 Summer 1980 Convergence Techniques for Finding Linear Approximations U Special Fast Fourier Issue August 1973 Cooley-Tukey Fast Fourier Transform for Base 4 and Base 4 2 U Vol XVII No 4 Fall Cosymmetric Approximations to Combining Functions U Vol XVI No 4 Fall 1971 I Coupon Collecting and Cryptology U 1972 u Vol XI No 4 Fall 1966 DOCID 3020956 b l3 -P L 86-36 Title Keywords Author Reference Cryptanalytic Applications of Sequential Analysis ti Vol IX NO 3 August 1964 Distribution of C bJ u 13 The c' Special Fast Fourier Issue August 1973 Elements of Shift Register Cryptology U Vol XVI NO 2 Spring 1971 Estimating the Number of Solutions in LCF 2 lnof a System of Equations over the Integers U Vol VIII No 3 Summer 1963 Euclidean Algorithm and Distances between Wheel Settings The U Vol VIII NO 1 Winter 1963 Exact Markoff Probabilities from Oriented Linear Graphs Vol 11 NO 3 J u l y 1957 U Vol XXI No 1 Winter 1976 Fast Dynamic Programming Algorithm and Its Mathematical Basis A U Finding the Best-Scoring Permutation U Jacobs Walter W Vol X No 1 Winter 1965 FIR A CDC 1604 Program for Solution of Systems of Linear Equations U Flattening Effect The U Vol XIV NO 4 Fall 1969 Kullback Solomon Vol X NO 1 Winter 1965 Fourier Analysis on Finite Abelian Groups U Vol XXI No 3 Summer 1976 Fourier Coefficients and Function Decomposition U Special Fast Fourier Issue August 1973 Generating Function Approach to CRETAG A ti Vol XXII NO 1 Winter 1977 REF ID A398598 9 DOCID 3020956 Keywords I Title Author Reference Geodetic Latitude and Altitude from Geoceatric Coordinates U Vol XX No 1 Winter Geometric Approach to Waveform Recognition A Vol VIII No 2 Spring U 1963 Graph Theory U Vol XII No 3 Summer 1975 1967 Hill Climbing U How to Visualize a Matrix I Vol X No 4 Fall 1965 U Vol VIII No 3 Summer 1963 Vol XII No 1 Winter In e n e r a l - x Converges 1967 introduction to Computer Binary Arithmetic An U I I Introduction to the Fast Fourier Transform An U Introduction to the Special Issue U I - A Yates Algorithm Machine U Least Squares Analysis of a Probability Matrix The U Special Issue January 1971 I Special Fast Fourier Issue August 1973 I Vol X No 1 Winter 1965 JACQUARD Labeled Oriented Graphs Which Are Onto U Vol 111 No 2 April 1958 Special Fast Fourier Issue August 1973 Vol IV No 1 January 1959 Linear Approximation Attack on an Irregularly Stepping Key Generator A Special Fast Fourier Issue August 1973 U Linear Approximations and the Degree of the Function U Special Fast Fourier Issue August 1973 REF ID A398598 DOCID 3020956 Keywords Author Title Reference ourier Issue ugust 1973 I Linearly Induced Nonlinear Vol XXII No 4 Fall Cycles $1 I List of Properties of BayesTuring Factors A U Vol X No 2 Spring 1965 Long and Short of Single Transpositions The U Vol XXI No 2 Spring 1976 Low Weight Linear Recursions in Key U Vol VIII No 1 Winter 1963 I Product Sequences I1 U Markov Chain -The Models with the Short Memories U I Vol XX No 4 Fall 1975 Vol XVII No 1 Winter 1972 Mathematics and Computers in Cryptanalysis U Special Council of Learned Organization Issue 1972 Matric Recursions U I Vol XXII No 3 Summer 1977 This U Vol 111 No 3 July 1958 Modified Normal Curves U Spring 1961 Note on Curve Fitting A U I Matrix Business Part 11 Note on Logarithmic Scoring and Preliminary Testing U Vol XIII N o 4 Fa11 1968 I I Vol 11 No 4 October 1957 DOCID 3020956 