index [cryptocellar.org] · book review: artificial intelligence: theory, logic and application...
TRANSCRIPT
INDEX Spring 1982 - Winter 1996
Vol. la, NO. 1 - V0115., NO. 4
Publ~shed by the Center for Cryptolog~c History May 1997
DOCID: 3020954 REF ID:A525813
Note to Cryptologic Quarterly Readers
This is the second cumulatave index of Cryptologrc Qwrterly arhcles It is sorted three ways by htle of &cle, by author, and by keywords Its purpose 1s twofold to g v e readers a general view of the scope of subjects that appear in Cryptologrc Qwrterly - and thus to sbmulate the mbng of artrcles - and to provide our readership mth a means to locate artacles they may wrsh to use as general informahon on the job or as research tools for operatzonal projects We pubhsh supplements annually
We hope you find the index useful and that you will contact the Quarterly staff ~f you would like wples of an artwle You may reach the office of Cryptologu: Quarterly a t 972-2895s or 301/688-6338b If you send a wntten request for an arbcle, address ~t to Cryptologac Quarterly, S542, SAB 2, Door 22
BARRY D CARLEEN Execubve EBtor, Cryptologrc Quarterly
DOCID: 3020954 REF ID:A525813
T i t le I naex
DOCID: 3020954 REF ID:A525813
( b l (1) 7' fb):3)-5C USC 403 (b] i 3 ) - l R USC 7 9 E ( b ) I 3 ) - 1 ' . I , . ~ 5 - 3 6 Cryptologic Quarterly Index by Title
ACQUAINTANCE: A Tool for Language Identification (U) I
Title /
Author Reference
ADAGIO: A Modern Analog-to- DigitaUDigital-to-Analog System for the R5 CYBERNAX Research System (U)
Address Given to Annual Cryptanalysis Exchange (U)
Vol5, Nos 1-2, Spr-Sum 86
ABM Treaty and the Dilemma of Indecision, The (U)
Admiral Gorshkov and Soviet Doctrine (U)
-
Agency Electronic Printing Standards: Today It's PostScript and Interpress Page Description Languages (U)
Alpe-Adria: A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)
Analysis of a Problem common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)
Analysis of the "Lehigh" Virus (U)
Analysis of the Random and Sequential Viruses (U)
Analysis of the Vectorization Abilities of Current C Compilers, An (U)
Analysis of TRS-80 Model I Passwor Encryption Algorithm (U) 1
Vol4,85 (CS Issue)
Vol 1 ,83 (CS Issue)
I Vol 5, No 3, Fall 86
Vol9, No 3, Fall 90
Vol7, No 3, Fall 88
Vol4, No 3, Fall 85
Vol9, No 2, Sum 90
Vol. 11, No. 4, Winter 92
Vol 10, No 2, Sum 91
Vol 1, No 1, Spr 82
Vol9, No 4, Win 91
Keyword
Defense Soviet Union
Computer systems Language Mathematics
Computer software Computer systems Computer hardware
Cryptanal y sis
Soviet Union
Electronic printing
Economics International f l a i r s
Language Linguistic Japan
Computer virus
Random viruses Sequential viruses Software analysis
Computer programming
Computer software
Cryptanalysis Computer software
( b ) (3;-P.L. 86-36 - 1
~ - ,
1.k~' : 1) (I,) !3)-:8 nsc 798 :b ;m@I~~~.o3302O95(& 11;
( b l ( 3 ) - P . L . 86-36 REF ID:A5258%3.= . E6-36
I b) i 3 ) -18 USC 798
Title Author
Analyzing Vague Data (U)
Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (U)
Another Look at TEABALL, and Where We've Gone from There (U) I Application of Nonsymbolic Artificial Ihtelligence: Neural Networks (U) I
Applying Object Technology to Our CLOVER Network (U)
Approach to Isolating Nontraditional Targets, An (U)
Architecture and Implementation for a Large Scale Distributed Multiprocessor, An (U)
Architecture and Implementation for Linear Speedup of DSP Programs, An (U)
Artificial Intelligence and Expert Systems: Do They Have a Future in Management? (U)
Artificial Intelligence: Approach to Cryptodiagnosis (U)
ART: The Linked-Letter Language Model A Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text (U)
Reference Keyword
Vol, 83 (CS Issue) Computer systems
Vol. 11, No. 4, Image quality Winter 92 Ranked-order filters
Signals analysis
V0111, NO 1, SIGINT Support Spr 92 Vietnam War
Vol9, No 4, Artificial Win 91 intelligence
Neural networks
Vol. 13, No. 3, Fa11 94 INPOSEC Trusted product
evaluation I I I
Vo15,86 Cryptanalysis (CA Issue) Cryptography
Mathematics
Vol. 12, No. 2, Summer 93
Vol. 13, No. 3, Fall 94
Vol8, No 3, Fall 89
CLOVER Object-oriented
technology
ontra itiona 4 n - J targets
Computer networks Signal processor
Vol8, No 4, Computer networks Win 90 Signal processor
Vol9, No 2, Artificial Sum 90 intelligence
Management
Vol. 13, No. 1, Artificial Spring 94 intelligence
Cryptanalysis
Vol9, No 3, Language Modeling Fall 90
(0) (3)-P.L. 86-36
(b i ( 1 i
$&$&Z?bi%; ra20954 (b) (1) (b) :3)-P.L. REF ID :A525813 '(b) ( 3 ) - P . L . 86-36
(b, ( 3 ) - E . L . 86-25 86-36
Title I Author Reference Keyword
Practical and Potential Applications (U)
Attempted Imposition of Sharia on the Sudan, The (U) I
-1~ro~ram Overview: History, Status, and Directions (U)
Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945fseee)
Vol9, No 1, Communications Spr 90 Ionosphere
1 Vol4, WQ 2, Middle East Sum 85
Begin and Arafat (U)
1I
Vol10, No 1, Computer Security Spr 91 COMSEC
Vol. 12, Cryptologic history Nos. 3-4, Fall/ Soviet problem Winter 1993
c Beyond Codes and Ciphers: The Expanded Meaning of Cryptology in the Late Twentieth Century (U)
Beyond "DRAGONS LAIR" (U) I Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)
Vol2, Nos 1-2, Middle East Spr-Sum 83
VO~. 14, NO. 1, BOURBON Spring 95 Cryptologic history
Soviet problem
Nolte, William M. Vol S, No 4, C V P ~ ~ O ~ Y Win 90 History
I
I Vol4.85 Computer systems (CS Issue)
Vol. 11, No. 3, Network Fall 92 management
Neural networks Telecommunications
BILLY Data Basemasking Vol8, No 3, Data base Management System Intervals (U) Fall 89 management
Supercomputer
Book Review: A Century of Spies: Intelligence in the Twentieth Century (U)
Book Review: Alan Turing: The Enigma (U)
Book Review: American Black Chamber, The (U)
Johnson, Thomas R. Vol. 15, No. 3, Fa11 96 Book review Intelligence
Mowry, David P. Vol2, Nos 3-4, Book review Fall-Win 83-84 Cryptanalysis
Enigma History
Black Chamber Book review Cryptanal ysia History
DOCID: 3020954 REF ID:A525813 (b (3 - P . L 86-36
Title
Book Review: America's Military Revolution: Strategy and Structure af'ter the Cold War (U)
Book Review: "And i Was There": Pearl Harbor and Midway - Breaking the Secrets (U)
Book Review: Artificial Intelligence: Theory, Logic and Application (L')
Author Reference Keyword
Vol. 13, No.1, Book review Spring 94 Cold War
Military strategy
Vol5, Nos 1-2, Book' review Spr-Sum 86 History
Japan Pearl Harbor World War I1
Vol5, No 3, Book review Fall 86 M i c i a 1
intelligence
Book Review: Atom Bomb Spies, The Vol6, N<#i 3-4, Book review (U) Fall-Win 87-88 Espionage
Book Review: Black Cipher (U) Vol. 14, No. 4, Winter 95
Book Review: Breaking the Maya Code (U)
Book Review: British and American Approaches to Intelligence (Uf
Hatch, David A. Vol. 13, No.1, Spring 94
Book Review: Chicksands: A u Vol. 13, N0.3, Millenium of History (U) Fall 94
Book Review: CIA in Guatemala, The (U)
Book Review: Citizens and Soldiers (U)
Gronet, Richard W. Vol 1, No 4, Win 83
I Vol6, Nos 3-4. Fall-Win 87-88
Book Review: Codebreakers: The Inside Story of Bletchley Park (U)
Book Review: Clash of Cultures: Managers and Professionals, The (U)
Filby, P. W. Vol. 13, No. 2,'- Summer 94
Nolte. William M. Vol7, No 2, Sum 88
Book Review: Code-Name Downfall: Vol. 15, No. 4, Winter The Secret Plan to Invade Jaoan - h 96
Book Review: Clausewitz (U) I Vol6, No 2, Sum 87
and Why Truman Dropped &e Bomb (U)
Book review Espionage
Book review Linguistics Maya code
Book review Britain Intelligence
Book review Chicksands Field sites
Book review CIA
Book review Military policy
Book review Management
Book review Military theory
Bletchley Park Book review Enigma Ultra
Atomic bomb Book review World War I1
DOCID: 3020954 REF ID:A525813 I ( b ) ( 3 ) - P . L. 56-36
\
P
Title 1 Author Reference Keyword
Book Review: Concise History of the Middle East, A (U)
Book Reuiew: ConllIctofDuty: The U.S. Navy's Intelligence Dilemma, 1919-1945 (U)
Book Review: Designing and Programming Personal Expert Systems (U)
Book Review: Does God Play Dice? The Mathematics of Chaos (U)
Book Review: Drawing the Line: Tales of Maps and Cartocontroversy (U)
Book Reuiew: Eavesdroppers, The (U)
Book review History Middle East
Nolte, William M. Vol2, Nos 1-2, Book review Spr-Sum 83 Intelligence
Johnson, Thomas R. Vol. 14, No.1, Spring Book review 95 Australian SIGINT
WWII
Book Review: Electronic Warfare: Element of Strategy and Multiplier of Combat Power (U)
Book Review: Essays on Strategy (U)
Book Review: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)
Book Reuiew: Eyeball to Eyeball: The Inside Story of the Cuban Missile Crisis (U)
Book Review: Family Treason (U)
Book Review: FBI-KGB War: A Special Agent's Story, The (U)
Vol5, No 3, Computer Fall 86 programming
Computer systems
Vol8, No 4, Book review Win 90 Mathematics
Val. 14, No. 4, Winter Book review 95 &P
Book Reuiew: French Secret Services: From the Dreyfus Atrclir to the Gulf War, The (U)
Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Seqrets W)
Voll, Nos 2-3, Book review Sum-Fall 82 Electronic warfare
Vol5, No 3, Book review Fall 86 Human factor
Middle East
Vo14, No 3, Book review Fall 85 Ethiopia
History
Hatch, David A. Vol. 11, No. 3, Book review Fall 92 Cuban Missile Crisis
I vol6, Nos 3-4, Book review Fall-Win 87-88 Espionage
Vol6, No 2, Book review Sum 87 Espionage
Soviet Union
Hanyok, Robert J. .- . . . .Val. 15, No. 4, Winter Book review 96 French secret service
Vol. 13., No. 2, Book review Summer 94 Economic espionage
DOCID: 3020954
Title I Author Reference Keyword
Book Review: Guardians of the Sea: History of the United States Coast Guard from 1915 to the Present (U)
Book Review: Grand Failure! The Birth and Death of Communism in the Twentieth Century, The (U)
Book Review: Haile Selassie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)
Yo1 8, No 3, Book Review Fall 89 Communism
Vol7, No 2, Book review Sum 88 History
Coast Guard
Vol4, No 4, Book review Win 86 Ethiopia
History
Book Review: History of the German Vol8, No 3, Book review General Staff (U) Fall 89 Germany
Military forces
Book Review: Infamy: Pearl Harbor Vol 1 , Nos 2-3, Book review and Its Aftermath (U) Sum-Fall 82 Japan
Pearl Harbor
Book Reviela: Informing Statecraft Vol. 12, No.2, Book review (u) Summer 93 Intelligence
community
Book Review: Honorable Treachery: A History of U.S. Intelligence, Es- pionage, and Covert Action from the American Revolution to the CIA (U)
Book Review: Inside Hanoi's Secret Archives (U)
Hatch, David A. Vol. 13, No. 3, Fa11 94 Book review Espionage SIGINT
Hanyok, Robert J. Vol. 15. No. 1. Spring 96
Book Review: Inside Soviet Military Intelligence (U)
Book Review: Inside the Soviet Army (U)
Book Review: Intelligence and National Security (U)
Book Review: International Journal of Intelligence and Counterintelligence (U)
Book Review: Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)
VOI 5, NOS 1-2, Spr-Sum 86
Vol4, No 4, Win 86
Vol5, No 4, Win 87
Vol6, Nos 3-4, Fall-Win 87-88
V015, NOS 1-2, Spr-Sum 86
Book review POWllMIA Vietnam War
Book review Intelligence Soviet Union
Book review Soviet Union
Book review Intelligence Security
Book review Counterintelligence Intelligence
Book review Artificial
intelligence
Title
Book Review: Invasion of Japan: Alternative to the Bomb, The (U)
Book Reuiew: KGB: The Secret Work of Soviet Secret Agents (U)
Book Review: KGB Today: The Hidden Hand tU)
Book Review: Legitimacy and Force, Vol.1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)
Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)
Book Review: Marching Orders: The Untold Story of World War II (U)
Book Review: Marketing Warfare (U)
Book Review: Mask of Command, m e (U)
Book Review: Master Terrorist, The : The True Story behind Abu Nidhal (U)
REF IDzA525813
1 Author Reference Keyword
Johnson, Thomas R. Vol. 14., No. 2, Atomic bomb Summer 95 Book review
Japan WWII
Vol5, Nos 1-2, Book review Spr-Sum 86 KGB
Soviet Union
Vol5, Nos 1-2, Book review Spr-Sum 86 KGB
Soviet Union
Vol7, No 9. Book review Win 89 International
Affairs
Vol7, No 1, Book review Spr 88 COMINT
History ULTRA
Johnson, Thomas R. Vol. 14, No. 4, Winter Book review 95 World War I1
Vol5, No 4, Book review Win 87 Economic warfare
Human factor
Vol9. No 2, History Sum 90 Military policy
Vol6, No 1, Book review Spr 87 Middle East
Terrorism
Book Review: Missing Dimension: Vol5, No 4, Book review Governments and Intelligence Win 87 Intelligence Communities in the Twentieth Century, The (U)
Book Review: The New KGB: The Engine of Soviet Power (U)
Book Review: My Silent War (UI
Book Review: Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million (U)
Hanyok, Robert J.
Book Review: One American Must I I Die (U) I
Vol. 14, No. 3, Fa11 95 Book review Espionage
Vol5, Nos 1-2, Book review Spr-Sum 86 KGB
Soviet Union
Vol. 15, No. 2, Book review Summer 96 Espionage
Vol5, No 4, Book review Win 87 Human factor
DOCID: 3020954 - (b) (3)-P.L. %t$ ID:A525813
Title 1 Author Reference Keyword
Book Review: One Hundred Days: Val. 11, NO. 2, The Memoir8 of the Falklands Battle Summer 92 Group Commander (U)
Book review Falklands War
Book Review: On ULTRA Adive I Farley, Robert D. Vol 10, Nos 3-4, Service (U) Fall-Win 91
Australian SIGINT operations
World War I1
Book Review: On Writing Well (U) I Vol7, No 3, Fall 88
Book review Writing
Book Review: Out of the Inner Circle: A Hacker's Guide to Computer Security (U)
Vol4, No 3, Fall 85
Book review Computer security
Vol5, No 4, Win 87
Book review Human factor
Book Review: Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)
Vol2, NOS 1-2, Spr-Sum 83
Book Review: Room 40: British Naval Intelligence 1914-18 (U)
Book review History Intelligence
Book Review: Ropes to Skip and the Ropes to Know: The Imer Life of an Organization, The (U)
Vol6, NOS 3-4, Fall-Win 87-88
Book review Management
Book Review: Sacred Rage: The Crusade of Modern Islam (U)
Vol6, NOS 3-4, Fall-Win 87-88
Book review Iran Middle East
Book Review: Secrecy and I Vol4, No 3, Fall 85
Book review CIA History Intelligence
Democracy: The CIA in Transition (UI
Book Review: Shadows of the Rising Sun: A Critical View of the "Japanese Miracle" (U)
V013, NOS 1-2, Spr-Sum 84
Book review Japan
Book Review: HGINT Secrets: The Signals Intelligence War, 1900 to Today, The
Vol. 12, No. 1, Spring 93
Book review Cryptologic history SICINT
Book Review: Spywars: Espionage Val. 14, No.2, and Canada from Gouzenko to Summer 95 Glmnost (U)
Book review Canada Espionage
Book Review: Spyworld: Inside the Vol. 14, No. 1, Spring Canadian and American Intelligence 95 Establishments (U)
Book review Canada Intelligence
community
DOCID: 3020954 ( b ) (3) - P . L . 8 6 - 3 6
( b i (11
REF ID:A525813 ;;;I:{:;: y:: :ii (b)(3j-P.L. 86-36
Title r'
Author Reference Keyword
Book Review: Straw Giant, The (U) Vol9, No 4, Book review Win 91 Military forces
Book Review: Structure and Val 9, No 3, Book review Interpretations of Computer Fall 90 Computer s o f i w m Programs (U) Computer
programming
Book Review: The Target is Destroyed. What Really Happened to Flight 007 and What America Knew About I t (U)
Book Review: The Technical Writer's Handbook : Writing with Style and Clarity (U)
Book Review: Technical Writing for Beginners (U)
Book Review: To Arm A Nation (U) I Book Review: Ultra Americans: The U.S. Role in Breaking the Nazi Codes,The (U)
Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946, The (U)
Book Review: Vietnam Spook Show (U) I Book Review: Yen! Japan's New Financial Empire and Its Threat to America (U)
BRANFLAKE (U) I
I
Bringing User Power to the High Performance Workstation (U)
Johnson, Thomas R. Vol5, No 3, Book review Fall 86 Communications
SIClNT
1 Soviet Union
Vol9, No 1, Book review Spr 90 Writing
Vol4. No 4. Book review 1 Win86 Writing
Vol8, No 2, Book review Sum 89 ' Military forces
Vol5, No 3, Book review Fall 86 History
Intelligence ULTRA
Vol. 12, Nos. 3-4. Book review FalY BRUSA agreement Winter 93 Magic
Ultra
Vol11, No 1, Linguistics Spr 92 SIGINT support
Vietnam War
Vol8, No 1, Book re view Spr 89 Japan
1 r'l. 13, No. 4, Winte
Vol10, No 1, Telephone Spr 91 Traffic analysis
I Vol9, No 2, Computer networks Sum 90 Management
BS Attitudes: How Things Work in Vol.16, No. 4, Winter Bureaucracy Bureaucracies, The (U)
REF ID:A525813
Title 1 Author Reference Key word
Calculation of Threat: A Review o Intelligence Community for Indications and Warning (U)
Business Manager and Business Communications, The (U)
CAP Production Software Library User (U) I
Vol 11, No 1, Communications Spr 92 Management
CCI Doctrine and the Simile of the I Cave: Time for Enlightenment (U) 1
Certitication of the Air Force Intelligence Officer: What Now? (U)
Challenges and Opportunities (U) I and Learners of a Second Langua
Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The (u)
Channel Capacity Algorithm (U)
China: Forbidden No More? (U) I Chinese KGB, The (U)
Church Cryptogram: Birth of Ou Nation's Cryptology, The (U) 1 "Cipher" Dispatches and the Electio of 1876 (U)
Vol 1, Nos 2-3, Intelligence Sum-Fall 82
I Vol4,85 Computer software (CS Issue) Computer systems
Vol. 16, Special Edition 96
Vol11,No 1, Spr 92
Vol. 12, No. 2, Summer 93
CCI Doctrine QUADRANT
m I I
Telephone
Air Force intelligence
Training
I Vol 10, Nos 3-4, Management Fall-Win 91
Vol4, No 4, Lankwage Win 86
V01.15. No. 4. Winter
Vol. 11. No. 2. Budget process Summer 92 Computer
programming Management
Vol2, Nos 1-2, Spr-Sum 83
Vol. 13, N0.4, Winter 94
Vol 1, No 1, Spr 82
Vol6. No 2, Sum 87
Vol. 1 1, No. 3, Fall 92
Communications Mathematics
China Travel
China KGB
Cryptology
Cryptologic history
REF IDgA525813
tb ) ( 3 ) - P . L . 86-36
Title
Closer Look a t the First Russian Language Proficiency Test, A (U)
Cobra Judy Acquisition, The (U) I1
Author Reference Keyword
Vol. 12, No.& Language testing Summer 93
Closing Address. F ron t ie r s i n Supercomputing Conference (U)
Code Acquisition by Binary Autodirective Search (U) I
Faurer, Lincoln D., LT Vo12, Nos 1-2, Supercomputers GEN, USAF Spr-Sum 83 I .