Title Keywords Note on Product Sequences A U Author Reference Vol XVI No 2 Spring 1971 On a n Algorithm for Approximate Polybit Raring Using Fourier Transforms Special Fast Fourier Issue August 1973 U On the Minimization of Integer Quadratic Forms over Nonzero Integer Vectors U On Understanding the Null Hypotheses of Test Statistics Vol XXV No 1 Winter 1980 Vol VIII No 4 Fall 1963 U Optical Fourier Transform and Periodic Phenomena U Vol XVIII No 3 Summer 1973 Order Statistics for Cell Counts U Vol XXIII No 4 Fall 1978 Parity a s an Operation Checking Code U Vol VIII No 3 Summer 1963 Processes for Random and Sequential Accessing in Dynamic Memories U Vol XXII No 4 Fall Random and Algebraic Coverings of Binary Vectors Vol XXIII No 3 Summer 1978 and Special Mathematics and Engineering Issue 1981- U 1977 1983 Remarks concerning Substantialization U 4 Fall 1964 Vol IX No Roughness of Visitations in a Markov Chain The U Vol VIII No 2 Spring 1963 DOCID 3020956 ' P n P g 8 5 9 8 l l 3 -l L 46-36 Keywords Title Author Reference Scoring Function and Its Distribution A U Vol XIII No 4 Fall1 968 Sequential Least Squares Estimates U Vol XII No 2 Spring 1967 Setwise Transitive Groups U Vol X No 2 Spring 1965 Simple Test for Slide or Kick A UI Vol VIII No 4 Fall 1963 Slow Look a t Fast Transforms A U Special Fast Fourier Issue August 1973 Some Formulas concerning Bulges of Combining Functions U Special Fast Fourier Issue August 1973 Some Properties of Sample Bulges U Special Fast Fourier Issue August 1973 Spectral Analysis and the Fast Fourier Transform U Vol XIV No 1 Winter 1969 Strategy for Program Decomposition for a Distributed Pipeline A U Vol XXII No 4 Fall 1977 Strength of the Bayes Score The U Vol XVII No 1 Winter 1972 Survey of Bent Functions A Special Fast Fourier Issue August 1973 U Survey of Multinomial Estimation for Code Weighting A U 3 Summer 1975 Vol XX No Symmetric Approximations to Boolean Functions U Vol XIX No 3 Summer 1974 Tail Probabilities for the Binomial Ilistribution U Vol VIII No 3 Summer 1963 DOCID 3020956 Reference Author Keywords Vol VIII No 3 Summer Tutiog's Contributions to Cryptology ti 1963 Variable-Length Output t r i n d - m w Vol XXI No 4 Fall 1976 Variance of the Number of Ones in a Derived Stream of Zeros and Ones U Vol XII No 2 Spring 1967 Way the Ball Bounces The An Experiment in Deconvolutipn Filtering U Special Issue January 1971 Assignment of Storage Space in Rapid-Access Memory Systems U Memory I CAM 11 1 Vol 11 No 2 April 1957 U Content - Addressed Memories U -1 Vol IX No 1 Winter 1964 Data Structures and Their Representation in Storage Part I U Data Structures and Their Representation in Storage Part I1 U Magnetic Core Memories U D'Imperio Mary Vol IX No 3 August 1964 D'lmperio Mary Vol IX No 4 Fall 1964 ElJ Vol 11 No 1 Messages It Is Obvious T h a t A Lewis F W Painless Approach to Cryptanalytic Diagnosis U Midway Midway and Yamamoto Properly Revisited U Military Book Reuiew Military Cryptanalytics Part I1 U anuary 1957 Vol 111 No 2 April 1958 Vol XIII No 3 Summer 1968 Campaigne Howard H Vol IV No 4 October 1959 1 I DOCID 3020956 Keywords I Titte Military Addresses Correlation of Frequency of Appearance of Military Unit Addresses to Unit Echelon and Combat Readiness Status U Military Linguists Employment of Military Linguists U Missile Radiation Missile Trajectory Modems Modulation