Code.Train: A Computer-Based Morse Code Training Package (U) I Cognitive Proceases in Software Fault Detection (U) I Collection Challenges Represented by the Proliferation of Very Small Aperture Terminal Communications, The (U)
Combining Distributed Computing and Objectoriented Techniques (U)
Vol 1, No 4, Win 83
Vol. 13, No. 3, Fa11 94 Code synchronization Spread spectrum
communications
Vol6, Nos 3-4, Computer Fall-Win 87-88 programming
Training
Vol. 11, No. 2, Cognitive process Summer 92 Computer
programming Computer software
I I Vol. 13, No. 3, Fall 94 Collection VS AT
Vol. 15, No. 1, Spring Distributed 96 computing
Object-oriented I techniques
COMINT and the PRC Intervention in Vanderpool, Guy R. the Korean Wa&S469+ I
Comments on Supercomputing (U) I
VO~. 15, NO. 2, COMINT Summer 96 Korean War
Vol 7, No 2, Sum 88
Vol2, Kos 1-2, Supercomputers Spr-Sum 83
Communications and the Ionosphere Voll,No4, Communications (LT) Win 83 HF
Ionosphere
Communications Security and the Vol3, Nos 3-4, Communications Problem of Hamlet: To Be or Not to Fall-Win 84-85 security Be (U)
Communist Carol, A (U) Vol6, Nos 3-4, Parody Fall-Win 87-88
( n ; (31-50 Uh(: 4[13
DOCID: 3020954 REF IDrA525813 ( 5 ) ( 3 1 - 1 8 iLlSC 7 9 8
(~'(3)-P.L. 36 -36
Title Author Reference Keyword i
Compacting the Masscomp Disk (U)
Comparing Visual Detection to Machine Vision for Detectiag the Presence of Laser Irradiation with an Electro-Optical Device (U)
Compariaon of Long P ipe l ine Protocols (U)
Computer Graphics Database Design Aid Package, A (U)
Computerized Identification of Message Families Using Graph Theory (U)
Vol8, No 2, Digi tizirrg Sum 89 Disk
Supercomputer
Vol4, No 4, Electronits Win 86 SICINT
I Val 7, No 4, Computer software Win 89 Computer networks
I Vol2.83 Computer graphics (CS Issue) Data base
V0l8, No 2, Computer graphics Sum 89 Communications
Computer Scripting of Arabic: I I Vol2,83 Computer systems the Impossible Dream- (CS Issue) L a m w e
Computer Virus Organization: A Defmitive Taxonomy and Anatomy of Computer Viruses (U)
Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)
Computers -The Wailing Wall (U)
Conditional Sigmage Analysis and Bulge Estimation (U) I
Vol4, Sum 85 (Supplement)
Meyer, Joseph A. Vol6, Nos 3-4, Fall-Win 87-88
Connect the Dots: Th Aid to Studying
Creating an Information Space: Cyc and Carnot (U)
Computer Virus Infections: is NSA Vulnerable? (U)
Creativity: Can It Be Taught? (U)
Vol4, No 3, Fall 85
Critical Programming Support during the Persian Gulf Crisis (U)
Vol5, No 3, Fall 86
I Vol 1,83 (CA Issue)
Computer security Computer systems
Computer systems Cryptanalysis
Computer security Computer virus
Computer security Computer virus
Cryptanalysis
Vol7, No 4, Computer systems Win 89 Mathema tics
Vol. 12, Nos. 3-4, Database Fall/ management Winter 93 systems
Vol.13, No. 4, Winter Creativity Management
Vol. 12, No. 1, Critical Spring 93 programming
support DESERT SHIELWSTORM
i k ) (1)
DOCID)s3~-3912()1B54 (t) (31-18 USC 798 (b)(3I-P.L. 86-36
Title I Author Reference Keyword I
CRITICOUM Management: A User Interface (U)
Vol2,83 Computer graphics (CS Issue)
Voll ,Nol, Cryptanalysis Spr 82
Cryptanalysis: A Prognosis for the Eighties (U)
.Vol. 12, Nos. 3-4, Cryptanalysis FalU Winter 93
Cryptanalysis in the United Kingdom (U)
Vol. 13, No.4, Winter computers 94 Cryptanalysis
Cryptanalytic Use of High-Speed Digital Computing Machines (U)
Vol 1.83 c r y p t o ~ r a ~ h ~ (CA Issue) Cryptology
Cryptographic Applications of Singular Value Decomposition (U) I Cryptographic Mathematia of Enigma, The (U)
Vol. 13, No. 3, Fall Ciphers 1994 Cryptanalysis
Enigma Ultra
Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)
Vol. 14, No. 3, Fa11 95 Intelligence analysis Language
Cryptologic Origin of Braille, The (U) Vol. 14, No. 3, Fa11 96 Braille Communications
Vol. 13, No. 4, Winter Crypto-TA 94
Crypto-TA: The Mighty Morphin of Technical Analysis (U) I C R Y ~ N I C S or Cryptanalysis and Cryptography in Microelectronics (U)
Vol. 16, Special Cryptanalysis Edition 96 C ~ Y P W ~ ~ ~ P ~ Y
Microelectronics
Vol3, Nos 1-2, Economics Spr-Sum 84 Soviet Union
Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)
Vol.13, No. 1, Spring Cuban Missile Crisis 94
Cuban Missile Crisis: A SIGINT Perspective, The (U) I
Vol4, No 2, Computer Sum 86 progra-ming
Computer systems
DAEMON - A FOLK- System Guardian Spirit (U)
Vol. 15, Special Edition 96
[Sensitive Title]
Data Transmissions (U) Vol. 15, No. 3, Fa11 96 Collection equipment Receivers
Vol6, No 4, Computer systems Win 87 Data Base
Database Processing with Triple Modular Redundance (U) I Dealing with the Future: The Limits of Forecasting (U)
Vol. 15, No. 3, Fa11 96 Forecasting
Title I Author Reference Keyword
Debunking Some Old Myths about Critical-Grade Promotions (U) Spr 82
Performance Promotion
Decade of Information Service a t FANX, A (U)
Vol8, No 3, Fall 89
Information support Library
DEFSMAC: The Future Is Now (U) Vol. 13, No.1, Spring 94
Vol 10, Nos 3-4, Fall-Win 91
DEFSMAC LANs
Deployment of the First ASA Unit to Vietnam (U)
Army Security Agency Vietnam War
Design and Evaluation of rwosEC Systems: The Computer Security Contribution to the Composition Discuseion, The (U)
Vol. 12, No. I, Spring 93
Computer security 1NM)SEC
Designers vs Users: Bridging the Communication Gap (U)
I
Computer graphics
~ a n g u a l 3 D Orthography
Vol 10, Nos 3-4, Fall-Win 91
Personal computers
Developing a Document Image Processing System (U)
Vol. 11, No. 3, Fall 92
Desktop publishing Document image
processing
Developing a Feedback Maintenance System (FMS) on Carillon (U)
Vol4,85 (CS Issue)
Communications Computer Systems
Developing Effective User Documentation (L')
Vol6, No 1, Spr 87
Programmer
Development of Communications Security Equipment, The (U)
Vo1.15, No. 2, Summer 96
COMSEC
Training Development of Ctyptologic Vol9, NO 3, Training, 1949 to 1960, The (U) and uavla A. Hatch Fall 90
Decision support Development of Decision Support Analysis for Traffic Analysis (U) systems
Trac analysis
Vol. 12. Nos. 3-4, FalU Winter 93
Development of the Transposition Pseudo-Square Technique, The (L')
I Diabolical Diagnosis (U)
Vol 1.83 (CA Issue)
Cryptanal ysis
V012, NOS 3-4, Fall-Win 83-84
Communications SIGlNT
Vol5.86 (CA Issue)
Cryptanal ysis Cipher systems
' b i l 3 i - 5 0 USC 4 C j - Title 1 Author Reference Key word
Vol9, No 4, Radio Win 91 communications
-
Vol 1, Nos 2-3, Friedman, W. F. Spr-Fall82 History
Human factor
Diary of William F. Friedman, 23 April-13 June 1943. Part I (U)
Friedman, William F.
Diary of William F. Friedman, 23 April -13 June 1943, Part I1 (U)
Friedman, W. F. History Human factor
Friedman, William F. Vol 1, NO 4, W in 83
Dictionary Searching by Syllabification and Syllable Indexing (U)
Vol. 11, No. 2, Summer 92
Computer programming
Language dictionary Pinyin dictionary
Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkley UNIX (U)
Vol10, No 2, Sum 91
Computer Programming
Computer software
Digital Communications: Introduction and Trends (U)
Vol 1, No 4, Win 83
Communications
Digital Subscriber Loops (U) Vol. 15, No. 1, Spring 96
ISDN Subscriber loops
Communications Data base Mathematics
Digital Voice Compression Algorithm with Robust Properties, A (U)
Vol2, Nos 1-2, Spr-Sum 83
McConnell, Vice Vol. 12, No. 1, Admiral J.M., USN Spring 93
Director's Welcome at the 1992 Cryptologic History Symposium, The (U)
Cryptologic history
Vol7, No. 3, Fall 88
Distributed File Access Over Heterogeneous Networks (U)
Computer networks
Distributed Processing on Powerful Personal Computers: Interim Results (U)
Vol4,85 (CS Issue) Computer networks
Counterintelligence
" r
,,nQCID: 3020954 (b) :3)-50 USC 405 ( u i : 3 ) - - E USC -198 ( b ) : 3 i - 2 . L . 66 -36
Title I Author Reference Keyword
DOSNNIX Interoperability and E mail in the Agency (U)
Domain Name Service (U)
Vol 11,-No 1, Computer hardware Spr 92 Computer software
Vol 10, Nos 3-4, Fall-Win 91 SIGlNT suppo
Terrorism
Vol. 14, Nb. 2, Information Summer 05 networks
LANs System
administration
Dr. Louis W. Tordella, 1911-1996 (U) author unknown I Vol. 15, No. 1, Spring 96
Effects of Optical Components on System Performance, The (U)
Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)
Effects of Pictures on Adult Learning and Recall, The (U)
Eight Cryptologic Problems (U)
, Electronic Procurement Request ' Processing: A Goal for Improved Resources Management (U)
EMC -A Field Perspective (U)
Encapsulating Xt Callback Functions in C + + (U) Enhancing Auditory Perception (U)
Vol5, Nos 1-2, Spr-Sum 86
Vol8, No 1, Spr 89
Vol. 16, No. 2, Summer 96
Vol8. No 2, Sum 89
Tordella Deputy directors
Data Base Photo-reconnais- same
Cryptologic history Soviet problem
Cryptanalysis .
SIGINT
Digital optical systems Optical fibers
Military Forces Soviet Union
Vol. 11, No. 2, Training Summer 92 Visual learning
Vol 1,83 (CA Issue) Cryptology
Vo19, No 1, Management Spr 90 Procurement
Vol8, No 4, Electronics Win 90
Vol11, No 1, Computer Spr 92 programming
Vol I, Nos 2-3, Data base Sum-Fall 82 Translation
(b) i i )
(b) (31-5C USC 105
~ ~ ~ 6 ~ 3 0 2 0 9 5 4 REF ID:A525831-3.~. 8 6 - 3 6
Title 1 Author
Error Messages: The Importance of Good Design (U)
Essential Diierence. The (U)
Evaluation of Conventional and LDD Devices for Submicron Geometries, An (U)
Examination of SSL Target Location Accuracies, An (U)
Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery, An (U)
Examples of Lattices in Computer Security Models (U) I Expanded MAX-MIN Priority Queue, An (U) I Exploratory Exploitation (U) ,I Facing the Post-Cold War Era (U)
Fall of the Shah: A Chaotic Approach, he (U) .
Farewell Address, A (U)
FARSEEING: A Study in Expert Systems (U)
Fault Simulation Requirements for Security Fault Analysis (U)
Fiber Distributed Data Interface. The (U)
First Generation Technical Viral Defense,A (U)
Reference Keyword
Vol11, No 1, Spr 92
Vol8, No. 1, Spr 89
Vol. 15, No. 2, Summer 96
Vol7, No. 3, Fall 88
Computer Programming
Computer systems
Human factor Management . - Transistors
Nolte, William M.
Vol. 13, No. 4, Winter 94
Vol4, No 2, Sum 86
Vol8, No 2, Sum 89
Vol5, No 4, Win 87
Human factor Soviet Union
Vol4, No 4, Computer security Win 86
Vol10, No 2, Computer software Sum 91
Vol5,86 (CA Issue) Cryptanalysis
Vol. 11, No. 4, Intelligence Winter 92 community
Post-Cold War
Chaos D~namical systems Indications and
warning
Artificial intelligence
Computer systems
Computer security
Computer Networks
Vol7, No 2, Sum 88
Computer security
Computer virus
DOCID: 3020954 REF IDtA525813
Title I Author Reference Keyword I -
First U.S. Government Manual on 1 Gaddy, David W. Vol. 11, No. 4, cryptogra~h~ Cryptologic history I
- .
Cryptography, The (U) Winter 92
Flight of the Condor, The (U) I Collection SICINT
~ L K U I R E : One Approach to Security 0
Vo1.13, No. 3, Fall 94 Computer security Cryptanalysts F'OLKLORE
Foreign Language Pdiciency Maintenance (U)
Vol. 12, No. 2, Summer 93
Cryptographic b ypase
INPOgEC
Formally Stating Cryptographic Bypass Requirements (U)
Vo1.13, No. 1, Spring 94
Four-Power Conference: Looking at a Few Unique Translations h m NSA's First Russian Language Proficiency Test, The (U)
Communications Frequency Hopping Vulnerability to Partial Band Jamming (U)
Vo11, No 1, Spr 82-
Frequency Management-No Longer an Agency Nemesis (U)
Vol. 13, No. 2, Summer 94
Frequency management
Telecommunications
DIRNSA From Chaoa Born: General Canine's First Charge to the NSA Workforce (U)
Vol6, No 2, Sum 87
Computer hardware Computer software Information support
Full-Text Searching: Coming of Age (U)
Vol8, No 3, Fall 89
Fundamentals of Electronic System Grounding (U) I I Vol 1, Nos 2-3,
Sum-Fall 82 Electronics
Further Results in Programming the I Vol6, No 1, Spr 87
Computer programming
HF
Future of Cryptology, The (U)
I I I
Meyer, Joseph A. Vol5.86 (CA Issue)
Future High Frequency Target Location System. The (U)
Future of High Frequencies in I Gerson, N.C. Vol. 11, No. 2, Cryptology - Part I, The (U) Summer 92
Gerson, N. C. Vol2, Nos 1-2, Spr-Sum 83
Cryptology HE' Communications
Future of High Frequencies in
. I Gerson, N.C. Vol. 11, No. 3, Cryptology - Part 11, The (U) Fall 92
Cryptology HF Communications
Title Author
Generalized GMW Sequences and an Application to Frequency Hopping (U)
Geographic Information Systems (U) I GKS: Its Comparison to Core and Its Feasibility of Use at NSA (U)
Glimpses of a Man: The Lie of Ralph J. Canine (U)
GLISSADE Lessons Learned from a Rapid Prototype (U)
Golden Age of Russia, The (U)
Corn NUGGET Award (U)
GOLD NUCGET Award for Excellence in Trac Analysis, The (U)
Gorbachev in Historical Perspective (U)
I 1 GRAFMAKER: A Powerful Business Graphics Tool (U)
Graphic User Interface for the Transcriber-Analyst, A (U) I
Reference Keyword
~01.15, No. 1, Spring Holographic camera INFOSEC
Vol 3, Nos 1-2, Electronics Spt-Sum 84 Engineering
Mathematics
I Val 10, Nos 3-4, Computer systems Fall-Win 91 I&rmation support
I Vol7, No 2, Computer Sum 88 Graphics
Vol6, No 2, Biography Sum 87 DIRNSA
Vol. 13, No. 3, Fall 94 GLISSADE Software system design
Vol. 13, No. 4, Winter Holbrook, James I 94 Russia
Vol. 15, No. 1, Spring COMINT 96 COLD NUGGET
TrafZic analysis
I Vol. 14, No. 2, GOLD NUGGET sum me^ 95 Tragic analysis
Vo18, No 4, Gorbaehev, Mikhail Win 90 History
Soviet Union
I Vol6, No 2, Sum 87
Vol4.85 Computer graphics (CS Issue) Computer software
Guerrillas in the Mist: C 0 ~ 1 ~ T a n d the Formation and Evolution of the Viet Minh, 1941-45 (U)
Handy-Dandy Field Site History: Fifty Years of Field Operations, 1946-1995, The (U)
HFDF Research Attempts: Past and Future (U)
I Vol2,83 Computer graphics (CS Issue) Computer systems
Hanyok, Robert d. Vol. 15, No. 1, Spring Viet,Minh 96 Vietnam
Johnson, Thomas R. Vol. 14, No. 1, Spring Cryptologic history 1995 Field sites
Gerson, N.C. Vol 1 , Nos 2-3, HF Sum-Fall 82
D@C!JJD: 3 0 2 0 9 5 4 (b) (3)-P.L. 8 6 - 3 6
Title -- -- -- -
High-Altitude Electromagnetic Pulae (HEMP): "A Sleeping Electronic Intruder ," The (U)
High-Tech Trade War with Japan: Can Anyone Win?, The (U)
Historical Intelligence Production Problems: Is Technology the Answer? (U1
History of the South Vietnamese Directorate for Technical Security (U)
History of the TACOMETER Development, A (U)
Hitler Gambit Versus the Great Anyway, The (U)
HoIistic Analysis (U)
Hot Carrier E f f ~ t s on VLSI Devices (U)
Human Visual Perception and Man- Computer Interaction (U)
HYPERCHANNEL: It8 Applications h ASHLAND'S Architecture (U)
Hypermedia Implemented in Object- Oriented Database Management ,
Systems (U)
Icon: An Enhancement to the UNIX Language Hierarchy (U)
Identifying Spoken Languages: A Community Problem Whose Time Has Come (L')
Ideograph Writing Patterns and Computer Input (U)
If Cryptanalysis Is What We Do and Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)
REF I D : A 5 2 5 8 1 B (~)-P.L. "6-36
1 Author Reference Keyword
Vol5, No 3, Communications Fall 86 Electronics
Jelen, George F. Vd 5, Nos 1-2, Economic warfare Spr-Sum 06 Japan
V614, No 4. Collection Win 86 Computer systems
Intelligence
Vol. 13, No. 1, Spring Cryptologic history 94 Vietnam
I Vol. 12, No. 2. Summer 93
I Vol5, Nos 1-2, International affairs Spr-Sum 86
Vol4, No 1. Analysis 1 Spr85 Collection
I Vol6, No 1, Electron injection Spr 87
Vol4,85 Computer graphics (CS Issue)
I Vol7, No. 3, Computer networks Fall 88 Computer systems
Vol10, No. 1, Computer networks Spr91 Management
I Vol6, No 1, Computer Spr 87 Programming
Computer systems L~~guage
Nolte, William M. Vol9, No 2, Cryptology Sum 90
(bj 131-18 %SC 798 ,b)13)-P.L. 86-36
REF IDgA525813 ( b ) ( 3 ) - P . L . 86-36
Title I Author
Impressions of the 1995 American Translatorss Association Conference in Nashville aa Viewed from the Per-
u-spective of tw I I I
Improving Roductivity in Software Prototype Developments (U)
IMP Syntax Graph, The (U) I In Defense of Translation (U)
In France's Footsteps (U)
Inference and Cover Stories (U)
Reference Keyword
Vol. 15, No. 1, Spring Language 96 Translation
Vol. 14, No. 3, Fa11 95 Software prototype development
Vol4, No 4, Computer programming
Vol4. No 2, Linguistic Sum 85 LanESuatW
I Val 4, No 3, Intelligence Fall 85
Vol. 12, Nos. 3-4, Cover stories FalVWinter 93
Inference through Polyinatantiation Vol. 11, No. 4, Computer security (u) Winter 92 Polyinstantiation
Influence of U.S. Cryptologic Organizations on the Digital Computer Industry (U)
Information Engineering Integrated Methodologies for Building a Transcriber Information Aids System (U)
In Pursuit of a SONET Link Encryptor (U)
Information System Security Engineering: Application Customer Foeused(U)
Quality Initiatives (U)
Integrative Language Testing (U)
Intelligence: A Business or a Craft (U)
Snyder. Samuel S. Vol6. Nos 3-4, Computer systems Fall-Win 87-88 History
Yo1 4.85 Computer systems (CS Issue) Engineering .
Vol10, Nol, Computer networks Spr 91 Link encryption
Optical
Vol. 11, No. 3, Information security Fall 92 Open systems
Vol. 15, Special Edition 96
Vol. 14, No. 1, Spring Management 95 Strategic planning
TBM
Vol4, No 3, I-@- Fall 85
Vol7, No 3, Intelligence 1 Fa11 88 Management
DOCID: 3020954
Title Author Reference Keyword
Intelligence and the American Johnson, Thomas R. Vol. 14, No. 3, Fa11 95 Book review Presidency (U) Intelligence
Intelligence Preparation of the Vol. 12, No. 2, IPB Battlefield: HOW Can NSA Improve Summer 93 Its Contributions to the IPB Process? (v)
International Telecommunications Val 5, No 3, Collection Revolution: VANS, ISDNs, and Fall 86 Telecommunications Other Assorted Collection Nightmares, The (U)
Internet: Opportunity and Challenge Vol. 16, No. 4, Winter Information services for the Information Services 96 Internet Organization at the National Security Agency (U)
INTERROGRAPH:. An Information Tool Vol2.83 Computer graphics for Counter-Terrorism Intelligence (CS Issue) Intelligence Centers (U)
Introduction: Examples of Powerful Vol2,83 Computer hardware Personal Computers (U) (CS Issue)
Introduction: Special Computer Vol4,85 Computer Science Issue (U) (CS Issue) Hardware
Intrbduction to a Historic Computer Vol. 13, No. 4, Winter Computers Document: Betting on the Future - 94 Cryptanalysis The 1946 Pendergrass Report, Pendergrass, J. T. Cryptanalysis and the Digital Computer, The (U)
Introduction to Asynchronous Vol. 14, No. 1, Spring ATM Transfer Mode (ATM) (U) 95 Communications
network technology
Introduction to Distributed Vol. 15, No. 3, Fall 96 Distributed Processing for the Layperson: processing Making the Move from the General Store to the Supermarket. . . , An (U)
Introduction to Object-Oriented Vol. 12, Nos. 3-4, Object-orientation Software Design and Development FalYWinter 93 Software design and Its Application a t NSA, An (U)
Introduction to Optical Lithography Vol6, Nos 3-4, Lithographer Modeling (U) Fall-Win 87-88 Optical
Introduction to Optical Projection Vol8, No 1, Lithographer Lithography Tools (U) .- - Spr 89 Optical
DOCID: 3020954
Title 1 Author Reference Keyword
Introduction to Positive Photoresist Processing (U) I Introduction to Volume Modeling and Rendering, An (UI
Iranian Islamic Revolutionary Guard Corps: "Khomeini's KGB," The (U) I Iran-Iraq War: Regional Implications and Alternatives for Resolution, The (U)
I Was a Cryptologic Corporal! (U)
Vol6. No 2, Sum 87
Vol. 1 1, No. 3, Fall 92
Vol4, No 4, Win 86
Vol7, No 2, Sum 00
Vol I, No 4, Win 83
Lithographer Optical
Data manipulation Volume modeling Volume rendering
Iran Middle East
International affairs
Middle East
History Human factor
John H. Tiltman: A Reminiscence Personality (U) Sum-Fall 82 Tiltman, John H.
52 Software Process Improvement Effort Measures of Value, The (U)
KAL 007 Shootdown: A View from (U,
Korean Phonology System: An Automated Language Information Aid for Transcribers. The (U)
Language Cross-Training: Alternatives and Permutations (U)
Language Expert System: Squeezing the Expert Linguist into a Computer (U)
Language Identification (U)
Language Multimedia-A Makeover (v)
LARC: An Electrical Parameter Extraction Algorithm for VLSI Standard Cell Deaigns(U)
Vol. 15, No. 3, Fa11 96 Software process improvement
Vol. 12, Nos. 3-4, KAL 007 FalVWinter 93
.Val 8, No 1, L ~ ~ g ~ a g e Spr 89 Transcription system
Vol. 11, No. 3, Language training Fall 92 Linguistics
Vol4, No 1, Spr 85
Vol. 15, No. 3, Fall 96
Vol. 13, No. 2, Summer 94
Vol9, No 2, Sum 90
Computer systems Lanwage Linguistic
Computer-managed instruction
Language training Video technology
Computer software
Learning Theories and Computer- Vol10, No 1, Computer-assisted Assisted Language Instruction Spr 91 instruction Technologies: A Synthesis (U) Computer
programming Language
Title
Linguistic "Funny," A (U)
Listening to the Rum Runners (U)
Listing Algorithms (U)
LOCKing Computers Securely (U)
Long Live the King (U)
Looking Ahead to the 1990s (U)
Low Earth Orbit (LEO) Satellite Communications Systems Technology and Intercept Issues (U)
Low Noise Reception of Microwaves (U)
Machine Learning Approach to Text Type Identification, A (U)
Management of TDY Funds: A Graphical Approach (U)
Managerial Track, The (U)
Managing Change (U)
Managing the Future (U)
Mathematics: A Challenge for Business, Government, and Academia (U) u Mechanisms of S~GINTTechnology
Transfer, The (U)
Media Responsibility and National Security (U)
Author Reference Keyword
Mowry, David P. Vol2, Nos 1-2, Communications Spr-Sm 83 History
Vol2, Noa 3-4, Mathematics Fall-Win 83-84 I lVol"l, Computer security
I Becker. Gene Vol. 15, Special Middle East Edition 96 SIGINT
I. Unknown Author Vol 5, NOS 1-2, Human factor Spr-Sum 86 Management
VoI. 12, NOS. 3-4, Communication Fall/Winter 93 satellites
VQ~. 11. No. 3, Microwaves Fall 92 Signals collection
Vol. 13, No. 4, Winter Discrimination 1994 Selection
Text type
I Vol2,83 Computer graphics (CS Issue) Management
Vol 10, Nos 3-4, Management Fall-Win 91 Training
Vol11, No 1, Management
11 1 ;'!&No 1. Management
Studeman, W. 0.. Vol8, No 2, Mathematics VADM, USN Sum 89
Vol. 12, No, 2, Airborne Summer 93 reconnaissance
Shootdowns
Vol6, No 2, Compromise Sum 87 SIGINT seeurity
Ridskopf, Elizabeth Vol7, No 3, Security leaks Fall 88
(hi ( 1 i
I E ~ $ & ~ 1 ~ / 3 0 2 0 g 5 4 [a) ( 3 ) - ? . L . (36-36
Title
Meeting the Programming Challenges of the Future (U)
Meteor Burst Communications: An Ignored Phenomenon? (U)
I I
Middle Management and the Soviet Problem: Some Reflections
Military Intelligence Corps Hall of Fame (U)
MILK SUSS^ Proof-Concept ATM .Encryptor: Overview and Lessons Learned (U)
Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere (U)
MrnTAR (U)
Model for Automated Cryptovariable Distribution in a Cryptographic Network, A (U) .
Modem Error Correction (U)
Modem Signal Routing (U)
Modular Arithmetic in Hardware (U)
Mokueatsu: . h e Word, Two Leesons (U)
Morse Mechanization (U)
REF 1~:~525&iY'-~'~' 86-36
Author Reference Keyword
I Val 1, Nos 2-3, Computer Sum-Fall 82 Programming
Vol9, No 3, Communications Fall90 Collection
Vol. 13, No.2 Cryptologic history Summer 94 Soviet problem
I Vol2, Nos 1-2, Management Spr-Sum 83 Soviet Union
I Vol10, No 1, Intelligence Spr 91 Personalities
Vol. IS, No. 3, Fa11 96 ATM MLKBUSH
Vol5, Nos 1-2, Collection Spr-Sum 86 ELINT
I Vol7, No 1, Communications Spr 88 System
Vol6, No 2, LanWage Sum 87 Transcription system
Vol10, No 2, Computer security Sum 91 Cryptographic
network
Vol. 13, No. 4, Winter Modem errors
I94
Vo1.16, No. 4, Winter Signs1 routing 96
Vol. 11,No.4, ,Hardware Winter 92 descriptive
languages Modular arithmetic
Vol.14, No. 4, Winter Atomic bomb World War I1
I Vo1.15, No. 2, Morse Summer 96
REF ID :(A)SB5E8P.38G36
Title Reference Keyword - Moscow's Realignment with Cairo: A Val 8, NO 4. Look at Gorbachev's New Political Win 90 T h i n k i i (U)
Move, or How NSA Came to Fort Johnson, Thomas R. Vol. 14, No. 2, Meade, The (U) Summer 95
Multidisciplinary Interaction: The Vol. 15, Time Is Now! (U) Special
Edition 96
Gorbachev, Mikhail Middle East Soviet Union
Cryptologic history NSA
Multidisciplinary interaction
SUNDIAL SINTER
Multimedia Data Bases: Design Issues, NSA Applications, and Prototypes (U)
I Vol9, No 2, Sum 90
Computer hardware Data base
Vol. 11, No. 3. Fall 92
National OPSEC Program, The (U) 10s OPSEC
Vol2, NOS 3-4, Fall-Win 83-84
Data base Naval Security Group Data Base Administration (U)
Vol. 15, Special Edition 96
Vol. 12, No; 1, Winter 93
Nearest Lattice Point Problem, The (U)
LLLalgorithm Mathematics Nearest lattice point
problem
Network System's Data Exchange (DX) IP Router: NSC's Product in Review (U)
Data exchange NSC DX router
Vol. 15, Special Edition 96
New View of Pearl Harbor: The U.S. Vol5, No 3. Navy and Communications Fall 86 Intelligence, A (U)
Communications History Japan Pearl Harbor
NIKKEL 11 S i l Processor or Getting Your NIKKEL'S Worth, The (U)
Vol7, No 1, Spr 88
Computer systems Signal processor
North Korean Attack on and Seizure of the USS Pueblo, The (U)
Vol. 11, No. 3, Fall 92
USS Pueblo
Vol. 11, No. 2, Summer 92
Churchill, Winston JN-25 Naval Code Pearl Harbor
Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)
Notes on Optimization (U) w Computer programming
DOCID : 3 02 0 999)-' .L "-'" REF IDzA525813
Title I Author Reference Keyword
NSA and SAC (U)
NSA and the Supercomputer Industry (U) I NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)
NSA: How Much Do We Really Know about the Software Capability of Our Contractors?
NSA in the Cyberpunk Future: A Somewhat Educated Guess at Things to Come (U)
NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)
NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)
NSA Signal Collection Equipment and Systems: The Early Years - Receivers (U)
NSA's Lessons Learned Program (U)
NTSS - Yesterday, Today, and Tomorrow (U)
Object Oriented Programming with C+ + (U)
Obscenities in COMINT: A Need for Cognitive Knowledge (U) I Obtaining Maximum Performance in a Supercomputer Unix Environment (U)
Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twina and the Complexity of Intelligence Analysis (U)
Johnson, Thomas R. Vol5, Nos 1-2, Intelligence Spr-Sum 86 Support
Vol. 14, No. 4, Winter HPC technology 1 95 Supercomputers Vol. 15, No. 1. Spring Data Encryption 96 Standard (DES)
Public cryptography
Vol. 14, No. 1, Spring Software assurance 1 95 TCMM
Vol. 15, No. 3, Fall 96 Cyberspace Seeurity
Vol. 14, No. 4, Winter Antennas 96 HF collection
Signal c o l l ~ t i o n equipment
Vol. 16, No. 1, Spring HF collection 96 Magnetic tape
recorders
Vol. 14, No.2 Analog technology Summer 95 Digital technology
Receivers Signals
I Vol. 14, No. 3, Fall 96 Lessons learned
Vol. 13, No. 2, Communications Summer 94 systems
National Time Sensitive System
I Vol. 12, Nos. 3-4, Object oriented FalVWinter 93 programming
I Vol4, No 1, Language Spr 85 Linguistic
Vol7. No 2, Supercomputer Sum 88
VoI8, No 3, Intelligence analysis Fall 89 Mathematics
REF
Title Author Reference Keyword
OJE: On the Job Enthusiasm A Layman's Perapeetive IZI) I
On NSA Reporting Style (Or Lack T h e r e d (U) I On Perverted Priorities (U)
On the Desirability of a Flexible and Dynamic Security httice (U)
On-Web Training: A Supervisot's Responsibility (U)
On the Selection Mechanism for Pseudonoise Seqwnees (U)
Opening Address, Annual Cryptanalysis Exchange (U)
Open Letter to William M. Nolte, An (U)
Operational Application of VLSI Technology: Using the PF474 to Alleviate the Problem of Variant Names, An (U)
Operations Management and Reaource Utilization for Signals Collection Using Knowledge-Based systems rS),
m Optical Disk Technology: CDs, WORMS and Erasable Disks (U)
Optical SIGINT Collectors (U)
Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)
Vd7, No 2, Human reaoureea Sum 88 M a n q m e n t
Vol. 13, No. 3, Fall 94
Soviet problem
Vol7, No 3, R ~ P ~ * S Fall 88
Vol3, Nos 1-2, L-WWm Spr-Sum 84 Linguistic
Vol10, No 2, Computer security
Vol8, No 2, Sum 89
Vol 1, Nos 23, Sum-Fall 82
Vol9, No 2, Sum 90
Vol4, No 2, Sum 86
Human resources Management Training
Communications Mathmatics
Cryptanalysis
Computer programming
Vol9, No 3, Management Fall 90 Signals collection
Computer systems TI WW
Vol8, No 2, Archival storage Sum 89 Computer sys tem
Optical
I Vol3, Nos 1-2, Collection s p r - s ~ m 84 SIGINT
Vol. 15, No. 3, Fa11 96 Solitona Telecommunications
(b) (1) (b) ( 3 1 - 5 0 USC 403 (b) ( 3 ) - P . L . 8 6 - 3 6
REF ID:A525813 - Title 1 Author Reference Key word
Radio traffic Traffic analysis
-
Origination and Evolution of Radio R a t r ~ e Analysis: The Period between the Wars, The (U)
Radio traffic Traffic analysis World War I
Origination and Evolution of Radio Mc Analysis: The World War I Era, The (U) F""
Radio traff~c Traffic analysis World War 11
Origination and Evolution of Radio Trac Analysis: World War 11, The 1
01.12, No. 1, Arab cryptology Cryptologic history
Origins of Cryptology: The Arab Contributions (U) I Origins of SGINT Hearability (U) 01.12, No. 2,
ummer 93 Hearability
Cryptologit history Soviet problem
Origine of the Soviet Problem: A Kirby, Oliver R. Vol. 11, No. 4, Personal View, The (U) Winter 92
Out of Control (U) Vol. 15, Special Edition 96
Computer security Espionage
Overview of -ME and Ita Application as a Knowledge-Based Mission Management System. An (U)
Vol8, No. 1, 1 Spr 89 Collection Management
Vol7, No 2, Sum 88
Pachydermic Personality Prediction Profile (U) I Human factor
Management
(Painful) Learning Experience from the Past, A (U1 I Vol. 12, Nos. 34,
FalUWinter 93 S i l s analysis
Parable of the Tail with No Teeth, The (U) I Management
Parable of the Tail with No Teeth, The Part 11: Into the Teeth ofthe Tail (U)
Vol8, No 2, Sum 89
Management
Parable of the Tail with No Teeth, The Part lII: The Raining Tail That Wagged the Teeth (U)
Vol8, No 4, Win 90
Management
Parable of the Tail with No Teeth,. The Part IV: The Tarnished Teeth of the Golden Tail (U)
Vol9, No 3, Fall 90
Management
Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail, The (U)
Vol 10, Nos 3-4, , Fall-Win 91
Management
(b) (1)
DOCID: 3020954 REF ID:A525813 (b)(3)-50 USC 4C3 (b)(3)-18 USC 7 9 9
[b) 13)-P.L. 86-36 (b)(3)-P.L. 86-36
P
Title 1 , Author Reference Keyword
Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U) I Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (u) I Parallel Tauswotthe Generator, The (v)
-paldo's Dream (U)
Passing of an Extraordinary Man, The (U) I Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U) I PCSE: A Design Implementation for PC Security (U) I
8 I
An "Electronic Performance Support System" (EPSS) for On-the-Job Training of Computer Operators f688Bt- I Perfect Router for the RINGSTONE Backbone, A (U) I Platform Network Evolution, The (U)
Predicting Terrorism: An Indications and Warning Model
Priceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)
Primer on Specific Emitter Identitication, A (U)
Problem Encountered with the Variant.Reeord Construct in Ada (U)
Vol. 11, No. 2, Summer 92
Vol. 11, No. 4, Winter 92
Vol 1, No 1, Spr 82
Vol7, No 4, Win 89
Vol4, No 3, Fall 85
Vol. 15, No. 2, Summer 96
Vol8, No 2, Sum 89
Vol11, No 1, Spr 92
Vol. 12, No. 1, Spring 93
Vol5.86 (CA Issue)
Vol9, No 4, Win 91
Vol8, No 4, Win 90
Vol9, No 4, Win
Vol 1, No 4, Win 83
Vol7. No 2, Sum 88
Management
Logic Mathematics
Computer systems Mathemath
Fairbanks, Sydney Personality
Somalia U.S. policy
Computer security Personal computer
Computer systems Computer training
RINGSTONE backbone Router
configurationg
Computer network Computer software
Terrorism
COMINT World War I1 Japan
COMIHINT Emitter
Computer network Variant re&
DOCID: 3020954 (3) (1) (~j(3)-50 USC 403 (3j (3)-15 USC 798 l s i ( 3 ) - P . T d . 86-36
REF (2U3'~%?25%3?5
Title Reference Keyword
Piocessor Interconnection Netwmka Val 8. NO 3, Computer graphics from Cayley Graphs (U) Fall 89 Computer networks
Supercomputer
Programmable COM8EC and the CYPRIS Crypto-Microprocessor (U)
Programming the SPS-2 (U)
Vol9, No 1, Computer software Spr 90 COMSEC
Microprocessor
Vol10, No 2, Computer Sum 91 programming
Computer software
Vol. 13, Na.4, Winter -1 94 Cryptologic history
Soviet problem
Project POSrCARD (U) Hanyok, Robert Vol. 13, No. 3, Fall 94 Deception POSrCARD Vietnam problem
Vo19, No 1. Signals collection Spr 90
Prototype Knowledge Base System for Technology Espionage: An Interim Report, A (U)
Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)
Prototyping Man-Machine Interface to Facilitate Early Identification of Software Defxiencies (U)
Pump or Bottleneck? Focus on the Intelligence Analyst (U)
I Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
Rapid Text Searching for Multiple Key Strings (U)
RATBAG Report, The (U) Jenkins, William
Vol5, No 4, Computer systems Win 86
Vol7, No 3, Computer networks Fall 88 Computer systems
Vol4, No 4, Win 86
Vol8, No 4, Win 90
Vol6, No 1, Spr 87
Vol9, No 2; Sum 90
Vol 10, No 2, Sum 91
Vol. 12, Nos. 3-4, FalVWinter 93
Computer software
Intelligence analysis
Computer software
Japan History Pearl Harbor Radio intelligence World War I1
Computer hardware Computer security Text searching '
Computer security
: % Q ~ ~ ~ , a - ~ 3 0 2 0 9 5 4 REF 1 ~ ~ ~ 5 2 5 8 1 3 (b) ( 3 ) - P . L . 86-36
Title
Reading Between the Lines: Methods of Analysis of Soviet Military Literature (U)
Real-Time Signals Acquisition and Processing on UNIX Platforms +wJf&- Receiver Dynamics (U)
Recent Progress in Academic Cryptology (U)
Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)
Red and Purple: A Story Retold (U)
Author Werence Keyword
1 Vol4, No 3, Reparting Fall 86 So& Union
Vol. 11, No. 2, S i s acquisition Summer 92 Signals processing
UMX
Vo1.15, No. 4. Winter Receivers Terms
Vol4, No 2, Cryptology Sum 86
Vol. 14, No.2, Cryptologic history Summer 95 S i o v , Abraham
WWlI
Vol3, Nos 3-4, Cipher systems Fall-Win 84-85 Hiatory
Japan
Reflection of Sherman Kent, A (U) Caddy, David W. I Vol 5, Nos 1-2, Kent, Sherman A. Spr-Sum 86 Personality
Regierunga-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire (U)
Requiem for TEAM SPIRIT, A (U)
Restructuring the U.S. SIGINT System for Tomorrow's World (U) I Return of the Electronic Francophoneglos, The (U)
Revised Capability Maturity Model for Heretics, A (U)
Revisiting the Dispute over the Identification of "AF" as Midway (U)
Mowry, David P. Vo1 2, Nos 3-4, Cryptanalysis Fall-Win 83-84 History
Vol9, No 3, Fall 90
Computer software Memory devices
Vol. 11, No. 2, Korea Summer 92 Support to military
Operations TEAMSPlRLT
Vol8, No 3, International &airs I Fall 89 sraiNT requirements
Vol4, No 1, Data base Spr 85
Vol. 14, No. 2, Capability maturity Summer 96 model
Software process improvement
Vol. 13, No. 4, Winter Cryptologic history 94 Midway, Battle of
wwn RISC Does Windows (U) Vol8, No 3, Computer hardware
Fall 89 Microprocessor
DOQIDr 3020954 (b) 13) -50 USC 403 (b) ( 3 ) -18 USC 798 i b ) (3)-P.L. 86-36
REF ID:j$735813 ( - P . L . 8 6 - 3 6
Title I Author Reference Keyword
The (U)
Role of Intelligence in the Post-Cold Vol. 11. No. 2. Intelligence War World. The (U) Summer 92 Poet-Cold War
Romanization of the Korean Vol11, No 1, Language (Korean) Language Based on the Character Spr 92 Values, The (U)
Rosetta Stone and Its Decipherment. Vol. 14, No. 3, Fall 96 Rosetta Stone The (U)
Satellite-Earth Radio Link Vol2, NOS 1-2, Communications Depolarization by Ice Crystals (U) Spr-Sum 83 Engineering
Securing Army Circuits during World War 11: A Potential Disaster Narrowly Averted (U)
Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)
Segment Storage: Hierarchical Graphics Storage System (U)
Select Yourself for War College (U)
Seward's Other Folly: America's First Encrypted Cable (U)
Shallow Junction Formation in Silicon Using Ion Implantation (U)
SIGINT and the Holocaust (U) '
SIGINT Goes to War (U)
Rowlett, Frank B. Vol6, No 1, Cryptanalysis Spr 87 History
World War I1
Vol. 15, Special Algorithm benign Edition 96 loading
Vol8, No 2, Computer graphics Sum 89
Vol5, No 3, Human factor Fall 86 Training
Vol. 12, No. 2, Cryptologic history Summer 93
Vol5, No 4, Microelectronics IWin86
Vol. 16, No. 2, Summer 96
Benson, Robert Louis Vol. 14, No. 1, Spring Cryptologic history 95 Holocaust
' WWII
1 Johruan, Thomas R. Vol. 15, No. 3, Fall 94 ruc;~~~doctrine
SGINT Requiremenb: Before, During, and After (U)
Vol. 14, No. 3, Fa11 95 Codebooks Cryptolinguistics
vol. 11, No. 2, SICINT reporting Summer 92 Training
Vol 7, No 1. Requirements Spr 88
REF IDzA525813 :b) ( 3 ) - P . L . 86-36
SGINT Talking (U)
Title Author Reference Keyword
S i l Analysis - Some Parting Thoughts (U)
Vol11, No 1, Spr 92
Sienal Descriptor Language, A (U)
-
Signaling System No. 7: And What about Analysis (U)
SIGINT Support to Military Vd. 12, No. 1, Support to military Operations: Organizing for J3ffective Spring 93 operations CrisislContingeney Support (U)
Signalman's Odyssey (U)
Simulated Annealing and Iterative Improvement: An Experimental Comparison (U)
SINCGARS Software Evaluation (U)
SINIOS, NSA, and the National Estimates Process (U)
\-[A Case Study in UNIX System Optimization (U)
Hateh, David A. Vol. 12, No. 2, SIGINT jargon Summer 93
I Hudee, James G. Vol. 15, Na. 4, Winter Signal analysis W
Vol3, Nos 34, Computer systems Fall-Win 84-85 Electronics
Vol. 13, No. 3, Fa11 94 CCS7 Communications
networks
Vol4, No 1, History Spr 85 Human factor
Vol. 12, No. 1, Combinatorial Spring 93 optimization
Iterative improvement
Simulated annealing
I l;l. 13, No. 1, Spring Computer security Tactical radio
systems
N o h , William M. Vo19, No 1, Intelligence Spr 90 community
National Intelligence Estimates
Vol. 12, No. 1, , Signals tiammission Spring 93
UNIX
Software Application to Correct the Effwts of Transliteration "Errors" on Database Integrity, A (U)
Software Inspections (U) I Software Maintenance: Putting Life Back into the Life Cycle (U)
Vol. 12, No.2, Software applications Summer 93 Transliteration
Vol4,85 Computer software (CS Issue)
Vol5, No 4, computer software Win 87
REF IDzA525813
. ( b ) ( 3 ) - P . L . 86-30
Title
Solved: A Long-hst Cipher from Siberia (U)
Solving xa = b (mod c) for x and Undedmating Recursions (U)
I Some Contributions toward a Course in COMINT Translation (U)
Author Reference Ke ywonl -
Vol. 13, No. 2, Ciphers Summer 94 Cryptologic history
I VOI. 11, NO. 4, c ~ p t a n a l y a s Winter 92 Signals Analysis
Undecimating recursions
Val. 14, No. 3, Fall 95
2 Win Vol9, 91 No 4, Training Translation
Soviet Military Establishment under Vol7, No 4, Gorbachev, Mikhail Gorbachev, The (U) VADM, USN Win 89 Intelligence
Soviet Union
Soviet "Scientific" Approach to Military Strategy: Strength or Weakness?, The (U)
Soviet Oil Production: Energy Balance Prospects for the Future (U)
So Where Do the Analysts Come From? (U) I
I t.'ol4, No 2, Oil Sum 86 Soviet Union
Space Weapons: Time for a Treaty? (U) I
I t ~ n Overview of a Systolic Array Processor for the Sun (U)
Spoken Language Library: A Unique Institution (U)
Stab at A2 Criteria, A (U)
Standards for Information Exchange among Computers (U)
Station "Cn and Fleet Radio Unit Melbourne (FRUMEL) Revisited (U)
Statistical Method for Quality '
Control of Microelectronic Chip Design, A (U)
Vo19, NO 1, ~ i l i t a r y forces Spr 90 Soviet Union
I Vol. 12, Nos. 3-4, Intelligence analysts FalVWinter 93 Management
I Vol8, No 4, Win 90
Space weapons Treaty
Vol. 14, No. 3, Fall 95 n & I
Computer networks Sum 90 Computer software
Gurin, Jacob (Jack) Vol5, No 3,
I Fall 86
I Vol9. No 1, Spr 90
I Vol9, No 1, Spr 90
Vol. 12, No. 2, Summer 93
Vol. 15, No. 2, Summer 96
English Language
Computer security
Computer network Computer systems
Cryptologic history FRUMEL Station C .