I Intercept of USSR Missile Transmissions U Author Reference Vol XVII No 3 Summer 1972 Gurin Jacob Vol XIII No 4 Fall 1968 and Special Linguistics Issue I1 Gerson Nathaniel C Vol IV No 3 July 1959 Missile Trajectories U Vol 11 No 1 January 1957 Notes on Missile Terminal Ballistics Soviet U Vol IX No 1 Winter 1964 Wireline Modem with Harmonic Distortion Equalization A U Vol xxv No 2 Spring 1980 and Special Mathematics and Engineering Issue 19811983 Cipher Signal Phase Modulation U Vol XIV No 2 Spring1969 Target in Space A L' Special Council of Learned Organization Issue 1972 Monoalphabetic Substitution De Profundis or the ABC of Depth Reading U Morse Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals The U Callimahos Lambros D Vol 11 No 1 January 1957 Vol XXIII No 2 Spring 1978 b 1 lb 3 -50USC 103 1b 33-18USC 798 b 3 -P L 86-36 -98 DOCID 3020956 Keywords OGA b 3 T a I Author Title Reference Val XXIV Morse Code Automatic Acquisition and Translation of Hand-Keyed Morse Code U No 1 Winter Morse Translators Development of High Speed Automatic Morse Translators The U Vol I No 1 April 1956 Networking Community Impacts on NSA Systems U Vol XXIII No 3 Summer 1978 Noise Interference and Intercept U 1979 Gerson Nathaniel C Vol XVI No 1 Winter 1971 Noisy Pluggings U North Vietnam NSA 1 Vol 111 No 2 April 1958 Weather or Not - Encrypted U About NSA U Vol XII No 4 Fall 1967 Vol IV No I January 1959 Report of the Second Computer Study Group U Various Vol XIX No 1 Winter 1974 Oceanography SlGlNT Implications of Military Oceanography U On-Line Processing CRISP1 U On-Line Systems Problem Solving with Online Systems U One-Time Pads New Approach to the OneTime Pad A U Meyer Joseph A Vol XI No 4 Fall 1967 n u Vol X No 1 Winter 1965 Special Council of Learned Organization Issue 1972 Vol XIX No 3 Summer 1971 Operating Systems Operations Privacy and Protection in Operating Systems U Vol XVIII No 2 Spring Operations Research in NSA Vol X No 1 Winter 1965 i U DOCID 3020956 Keywords Title Operators Abstract Groups Defined by Generating Operators U Optical Receiver Optical Receiver The U Optics Integrated and Guided Wave Optics andDevice Applications U Intercept and Electromagnetics U Author Reference Sinkov Abraham April 1960 El Vol XIII No 2 Spring 1968 Special Mathematics and Engineering Issue 19811983 Vol XX No 2 Spring 1975 Gerson Nathaniel C Linear and Quadratic Electro-Optic Effects Pockels and Kerr Effects U Vol IX No 4 Fall 1964 Orbits Determination of Missile and Earth Satellite Trajectories from Radar Observations U April 1960 Patents Patent Matters and the Technical Employee U Vol X No 3 Summer 1965 Pattern Recognition Introduction to Statistical Pattern Recognition U Vol XXII No 3 Summer 1977 and Special Mathematics and Engineering Issue 19811983 Pattern Recognition U1 Winter 1961 Jacobs Walter W Rotation Problem in Pattern Recognition The U Personnel Selection and Placement of Cryptanalytic Personnel U Phase-lock oscillators Introduction to Electronic Phase-Lock Oscillators An U Vol VII No 1 Winter 1962 I 1 Fall 1960 Vol VIII No 2 Spring 1963 DOCID 3 0 2 0 9 5 6 Title Key words Physics Reference Vol VIII No Analysis of Thin Film Germanium Epitaxially Deposited onto Calcium Fluoride U I Polar Ionosphere The U Thin Film Thermocouple LT Use of OpticaI Density Measurements of Thin Films to Determine Vapor Distributions The U Plain Text Author Analysis of Digital Plaintext Autokey Systems The U Distribution of Letters in Short Messages of English The U 2 Spring 1963 n Summer 1961 Gerson Nathaniel C Vol VII No 4 Fall 1962 Vol VIII No 3 Summer 1963 Callimahos Lambros D Vol XIV No 2 Spring 1969 Vol XIV No 2 Spring1969 Campaigne Optimum Use of Log Weights U Vol IX No 3 August 1964 Planes IFF A New Branch of Cryptology U Vol 11 No 4 October 1957 PRC Maybe It's Related to the Phase of the Moon U Vol XVII No 4 Fall 1972 Privacy ABC of Cifax The U Vol I No 2 July 1956 Privacy and Protection in Operating Systems U Vol XVIII No 2 Spring 1973 Entropy of German The U Vol I No 2 J u l y 1956 Distribution of the Maximum Bulge in a Flat Random Binary Stream The U Vol VII No 4 Fall 1962 Probability Probability Theory Book Reuiew Modern Probability Theory and Its Applications U Fall 1960 b 3 - 4 L 86-3h b 3 - F ' L 86-3b Title Keywords Author Reference Fall 1960 Bsok Review Probability An Introduction U Problem Solving Problem Solving with Online Systems U Special Council of Learned Organization Issue 1972 Processing ABC of Ciphony The U Vol I No 2 July 1956 and Special Linguistics Issue Programming FUZZY An Evolutionary Model for Data Structures U vol XXIV No 3 Summer 1979 Programming Concepts for Verification and Security U Vol XXII No 4 Fall 1977 Application O t h s O e r i o Mary Voynich Manuscr p An Vol XXIV No 2 Spring 1979 Vol XXIV No 3 Summer 1979 Vol XIX No 4 Fall 1974 Pulses Vol 111 No 4 December Cold-Cathode Counter Tube Studv A U 1958 Vol 111 No Error in a Capacitor-Type Totalizer U 4 December 1958 Vol IX No 1 Winter Subnanosecond Instrumentation U 1964 PURPLE Machine Solution of the Japanese PURPLE Machine The U Friedman William F Vol XIX No 1 Winter 1974 Keywords I Title Author Reference Qualification Standards Language Levels and Cryptologic Jobs U Vol XVIII No 3 Summer 1973 Queues Computers and Queues U January 1960 Queuing Theory Application of Queuing Theory to Camputer Systems An U Vol XIV No 2 Spring 1969 Digitizer Queuing Model for Vol XIV No 4 Fall 1969 FROSTING L' I I Radio Did Alexander Popov Invent Radio U Radio Intercept One Model for a n Artificial Ionosphere U Radio Waves Antipodal Propagation U Randomization Randomization Made to Order Random Numbers Are Too Important to be Lefi to Chance U Special Council of Learned Organization Issue 1972 Random Variables Approximation of Central Limits Vol IV No 4 October 1959 Receivers Receiving System Analysis Vol X No 1 Winter 1965 Gerson Nathaniel C U Reciprocal Alphabets Reciprocal Alphabets and Friedman Squares U Recording Electron Beam Recording for Wideband Analog Signals U Introduction to Magnetic Tape Recording and Its Use in Intercept Activities An U Kullback Solomon Vol XI No 2 Spring 1966 Vol IV No 1 January 1959 Vol 111 No 1 January 1958 Vol XIV No 3 Summer 1969 Vol I No 3 October 1956 DOCID 3020956 Title Keywords Author Reference Vol IX NO 1 Winter Recording Techniques Affecting Total Intercept 1964 Vol XVIII No 2 Spring This Is a Recording t' 1973 Reporting 17 Vol XVII No 2 Spring COMINT Analysis and Reporting on the Developing Nations U 1972 Research Library and the User The U b 1 b 3 -50 USC Vol XIII No 4 0 3 2 Spring b 3 -18 usc 1968 Research a t NSA U Campaigne Howard H Val XIII No 2 Spring 798 b 3 - P L 6-36 1968 Rocket Motion Rosetta Stone I Fall 1960 Rocket Motion and