Chip design Statistics
REF ID : ~ 5 2 5 $ ? 2 - ' . ~ . E"36
Title I Author Reference Keyword
Vol. 12, No. 1, Management Spring 93 Strategic
management
- - -
Strategic Management and Mid- h v e l Managers - Is There a Link? I I
Vol11, No 1, Computer Spr 92 programming
Expert systems Knowledge
acquisition
Vol9, No 4, I Win91 Computer
programming Computer software
Structured Testing as a Learning Tool (U)
Sub-HF Search and Acquisition (U) Gerson, N.C. Vol. 13, No.2, Summer 94
Radio frequencies Search
Supercomputer Performance (U) Vol3, Nos 1-2, Spr-Sum 84
Supercomputers
Supercomputers: Trends and Needs, A Government Perspective (U)
V012, NOS 1-2, Spr-Sum 83
Supercomputers
'- Vo14,No3, Fall 85
Susceptibility of Multi- to Vial Attacks, The (U)
Computer security Computer systems Computer viru
Vol. 15, No. 1, Spring ! 96
Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)
Mu1 ti-chip modules (MCM)
Synthetic diamond
Systems Engineering Profession and Its Importance to NSA, The (U)
Vol. 11, No. 2, Summer 92
Systems engineering Systems
management
Vol7. No 2, Sum 88
Tapered Wet Etching of ContactsUsing a Trilayer Silox Structure (U)
Electrochemical Photoresist
Vol. 15, Special Edition 96
TEABALL: Some Personal Observations of SIGINT at War (U)
SIGINT Vietnam War
Vol9, No 4, Win 91
Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)
Vol. IS, Special Edition 96
Satel1,ites Southeast Asia Space technology ,
Technique for Representing Mandatory Security Policies in Non- Interference Theory, A (U)
Vol6, No 2, Sum 87
Computer security
i b ) !li
D O C ~ ~ ~ : ; ; ~ ~ ~ $ 9 54- (b) (3)-P.L. 06-36
REF IDrA525813
1 Author Reference - --
Keyword Title
Tech Track: Will It Work? (U) Vol7. No 1, Career planning Spr 88 Management
Vol. I$, No. 4, Winter Internet 96 Latin America
Vol8, No 3, Communications Fall 89 systems
Telecommunications
Tejiendo la Red Telarana (Weaving the World Wide Web) (U)
Telecommunications Automatic Monitoring and Control System (U)
I Vol. 12, No. 1, Safe combinations Spciag 93 Telephone codes
Telephone Codea and Safe Combinations: A Deadly Duo (U)
I Vol8. No 1, Management Spr 89
Ten Rules to Avoid Planning Foul- ups (U)
Vol8, No 3, Communications Fa11 89 COMSEC
Neutrinos
Theoretical Implications of a Second Spectrum (U)
Things Aren't What They Used to Be" (U) I Gurin, Jacob (Jack) Vol 1, No 1,
Bpi 82 Cryptology Editorial
1 Vol7, No 4, Win 89
rty Nations: Partners and mu, T3343 Software Evaluation Effort (U)
SIGINT Third Party
I Vol4,85 (CS Issue)
Computer software
Through Thailand by Train: A Personal Memoir (U)
Johnson, Thomas R. Vol4, No 3, Fall 85
History Human Factor
Thumbnail Review: Dirty Little Secrets: Military Information You're Not Supposed to Know (U)
1 Hatch, David A. Vol. 12, No. 2. Summer 93
Thumbnail review
Vol. 12, No. 2, Summer 93
TIDYTIFS I11 Systems Capabilities (U)
Time Is -Time Was -Time Is Past: Computers for Intelligence (U)
1 gmpaigne, Howard Val 6, NOS 3-4, Fall- Win 88-87
Computer systems Intelligence
Tools for the Beginning Translator (U)
Vol3, Nos 1-2, Spr-Sum 04
Computer systems Translation
Too Many Cryptologic Eggs in One Basket (U)
Vol7,No 1, Spr 88
Deployment Management
TQM and Software: New Paradigms for Development and Support (U)
Vol11, No 1, Spr 92
Computer software TQM
DW319a ,,,a R2 0 9 5 4 REF ID:A5'fZ)SB19L. 86-36 (b) (3)-18 USC 798 (b) (3)-F.L. 86-36
Title Author Reference Keyword I
Vol. 13, No.4, Winter 94
Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and HOW to Deal with Them (U)
TURBOTECH: An Architecture Management and Analysis System (U)
Twenty Questions to Evaluate Your Manager (U) I
Vol3, Nos 1-2, Japan Spr-Sum 84 LwP'ge
Linguistic Translation
Vol8, No 4, Computer software Win 90 Management
Requirements
Vol6, No 1, Management
UCSD pSystem, The (U) I , 1 ~ 0 1 4 . 8 5 (CS Iswe) Computer systems
Uncertain Summer of 1945, The (U) Wiley, Edward Vol. 14, No. 1, Spring Atomic bomb 95 Japan
WWII
United Pigeons Service (UPS)? (U) Unknown Author I Vol2, Nos 3-4, History Fall-Win 83-84
Unofficial Vocabulary (U)
Unternehmen BOLIVAR (U)
Use of Compressed Speech in Selecting Morse Code Operators, The (U)
I I Using Lotus 1-2-3 as an ELINT Display and Analysis Tool (U)
Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)
Value of Working Longer Hours for Promotion, The (U)
Video Teleconferencing: NSA Applications (U)
I Hatch, David A.
I Mowry. David P.
Vol 10, Nos 3-4, Fall-Win 91
Vol3, Nos 3-4, Fall-Win 84-85
Vol 1, Nos 2-3, .
Sum-Fall 82
Language Terms
History Intelligence
Training
Vol4, No 1, Mathematics Spr 85
Vol4, No 3, Computer software Fall 85 Computer hardware
ELINT
Vol7, No 3, Computer Fall 88 programming
Computer hardware ELINT
Vol. 15, No. 4, Winter Promotions 96
Communications Teleconferencing
DOCID: 3020954 REF ID : A52 5813 ' ' * I ( ' ) - ' . " .
Title 1 Author Reference Keyword
Volunteering. A Fresh Approach (U) Vol8, No I, Human resources . Spr 89 Management
Virtual Reality (U)
Warning and Crisis Management (U) Vol2, Nos 3-4, Communications Fall-Win 83-84 Management
Watch is Set: The Evolution of the T Vole, No 2, Telecommunications Operations Center, The (U) Sum 89 Watch operations
11
Vol. 12, Nos. 3-4, Humancomputer F a m i n t e r 93 interaction
Virtual reality
Way It Used to Be or What's an RSM Anyway, The, Part I (U)
Way It Used to Be, The. Part I1 (From ADVA /GENS to the Alphabet)
What Every Cryptologist Should Know About Pearl Harbor (UI
Where there's a will. . . . (U)
Who Are We? (U)
Vol. 13, No. 1, Spring Cryptologic history 94
Vol. 13, No.2, Cryptologic history Summer 94
Johnson, Tom Vo16, No 2, Cryptology Sum 87 History
Pearl Harbor
Vol3, NO^ 1-2, LWiWage Spr-Sum 84
Winning the Paper Chase: .
Operational Applications of Computer Output Microfiche (U)
With Pail and Shovel: The "Sandbox Approachn to Management and Leadership (U)
Work Force Skills and Mission Requirements Comparison System (U)
World War 11 German Army Field Cipher and How We Broke It, A (U) I
I v019, NO 2, Cryptd0gy Sum 90
Vol 1, No 1, Computer systems Spr 82
Vol6, No 4, Management Win 86
Vol. 14, No. 1, Spring Management 95 Work force skills
Vol. 14, No. 4, Winter German ciphers 1 95 World War I1
XNS Ethernet Connections for the Vol4,85 (CS Issue) Computer networks IBM PC XT (U) Vol4, No 1,
Spr 86
You've Got to Go by the Rules (U) Gurin, ~ k b (Jack) Vol2, Nos 3-4. I English Fall-Win 83-84 Lang~age
-- - - -- ---- - -
DOCID: 3020954 REF IDzA525813
@I'
Author
Ell IEI
ibi (1) (b) (31-50 USC 403
D(YCTD+ "500954 REF IDzA525813 (bi(3)-18 USC 799 (b'(3)-P.L. 86-36
v
Cryptologic Quarterly Index by Author
Author Title Reference Key word
Nearest Lattice Point Problem, The (U) Vol. 15, Special LLL-algorithm Edition 96 Mathematics
Nearest lattice point problem
I Yo1 5.86 (CA Issue)
Improving Productivity in Software Fall 95
E Vol. 14, No. 3, Software
Prototype Developments (U) prototype development
NSA: How Much Do We Really Know about the Software Capability of Our Contractors? (U)
Prototyping Man-Machine Interface to Facilitate Early Identification of
I Software Deficiencies (U)
I MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)
I Combining Distributed Computing and Object-Oriented Techniques (Ul
Vol. 14, No. 1, Spring 95
Vol4, No 4, Win 86
Vol. 15, No. 3, Fall 96
Vol. 15, No. 1, Spring 96
Software assurance
TCMM
Computer software
ATM MILKBUSH
Distributed computing
Object-oriented techniques
I Susceptibility of Multics to Viral Vol4, No 3, Computer security Attacks, The (U) Fall 85 Computer systems
Computer virus
I Origins of Cryptology: The Arab Vol. 12, No. 1, Arab cryptology Contributions (U) Spring 93 Cryptologic
history
Bringing User Power to the High Vol9, No 2, Computer Performance Workstation (L') Sum 90 networks
Management
Software Maintenance: Putting L i e Vol6, No 4, Computer Back into the Life Cycle (U) Win 87 software
Author 1 Title Keyword
Computer programming
L ~ ~ g u a g e dictionary
Pinyin dictionary
Vol. 11, No. 2, Summer 92
Vol. 13, No. 2, Summer 94
Frequency management
Telecommuni- cations
Microwaves Signals collection
Vol. 11, No. 3, Fall 92
Vol. 16, Special Edition 96
Call forwarding Data exfiltration
Vol. 15, No. 4, Winter 96
Receivers Terms
Communications system
Teleeommunicat-
I I I Telecommunications Automatic Vo18, No 3, Fall 89 I I Monitoring and Control System (U)
I
Space Weapons: Time for a Treaty? (U)
Vol. 15, Special Edition 96
Vol8, No 4, Win 90
Space weapons Treaty
I I Challenges and Opportunities (U) Vol 10, Nos 3-4, Fall-Win 91
Management
rogram Overview: and Directions (U)
Programming the SPS-2 (U)
Voll0, No 1, Spr 91
Computer security COMSEC
Vol 10, No 2, Sum 91
Computer programming
Computer s o h a r e
I 1 FARSEEING: A Study in Expert Systems Vol8, No 2, Sum 89
Artif~cial intelligence
Computer systems
I I Supercomputer Perlormanee (U) Vol3, NOS 1-2, Spr-Sum 84
Supercomputere
DOCID: 3020954 (9) ( 3 ) - P . L . 36-26
REF ID:A525813
Author 1 Title Reference Keyword ,
Role of Intelligence in the Poat-Cold Vol. 11, No. 2, War World, The (U) Summer 92
Intelligence Poat-Cold War
I I Chineme KGB, The (U) Vol 1, No 1, Spr 82
China KGB
I I Development of Communications Vo1.15, No. 2, Security Equipment, The (U) Summer 96
I I. Work Force Skills and Mission Vol. 14, No. 1, Requirements Comparison System (U) Spring 95
Management Work force skills
I I Farewell Address, A (U) Vol4, No 2, Sum 86
Development of Cryptologic Trainiig, Vol9, No 3, 1949 to 1960, The (U) Fall 90
Training
Becker, Gene Long Live the King (U) Vol. 15, Special Edition 96
Middle East SICINT
Computer Vin;ls Organization: A Vol5, No 3, Definitive Taxonomy and Anatomy of Fall 86 Computer Viruses (U)
Computer security
Computer virus
First Generation Technical Viral Vol7, No 2, Defense, A (U) Sum 88
Computer security
Computer virus
1.0CKkrg Computers Securely (U) Vol7, No 1, Spr 88
Computer security
J2 Software Process Improvement Effort Vol. 15, No. 3, Measures of Value, The (U) Fall 96
Software process improvement
I Critical Programming Support during Vol. 12, NO. 1. the Persian Gulf Crisis (U) Spring 93
Critical programming support
DESERT SHIELJM3TORM
Solved: A Long-Lost Cipher from Siberia Vol. 13. No. 2. (U) Summer 94
Ciphers Cryptologic history
On the Desirability of a ~lexible and Vol10, No 2, Dynamic Security Lattice (U) Sum 91
Computer security
Benson, Robert Louis SICINT and the Holocaust (U) Vol. 14, No. 1, Spring 95
Cryptologic history Holoca~8t WWII .
DOCID: 3020954 REF IDzA525813 [b) ( 3 ) - P . L . 86-36
Author Title Reference Keyword
BILLY Data BasetTasking Management V0l8, No 3, Database System Intervals (U) Fall 89 Management
Supercomputers
Data Transmissions (U) Vol. 15, No. 3, Collection Fall 96 equipment
Receivers
Morse Mechanization (U) Vo1.15, No. 2, Morse Summer 96
NSA Signal Collection Equipment and Vol. 14, No. 4, Antennas Systems: The Early Years - Antennas Winter 95 HF collection (U) Signal collection
equipment
NSA Signal Collection Equipment and Vol. 15, No. 1, HF collection Systems: The Early Years - Magnetic Spring 96 Magnetic tape Tape Recorders (U) recorders
NSA Signal Collection Equipment and Vol. 14, No. 2, Analog technology Systems: The Early Years - Receivers Summer 95 Digital technology (u) Receivers
Signals
CAP Production Software Library User Vol4.85 Computer (U) (CA Issue) Software
Computer systems
Inference and Cover Stories (U) Vol. 12, Nos. 3-4, Cover stories FalU Winter 93
Inference through Polyinstantiation (U) Vol. 11, No. 4, Computer Winter 92 security
Polyinstantiation
Applications of Nonsymbolic Artificial Vol9, No 4, Artificial Intelligence: Neural Networks (U) Win 91 intelligence
Neural networks
Bibliography of Neural Network Vol. 11, No. 3, Ketwork Applications to the Telecommunications Fall 92 management Industry, A (U) Neural networks
Telecommuni- cations
DOCID: 3020954 [ b ) 3 ) - P . L . 86-36
REF IDzA525813
h Track Will It Work? (U) Vol7, No 1, Spr 88
igins of SICINT Hearability (U) Vol. 12, No. 2, Summer 93
ing Risks or What Every Vol. 15, NO. 4, 1 Student and NSAer Should Winter 96 t Taking Chances, The (UI
signers vs Users: Bridging the Vol2,83 mmunication Gap (U) (CS Issue)
amond: A Hard Rock Story Vol. 15, NO. 1, rcomputing Out of the Spring 96
stem Capabilities (U) Vol. 12, No. 2, Summer 93
xtraordinary Man, The Vol4, No 3, Fall 85
n Letter to William M. Nolte, An (U) V019, NO 2, Sum 90
Specialists: Meeting Vol. 14, No. 3, into the Twenty-first Fall 95
ricans: The Vol5, No 3, Nazi Codes, Fall 86
Author
Career planning Management
Title Reference Keyword
Cognitive Processes in Sottware Fault Vol. 11, No. 2, Cognitive process Detection (Ul Summer 92 Computer
programming
Hearability
Computer software
Risk management
Computer grap hies
Multi-chip modules (MCM)
Synthetic diamond
Personality
Intelligence analysis
L ~ ~ g u a g e
Book review History Intelligence ULTRA
Origination and Evolution of Radio Vol6, Nos 3-4, Radio communi- Trac Analysis: The Period Between Fall-Win 87-88 cations the Wars, The (U) Traffic analysis
Origination and Evolution of Radio Vol6, No 1, Radio Tr f l~c Analysis: The World War I Era, Spr 87 Communications The (U1 Tr&c analysis
World War 1
DOCID: 3020954 REF .I~:A525813 (k) i 3 ) - F . L . 86-36
Author 1 Title
Origination and Evolution of Radio Trac Analysis: World War 11, The (U)
A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)
I I T3343 Software Evaluation Effort (U)
Further Results in Programming the
Future Spy Camera, The (U)
Introduction to a Historic Computer Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)
Programmable COMSEC and the CYPIUS Crypto-Microprocessor (U)
I I WE: On the Job Enthusiasm A Layman's Perspective (U)
I 1 Out of Control (U)
Theoretical Implications of a Second Spectrum (U)
Internet: Opportunity and Challenge for the Information Services Organization at the National Security Agency (UI
-1 Closer Look at the First Russian Language Proficiency Test, A (U)
Four-Power Conference: Looking a t a Few Unique Translations from NSA's First Russian Language Proficiency Test, The (U)
Reference Keyword
Vol7, No 4, Win 89
Radio communi- cations
Traffic analysis World War I1
Vol 10, No 2, Sum 91
Vol4.85 (CA Issue)
Vol6, No 1, Spr 87
Vol. 15, No. 1, Spring 96
Vol. 13, No. 4, Winter 94
Vol9, No 1, Spr 90
Vol7, No 2, Sum 88
Vol. 15, Special Edition 96
Vol8, No 3, Fall 89
Vol. 15. No. 4. Winter 96
Vol. 12, No. 2, Summer 93
Vol. 13, No. 1, Spring 94
Computer security Cryptographic
network
Computer software
Computer programming
Holographic camera
INFOSEC
Computers Cryptanalysis Pendergrass, J.T.
Computer software
COMSEC Microprocessor
Human resources Management
Computer security Espionage
Communications COMSEC Neutrinos
Information services
Internet
Language testing
Language testing.
PQSTD* 3020954 t 3 - . . 88-36 REF ID : ~ 5 2 58#3:1-5c 403
( b ) (31-18 J S C 798 (b! ( 3 ) - P . L . 86-36
Author I Title Rpference Keyword
Callimahos, Lambros D. Rosette Stone and Its Decipherment, I The (U) Vol. 14, Ih. 3, Rosetta Stone Fall 95
Campaigne, Howard H. Time Is -Time Was -Time Is Past: Computers for Intelligence (U)
International Telecommunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The (U)
Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)
Programmable COMSEC and the CYPRIS Crypto-Microprocessor (U)
I Way It Used to Be or What's an RSM
1 Anyway, The, Part I (U)
Conditional Sigmage Analysis and Bulge Estimation (U)
Virtual Reality (U)
I
Pump or Bottleneck? Focus on the Intelligence Analyst (U)
Way It Used to Be, The, Part I1 (From ADVA /GENS to the Alphabet) (U)
Management of TDY Funds: A Graphical Approach (U)
I SIGINT Reporting Training: Some Suggestions for Change (U)
Reading Between the Lies: Methods of Analysis of Soviet Military Literature (U)
Vol6, Nos 3-4, Computer systems Fall-Win 87-88 Intelligence
Vol. 15, Special Edition 96
Vol5, No 3, m Telecommuni- Fall 86 cations
Collection
Vol. 15, Special Satellites Edition 96 Southeast Asia
Space technology
Vol9,Nol, COMSEC Spr 90 Microprocessor
Computer Software
Vol. 13, No. 1, Cryptologic history Spring 94
Vol. 13, No.2, Cryptologic history Summer 94
Vo12,83 Computer (CS Issue) graphics
Management
Vol 1,83 Cryptanalysis (CA Issue)
Vol. 12, Nos. 3-4, Human-computer FalY interaction Winter 93 Virtual reality
Vol8, No 4, Intelligence Win 90 analysis
Vol. 11, No. 2, SIGINT reporting Summer 92 Training
Vol4, No 3, Reporting Fall 85 Soviet Union
DOCID: 3 0 2 0 9 5 4 (bj(3)-F.L. 86-36
ib) i l l
REF ID:A5258%B'-50 (b) 131-18 U3C LSC 798 403
[b)(31-P.L. 86-36
Author I Title Reference Keyword
Digital Voice Compression Algorithm Vol2, Nos 1-2, Communications with Robust Properties, A (U) Spr-Sum 83 Database
Mathematics
Digital Communicatione: Introduction Vol 1, No 4, Communications and Trends (U) Win 83
Intelligence Preparation of the Vol. 12, N0.2, IPB Battlefield: How Can NSkImprove Its Summer 93 Contributions to the IPB Process? (U)
I Connect the Dots: ~hd-bid to Studying Associations (U)
Book Review: Electronic Warfare: Element of Strategy and Murtiplier of Combat Power (U)
Modular Arithmetic in Hardware (U)
Vol7, No 4, Computer systems Win 89 Mathematics
Vol7, No 4, Computer systems Win 89 Mathematics
Vol 1, No 2-3. Book review Sum-Fall 82 Electronic warfare
Vol. 11, No. 4, Hardware Winter 92 descriptive
languages Modular
arithmetic d I A Story of Vol 10, Nos 3-4,
Successful BGINT CooperationwC ; ; c. T Fall-Win 91 Terrorism
Compacting the Masscomp Disk (U) Vol8, No 2, Digitizing Sum 89 Disk
Supercomputere
Vol. 15, Special Edition 96
XNS Ethernet Connections for the IBM Vol4, No 1, Computer PC XT (U) Spr 85 networks
V014,85 (CS Issue)
I Development of a Hard Disk Erasure Vol10, Nos 3-4, Computer security Procedure (U) Fall-Win 91 Disks
Book Reuiew: America's Military Vol.13,No.l. Bookreview Revolution: Strategy and Structure Spring 94 Cold War after the Cold War (U) Military strategy
REF ID:A5258&3 (b) (3) -5C USC 403 (b) (3) -18 JSC 798 [ b ) ( 3 ) -P.L. 85-36 -
Author Title Reference Keyword
Computer Scripting of Arabic: Not the Vol2.83 Computer systems Impossible Dream- (CS Issue) LanWage
Vol. 14, No. 3, Codebooks Fall 95 Cryptolinguistics
LARC: An Electrical Parameter Vol9, No 2, Computer Extraction Algorithm for VLSI Sum 90 Software Standard Cell Designs (U)
Synthetic Diamond: A Hard Rock Story Vol. 15. No. 1, Multi-chip That Moved Supercomputing Out of the Spring 96 modules Basement (U) (MCM)
Synthetic diamond
NSA's Lessons Learned Program (U) Vol. 14, No. 3, Lessons learned Fall 95
NIKKEL II Signal Processor or Getting Vol7, No 1, Computer systems Your NIKKEL'S Worth, The (U) Spr 88 Signal processor
ACQUAINTANCE: A Twl for Language Vol 7. No 4, Computer systems Identification (U) Win 89 Language
Mathematics
Connect the Dots: The PARENTAGE Aid Vo17, No 4, Computer systems to Studying Associations (U) Win 89 Ma thematics
Oh Boy ... You Really Have Your Hands Vol8, No 3, Intelligence Full! Two-Year-Old Twins and the Fall 89 analysis Complexity of Intelligence Analysis (U) Ma thema tics
PARENTAGE: Waldo's Dream (U) Vol7, No 4, Computer systems Win 89 Mathematics
World War 11 German Army Field Vol. 14, Xo. 4, German ciphers Cipher and How We Broke It, A (U) Winter 95 World War I1
CRYPTRONICS or Cryptanalysis and Vol. 15, Special Cry-ptanalysis Cryptography in Microelectronics (U) Edition 96 Cryptography
NIicroelectronics
Computer systems ELINT
Cobra Judy Acquisition, The (U) Voll,No4, Win 83 0
In France's Footsteps (U) Vol4, No 3, Intelligence Fall 85
b ) 3 ) - P . L . 6 6 - 3 6
DOCID: 3020954 REF ID:A525813
I Address Given to Annual Cryptanalysis Vol 1,83 Cryptanalysis Exchange (U) (CS Issue)
Author
DOWNIX Interoperability and E-mail Vol11, No 1, Computer in the Agency (U) Spr 92 hardware
Computer software
Title Reference Keyword
Communist Carol, A (Ul Vol6, Nos 3-4, Parody Fall-Win 87-88
I Cryptanalysis: A Prognosis for the Vol 1, No 1, Cryptanalysis Eighties (U) Spr 82
I Essential Difference, The (U) Vol5, No 4, Human factor Win 87 Management
An Expanded MAX-MIN Priority Queue Vol10, No 2, Computer ' ( LuI Sum 91 software
I Statistical Method for Quality Control of Vol. 15, No. 2, Chip design Microelectronic Chip Design, A (U) Summer 96 Statistics
GLISSADE Lessons Leaned from a Rapid Vol. 13, No. 3, GUSSADE Prototype (U) Fall 94 Software system
design
Artifical Intelligence and Expert Vol9, No 2, Artificial Systems: Do They Have a Future in Sum 90 intelligence Management? (U) Management
Strategic Management and Mid-Level Vol. 12, No. 1, Management Managers: Is There a Link? (U) Spring 93 Strategic
management
Artifla1 Intelligence and Expert Vol9, No 2, Artificial Systems: Do They Have a Future in Sum 90 intelligence Management? (U) Management
I Telephone Codes and Safe Vol. 12, No. 1, Safe combinations Combinations: ~ . D e a d l ~ Duo (U) Spring 93 Telephone codes
I Encapsulating Xt Callback Functions in Vol11, No 1, Computer C+ + (U) Spr 92 Programming
Prototype Knowledge Base System for Vol5, No 4, Computer systems Technology Espionage : An Interim Win 87 Report, A (U)
(Painful) Learning Experience from the Vol. 12, Nos. 3-4, Signals analysis Past, A (U) FalY
Winter 93
REF ID:A525813
Keyword Author
Computer Software
Management Requirements
Title Reference
TURBOTECH: An Architecture Vol8, No 4, Management and Analysis System (U) Win 90
Code Acquisition by Binary Vol. 13, No. 3, Autodirective Search (U) Fall 94
Code synch- ronization
Spread spectrum communi- cations
Farley, Robert D.