Newton's Second Law U Callimahos Lambros D Rosetta Stone and Its Decipherment The U Vol XVI No 1 Winter 1971 Russian Russian Grammar Russian Language n Can We Lick the Voice Problem U Vol XVII No 3 Summer 1972 Computer There Is Thy Sting u1 Salemme Arthur Vol XVI No 4 Fall 1971 J Tour of Same Russian Translation Traps A U Salemme Arthur Vol XIV No J 4 Fall 1969 7 The Case for Bad Grammar I u I Are the Russir nsGaining Wordwise I C Vol IX No 2 May 1964 and Special Linguistics Issue Salemme Arthur Spring 1961 - DOCID 3020956 Title Author Reference Characteristic Features of the Russian Language of the Last Decade U Salemme Arthur J Vol XI No 4 Fall 1966 Language Files A Basic COMINT Aid U Salemme Arthur J Vol IV No 2 April 1959 Spoken Russian The Other Grammar U Girvan William H Vol XIV No 3 Summer 1969 Few Tricks of the Trade for the Translator of Russian A U I Russian Navy Codes Russian Diamond A U Vol XII No 2 Spring 1967 PPM Telemetry Simulator U Fall 1960 Vol XVI No Russian Translation False Friends of the Translator in the English and Russian Languages A Translation from the Russian of V V Akulenko U Russian Transliteration Handle With Care Russian Transliteration U Sampling Random Walks with Restraining Barrier as Applied to the Biased Binary Counter U Satellite Tracking Times of Shadow Passage for Earth Satellites U Satellite Trajectory Maximum Likelihood Estimation of a Trajectory and Its Variance U Science Science and Cryptology U Engstrom Howard T Vol 111 No 3 July 1958 Science and Technology Soviet Science and Technology Present Levels and Future Prospects U Sinkov Abraham Vol IV No 1 January 1959 Security 4 Fall 1971 Salemme Arthur J l-l Vol XII No 4 Fall 1967 Vol 111 No 2 April 1958 u Vol VIII No 3 Summer 1963 Vol XIII No 1 Winter 1968 Vol XI No 1 Winter 1966 398598 DOCID 3 0 2 0 9 5 6 Title Keywords Reference Narrow-Band Speech Security Vol 111 U No 4 December 1958 and Special Linguistics Issue Security Architecture in SIGINT Collection and Processing U Shift Registers Author Meyer Joseph A Vol XX No 1 Winter Jr 1975 Combining Functions in Key Generators U1 Spring 1961 Cycles from Nonlinear Shift Registers U Special Mathematics and Engineering Issue 19811983 Vol XIV No 4 Fall 1969 Perpetuation of Bias in Shift Register Devices U I Need for System Approach The Vol VII No 2 Spring 1962 Vol XXV No 3 Summer 1980 Meyer Joseph A Vol XI NO 1 Winter 1966 Selected SlClNT Intelligence Highlights U 1 SrCINT System Logic u SIGINT Collection and Processing SIGINT Productivity Tordella Louis W Vol XIX No 4 Fall 1974 Unknown Vol X No 2 Spring 1965 Trade-off Approach to Quality Intercept versus Quantity Intercept A U Vol XXIII No 1 Winter Third Revolution Prospects for Continued SIGINT Productivity The U Vol XIII No 3 Summer 1978 1968 REF IDzA398598 Keywords Title SIGINTReporting Trends Developments and Pressures in SICINT Reporting Today U UTIL of English A Study of the Quality of SICINT Product U Author Reference Oliver Donald B Vol XXI No 1 Winter 1976 Vol XVII No 4 Fall 1972 Vol IX No 2 May 1964 Signal Analysis i Signal Identification Automatic Signal Identification Use of Special Identification Techniques SIT in the SQlution of Specific SICINT Problems The U Signal Processing MICROCOMPUTER General- Purpose Signal Process The U Special Issue January 1971 Vol XII No 4 Fall 1967 Vol XXII No 2 Spring 1977 U N N A - An Introspective Signal Processor U Vol XX No 2 Spring 1975 Signal Theory Generalizations of MaximumEntropy Pattern Analysis C Vol XXIV No 2 Spring 1979 Signal-to-Noise Ratio Another Derivation of Binary Error Rates as a Function of Signal-to-Noise Power Ratio for Various Modulation Schemes U Vol X No 3 Summer 1965 Signals ARC of Ciphony The U Vol I No 2 July 1956 and Special Linguistics issue Ambiguity Reduction by Markov Analysis of TEMPEST Signals U Vol XVI No 1 Winter 1971 REF ID A398598 DOCID 3020956 Title Keywords - Author Reference Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System U '01 x l l s o Fall 1967 Collection of LlNCOMPEX Signals U '01 XVII lo 2 Spring 972 Design and Implementation of a Digital Demodulator for Use against On-Off Keyed Signals The U 701 XXIII lo 2 Spring 978 Electron Beam Recording for Wideband Analog Signals U 101 Evaluating Intercept Systems U 701 Experimental Approach to a n Environment Study in the HF Band U '01 VIII No Fall 1963 Extending the Radio Horizon for Intercept Purposes by Using the Moon a s a Reflector U rol X N O 2 $ring 1965 Investigation of Techniques for the Analysis of the M-803-3 Vocoder L' 701 Mathematical Modeling of 701 XVI No Summer 97 1 TEMPEST Channels U Multipath Differential Doppler Data U Recovery of Pre-Detection Signals in the Optical Receiver XIV No Summer 969 IX No Fall 1964 XX No Fall 1975 101 XXI No Summer 976 Tot XIII No Fall 1968 U Representation of Signals on Orthonormal Bases The U '01 IX No Winter 964 Response of a Non-Linear Device to an Emitter Environment in the High Frequency Spectrum The U 1 Winter 1963 101 VIII No DOCID 3020956 Title Keywords - - Spread Spectrum System Jamming Response U Study of Hourly Correlation of Trans-Horizon VHF-UH F Signals and Meteorological I Conditions U Signals Analysis Author Reference - Vol XXII No 3 Summer 1977 Vol XIV No 2 Spring 1969 Correlation and Power Spectra of Randomly Sampled and Held Signals U Vol XIV No 2 Spring Frequency Analysis of a Set of HarmonicaIIy Related Tones U Vol XVI No 1 Winter 1969 1971 Reference Patternsfor Nearest Neighbor Rule U Vol XXII No 1 Winter 1977 Signals Processing Integrated and Guided Wave Optics and Device Applications U Special Mathematics and Engineering Issue 19811983 Teletype Processing in the FROSTING System U Vol XVIII No 2 Spring 1973 Signals Trends COMINT Signals Trends 7SX% iM Vol x x v No 2 Spring 1980 Vol XXI No 1 Winter 1976 Software I Designing Secure Reliable Software A Methodology U Vol XXI No 4 Fall 1976 FUZZY An Evolutionary Model for Data Structures U Vol XXIV No 3 Summer 1979 Programming Concepts for Verification and Security U Vol XXII No 4 Fall - 1977 'P-598 DOCID 3 0 2 0 9 5 6 Keywords Software Acquisition I Reference Author Title Vol xxv Work Breakdown Structure A Better Implementation to Manage Software Overruns U No 4 Fall 1980 I Software Maintenance -The Other Side of Acquisition U Vol XXIII No 3 Summer 1978 Software Engineering Program Complexity Measure A U Vol XXI No 4 Fall 1976 Software Support CAPER Software Support Software Maintenance I Vol XXII No 2 Spring System The U 1977 Human-Machine Interfaces for NSA Computer Systems U D'Imperio Mary E Vol XXIV No 4 Fall 1979 South America I German Agent Systems of World War II-CG Soviet Lewis Frank W Vol VII No 3 Summer 1962 CAPER Software Support Vol XXII No 2 Spring System The U 1977 Database