Fiber Distributed Data Interface, The (U)
Vol7, No 1, Spr 88
Computer networks
Book Review: On ULW Active Service (U)
Vol10, Nos 3-4, Fall-Win 91
Auetralian SICINT operations
World War II
Hitler Gambit Versus the Great Anyway, The (U)
International affairs
Vol5, No 1-2, Spr-Sum 86
Faurer, Lincoln D., LT GEN, USAF
Closing Address, Frontiers in Supercomputing Conference (U)
I
Vol2, Nos 1-2, Spr-Sum 83
Supercomputers
Operational Application of VLSI Technology: C'sing the PF474 to Alleviate the Problem of Variant Names, An (U)
Vol4, No 2, Sum 85
Computer programming
Vol. 12, No. 2, Summer 93
Software applications
Transliteration
Software Application to Correct the Effects of Transliteration "Errors" on Database Integrity, A (W
I Managing Change tU) Volll, KO. 1, Spr 92
Management
Parable of the Tail with No Teeth, The (U)
Management Vol7, .Yo 1, Spr 88
Parable of the Tail with No Teeth Part 11: Into the Teeth of the Tail, The (U)
Vol8, No 2, Sum 89
Management
Vol8, No 4, Win 90
Management Parable of the Tail with No Teeth Part 111: The Training Tail That '
1 Wagged the Teeth, The (U)
Parable of the Tail with No Teeth Part IV: The Tarnished Teeth of the Golden Tail, The (U)
Vol9, No 3, Fall 90
Management
DOCID: 3020954 REF IDzA525813 (b) ; 3 ) - P . 1 , . 86-36
I Title Author Reference Keyword
The Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail (U)
Vol 10, Nos 3-4, Fall-Win 91
Management
Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U)
Vol. 11, No. 2, Summer 92
Management
Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (U)
Vol. 11, No. 4, Winter 92
Management
Book Review: Codebreakers: The Inside Story of Bletchley Park (U)
Vol. 13, N0.2, Summer 94
Bletchley Park Book review Enigma Ultra
Filby, P.W.
I Book Review: British and American Approaches to Intelligence (U)
Vol7, No 2, Sum 88
Book review Britain Intelligence
Book Review: Intelligence and National Security (U)
Book review Intelligence Security
Vol5, No 4, Win 87
Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (UI
Vol7, No 1, Spr 88
Book review COMINT History Ultra
Book Review: Room 40: British Naval Intelligence 1914-18 (U)
Vol2, Nos 1-2, Spr-Sum 83
Book review History Intelligence
Book Review: The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (U)
Vol5, No 4, Win 87
Book review Intelligence
Collection Challenges Represented b y the Proliferation of Very Small Aperture Terminal Communications, The (U)
Vol. 13, No. 3, Fa11 94
Collection VSAT
Vol4.85 (CS Issue)
Computer systems Engineering
Information Engineering: Integrated Methodologies for Building a Transcriber Information Aids System (U)
)-50 USC 403 REF 1~:~52581#$' 3)-18 USC 793
Author I Title Reference Keyword ~
Multimedia Databases: Design Issues, NSA Applications, and Prototypes (U)
MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)
Voi 9, No 2, Database Sum 90 Computer
hardware
Vol. 15, No. 3, ATM Fall 96 MILKBUSH
Comparison of Long Pipeline Protocols Vol7, No. 4, Computer (I?) Win 89 software
Computer networks
In Pursuit of a SONET Link Encryptor Vol10. No 1, (L') Spr 91
Multidisciplinary Interaction: The Time Vol. 15, Is Now! (U) Special
Edition 96
Vol9, No. 3, Fall 90
I I Listing Algorithms (U)
I
Computer networks
Link encryptor Optical
Comments on Supercomputing (U)
Friedman, William F.
Multidisciplinary interaction
SUNDIAL SINTER
Diary of 23 April-13 June 1943. Part I (V)
Computer software
Memory devices
Vol2, Nos 3-4. Mathematics Fall-Win, 83-84
Vol4, Xo 1, Mathematics Spr 85 - Vol. 13, So. 3, Fall 94
targets
Vol2, Nos 1-2, Supercomputers Spr-Sum 83
Vol 1, Eios 2-3, Friedman, William Spr-Fall82 F.
History Human factor
Vol l,?Jo4, Friedman, William Win 83 F.
History Human factor
, , , ,
b) ( 3 ) -50 USC 433
REF ID : ~5 b5818usc (b)(3;-P.L. 8 6 - 3 6 798
Author
n Gtuldy, David W.
I Title Reference Keyword
I IMP Syntax Graph, The (U) Vol4, No 4, Win 86
Computer programming
First U.S. Government Manual on Cryptography, The (U)
Vol. 11, No. 4, Winter 92
Cryptography Cryptologic
history
Kent, Sherman A. Personality I Reflection of Sherman Kent, A (U) Vol5, Nos 1-2,
Spr-Sum 88
Book Review: International Journal of Intelligence and Counterintelligence
Vol6, NOS 3-4, Fall-Win 87-88
Counterintellig- ence
Intelligence
Crypto-TA: The Mighty Morphin of Technical Analysis (U)
Vol. 13, No. 4, Winter 94
Glimpses of a Man: The Life of Ralph J. Canine (U)
Vol6,No 2, Sum 87
Biography DIRNSA
Data Transmissions (U) Vol. 15, No. 3, Fall 96
Collection equipment
Receivers
Vo1.15. No. 2. Summer 96
Morse I Morse Mechanization (U)
I NSA Signal Collection Equipment and Systems: The Early Years - Antennas
Vol. 14, No.4, Winter 95
Antennas HF collection Signal collection
equipment
NSA Signal Collection Equipment and, Systems: The Early Years - Magnetic Tape Recorders (U)
Vol. 15, No.1, Spring 96
HF collection Magnetic tape
recorders
I NSA Signal Collection Equipment and Systems: The Early Years - Receivers
Vol. 14, No. 2, Summer 95
Analog technology Digital technology Receivers Signals
Vol. 13, No. 4, Winter 94
Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)
Vo19. No 1, Spr 90
Management Procurement
Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)
V O ~ 7,No 3, Fall 88
Computer networks
Computer systems
REF 1 ~ : ~ 5 2 5 $ ! % g 1-50 USC 403 1-18 L S C 798
(h) ( 3 ) - P . l . 86-36
I Author Title Reference Keyword I
#
Vol9,No 4, Win 91
Error Messages: The Importance of Vol 1 1, No 1, Computer Cood Design (U) Spr 92 programming
Computer systems
II Another Look at TEABALL, and Where Vol 11, No 1, S I G N support We've Cone from There (U) Spr 92 Vietnam War
Book Review: %etnam Spook Show (U) Vol11, No 1, Linguistics Spr 92 S I ~ N T support
Vietnam War
II Intelligence: A Business or a Craft (U) Vol7,No 3, Intelligence Fall 88 Management
Requiem for TEAM SPIRIT,A (U) Vol. 11, No. 2, Korea Summer 92 Support to military
operations TEAM SPI IUT
So Where Do the Analysts Come From? Vol. 12, Nos. 3-4, Intelligence FalV analysts Winter 93 Management
Gerson, N. C. I Artificial Ionospheric Modif~cation: Vol9, No 1, Communications Practical and Potential Applications (U) Spr 90 Ionosphere
Communications and the Ionosphere (U) Vol 1, No 4, Communications Win 83 HF
Ionosphere
Examination of SSL Target Location Vol. 15, No. 2, SSL tar t location Accuracies, An (U) SummerW I- -
I Future of High Frequencies in Vol. 11, No. 2, Cryptology i Crrptology - Part I, The (U) Summer 92 HF Communi- I cations Future of High Frequencies in Vol. 11, NO. 3, Cryptology Cryptology - Part 11, The (U) Fall 92 HF Communi-
cations
Future High Frequency Target Location Vol2, Nos 1-2, HF System, The (U) Spr-Sum 83
I HFDF Research Attempts: Past and Vol 1, Nos 2-3. HF Future (U) Sum-Fall 82
REF IDzA525813
Author Title Reference Keyword
Sub-HF Search and Acquisition (U) Vol. 13, No. 2, Radio frequencies Summer 94 Search
Attempted Imposition of Sharia on the Vol4, No 2, Middle East Sudan, The (U) Sum 85
Computer Graphics Database Design Vol2,83 Computer Aid Package, A (U) (CS Issue) graphics
Database
Now Playing: Churchill as Pearl Vol. 11, No. 2, Churchill, Winston Harbor Villain or Do We Need Another Summer 92 JN-25 naval code Conspiracy Theory? (U) Pearl Harbor
Bringing User Power to the High Vol9, No 2, Computer Performance Workstation (U) Sum 90 networks
Management
Signaling System No. 7: And What Vol. 13, No.3, CCS7 about Analysis (U) Summer 94 Communications
networks
Vol. 15, No. 2, Summer 96
Analysis of the Random and Sequential Vol. 11, No. 4, Random viruses Viruses (U) Winter 92 Sequential viruses
Software analysis
Certification of the Air Force Vol. 12, No. 2, Air Force Intelligence Officer: What Now? (U) Summer 93 intelligence
Training
Creating an Information Space: Vol. 12, Nos. 3-4, Database Cyc and Carnot (U) Fall/ management
Winter 93 systems
Standards for Information Exchange Vo19, No I , Computer network among Computers (U) Spr 90 Computer systems
SPLASH: An Overview of a Systolic Vol9, No 2, Computer Array Processor for the Sun (U) Sum 90 networks
Computer software
Vol. 13, No.2, Counter- Summer 94 intelligence
Spaceborne
ABM Treaty and the Dilemma of 0
Vol5, Nos 1-2, Defense Indecision, The (U) Spr-Sum 86 Soviet Union -
56 (b) 1) (b) 131-56 USC (b) ( 2 ) - e usc (h) (3)-P I U i
REF ID : A52 58$#:i-,, ,,, ,,, l ib) (3)-18 USC 79E !(b) ( 3 ) - P . L . 86-36
Title Reference
Gronet, Richard W.
Curin, Jacob (Jack)
Book Review: The CIA in Guatemala Vol 1, No 4, (u) Win 83
Cognitive Processes in Software Fault Vol. 11, No. 2, Detection (UI Summer 92
Impressions of the 1995 American Vol. 16, No. 1, Translators' Association Conference in Spring 96 Xashville as Viewed from the Perspective of thf
Translating by the Seat of Your Pants: Vol3, Nos 1-2. Some Observations about the Spr-Sum 84 Difficulties of Translation and How to Deal with Them (U)
Enhancing Auditory Perception (U) Vol 1, Nos 2-3, Sum-Fall 82
Language Expert System: Squeezing khe Vol4, No 1, Expert Linguist into a Computer (U) Spr 85
I Spoken Language Library: A Unique Vol5, No 3, Institution (U) Fall 86
'Things Aren't What They Used to Be" Vol 1 , No 1, Spr 82
I You've Got to Go by the Rules (L) Vol 2, Nos 3-4. Fall-Win 83-84
I I
Book Review: American Black Vol4, NO 2, Chamber. The (U) Sum 85
Book Reuiew: "And I Was There": Pearl Vol5, NOS 1-2, Harbor and Midway - Breaking the Spr-Sum 86 Secrets (L)
Keyword
Book review CIA
Cognitive process Computer
programming Computer
software
Language Translation
Japan L ~ n w a g e Linguistic Translation
Database Translation
Computer systems Language Linguistic
English Lanlwage
Cryptology Editorial
L=%uam English
Collection signals
Black Chamber Book review Cryptanalysis History
Book review History Japan Pearl Harbor World War I1
REF IDzA525813
Author
Hanyok, Robert J.
Hatch, David A.
Title Reference Keyword
With Pail and Shovel: The "Sandbox Approach" to Management and Leadership (U)
Vol6, No 4, Win 86
Management
Book Review: Black Cipher (U) Vol. 14, No. 4, Winter 95
Book review Espionage
Book Review: French Secret Services: From the Dreyfus AfTair to the Gulf War, The (U)
Guerrilla8 in the Mist: COMINTand the Formation and Evolution of the Viet Minh, 194146 (U)
Vol. 15, No. 4, Winter 96
Book review French secret service
Vol. 15,No. 1, Spring 96
COXINT Viet Minh Vietnam
Book Reuiew: Inside Hanoi's Secret Archives (U)
Vol. 15, No. 1, Spring 96
Book review POW/MIA Vietnam War
Book Review: My Silent War (U) Vol. 14, No. 3, Fall 96
Book review Eepionage
Ptojeet POSTCARD (U) Vol. 13, No. 3, Fall 94
Deception PO6lCARD Vietnam problem
[Sensitive Title] Vol. 15, Special Edition 96
Call forwarding Data exfiltration
A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)
Vol10, No 2, Sum 91
Computer security Cryptographic
network
Examples of Lattices in Computer Security Models (U)
Vol4, No 4, Win 86
Computer security
Shallow Junction Formation in Silicon Using Ion Implantation (U)
Vol5, No 4, Win 86
Microelectronics
Book Review: Breaking the Maya Code (U)
Vol. 13, No. 1, Spring 94
Book review Linguistics Maya code
Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)
Vol. 15, Special Edition 96
Algorithm benign loading
Book Review: Eyeball to Eyeball: The Inaide Story of the Cuban Missile Crisis (U)
Vol. 11, No. 3, Fall 92
Book review Cuban Missile . Crisis
DQCSI3.t. d - U 0 9 5 4 REF I D r A 5 2 5 8 1 3 - Author I Title
Book Review: Honorable Treachery: A History of U.S. Intelligence, Espionage. and Covert Action from the American Revolution to the CIA (U)
Development of Cryptologic Training, 1949 to 1960, The (U)
SIGINT Talking (U)
,Thumbnail Review: Dirty Little Secrets: Military Information You're Not Supposed to Know (U)
Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)
Book Review: Shadows of the Rising Sun: A Critical .View of the "Japanese Miraclen (U)
I I In Defense of Translation (U)
I I On Perverted Priorities (U)
Low Earth Orbit (LEO) Satellite Communicatione Systems Technology and Intercept Issues (U)
Middle Management and the Soviet Problem: Some Reflections'o,
Signal Descriptor Language, A (U)
INTERROGRAPH: An Information Tool for Counter-Terrorism Intelligence Centers (U)
Modern Signal Routing (U)
d l Notes on Optimization (U)
Reference Keyword
Vol. 13, No.3, Book review Fall 94 Espionage
SIGINT
Vol9, No 3, Training Fall 90
Vol. 12, No. SIGINT jargon Summer 93
Vol. 12, No. 2 Thumbnail review Summer 93
Vol 10, Nos 3-4, Language Fall-Win 91 Terms
Vol4, No 3, Lw!uage Fall 85 Linguistic
Japan
Vol3, Nos 1-2, Book review Spr-Sum 84 Japan
Vol4, No 2, Language Sum 85 Linguistic
Vol3, Nos 1-2, Language Spr-Sum 04 Linguistic
Vol. 12, Nos. 3-4, Communication Fall/ satellites Winter 93
Vol2, Nos 1-2, Management Spr-Sum 83 Soviet Union
Vol3, Nos 2-3, Computer systems Fall-Win 84-85 Electronics
Vol2.83 Computer (CS Issue) graphics
Intelligence
Vo1.15, No. 4, Signalrouting Winter 96
Vol7, No 1, Computer Spr 88 programming
Author Title Reference Keyword
Korean Phonology System: An Vol8, No 1, L ~ ~ g ~ a f i e Automated Language Information Aid Spr 89 Transcription for Transcribers, The (U) system
Problem Encountered with the Variant Vol7, No 2, Computer Record Construct in Ada (U) Sum 88 network
Variant record
Decade of Information Service a t FANX, Vol8, NO 3, Information A (U) Fall 89 support
Library
SIGINT Support to Military Operations: Vol. 12, No. 1, Support to military Organizing for Effective Spring 93 operations Crisis/Contingency Support (U)
Introduction to Asynchronous Transfer Vol. 14. No. 1, ATM Mode (U) Spring 95 Communications
network technology
:gir2# TI L I
Vol 10, No 1, Telephone Spr 91 Traffic analysis
c Vol. 13, No. 4,
Electronic Procurement Request Vol9, No 1, Management Processing: A Coal for Improved Spr 90 Procurement Resources Management (U)
.On-the-Job Training: A Supervisor's V0l8, No 1, Training Responsibility (U) Spr 89 Management
Human resources
Cryptanalysis in the United Kingdom Vol. 12, Nos. 3-4, Cryptanalysis (U) Fall1
Winter 93
Linguistic "Funny," A (U) Vol5, Nos 1-2, Humor Spr-Sum 86 Linguistics
DOCID: 3020954 REF ID:A525813 - Author I Title Reference Keyword
Information System Security Engineering: Application Customer Focused (U)
Vol. 11, No. 3, Fall 92
Information security
Open systems
Signal analysis Hudec, James G.
I Vol. 15, No. 4, Winter 96
Vol3, Nos 1-2, Spr-Sum 84
Vol5, KO 4, Win 87
Vol6, NOS 3-4, Fall-Win 87-88
Signal Analysis - Some Parting Thoughts (U)
Tools for the Beginning Translator (U)
Book Reuiew: One American Must Die
Computer systems Translation
Book review Human factor
Book review Iran Middle East
Middle East Terrorism
Book Reuiew: Sacred Rage: The Crusade of Modern Islam (U)
I I Book Review: The Master Terrorist: The True Story behind Abu Nidhal (U)
Vol6, KO 1, Spr 87
ATM MILKBUSH
MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)
Vol. 15, No. 3, Fall 96
I I Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)
Vol3. Nos 1-2, Economics Spr-Sum 84 Soviet Union
I1 Designers vs Users: Bridging the Communication Gap (U)
Vol2.83 Computer (CS Issue) graphics
Agency Electronic Printing Standards: Today It's PostSeript and Interpress Page Description Languages (U)
Vol9, No 3, Electronic printing Fall 90
Applying Object Technology to Our CLOVER Network (U)
High-Tech Trade War with Japan: Can Anyone Win?, The (U)
VO~. 12, NO. 2, CLOVER Summer 93 Object-Oriented
technology
Jelen, George F. Vol5, Xos 1-2, Economic warfare Spr-Sum 86 Japan
Stab a t A2 Criteria, A (U) Vol9, No 1, Computer security Spr 90
Jenkins, Virginia C. I Debunking Some Old Myths about Critical-Grade Promotions (U)
Vol 1, No 1, Performance Spr 82 Promotion
Jenkins, William RATBAG Report, The (U) Vol. 12, Nos. 3-4, Computer security FalU Winter 93
DOCID: 3020954 ( 3 : ( 3 ) - P . L . 3 6 - 3 6
REF IDzA525813 - Author
Johnson, Thomas R.
Title Reference Keyword
Identifying Spoken Languages: A Vo1.15, No. 3, Language Community Problem Whose Time Has Fall 96 Come (U)
Book Review: Secrecy and Democracy: Vol4, No 3, Book review The CIA in Transition (U) Fall 85 CIA
History Intelligence
Meteor Burst Communications: An Vol9, No 3, Collection Ignored Phenomenon? (U) Fall 90 Communications
Book Review: A Century of Spies: Vol. 15, No.3, Book review Intelligence in the Twentieth Century Fall 96 Intelligence (U)
Book Review: Marching Orders: The Vol. 14, No. 4, Book review Untold Story of World War 11 (U) Winter 96 World War I1
Book Review: The Eavesdroppers (U) Vol. 14, No. 1, Book review Spring 95 Espionage
SIGINT
Book Review: The Invasion of Japan: Vol. 14, No.2, Atomic bomb Alternative to the Bomb (U) Summer 95 Book review
Japan WWII
Book Reuiew: Spywars: Espionage and Vol. 14, No. 2, Book review Canada from Couzenko to Glasnost (U) Summer 95 Canada
Espionage
Book Review: The Target Is Destroyed: Vol5, No 3, Book Review What Really Happened to Flight 007 Fall 86 Communications and What America Knew about It (U) SIGINT
Soviet Union
Handy-Dandy Field Site History: Fifty Vol. 14, No. 1, Cryptologic history Years of Field Operations, 1945-1995, Spring 95 Field sites The (U)
Intelligence and the American Vol. 14, No. 3, Book review Presidency (U) Fall 95 Intelligence
Move, or How NSA Came to Fort Meade, Vol. 14, No. 2, Cryptologic history The (U1 Summer 95 NSA
SIGINT Goes to War (U) Vol. 13, No. 3, SIGINT doctrine Fall 94
NSA and SAC (U) Vol5, Nos 1-2, Intelligence Spr-Sum 86 Support
DOCID: 3020954 ~ b i ( 3 ) - P . L . 86-36
Author I
l b ) (1)
REF ID:A525813 'c) b) (3)-50 (31-18 USC usc 403 798
(b)(3)-P.L. 86-36
Title Reference Keyword
Through Thailand by Train: A Personal Vol4, No 3, History Memoir (U) Fall 85 Human factor
What Every Cryptologist Should Know about Pearl Harbor (U)
I TQM and Software: New Paradigms for Development and Support (U)
Begin and Arafat (U)
Cryptologic Origin of Braille, The (U)
1 The Plight of the Condor (U)
The Rornanization of the Korean Language Based on the Character Values (U)
Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (L')
Obscenities in COMINT: A Need for Cognitive Knowledge (U)
Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)
Vol6, No 2, cr~rptol0gy Sum 87 History
Pearl Harbor
Vol11, No 1, Spr 92
Vol2, NOS 1-2, Spr-Sum 83
Vol. 14, NO; 3, Fall 95
Vol10. No 1, Spr 91
Vol11, No 1, Spr 92
Computer software
TQM
Middle East
Braille Communications
Collection SIGINT
Laniwage . (Korean)
Vol7,No2, Electrochemical Sum 88 Photoresist
Vol. 15, Special Edition 96
v014, KO 1, L ~ ~ g ~ a g e Spr 85 - Linguistic
Vol. 13. No. 2, Book review Summer 94 Economic
espionage
Book Review: Informing Statecraft (U) Vol. 12, No. 2, Book review Summer 93 Intelligence
community
Book Review: S I G I ~ T Secrets: The Vol. 12, No. 1, Book review Signals Intelligence War, 1900 to Today, Spring 93 Cryptologic The history
SIGSN'S
DOCID: 3020954 [bl ( 3 ' - ? . L . 86-36
Author -i REF ID:A525813 ;;;;;; - 5 0 . J s c 4 0 3
(bj(3j-18 LISC 798 (b) ( 3 ) -P.;. 86-36
Title Werenoe Keyword
Book Review: Ultra-Magic Deals and Vol. 12, Nos. 3-4, Book review the Most Secret Relationship, 1940- FalU BRUSA 1946, The (U) Winter 93 agreement
Magic Ultra
Foreign Language Proficiency Vol7, No 3, Language Maintenance (U) Fall 88
Book Review: Chicksands: A Millenium Vol. 13, No.3, Book review of History (U) Fall 94 Chicksands
Field sites
I 1 Vol. 15, Special Edition 96
Developing a Document Image Vol. 11, No. 3, Processing System (U) Fall 92
Introduction to Distributed Processing Vol. 15. NO. 3, for the Layperson: Making the Move Fall 96 from the General Store to the Supermarket. . . , An (U)
I I Twenty Questions to Evaluate Your Vole, No 1, Manager (U) Spr 87
I I Volunteering: A Fresh Approach (U) Vol8, NO 1, Spr 89
History of the TACOMETER Development, Vol. 12, No.2, A (U) Summer 93
Recent Progress in Academic Vol4, No 2, Cryptology (U) Sum 85
Decade of Information Service a t FANX, Vol8, No 3, Fall 89
Kirby, Oliver R.