Services U i s 11 41-13 h 3 - 5 - 1 lJ hj - -I U6C 7 3 U Vol XII No 1 Winter 1967 I Example of Substantive Analysis An U Vol XI No 3 Summer lhTYz9 1966 Investigation of Techni ues for Vol XX No 4 Fall 1975 Soviet Communications Journals as Sources of Intelligence u Vol IX No 3 August U 1964 Soviet Science and Technology Present Levels and Future Sinkov Abraham Vol IV No 1 January 1959 Vol XXV No 4 Fall 1980 Soviet Leadership Soviet Navy Soviet Navyod 1 A COMSEC 'I'urnlng Polnt U Vol XVI No 4 Fall 1971 10 3 -50 USC 403 lb 3 -18 USC 798 ib 3 -P L 86-36 DOCID 3020956 Keywords I Title Author Reference Soviet Telemetry Computer Processing of Soviet Telemetry U Soviets Role of Carrier VCh Telephony in Soviet World War I1 Strategic Communications U Vol XIX No 3 Summer 1974 Space Flights Spacecraft Passenger Television from Laika to Gagarin U Vol XXI No 2 Spring 1976 Spanish Cryptography Book Review CRrPToCRAFIA Vol XI No TRATADO DE 2 Spring U 1966 Spanish Language I Anglicisms in Puerto Rico U I Vol XIII s o 1 Winter 1968 Speaker Identification Vol XIV No 4 Fall 1969 Speech Vol XVIII No 1 Winter 1973 Speech Privacy Vol VII No 4 Fall 1962 Speech Scanning Vol XX No 4 Fall 1975 Spread Spectrum Vol XXV No 1 Winter 1980 Vol XXII No 3 Summer 1977 Sputnik Vol 111 No 2 April 1958 Stirling Numbers Vol 111 No 1 January 1958 REF ID A398598 DOCID 3020956 Title Keywords Author Reference Deposited Films - Magnetic Elements for the Memory of the Future U Vol I No 3 October 1956 On Operatorless Computers U Vol I No 1 April 1956 Strategic Warning Strategic Warning An Intelligence Gap that NSA Might Fill U Vol XVIII No 3 Summer 1973 Switching Systems Development of Automatic Telegraph Switching Systems Vol 11 No 3 July 1957 Storage U Tape Management Tape Storage Management of Magnetic Tape 7f3- Vol X No 4 Fall 1965 Measurement of Insecurity for Imperfect Erasure A U Vol XXII No 1 Winter 1977 Technical Intelligence Telecipher Analysis Drawing to a Straight Flush - A Study in Technical Intelligence Vol XXI No 3 Summer u 1976 Climbing Jacob's Ladder U Vol XII No 3 Summer 1967 Telemetry Processing U Vol XX No 3 Summer 1975 Teleprinter Cipher Analysis Simplified Exposition of a New Cycle Search Technique L' Vol I No 1 April 1956 TEMPEST Ambiguity Reduction by Markov Analysis of TEMPEST Signals U Vol XVI No 1 Winter Analysis of a Complex TEMPEST Signal Emanated from the IBM 1401 System U Vol XII No 4 Fall 1967 Mathematical Modeling of Vol XVI No 3 Summer Genesis of Mobile Magoo The TEMPEST Channels U 197 1 1971 TEMPEST Considerations in Automatic Data Processing Equipment Installations U Vol XIV No 1 Winter 1969 DOCID 3020956 Keywords Testing I Title Author Reference Vol xxv Contextual Testing in Establishing Minimum Working Level Language Proficiency U No 1 Winter 1980 Thin Film Analysis Introduction to the Methods of Thin Film Analysis An U Summer 1961 Traffic Chatter Patterns A Last Resort U Vol 11 No 4 October 1957 Cleaning the Augean Stables or How Much TA Can a Computer Do U Vol XIII No 3 Summer 1968 Traffic Analysis I Introduction to Traffic Analysis U Net Reconstruction - A Basic Step in Traffic Analysis U Some Thoughts concerning Traffic Analysis Mechanization U1 Traffic Analysis on Soviet Data Transmission U I What is Good Traffic Analysis Callimahos Lambros D Vol 111 No 2 April 1958 n Vol 111 No 3 J u l y 1958 Vol XI No 3 Summer 1966 Vol XIII No 1 Winter 1968 Vol XXIV No 4 Fall 1979 Training Systems Approach to Training Radiotelephone Technicians The U Vol XVIII No 1 Winter 1973 Transcription Computer Transcription of Manual Morse U Vol 111 No 3 July 1958 Transistors Analysis of a Transistor Monostable Multivibrator U Vol IV No 3 July 1959 Translation CAMINO U Vol XII No 3 Summer 1967 I I U Salemme Arthur Vol XVI No 4 Fall 1971 J Few Tricks of the Trade for the Translator of Russian A U Salemme Arthur Vol XI No 4 Fall 1966 J Computer There Is Thy Sting REF ID A398598 DOCID 3020956 Freedom in Translation U Reference Author Title Keywords I - - Vol XXI No 3 Summer 1976 Mechanical Translation U Vol1 No 1 April 1956 Mokusatsu One Word Two Lessons U 4 Fall 1968 Vol XIII No and Special Linguistics Issue I1 Vol XVI No 3 Summer 1971 Some Contributions towards a Course in COMINT Translation t U Tour of Some Russian Translation Traps A U Salemme Arthur Vol XIV No 4 Fall 1969 J Translation of a Classic A Matter of Ethics The U Gurin Jacob Vol XI No 2 Spring 1966 Translation Errors Chaco A Horrible Example U Vol XVIII No 3 Summer 1973 Transmission Data Transmission over Telephone Circuits U Vol IV No 1 January 1959 Transmitters Antipodal Propagation U Gerson Nathaniel C Vol IV No I January 1959 Turing Machine Insolvable Problem An U Jacobs Walter W Vol VIII No 3 Summer 1963 VHF Intercept Factors Affecting Required Antenna Gain in VHF Intercept U Vol I No 3 October 1956 Video VIDEOFILE A New Information Storage System U Vol XIII No 2 Spring 1968 Viet Minh Cover Terms Viet Minh Cover Terms and Their Solution U Caddy David W Vol IV No 3 July 1959 and Special Linguistics Isssue DOCID 3020956 Ib 3 - F L Keywords I 86-56 Title Author Reference Vietnam Project EXPLORER U Vol XVI No 2 Spring 1971 Vocabulary Thrusts and Boggles of Outrageous Escalation The A Vol XIII No 2 Spring 1968 V O C A B U U R Y SURVEY ATTHE NATIONAL WARCOLLEGE U Vocoders Vol XIII No 2 Spring 1968 Some Recent Vocoder Studies a t the National Security Agency Vol XII No 4 Fall 1967 1 Learned Organization Issue 1972 Voice Intercept Possible Applications of Keyword Recognition in Voice Intercept U Gurin Jacob Vol XXII No 1 Winter 1977 Voice Problem Nest of Dragons A T h e Voice Problem U Gurin Jacob Vol XXI No 1 Winter 1976 Voynich Manuscript Application of Cluster Analysis and Multidimensional Scaling to the Question of Hands and Languages'yn the Voynich Manuscript An U D'lmperio Mary E Vol XXIII No 3 Summer 1978 Application o l o the Voynich Manuscript An U D'Imperio Mary E Vol XXIV No 2 Spring 1979 Vol XXI No 3 Summer 1976 Voynich Manuscript Revisited The U Voynich Manuscript The The Most Mysterious Manuscript in the World U Waveform Recognition So You Want to Correlate U Tiltman John H Jr Brigadier Vol XII No 3 Summer 1967 a n d Special Linguistics Issue I1 Vol X No 2 Spring 1965 -8598 DOCID 3 0 2 0 9 5 6 Title Keywords - Waves Weather Author Reference - Error in a Capacitor-Type rotalizer U Vol 111 No 4 December Weather Its Role in Communications Intelligence Vol 111 No 3 July 1958 1958 U Working Aids Vol XXIV No 1 Winter Computer Scripting U 1979 Writing Curiosa Scriptorum Sericorum To Write But Not to Communicate U Wullenweber Systems U S Program in Direction Finding A U Vol XVI No 3 Summer 197 1 Gerson Nathaniel C Vol X No 2 Spring 1965 b 3 - P L 06-36
OCR of the Document
View the Document >>