UCSD p-System, The (U) Vol4.85 (CS Issue)
Origins of the Soviet Problem: A Vol. 1 1, No. 4, Personal View, The (U) Winter 92
Desktop publishing
Document image processing
Distributed processing
Management
Human resources Management
Cryptology
Cryptologic history
Soviet ptoblem
Information support
Library
Computer systems
(b) (1) (h) 3 - F . 1 , . 86-35
DOCID: 3020954 { t ) ( 3 ) - F . 1 , . 86-36
REF ID : A52 58$3ji/-53 403
(C)13)-18 USC 198 (b) (3)-P.L. 8 6 - 3 6
Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesia (U)
Author
I Satellite-Earth Radio Link Depolarization by Ice Cryetals (U)
Title
Cornmunicationa Security and the Problem of Hamlet: To Be or Not to Be (U)
Language Multimedia-A Makeover (U)
II Holistic Analysis (U)
Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The (U)
Reference Keyword
Vol3, Nos 3-4, Communications Fall-Win 8485 Security
Vol. 13, No. 2, Computer- Summer 94 managed
instruction Language training Video technology
Vol10, No 1, Computer-assisted spr 91 instruction
Computer programming
Language
Vol 10, Nos 3-4, Fall-Win 91
Personal computers
Vol2, Nos 1-2, Communications Spr-Sum 83 Engineering
Vol4, No 1, Analysis Spr 85 Collection
Vol. 11, No. 2, Budget process Summer 92 Computer
programming Management
Vol9, No 4, Radio Communi- Win 91 cations
n Developing a Feedback Maintenance System (FMS) on Carillon (U)
T3343 Software Evaluation Effort (U)
Vol4,85 Communications (CS Issue) Computer systems
Vo14,85 Computer (CS Issuel software
Development of a Hard Disk Erasure Procedure (U)
Vol10, Nos 3-4, Computer security Fall-Win 91 Disks
DOCID: 3020954 REF ID:A525813)(1) (b)13)-53 US: 403
( b ] (3)-18 USC 798 (h) ( 3 ) - J . I A . 8 6 - 3 6
'k) (j)-P.>. P 6 - 3 C -
Computer Virus Organization: A Vo15, No 3, Definitive Taxonomy and Anatomy of Fall 86 Computer Viruses (U)
Author
I I Military Intelligence Corps Hall of Vol10, No 1, Fame (U) Spr 91
Title Reference Keyword
I I Language Cross-Training: Alternatives Vol. 11, No. 3, and Permutations (U) Fall 92
Generalized GMW Sequences and an Vol3, Nos 1-2, Application to Frequency Hopping (U) Spr-Sum 84
Book Review: Concise History of the Vo14, No 1, Middle East, A (U) Spr 85
Calculation of Threat: A Review of Voll, Nos 2-3, Intelligence Community Initiatives for Sum-Fall 82 Indications and Warning (U)
I I Segment Storage: Hierarchical Vol8, No 2, Graphics Storage System (U) Sum 89
07 Shootdown: A View from Vol. 12, Nos. 3-4, FalU Winter 93 u Vol2, Nos 3-4, Fall-Win 83-84
I I LOCKing Computers Securely (U) Vol7, No 1, Spr 88
52 Software Process Improvement Effort Vol. 16, No. 3. Measures of Value, The (U) Fa11 96
Computer security
Computer virus
Intelligence Personalities
=angusg= training
Linguistics
Electronics Engineering Mathematics
Book review History Middle East
Intelligence
Computer Graphics
KAL 007 (hi (1) (b)(3)-P.; 86-36
Communications SIClNT
Computer security
Software process improvement
Case Study in UNlX System Vol. 12, No. 1, Signals Spring 93 transmission
Human Visual Perception and Man- Vol4,85 Computer Computer Interaction (U) (CS Issue) graphics
Millimeter Wave Transfer Function of Vol5, Nos 1-2, Collection the Earth's Clear Air Atmosphere (U) Spr-Sum 86 ELI~T
DOCID: 3020954 REF ID:A525813 (bj(3)-?.L. 86-36
Author I Title Reference Keyword
Lutwiniak, William
Signal Descriptor Language, A (U) Vol3, Nos 3-4, Computer systems Fall-Win 04-85 Electronics
I Vol. 15, No. 2, Summer 96
John H. Tiltman: A Reminiscence (U) Vol 1, Nos 2-3, Personality Sum-Fall 82 Tiltman, John H.
Introduction to Optical Lithography Modeling (U)
Introduction to Optical Projection Lithography Tools (U)
Introduction to Positive Photoresist Processing (U)
Gorbachev in Historical Perspective (U1
NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)
Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)
I Effects of Pictures on Adult Learning and Recall, The (U)
I Object Oriented Programming with C + + (L')
I Signalman's Odyssey (U)
I NSA: How Much Do We Really Know about the Software Capability of Our Contractors? (U)
1 Ideograph Writing Patterns and Computer Input (U)
Vol6. Nos 3-4, Fall-Win 87-88
Vol8, No 1, Spr 89
Vol6, No 2, Sum 87
Vol8, No 4, Win 90
Vol. 15, No. 1, Spring 96
Vol. 14, No. 2, Summer 95
Vol. 11, Wo. 2, Summer 92
Vol. 12, Nos. 3-4, Fall/ Winter
Vol4, No 1, Spr 85
Vol. 14, No. 1, Spring 95
Vol4, No 3, Fall 86
Optical Lithography
Optical Lithography
Optical Lithography
Gorbachev, Mikhail
History Soviet Union
Data Encryption Standard (DES)
Public cryptogra~h~
Cryptologic history Sinkov, Abraham WWII
Training Visual learning
Object Oriented programming
History Human factor
Software assurance
TCMM
Computer systems ~~~~
( b l (11
REF ID : A52 !$3?;4;$: DOCID: 3020954 i i b)(j)-P.L. 8h-36 (b) ( 3 ) - P . L . 86-36
Author I Title Reference Keyword
Perfect Router for the RINGSTONE Vol. 12, No. 1, RINGSTONE Backbone, A (U) Spring 93 backbone
Router configurations
52 Software Process Improvement Effort Vol. 15, No. 3, Software process Measures of Value, The (U) Fall 96 improvement
Frequency Hopping Vulnerability to Vol 1, No 1, Communication Spr 82
Vol5,86 Cryptanalysis (CA Issue) cryptography
Mathematics
Cryptographic Applications of Singular Vol 1,83 C r Y ~ t o g r a ~ h ~ Value Decomposition (L') (CA Issue)
McConnell, Vice Admiral J.M., USN
Director's Welcome at the 1992 Cryptologic History Symposium, The (U)
In Pursuit of a SONET Link Encryptor (U)
Radio Intelligence in Japanese and American North Paciftc Naval and Air Operations (U)
Architecture and Implementation for a Large Scale Distributed Multiprocessor, An (U)
Vol. 12, No. 1, Spring 93
Vol10, No 1, Spr 91
Vol9, No 2, Sum 90
Vol8, No 3, Fall 89
Cryptologic history
Computer networks
Link Encryptor Optical
History Japan Pearl Harbor Radio intelligence World War I1
Computer networks
Signal processor
Architecture and Implementation for Vol8, No 4, Computer Linear Speedup of DSP Programs, An Win 90 networks (U) Signal processor
McManis, David Y. I Warning and Crisis Management (U) Vol2, Nos 3-4, Communications Fall-Win 83-84 Management
Geographic Information Systems (U) Vol 10, Nos 3-4, Computer systems Fall-Win 91 Information
support
ibi (1)
DOCID: 3020954 REF ID:A5258$8 31-50 USC 403 3)-18 USC 738
(b) 13)-P.L. 96-36 ( b ) ( 3 ) - F . L . RO-36
Author I Title Reference Keyword
I Future of Cryptology. The (U) Vol5.86 Cryptology (CA Issuel
Vol5, Nos 1-2, Database Spr-Sum 86 Photo-
reconnaissance
I Soviet Oil Production: Energy Balance Vol4, No 2, Oil Prospects for the Future (U) Sum 85 Soviet Union
Meyer, Joseph A.
Development of Decision Support Vol. 12, Nos. 3-4, Decision support Analysis for Trafiic Analysis (U) FaIY systems
Winter 93 Traffic analysis
Computers -The Wailitlg Wall (U) Vol6, Nos 3-4, Computer systems Fall-Win 87-88 Cryptanalysis
Alpe-Adria: A Model for Regional Vol7, No. 3, Economics Economic and Cultural Cooperation or a Fa11 88 International Rebirth of Austria-Hungary? (U) affairs
Cryptographic Mathematics of Enigma, Vol. 13, No. 3, Ciphers The (U) Fall 94 Cryptanalysis
Enigma Ultra
NSA and the Supercomputer Industry Vol. 14, No. 4, HPC technology Winter 96 Supercomputers
Real-Time Signals Acquisition and Vol. 11, No. 2, Signals Processing on UNIX Platforms W%W- Summer 92 acquisition
S i a l s processing UNIX
SKYRAP: A Case Study in UNIX System Vol. 12, No. 1, Signals Optimization (U) Spring 93 transmission
SKYRAP UNIX
I Some Contributions toward a Course in Vol9, No 4, Training COMINTTranslation (U) Win 91 Translation
I TEABALL: Some Personal Observations Vol9, No 4, SIGINT of SICINT a t War (U) Win 91 Vietnam War
Diabolical Diagnosis (U) Vol5,86 Cryptanalysis (CA Issue) Cipher systems
I Exploratory Exploitation (U) Vol5.86 Cryptanalysis (CA Iasue)
DOCID: 3020954 REF ID:A525813 - Title Reference Keyword Author
T - - - -
Distributed Processing on Powerful Per- sonal Computers: Interim Results (U)
- - - -
Vol4.85 (CS Issue)
Computer networks
Further Results in Proarammina the - RISC Does Windows (U)
Vol6, No 1, Spr 87
Computer programming
Computer hardware
Microprocessor
Vol8, No 3, Fall 89
Artificial Intelligence: Approach to Cryptodiagnosis (U)
Vol. 13, No. 1, spring 94
Artificial intelligence
Cryptanalysis
Machine Learning Approach to Text Type Identiflation, A (U)
Vol. 13, No. 4, Winter 94
Discrimination Selection Text type
CRYPTROMCSor Cryptanalysis and Cryptography in Microelectronics (U)
Vol. 15, Special Edition 96
Cryptanalysis Cryptography Microelectronics
Nearest Lattice Point Problem, The (U) Vol . 1 5, Special Edition 96
LLL-algorithm Mathematics Nearest lattice
point problem
Evaluation of Conventional and LDD Devices for Submicron Geometries, An (U)
Vol8, No 1, Spr 89
Transistors
Hot Carrier Effects on VLSI Devices (U) Vol6, No 1, Spr 87
Electron ily'ection
Mowry, David P. I Book Review: Alan Turing: The Enigma Vol2, Nos 3-4, Fall-Win 83-84
Book review Cryptanalysis Enigma History
I Listening to theRum Runners (U) Vol2, NOS 1-2, Spr-Sum 83
Communications History
Regierungs-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire (U)
Unternehmen BOLIVAR (U)
Vol2, Nos 3-4, Fall-Win 83-84
Cryptanalysis History
Vol3, Nos 3-4, Fall-Win 84-85
History Intelligence
I Developing Effective User Documentation (U)
Volf3. No 1, Spr 87
Programmer
DOCID: 3020954 REF ID:A5258&3 (b)[3)-5C USC 403 (.b) (31-18 USC ?SIE
[b) 1 , 3 ) - l ' . L . 86-.36 ( b ) (3)-P.L. 86-36
Development of a Hard Disk Erasure Procedure (U)
Author
Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)
Title --
Software Inspections (Ul
I Platform Network Evolution, The (U)
I I Eight Cryptologie Problems (U)
Opening Address, Annual Cryptanalysis Exchange (U)
Artif cia1 Intelligence: Approach to Cryptdiagnosis (U)
Machine Learning Approach to Text Type Identification, A(U)
Book Review: One Hundred Days: The Memoirs of the Falklands Battle Group Commander (Ul
I I North Korean Attack on and Seizure of the USS Pueblo, The (U)
History of the South Vietnamese Directorate for Technical Security (C)
Beyond Codes and Ciphers: The Expanded Meaning of Cryptology in the Late Twentieth Century (U)
Book Reuiew: Conflict of Duty: The U.S. Navy's Intelligence Dilemma, 1919- 1945 (U)
Book Reuiew: Infamy: Pearl Harbor and Its Aftermath (U)
Reference Keyword
Vol4.85 Computer (CS Issue) software
Vol10, Nos 3-4, Computer security Fall-Win 92 Disks
Vol10, No 2, Computer Sum 91 programming
Computer software
Vol9, No 4, Computer network Win 91 Computer security
Vol 1,83 (CA Issue)
Vol 1, Nos 2-3, Sum-Fall 82
Vol. 13,No. I, Spring 94
Vol. 13, No. 4, , Winter 94
Vol. 11, No. 2, Summer 92
Cryptology
Cryptanalysis
Ar tiflcial intelligence
Cryptanalysis
Discrimination Selection Text type
Book review Falklands War
Vol. 11, No. 3, USS Pueblo Fall 92
Vol 11, No 1, Spr 92
Vol. 13, No. 1, Spring 94 Vietnam
Vol8. No 4, Cryptology Win 90 History
Vol2, Nos 1-2, Book review Spr-Sum 83 Intelligence
Vol 1, Nos 2-3, Book review Sum-Fall 82 Japan
Pearl Harbor
-
DOCID: 3020954 REF ID:A525813 - Reference Keyword Author
-
Vol7, No 2, Book review Sum 88 Management
Title
Book Review: The Clash of Cultures: Managers and Professionals (U)
vdl. 11, No. 4, Intelligence Winter 92 community
Post-Cold War
Facing the PostcCold War Era (U)
If Cryptanalysis Is What We Do and Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)
Vol9, No 2, Cryptology Sum 90
I SINIOs, NSA, and the National Estimates ~ r & e s e (U)
Val 9, No Spr 90
National Intelligence Estimates
Intelligence community
Communications Mathemati-
Channel Capacity Algorithm (U) VOI 2, NOS 1-2, Spr-Sum 83
Deployment of the First ASA Unit to Vietnam (U1
Vol LO, NOS 3-4, Fall-Win 91
Army Security Agency Vietnam War
Admiral Corshkov and Soviet Doctrine (U)
Vol5, No 3, Fall 86
Vol9, No 3, Fall 90
Soviet Union
L a n w a e modeling
ART: The Linked-Letter Language Model A Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text (U)
Book Review: Atom Bomb Spies, The (U)
Vol6, Nos 3-4, Fall- Win 87-88
Book review Espionage
Book Review: Citizens and Soldiers (U) Vol6, Nos 3-4, Fall-Win 87-88
Book review Military policy
Book Review: Clausewitz (U) Book review Military theory
Vol6, No 2, Sum 87
Book Review: Does God Play Dice? The Mathematics of Chaos (U)
Vol8, No 4, Win 90
Book review Mathematics
I Book Review: Essays on Strategy (U) Vol5, No 3, Fall 86
Book review Human factor Middle East .
Book Review: Family Treason (U) VOI 6, NOS 3-4, Fall-Win 87-88
Book review Espionage
DOCID: 3020954 REF ID:A525813
I Author Title Reference Keyword
Book Review: Guardians of the Sea: Vol7, No 2, Coast Guard History of the United States Coast Sum 88 History Guard from 1915 to the Present (U)
Book Review: History of the German Vol8, No 3, Book review General StafT(U) Fall 89 Germany
Military forces
Book Review: Inside the Soviet Army Vol4, No 4, Baak review (U) Win 86 Soviet Union
Book Review: Inside Soviet Military Vol5, Nos 1-2, Book review Intelligence (U) Spr-Sum 86 Intelligence
Soviet Union
Book Review: KGB: The Secret Work of Vol5, Nos 1-2, Book review Soviet Secret Agents (U) Spr-Sum 86 KGB
Soviet Union
Book Review: KGB Today: The Hidden Vol5, No 1-2, Book review Hand (U) Spr-Sum 86 KGB
Soviet Union
Book Review: Legitimacy and Force, Vol7, No 4, Book review Vol. 1, Political and Moral Dimensions; Win 89 International Vol. 2, National and International affairs Dimensions (U)
Book Review: Marketing Warfare (U) Vol5, No 4, Book review Win 87 Economic warfare
Human factor
Book Review: Mask of Command, The Vol9, No 2, History (U) Sum 90 Military policy
Book Review: The New KGB: The Vol5, Nos 1-2, Book review Engine of Soviet Power (U) Spr-Sum 86 KGB
Soviet Union
Book Review: On Writing Well (C) Vol7, No 3, Book review Fall 88 Writing
Book Review: Positioning: The Battle Vol5, No 4, Book review for Your Mind (How to be Seen and Win 87 Iiuman factor Heard in the Overcrowded Marketplace) (U)
Book Review: Straw Giant, The (U) Vol9, No 4, Book review Win 91 Military forces
DOCID: 3020954 REF IDzA525813 (b) ( 1 1 (b) (31-18 USC 798 (bl(3)-P.L. 86-36 -
Author I Title Reference Keyword
I BOO& ~evielu:~tructure and Computer software
Computer programming
Interpretations of Computer Programs ((UI
Book Review: Technical Writer's Handbook: Writing with Style and Clarity, The (U)
Vol9, No 1, Spr 90
Book review Writing
I Book Review To Arm A Nation (U) Vol8, No 2, Sum 89
Book review Military forces
Pachydermic Personality Prediction Profile (U)
Human factor Management
Vol7, No 2, Sum 88
Select Yourself for War College (U) Vol5, No 3, Fall 86
Human factor Training
Soviet "Scientific" Approach to Military Strategy: Strength or Weakness?, The (U)
Overview of a Systolic Array Processor for the Sun (U)
I I
Vol9, No 1, Spr 90
Military forces Soviet Union
Vol9, No 2, Sum 90
Computer network Computer
sohware
S Attitudes: How Things Work in ureaucracies, The (U)
Vo1.15, No. 4, Winter 96
Bureaucracy
in the Cyberpunk Future: A mewhat Educated Guess a t Things to
ome (U)
Vol. 15, No. 3' Fall 96
Cyberspace Security
Vol. 13, No. 3, Fall 94
IXFOSEC Trusted product
e-
I I the Transposition Technique, The (U)
Vol 1,83 (CA Issue)
Cryptanalysis
r and Purple: A Story Retold (U) Vol3, Nos 3-4. Fall-Win 84-85
Cipher systems History Japan
Vol4,85 (CS Issue)
Computer systems Computer
hardware Computer
software
REF ID:A52581$,,:,, (b] :3)-50 IJSC 403 (b)(3)-1E USC 798
Author I Title Reference Keyword
Communications History Japan Pearl Harbor
I I New View of Pearl Harbor: The U.S. Vol5, No 3. I I Navy and Communications Intelligence, Fall 86
Priceless Advantage: COMINT in the Vol9, No 4, Battles of Coral Sea and Midway, A (U) Win 91
COMINT
J a w World War I1
Revisiting the Dispute over the Vol. 13, No. 4, Identification of "AFn as Midway (U) Winter 94
Cryptologic history Midway, Battle of WWII
Management 1 1 Managing the Future (U) Vol4, No 1, SPr 85
Distributed File Access Over Heterogeneous Networks (U)
Vol7, No3, Fall 88
Computer networks
Hypermedia Implemented in Object- Oriented Database Management Systems (U)
Vol10, No 1, Spr 91
Computer networks
Management
Mechanisms of SlGlNT Technology, The / lm Compromise SIGINT security
Vol6, No 2, Sum 87
Restructuring the U.S. SiGINT System for Tomorrow's World (U)
Vol8, No 3, Fall 89
SIGINf Requirements International
affairs
Third Party Nations: Partners and Targets (U)
Vol7, No 4, Win 89
SICINT Third Party
I I Too Many Cryptologic Eggs in One Basket (U)
Vol7, No 1, Spr 88
Deployment Management
I Overview of GLADSOME and Its Vol8, No 1, Application as a Knowledge-Based Spr 89 Mission Management System, An (U)
Collection Management
Vol6. No 1, Spr 87
Vol. 13, No. 4, Winter 94
Computer Software
Computers Cryptanalysis
Iranian Islamic Revolutionary Guard Vol4, No 4, Corps: "Khomeini's KGB," The (U) Win 86
Iran Middle East
DOCID: 3020954 ( b ) 13)-P.L. kh-36
Bib) (1)
REF I D : ~ 5 2 5 8 1 3 ~ ' ~ ~ ~ 1:j::; ::: '.! . [b) . (3)-P.;. 86-36
Cryptologic history
Airborne reconn-
Microprocessor
Naval Security Group Database Vol2, Nos 3-4, Database Administration (U) Fall-Win 83-84
Supercomputers: Trends and Needs ,A Vol2, Nos 1-2, Supercomputers Government Perspective (U) Spr-Sum 83
Database Processing with Triple Vol5, No 4, Computer systems Modular Redundance (U) Win 87 Data base
Technique for Representing Mandatory Vol6, No 2, Computer security Security Policies in Non-Interference Sum 87
DOCID: 3020954 It, ( 3 1 - P . L . 86-36
Author
REF . D , (1)
1~:~5258&21-50 IJSC 4113 ijbj (3)-18 USC 798
Title Reference Keyword
Vol5,86 Cryptanalysis (CA Issuel C r r p t o g r a ~ h ~
Mathematics
Book Review: Ethiopia a t Bay: A Vol4, No 3, Book review Personal Account of the Haile Selassie Fall 85 Ethiopia
1 Years (U) History
Book Review: Haile Selassie's War: The Vo14, No 4, Book review Italian-Ethiopian Campaign, 1935-1941 Win 86 Ethiopia (U) History
DAEMON- A FOLKLORE System Vol4, No 2, Computer Guardian Spirit (U) Sum 85 programming
Computer systems
Vol l l ,Nol , -1 Spr 92 Telephone
The Watch is Set: The Evolution of the Vol8, No 2, Telecommunicat- T Operations Center (U) Sum 89 ions
Watch operations
I Signal Descriptor Language, A (U) Vol3, Nos 3-4, Computer systems Fall-Win 84.85 Electronics
Code. Train: A Computer-Based Morse Vol6, Nos 3-4, Computer Code Training Package (U) Fall-Win 87-88 programming
Training
Ten Rules to Avoid Planning Foul-Upa Vol8, No 1, Management (U) Spr 89
I V015.86 (CA Issue)
CCI Doctrine and the Simile of the Cavei Vo1.15. Special CCI doctrine Time for Enlightenment (L') Edition 96 QUADRANT
Revised Capability Maturity Model for Vol. 14, No. 2, Capability Heretics, A (U) Summer 95 maturity
model Software process
I improvement
DOCID: 3020954 (h i 1 3 - E . L . (36-36
REF IDzA525813 i b ) (1) l b ) (3)-P.L. 86-36 -
Author I Title Reference Keyword
Computer Security Certification Vol4, Sum 85 Implications to Networked U.S. (Supplement) National Security Establishment Automated Data Processing Systems
Computer security
Computer systems
IOSS OPSEC II National OPSEC Program, The (U) Vol. 11, No. 3,
Fa11 92
Modem Error Correction (U) Vol. 13, No. 4, Winter 94
Modem errors
Network System's Data Exchange (DX) Vol. 12, No. 1, IP Router: XSC's Product in Review (U) Spring 93
Data exchange NSC DX router
Computerized Identification of Message Vol8, No 2, Families Using Graph Theory (U) Sum 89
Communications Computer
Graphics
Fundamentals of Electronic System Vol 1, Nos 2-3. Grounding (U) Sum-Fa11 82
Electronics
II Cryptographic Applications of Singular Vol 1,83 Value Decomposition (U) (CA Issue)
Vol9, No 3, Fall 90
Computer software
Memory devices
Rindskopf, Elizabeth R. I Media Responsibility and National Vol7, No 3. Security (UI Fall 88
Security leaks
Value of Working Longer Hours for Vol. 15, No. 4, Promotion, The (U) Winter 96
Promotions
Dealing with the Future: The Limits of Vol. 15, No. 3, Forecasting (U) Fall 96
Forecasting
FOLKLORE: One Approach to Security Vol. 13, No. 3, (L') Fall 94
Computer security Cryptanalysts FOLKLORE
Introduction to Volume Modeling and Vol. 11, No. 3, Rendering, An (U) Fall 92
Data manipulation Volume modeling Volume rendering
Virtual Reality (U) Vol. 12, Nos. 3-4, Human-computer Fall/ interaction Winter 93 Virtual reality
Rolfe, Susan H. China: Forbidden No More? (U) Vol. 13, No. 4, China Winter 94 Travel
DOCID: 3020954 :(b) f 2 ) - t > . I , . 86-36
REF IDgA525813
Author
El Rowlett, Frank B.
Title Reference Keyword
Iran-Iraq War: Regional Implications Vol 7, No 2, International and Alternatives for Resolution, The (U) Sum 88 affairs
Middle East
Paved with Good Intentions: How the Vol. 15, No. 2, Somalia Road to Somalia Turned into a Detour to Summer 96 U.S. policy Chaos (U)
Mokusatsu: One Word, Two Vo1.14, No. 4, Atomicbomb Lessons (U) Winter 95 World War 11
Effects of Optical Components on Vol. 15, No. 2, Digital optical System Performance, The (U) Summer 96 systems
Optical fibers
Securing Army Circuits during World Vol6, No 1, Cryptanalysis War 11: A Potential Disaster Narrowly Spr 87 History Averted (U) World War I1
The Business Manager and Business Vol11, No 1, Communications Communications (U) Spr 92 Management
Introduction to Asynchronous Transfer Vol. 14, No. 1, ATM Mode (ATM) (U) Spring 95 Communications
network technology
Icon: An Enhancement to the UNIX Vol6, No 1, Computer Language Hierarchy (U) Spr 87 programming
T3343 Software Evaluation Effort (UI Vol4.85 Computer (CS Issue) software
Formally Stating Cryptographic Bypass Vol. 12, No. 2, Cryptographic Requirements (U) Summer 93 bypass
INFOSEC
Computer Virus Infections: Is NSA Vol4, No 3, Computer Vulnerable? (U) Fall 85 Security
Computer virus
Computer Virus Organization: A Vol5, No 3, Computer Definitive Taxonomy and Anatomy of Fall 86 Security Computer Viruses (U) Computer virus
LOCKing Computers Securely (U) Vol7, No 1, Computer Spr 88 Security
DOCID: 3020954 REF IDzA525813 (b) (3)-P.L. 86-36
Author Title Reference Keyword
Processor Interconnection Netnorks Vol8, No 3, Computer from Cayley Graphs (U) Fall 89 graphics
Computer networks
Supercomputer
E f f ~ t a of Perestrojka on the Soviet Vol8, No 2, Military forces Armed Forces Portend New Challenges Sum 89 Soviet Union to the Oflice of Soviet Military Forces (U)
Analysis of TRS-80 Model I Password Vol1, No 1, Computer Encryption Algorithm (U) Spr 82 software
Cryptanaly sis
Introduction to Object-Oriented Vol. 12, Nos. 3- Object-Orientation Software Design and Development and 4,FalU Software design Its Application a t NSA, An (U) Winter 93
Graphic User Interface for the Vol2,83 Computer Transcriber-Analyst, A (U) (CS Issue) IPphi-
Computer systems
Analyzing Vague Data (U) Vol2,83 Computer systems (CS Issue)
Ideograph Writing Patterns and Vol4, No 3, Computer Computer Input (U) Fall 85 systems
L a w w I e
Introduction: Examples of Powerful Vol2.83 Computer Personal Computers (U) (CS Issue) hardware
Simulated Annealing and Iterative Vol. 12, No. 1, Combinatorial Improvement: An Experimental Spring 93 optimization Comparison (U) Iterative
improvement Simulated
annealing
Generalized GMW Sequences and an Vol3, Nos 1-2, Electronics Application to Frequency Hopping (U) Spr-Sum 84 Engineering
I Mathematics
On the Selection Mechanism for Vol8, No 2, Communications Pseudonoise Sequences (U) Sum 89 Mathematics
DOCID: 3 0 2 0 9 5 4 REF ID : ~ 5 2 5f#$%/-50 ,,, j ( b ) ( 3 ) - 1 8 USC 798 i i b ) ( 3 i - P . L . 86-36
. Author Title Reference Key word
Domain Name Service (U) Vol. 14, No. 2, Idormation Summer 95 networks
LAN9 System
administration
Fault Simulation Requirements for Vol5, No 4, Computer security Security Fault Analysis (U) Win 87
I Vol11, No 1, Computer systems Spr 92 Computer
training
I
Use of Compressed Speech in Selecting Vol 1, Nos 2-3, Training Morse Code Operators, The (U) Sum-Fall 82
n I I
Golden Age of Russia, The (U) Vol. 13, No. 4, Holbrook. James Winter 94 Russia
Historical Intelligence Production Vol4, No 4, Collection Problems: Is Technology the Answer? Win 86 Computer systems
Intelligence
8: Vol6, No 2, Economies ASIGINT Sum87 Oorbachev,
Mikhail Sovietunion
I1 Who Are We? (U) Vol9, No 2, Cryptology Sum 90
Vol9, No. 3, Fall 90
52 Software Process Improvement Effort Vol. 15, NO. 3, Measures of Value, The (U) Fall 96
Sum 85 I I v014e
Book Review: Code-?lame Downfall: The Vo1.15, No.4, Secret Plan to Invade Japan -and Why Winter 96 Truman Dropped the Bomb (U)
Computer software
Memory devices
Software process improvement
Security
Atomic bomb Rook review World War I1
DOCID: 3020954 (u)(?)-P.L. 8 6 - 3 5
ib) ( l i
REF ID : A52 5811130 3 0 3 (b) (3)-18 USC 798 (bi (3)-P.L. 86-36
Author I Title Reference
Boo& Review: Drawing the Line: Tales of Vol. 14, No.4, Maps and Cartocontroversy (U) Winter 95
Book Review: Nightmover: How Aldrich Vol. 15, NO. 2, Ames Sold the CIA to the KGB for $4.6 Summer 96 Million (U)
I Book Review: Spyworld: Inside the Vol. 14, No. 1, , Canadian and American Intelligence Spring 95
Establishments (U)
SIGINT Requirements: Before, During, and After (U)
An Analysis of the Vectorization Abilities of Current C Compilers (U)
Bibliography of Neural Network Applicationa to the Telecommunications Industry, A (U)
Video Teleconferencing: NSA Applications (U)
Influence of U .S. Cryptologic Organizations on the Digital Computer Industry (U)
Snyder, Samuel S.
Processor Interconnection Networks from Cayley Graphs (U)
Solving xn = b (mod c) for x and Undecimating Recursions (U)
Vol7, No 1, Spr 88
Vol10. No 2, Sum 91
Vol. 11, No. 3, , Fa11 92
Vol3, Nos 3-4, Fall-Win 84-85
Vol6, Nos 3-4, Fall-Win 87
Vol8, No 3, Fall 89
Vol. 11, No. 4. Winter 92
GRAFMAKER: A Powerful Business Vol4.85 Graphics Tool (U) (CS Issue)
Keyword
Book review Maphl Book review Espionage
Book review Canada Intelligence
community
Requirements
Computer programming
Computer software
Network management
Neural networks Telecommuni-
cations
Communications Teleconferencing
Computer systems History
Computer graphics
Computer networks
Supercomputers
Cryptanalysis Signals analysis
recursions L'ndecimating
Cryptanalysis SIGINT
Computer graphics
Computer software
DOCID: 3020954 :b)13)-E.L. 86-36
REF ID:A5258&3(,, ( b ~ (3)-50 USC 403 (b) (31-18 USC 798 (b)(3)-P.L. 86-36 -
I Title Reference Author Keyword
Decade of Information Service a t FANX, Vol8, No 3, A (U) Fall 89
Id rmat ion support
Library
I The Managerial Track (U) Vol 10, Nos 3-4, Fall-Win 91
Management Training
Book Review: Artif~cial Intelligence: Vol5, No 3, Theory, Logic, and Application (U) Fall 86
Book review M i c i a 1
intelligence
Book Reuiew: Designing and Programming Personal Expert Systems (U)
Book Reuiew: Into the Heart of the Mind: An American Quest for Artif~cial Intelligence (U)
Vol5, No 3, Fall 86
Book review Computer
programming Computer systems
Vol5, Nos 1-2, Spr-Sum 86
Book review Artificial
intelligence
Book Reuiew: Out of the Inner Circle: A Hacker's Guide to Computer Security (UI
Vol4, No 3, Fall 85
Book review Computer security
I Book Review: Technical Writing for Beginners (U)
Vol4, No 4, Win 86
Book review Writing
Book Reuiew: The New KGB: Engine of Soviet Power (U)
Vol5, Nos 1-2, Spr-Sum 86
Book review KGB Soviet Union
Book Review: The Ropes to Skip and the Vol6, Nos 3-4, Ropes to Know: The Inner Life of an Fall-Win 87-88 Organization (U)
Book review Management
Vol5, Nos 1-2, Spr-Sum 86
Database Photo- .
reconnaissance
Fall of the Shah: A Chaotic Approach, Vol. 13, No. 4, The (U) Winter 94
Chaos Dynamical
systems Indications and
warning
DEFSMAC: The Future Is Now (U) Vol. 13, No. I , Spring 94
DEFSMAC LAYS
I Language Identification (U) Vol. 15, No. 3, Fall 96
DOCID: 3020954
it) (3)-P.L. 86-36
REF ID:A525813 Ib) (1) (b) (31-50 USC 403
Title Reference Keyword - -
Moscow's Realignment with Cairo: A Look a t hrbachev's New Political Thinking (UI
Structured Knowledge Acquisition Techniques (U)
Mathematics: A Challenge for Business, Government, and Academia (U)
Soviet Military Establishment under Gorbachev, The (U)
MILSTAR (U)
SPLASH: An Overview of a Systolic Array Processor for the Sun (U)
Debunking Some Old Myths about Critical-Grade Promotions (U)
Primer on Specific Emitter Identification, A (U)
NTSS - Yesterday, Today and Tomorrow (U)
Introduction Special Computer Science Issue (U)
Where there's a will. . . (U)
- - -
Vol8, No 4, Gorbachev, Win 90 Mikhail
Middle East Soviet Union
Vol11, No 1, Computer Spr 92 programming
Expert systems Knowledge Acquisition
Vol8, No 2, Mathematics Sum 89
Vol7, No 4, Gorbachev, Win 89 Mikhail
Intelligence Oil Soviet Union
Vol7, No 1, Communications Spr 88 systems
Vol9, No 2, Computer Sum 90 networks
Computer sof'tware
Vol 1, No 1, Performance Spr 82 Promotion
Vol 1, No 4. COMINT Win 83 Emitter
Vol. 13, No. 2, Communication Summer 94 systems
National Time Sensitive System
Vol4,85 Computer (CS Issue) hard ware
Vol3, Nos 1-2, Language Spr-Sum 8.4
DOCID: 3020954
( 9 ; (3)-P.L. 36-36
REF ID:A525813 (33 (1) ( 3 ) ( 3 ) - E O USC 403 (b: (3)-18 USC 798 (~i(3)-P.L. 86-35 -
Author 1 Title Reference Keyword
Vol. 13, No. 3, GLISSADE Fall 94 Software system
design
i
I I Structured Testing as a Learning Tool
GLlSSADE Lessons Learned from a Rapid Prototype (U)
Vol , No 4, Computer Win 91 programming
Computer software
Vol4, No 3, Language Fall 85
Vol. 11, No. 3, Fall 92
LwPage training
Linguistics
Language Cross-Training: Alternatives and Permutations (U)
I I Analysis of the "Lehighn Virus (U) Vol9, No 2, Sum 90
Computer virus
Vol. 11, No. 4, Winter 92
Random viruses Sequential viruses Software analysis
Analysis of the Random and Sequential Viruses (U)
I I Predicting Terrorism: An Indications and Warning M o d e l m
Vol8, No 4, Win 90
Terrorism
Vol7, No 3, Fall 88 I I On NSA Reporting Style (Or Lack
Thereof) (U) Reporting
I I Obtaining Maximum Performance in a Supercomputer Unix Environment (U)
Vol7. No 2, Supercomputer Sum 88
Design and Evaluation of INF'OSEC Systems: The Computer Security Contribution to the Composition Discussion, The (UI .
Vol. 12. No. 1. Computer security Spring 93 INFOSEC
I I Stab st A2 Criteria, A (U) Vol9, No 1, Computer security Spr 90
SKYRAP: A Case Study in UNIX System Optimization (U)
Vol. 12, No. 1, Signals Spring 93 transmission
SKYRAP UNIX
Vo1.15, No. 4, Winter 96 u
Collection
Return of the Electronic Francophoneglos, The (U)
Vol4, No 1, Database Spr 85
ib) (1)
REF ID:A5258&B3)-50 ib) (31-18 USC LISC 798 4 0 3
( b ) ( 3 1 - P . L . 86-36 DOCID: 3020954
.(bi ( 3 ) - P . L . 86-36
Keyword Author
Hietory Human factor
Title Reference
Unknown Author I I Was a Cryptologic Corporal (U) Vol 1, No 4, Win 83
Human factor Management
Looking Ahead to the 1990s (U) Vol5, Nos 1-2, Spr-Sum 86
I United Pigeons Service (UPS)? (U) Vol2, Nos 3-4, Fall-Win 83-84
T3343 Software Evaluation Effort (U) Vol4, $6 (CS Issue)
Computer software
Meeting the Programming Challenges Vol 1, Nos 2-3, of the Future (U) Sum-Fall 82
Computer programming
I Co~rNTand the PRC Intervention in the Vol. 15, No. 2, Korean War- Summer 96
Vanderpool, Guy R. COUINT Korean War
111 Vol 6. No 2, Language Transcription
system
Computer networks
Computer systems
II Tejiendo la Red Telarana (Weaving the Vol. 15, No. 4, World Wide Web) (U). Winter 96
Internet Lntin America
Systems Engineering Profession and Its Vol. 11, No. 2, Importance to NSA, The (U) Summer 92
Systems engineering
Systems management
Examination of the Possible Effects of Vol7, No 3, Slavic Chauvinism on the Economic and Fall 88 Political Development of the Southern Soviet Periphery, An (U)
Human factor Soviet Union
Creativity: Can It Be Taught? (U) Vol. 13, No. 4, Winter 94
Creativity Manage me nt
Integrating Strategic Planning and Vol: 14, No. 1, Quality Initiatives (U) Spring 95
hfanagement Strategic planing TQM
I I Optical Disk Technology: CDs, I Vol8, Xo 2, WORMS, and Erasable Disks (U) Sum 89
Archival storage Computersystems Optical
DOCID: 3020954 REF IDzA525813
Author Title Reference Keyword -,#
Parallel Tausworthe Generator, The (U) Vol 1, No 1, Logic Spr 82 Mathematics
Security, Infrastructure, and Vol. 15, Special Algorithm benign Management Issues Surrounding Edition 96 loading Algorithm Benign Loading (U)
"Cipher" Dispatches and the Election of Vol. 11, No. 3, Cryptologic 1876 (U) Fall 92 history
Seward's Other Folly: America's First Vol. 12, No. 2, Cryptologic history Encrypted Cable (U) Summer 93
Using Lotus 1-2-3 as an Elint Display Vol4, No 3, Computer and Analysis Tool (U) Fall 85 hardware
Computer programming
ELlNT
Using Lotus 1-2-3 to Parse Coastline Vol7, No 3, Computer Message Track Data (U) Fall 88 programming
Computer systems ELINT
Digital Subscriber Loops (L3 Vol.15,Mo.1, ISDN Spring 96 Subscriber loops
Optical Solitons: The Fourth Generation Vol. 15, No. 3, Solitons of Transoceanic Optical Fiber Tele- Fall 96 Telecommuni- communications (U) cations
Beyond "DRAGON'S LAIR (U) Vol4,85 Computcr systems (CS Issue)
High-Altitude Electromagnetic Pulse Vol5, No 3, Communications (HEMP): "A Sleeping Electronic Fall 86 Electronics Intruder." The (U)
SINCGARS Software Evaluation (U) Vol. 13, No. 1, Computer security Spring 94 Tactical radio
systems
Station "C" and Fleet Radio Unit Vol. 12, No. 2, Cryptologic history Melbourne (FRUMEL) Revisited (U) Summer 93 FRUMEL
Station C
Winning the Paper Chase: Operational Vol 1. No 1, Computer systems Applications of Computer Output .. . Spr 82 Microfiche (U)
Telephone Codes and Safe Vol. 12, No. 1, Safe combinations Combinations: A Deadly Duo (U) Spring 93 Telephone codes
REF ID:A525813
Author I Title Reference Keyword
II Cuban Missile Crisis: A SIGINT Perspective, The (U)
Rapid Text Searching for Multiple Key Strings (U)
11 Another Look at Ranked-Order Filters. Noisy Images, and V i l Perception (U)
Comparing Visual Detection to Machine Vision for Detecting the Presence of .
Laser Irradiation with an Electro- Optical Device (U)
II Optical SIGINT Collectors (U)
In Pursuit of a SONET Link Encryptor II (U)
Wiley, Edward 1 Uncertain Summer of 1946, The (U)
Operations Management and Resource Utilization for Signals Collection Using Knowledge-Based SystemsWL
A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)
I Book Reuiew: he FBI-KGB War: A Special Agent's Story (U)
PCSE: A Design Implementation for PC Security (U)
Vol. 13, No. 1, spring 94
Vol LO, No 2, Sum 91
Vol. 11, No. 4, Winter 92
Vol4, No 4, Win 86
Vol3, NOS 1-2, Spr-Sum 84
Vol10. No 1, Spr 91
Vol. 14, No. 1, spring 95
Vol9, No 3, Fall 90
Vol10, No 2, Sum 91
Vol6, No 2, Sum 87
Vol8, No 2, Sum 89
Cuban Missile Cr i s i~
Computer hardware
Computer security Text searching
Image quality Ranked-order
filters Signals analyeis
Electronics SIGINT
Collection SIGINT
Computer networks
Link encryptor Optical
Atomic bomb Japan WWII
Management S i l s collection
Computer security
Cryptographic network
Soviet Union espionage
computer security Personal
computer
DOCID: 3020954 (b):3)-F.L. 86-36
REF ID:A525813
Author I Title Reference Keyword
Full-Text Searching: Coming of Age (U) Vo18, No 3, Computer Fall 89 hardware
Computer software
Information support
I Conditional Sigmage Analysis and Vol1,83 Cryptanalysis Bulge Estimation (U) (CA Issue)
CRITICOMM Management: A User Vol2,83 Computer Interface (U) (CS Issue) graphics
On the Selection Mechanism for Vol8, No 2, Communications Pseudonoise Sequences (U) Sum 89 Ma thematics
T3343 Software Evaluation Effort (U) Vol4.85 Computer (CS Issue) software
GKS: Its Comparison to Core and Its Vol7, No 2, Computer Feasibility of Urn a t NSA (U) Sum 88 graphics
Book Review: The Grand Failure: The Vol8, No 3. Book review Birth and Death of Communism in the Fall 89 Communism Twentieth Century(U1
Book Review: Yen! Japan's New Vol8, No 1, Book review Financial Empire and Its Threat to Spr 89 Japan America (U)
I Challenges Encountered by Teachers Vol4, No 4, Language and Learners of a Second Language (U) Win 86
DOCID: 3020954 REF IDgA525813
DOCID: 3020954 REF IDzA525813
(hi ( i Cryptologic Quarterly Index by Keyword
Algorithm benign loading
Keyword
ADVENTURE TRAIL
Airborne Reconnaissance
Air Force intelligenca
Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)
Title Author
Certification of the Air Force Intelligence Officer: What Now? (U)
Analog ciphony I Analog technology
Analysis
Antennas
Arab cryptology
Archival storage
NSA Signal Collection Equipment and Systems,: The Early Years - Receivers (U)
Holistic Analysis (U)
NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)
Origins of Cryptology: The Arab Contributions (U)
Optical Disk Technology: CDs, I WORMS, and Erasable Disks (U)
Artificial intelligence
Army Security Agency
Applications of Nonsymbolic Artificial Intelligence: Neural Networks (U)
Deployment of the First ASA Unit to Vietnam (U) I
Reference .
Vol. 15, Special Edition 96
Vol. 12, No. 2, Summer 93
Vol. 12, No.2, Summer 93
Vol. 15, Special Edition 96
Vol. 15, Special Edition 96
Vol. 14, No.2, Summer 95
Vol4, No 1, Spr 86
Vol. 14, No. 4, Winter 95
Vol. 12, No. 1, Spring 93
Vol8. No 2, .
Sum 89
Vol 10, Nos 3-4, Fall-Win 91
Vol9, No 4, Win 91
DOCID: 3020954 REF ID:A525813
Keyword I Title Author Reference
ATM
Atomic bomb
Artif~cial Intelligence: ro roach to Cryptodiagnosis (U)
Artificial Intelligence and Expert Systems: Do They Have a Future in LManagement? (U)
Book Review: Artificial Intelligence: j Theory, b g i ~ and Application (ul I Book Review: Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)
FARSEEING: A Study in Expert Systems (L')
Introduction to Asynchronous Transfer Mode (U) I MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)
Book Review: Code-Name Dowdalt: The Secret Plan to Invade Japan - and Why Truman Dropped the Bomb (U)
Vol. 13, No. 1, Spring 94
Vol9, No 2, Sum 90
Vol5, No 3, Fall 86
Vol5, Nos 1-2, Spr-Sum 86
Vol8, No 2, Sum 89
Vol. 14, No. 1, Spring 95
Vol. 15, No. 3, Fall 96
Vol. 15, No. 4, Winter 96
Book Review: The Invasion of Japan: Johnson, Thomas R. Vol. 14, No. 2, Alternative to the Bomb (U) Summer 95
Mokusatsu: One Word. Two I Vo1.14. No. 4, Lessons (U) Winter 95
Uncertain Summer of 1945, The (U) Wiley, Edward Vol. 14, No. 1, Spring 95
Australian SIGINT Book Review: The Eavesdroppers (U) Johnson, Thomas R. I Vol. 14, No. 1, Spring 95
Australian SIGINT operations
Biography
Book Review: On ULTRA Active Farley, Robert D. Service (U) ' From Chaos Born: General Canine's 1 I First Charge to the NSA Workforce (U) I Glimpses of a Man: The Life of Ralph J. Canine (U)
Vol10, Nos 3-4, Fall-Win 91
Vol6, No 2, Sum 87
Vol6. S o 2. Sum 87
Keyword I Title Author Reference
Bletchley Park
Black Chamber
America's Military Revolution: Strategy and Structure af'ter the Cold War (U)
Book Review: Codebreakers: The Filby, P. W. Vol. 13, No. 2, Inside Story of Bletchley Park (U) 1 Summer 94
Vol. 13, No. 4, Winter 94
Book Review: American Black Chamber, The (U)
Book review
Vol4, No 2, Sum 85
A Century of Spies: Intelligence in Johnson, Thomas R. Vol. 15, KO. 3, the Twentieth Century (U) Fall 96
"And I Was There": Pearl Harbor and Vol5, Nos 1-2. Midway - Breaking the Secrets (U) Spr-Sum 86
Alan Turing: The Enigma (U) Mowry, David P. Vol2, Nos 3-4. Fall-Win 83-84
American Black Chamber, The (U) 1 Vol4, No 2, Sum 85
Artificial Intelligence: Theory, Logic and Application (U) I I Vol5, No 3,
Fall 86
Atom Bomb Spies, The (U) I I Vole, Nos 3-4 Fall-Win 87-88
Black Cipher (U) Hanyok, Robert J. Vol. 14, No. 4, Winter 95
I Breaking the Maya Code (U) Hatch, David A.
British and American Approaches to Intelligence (U)
Chicksands: A Millenium of History
Vol. 13, No. 1, Spring 94
Vol7, s o 2, Sum 88
Vol. 13, No. 3, Fall 94
CLA in Guatemala, The (U1 Gronet, Richard W. Vol 1 , KO 4, Win 83
Clash of Cultures: Managers and h'olte, William NI. Vol7, KO 2, Professionals, The (U) Sum 88
I Clausewitz (U) Vol6, No 2, Sum 87
DOCID: 3020954
Keyword 1 Title Author
Codebreakers: The Inside Story of Filby, P.W. Bletchley Park (Ul
Code-Name Downfall: The Secret Plan to Invade Japan -and Why Truman Dropped the Bomb (U)
Concise History of the Middle East, A
Conflict of Duty: The U.S. Navy's Nolte, William M. Intelligence Dilemma, 1919-1946 (U)
I
I Designing and Programming Personal Expert Systems (U) I
I Does God Play Dike? The Mathematics of Chaos (U)
I Drawing the Line: Tales of Map8 and- Cartocontroversy (U)
I Eavesdroppers, The (U) Johnson, Thomas R.
Electronic Warfare: Element of Strategy and Multiplier of Combet Power (U)
(Essays on Strategy (U)
Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)
Eyeball to Eyeball: The Inside Story Hatch, David A. of the Cuban Missile Crisis (U)
Family Treason (U)
I FBI-KGB War: A Special Agent's Story. The (U)
French Secret Services: From the Hanyok, Robert 3. Dreyfus Affair to the Gulf War, The (U)
Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)
Reference
Vol. 13, No. 2, Summer 94
Vol. 16, No. 4, Winter 96
Vol4, No 1, Spr 85
Vol2, NOS 1-2, Spr-Sum 83
Vol5, No 3, Fall 86
Vol8, No 4, Win 90
Vol. 14, No. 4, Winter 95
Vol. 14, No. 1, Spring 95
Vol 1, Nos 2-3, Sum-Fall 82
Vol5, No 3, Fall 86
Vol4, No 3, Fall 85
Vol. 11, No. 3, Fall 92
Vol5. No 3. Fall 86
Vol6. No 2, Sum 87
Vol. 15, No. 4, Winter 96
Vol. 13. No. 2. Summer 94
DOCID: 3020954 REF ID:A525813 qb) ( 3 ) - P . L . 86-36
Keyword 1 Title
Grand Failure: The Birth and Death of Comrnulrjsm in the Twentieth Century, The (U)
Guardians ofthe Sea: History of the URited States Coast Guard from 1915 to the Present (U)
Haile Selassie's War: Italian- Ethiopian Campaign, 1935-1941 (Ul
History of the German General Staff
Author Reference
Vol8, No 3, Fall 89
Vo17, No 2, Sum 88
Vol4, No 4, Win 86
Vol8, No 3, Fall 89
Honorable Treachery: A History of Hatch, David A. U.S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (U)
Infamy: Pearl Harbor and Its Nolte, William M. Aftermath (U)
Informing Statecraft (U) 0 I Inside Hanoi's Secret Archives (U) Hanyok, Robert J.
Inside Soviet Military Intelligence (U)
Inside the Soviet Army (U)
Intelligence and National Security (U)
Intelligence and the American Johnson, Thomas R. Presidency (U)
Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)
Invasion of Japan: Alternative to the Johnson, Thomas R. Bomb, The (U)
KGB: The Secret Work of Soviet Secret Agents (U)
KGB Today: The Hidden Hand (U) I I
Vol. 13, No. 3, Fall 94
VOI 1, NOS 2-3, Sum-Fall 82
Vol. 12, No. 2, Summer 93
Vol. 15, No. 1, Spring 96
Vol5, Nos 1-2, Spr-Sum 86
Vol4, No 4, Win 86
Vol5, No 4, Win 87
Vol. 14, No. 3, Fall 95
Vol5, NOS 1-2, Spr-Sum 86
Vol. 14, No. 2, Summer 95
Vol5, Nos 1-2. Spr-Sum 86
Vol5. NOS 1-2, Spr-Sum 86
DOCID: 3021075 REF ID:A525813 ( b ) ( 3 ) - P . L . 8 6 - 3 6
Keyword Title Author
Legitimacy and Force, Vol. 1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)
Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan W)
Marching Orders: The Untold Story Johnson, Thomas R. of World War I1 (Ul
Marketing Warfare (U)
I Mask of Command, The (U) I I I Master Terrorist: The True Story behind Abu Nidhal. The CUI I Missing Dimension: Governments and Intelligence Communities in the Twentieth Century. The (U)
( My Silent War (U) Hanyok, Robert J.
New KGB: The Engine of Soviet Power, The (U)
New KGB: The Engine of Soviet Power, The (U)
I Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million 1 (U)
On Writing Well (U)
One American Must Die (U)
One Hundred Days: The Memoirs of the Falklands Battle Group Commander (U)
I Out of the Inner Circle: A Hacker's I I Guide to Computer Security (U)
Reference -
Vol7, No. 4, Win 89
Vol7,Nol, Spr 88
Vol. 14, No. 4, Winter 95
Vol5. No 4, Win 87
Vol9, No 2, Sum 90
Vol6, No 1, Spr 87
Vol5, No 4, Win 87
Vol. 14, No. 3, Fall 95
Vol5, Nos 1-2, Spr-Sum 86
VOI 5, NOS 1-2, Spr-Sum 86
Vol. IS., No. 2, Summer 96
Val 7, No 3, Fall 88
Vol5, No 4, Win 87
Vol. 11, No. 2, Summer 92
Vol4, No 3, Fall 85
DOCID: 3021075 REF IDzA525813 ( b ) (3) -P. L. 86-36
Keyword I Title Author
Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)
Room 40: British Naval Intelligence 1914-18 (U) I Ropes to Skip and the Ropes to Know: The Inner Life of an Organization (U) I I Sacred Rage: The Crussde of Modern Islam (U) I I Secrecy and Democracy: The CIA in Transition (U) I Shadows of the Rising Sun: A Critical View of the "Japanese Miraclen (U)
I 8101NT Secrets: The Signals . I I Intelligence War, 1900 to Today, The
I Spy wars: Espionage and Canada Johnson, Thomas R. from Couzenko to Glasnost t U)
Spyworld: Inside the Canadian and American Intelligence Establishments (U)
( Straw Giant, The (U)
Target is Destroyed: What Really Happened to Flight 007 and What America Knew About It, The (U)
I Technical writer's Handbook: Writing with Style and Clarity, The (L')
Technical Writing for Beginners (U)
I To Arm A Nation (U)
Johnson, Thomas R.
I ULTRA Americans: The U.S. Role i Breaking the Nazi Codes, The (U)
Reference --
Vol5, No 4, Win 87
Vol2, Nos 1-2, Spr-Sum 83
Vol6, Nos 3-4, Fall- Win 87-88
Vol6, Nos 3-4, Fall-Win 87-88
Vol4, No 3, Fall 85
Vol3, NOS 1-2, Spr-Sum 84
Vol. 12, No. 1, Spring 93
Vol. 14, No. 2, Summer 95
Vol. 14, No. 1, Spring 95
Vol9, No 4, Win 91
Vol5, No 3, Fall 86
Vol9. No 1. Spr 90
Vol4, No 4, Win 86
Vol8, No 2, Sum 89
Vol5, No 3, Fall 86
REF ID:A5258&7,3 , , i -
Keyword I Title Author
I Yen! Japan's New Financial Empire and Its Threat to America (U) I
-
BOURBON Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945GU333
Ultra-Magic Deals and the Most Secret Relationship, 1940-1946, The
Braille Cryptologic Origin of Braille. The (U)
BRANFLAKE
Britain
BRANFLAKE (U,
I Book Review: British and American Approaches to Intelligence (U) I I Book Reuiew: Room 40: British Naval Intelligence 1914-18 (U)
Budget process
BRUSA agreement
I Changing Development Environment from One of System u
Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946 The, (U)
Creation to One of System ~volution without Benefit of Changes to the Institutional Support Process, The (U)
Reference
Vol. 12, Nos. 3-4, Fall/ Winter 93
Vol 8, No 1, Spr 89
Vol. 12, Nos. 3-4, FalUWinter 93
Vol. 14, No. 1, Spring 95
Vol. 13, No. 1, Spring 94
Vol. 13, No.2, Summer 94
Vol. 14, No. 3, Fall 95
Vol. 13, No. 4, Winter 94
Vol2, Nos 1-2, Spr-Sum 83
Vol. 12, NOS. 3-4, FalU Winter 93
Vol. 11, No. 2, Summer 92
DOCID: 3021075 REF IDzA525813 i ib ) (1)
(b) (3) -P.L. 86-36 (b) (31-50 LSC 403
. (b) (31-18 LSC 798 ib) (31-t.L. 86 -36
Canada
Keyword
Bureaucracy
Call forwarding
Capability maturity model
Career planning
Title Author Reference
Book Review: Spywars: Espionage Johnson, Thomas R. and Canada from Gouzenko to Glasnost (U) I
BS Attitudes: How Things Work in Bureaucracies, The (U)
[Sensitive Title1
Book Review: Spyworld: Inside the Canadian and American Intelligence Eatablishments(U)
Vo1.15, No. 4, Winter 96
Vol. 16, Special Edition 96
I Revised Capability Maturity Model for Heretics. A (U)
I Tech Track: Will I t Work? (U)
Chaos
CCI doctrine
CCS7
Fall of the Shah: A Chaotic Approach, The (U)
CCI Doctrine and the Simile of the Cave: Time for Enlightenment (U)
Signaling System No. 7: And What about Analysis (U)
Chicksands I Book Review: Chicksands: A Millenium of History(U1 1
China
Chip design
I China: Forbidden No More (U)
Chinese KGB, The (U)
Statistical Method for Quality Control of Microelectronic Chip Design, A (U)
I
Vol. 14, No. 2, Summer 95
Vol. 14, No. 1, Spring 95
Vol. 14, No. 2, Summer 95
Vol7, No 1, Spr 88
Vol.15, Special Edition 96
Vol. 13, No. 3, Fall 94
Vo1.15, No. 4, Winter 96
Vol11, No 1, Spr 92.
Vol. 13, No. 4, Winter 94
Vol. 13, No. 3, Fall 94
Vol. 13, No. 4, Winter 94
Vol 1, No 1, Spr 82
Vol. 15, No. 2. Summer 96
No Code
D O C % ~ ~ - L & & ~ I L O ~ 5 ! a (?)-I8 USC 798 ( n j ( 3 ) - P . L . 56-56
Keyword
Churchill, Winston
CIA
REF ID:A525823) ( 3 ) - P . L . 86-36 - I Title Author Reference
Book Review: Secrecy and Vol4, No 3, Democracy: The CIA in Transition Fall 85 (U)
Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)
Book Review: The CIA in Guatemala Gronet, Richard W. I (U)
Vol. 11, No. 2, Summer 92
Ciphers I Cryptographic Mathematics of Enigma. The (U)
I Solved: A Long-Lost Cipher from Siberia (U)
Cipher systems I Diabolical Diagnosis (U) I Red and Purple: A Story Retold (U) I
CLOVER I Applying Object Technology to Our CLOVER Network (U)
Coast Guard Book Review: Guardians of the Sea: History of the United States Coast Guard from 1919 to the Present (U)
Codebooks
Cognitive process
Code synchronization
Cold War
I
Code Acquisition by Binary Autodirective Search (U)
Cognitive Processes in Software Fault Detection (U)
Book Review: America's Military Revolution: Strategy and Structure after the Cold War (U)
I
Cobra Judy Acquisition, The (U1
Vol 1, No 4, Win 83
Vol. 13, No. 3, Fall 94
Vol. 13, No.2, Summer 94
Vol5,86 (CA Issue)
Vol3, Nos 3-4, Fall-Win 84-85
Vol. 12, No. 2, Summer 93
Vol7, No 2, Sum 88
Vol. 14, No. 3, Fall 95
Vol. 13, No. 3, Fall 94
Vol. 11, No. 2. Summer 92
Vol. 13, No. 1, Spring 94
Vo1.15, No. 4, 1 Winter 96
I Voll.No4, Win 83
(b, (1)
REF ID:A525813 ( b ) ( 3 ) - P . L . 86-36
DRF;RDX 3PX8075 (b\ ( 3 ) - P . L . 86-36 -
Reference
Flight of the Condor, The (U)
Historical Intelligence Production Problems: Is Technology the Answer?
Holistic Analysis (U)
International Telecommunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The
Meteor Burst Communications: An Ignored Phenomenon? (U)
Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere
Optical SIGrNT Collectors (U)
Collection equipment
Combinatorial Simulated Annealing and Iterative Improvement: An Experimental
COMINT Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)
DOUZD,: 3021075 (b)(3)-50 USC 403 (b) (31-19 LSC 798 [b) (31-P. I . 86-16
REF I D z A 5 2 5 8 1 3 (b) ( 3 ) - P . L . 8 6 - 3 6
Keyword 1 Title Author Reference
COMINT C O m and the PRC Intervention in Vanderpool, Guy R. the Korean W-
Communications
Guemllas in the Mist: C o ~ l ~ ~ a n d Hanyok, Robert J. the Formation and Evolution of the Viet Minh, 1941-45 (U) - Priceless Advantage: COMINT in the Battles of Caral Sea and Midway, A (U)
, Primer on Specific Emitter I Identificaticsn, A (U) I
Artificial Ionospheric Modification: Practical and Potential Applications (U)
Book Revieur: The Target is Johnson, Thomas R. Destroyed: What Really Happened to Flight 007 and What America Knew About I t (U)
I Channel Capacity Algorithm (U)
Communications and the Ionosphere Gerson, N. C. 1 1111 Communications Security and the Problem of Hamlet: To Be or Not to Be (U)
Computerized Identification of Message Families Using Graph Theory (U)
I Cryptologic Origin of Braille, The (U)
I Developing r Feedback Maintenance System (FMS) on Carillon (U)
I Digital Communications: Introduction and Trends (U)
Vol. 15, No. 2, Summer 96
Vol. 15, No. 2, Spring 96
Vol9, No 4, Win 91
Vol 1, No 4, Win 83
Vo19, No 1, Spr 90
Vol5, No 3, Fall 86
Vol2, Nos 1-2, Spr-Sum 83
Vol 1, No 4, Win 83
Vol3. Nos 3-4, Fall-Win 84-85
Vol8, No 2, Sum 89
Vol. 14, No. 3, Fall 95
Vol4,85 (CS Issue)
V012, NOS 3-4, Fall-Win 83-84
Vol 1, No 4. Win 83
DOCID: 3021075 REF ID:A525813 jb) ( 3 ) - P . L . 86-36
I Title Author Reference Keyword
Digital Voice Compression Algorithm with Robust Properties, A
-
Vol2, Nos 1-2, Spr-Sum 83
I Frequency Hopping Vulnerability to Partial B a d Jamming (U)
Vol 1, No 1, Spr 82
Vol5. No 3, Fall 86
High-Altitude Electromagnetic Pulse (HEMP): "A Sleeping Electronic Intruder," The (U)
I Listeming to the Rum-Runners (W Mowry, David P. Vol2, Nos 1-2, Spr-Sum 83
Meteor Burst Communications: An Ignored Phenomenon? (U)
Vol9, No 3, Fall 90
New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)
Vol5, No 3, Fall 86
I On the Selection Mechanism for Pseudonoise Sequences (U)
Vol 8, No 2, Sum 89
I Satellite-Earth Radio Link Depolarization by Ice Crystals (U) I V012, NOS 1-2,
Spr-Sum 83
I The Business Manager and Business Communications (u) I Vol11,No1,
Spr 92
Theoretical Implications of a Second Spectrum (U) I Vol8, No 3,
Fall 89
I Video Teleconferencing: NSA Applications (U)
V013, NOS 3-4, Fall-Win 04-85
Warning and Crisis Management (U) McManis, David Y. Vol2, Nos 3-4, Fall-Win 83-84
I Signaling System No. 7: And What about Analysis (U)
Communications networks
Vol. 13. No. 3, Fall 94
Introduction to Asynchronous Transfer Mode (ATM) (U1
Vol. 14, No. 1, Spring 95
Communications network technology
Vol. 12, Nos. 3-4, Fall/ Winter 93
Communication Satellites
Low Earth Orbit (LEO) Satellite Communications Systems Technology and Intercept Issues (U)
Communications systems
( MILSTAR (U) I I Vol7,No 1, Spr 88
REF ID:A525813
Keyword I Title
NTSS-Yesterday, Today and Tomorrow (U)
Telecommunications Automatic Monitoring and Control System (U)
Communism Book Review: The Grand Failure: The Birth and Death of Communism in the Twentieth Century (U)
Computer security Out of Control (U) I Compromise
Computers
Mechanisms of Sigint Technology, The (U)
Cryptanalytic Use of High-Speed Digital Computing Machines (U)
Introduction to a Historic Computer Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)
Computer-managed Multimedia-A Makeover instruction
Computer- assisted instruction
Computer graphics Computer Graphics Data Base I Design Aid Package, A (U)
Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesis (U)
Computerized Identification of Message Families Using Graph Theory (U)
CRITICOMM Management: A User Interface (U)
Designers vs Users: Bridging the Communication Gap (U)
GKS: Its Comparison to Core and Its Feasibility of Use a t NSA (U)
GRAFMAKER: A Powerful Business Graphics Tool (U)
Author Reference
Vol. 13, No. 2, Summer94 .
Vol8, No 3, Fall 89
Vol8, No 3, Fall 89
Vol6, No 2, Sum 87
Vol . 1 5, Special Edition 96
Vol. 13, No. 4, Winter 94
Vol. 13, No. 4, Winter 94
Vol10, No 1, Spr 91
Vol. 13, No. 2 , Summer 94
Vol2,83 (CS Issue)
Vol8, No 2, Sum 89
Vol2.83 (CS Issue)
Vol2,83 (CS Issue)
Vol7, No 2, Sum 88
Vol4.85 (CS Issue)
DOCID: 3021075 REF IDzA525813
Keyword I Title
I Graphic User Interface for the Transcriber-Analyst, A (U)
I Human Visual Perc'eption and Man- Computer Interaction (U)
INTERROGRAPH; An Information Tool for Counter-Terrorism Intelligence Centers (U)
I Management of TDY Funds: A Graphical Approach (U)
Processor Intercoenection Networks from Cayley Graphs (U)
I Segment Storage: Hierarchical Graphics Storage System (U)
I DOSNNIX Interoperability and E- mail in the Agency iU)
Computer hardware
Full-Text Searching: Coming of Age (1111
ADAGIO: A Modem Analog-to- DigitaYDigital-*Analog System for the R5 CYBERNAX Research System (U)
I Introduction: Examples of Powerful Personal Computers (U)
I Introduction: Special Computer Science Issue (U)
Multimedia Data Bases: Design Issues, NSA Applications, and Prototypes (U)
I Rapid Text Searching for Multiple Key Strings (U)
RISC Does Windows (U)
I Using Lotus 1-2-3 as an ELINT Display and Analysis Tool (U)
I Using Lotus 1-2-3 to Parse Coastline I Message Track Data (U)
Author Reference
Vol2.83 (CS Issue)
Vol4,85 (CS Issue)
Vol2,83 (CS Issue)
Vol2.83 (CS Issue)
Vol8, No 3, Fall 89
Vol8, No 2, Sum 89
Vol4,85 (CS Issue)
Vol 11, No 1, Spr 92
Vol8, No 3, Fall 89
Vol2.83 (CS Issue)
Vol4,85 (CS Issue)
Vol9, No 2. Sum 90
Vol 10, No 2, Sum 91
Vol8. No 3, Fall 89
Vol4, No 3, Fall 85
Vol7, No 3, Fall 88
DOCID: 3021075 REF IDzA525813
(b) ( 3 ) - P . L . 8 6 - 3 6 - Keyword Title Author Reference
Computer networks A Model for Automated Vol10, No 2, Cryptovariable Distribution in a Sum 91 Cryptographic Network (U)
Architecture and Implementation for Vol8, No 3, a Larp Scale Distributed Fall 89 Multiprocessor, An (U)
Architecture and Implementation Vol8, No 4, for Linear Speedup of DSP Programs, Win 90 An (U)
Bringing User Power to the High Vol9, No 2, Performance Workstation (U) Sum 90
Comparison of Long Pipeline Vol7, No 4, Protocols (U) Win 89
Distributed File Access Over Vol7, No 3, Heterogeneous Networks (U) Fall 88
Distributed Processing on Powerful Vol4,85 Personal Computers: Interim Results (CS Issue) (U)
Fiber Distributed Data Interface, Vol7, No 1, The (Ul Spr 88
HYPERCHANNEL: Its Applications VoJ 7, No 3, in ASHLAND'S Architecture (U) Fall 88
Hypermedia Implemented in Object- Vol 10, No 1, Oriented Database Management Spr 91 Systems (U)
In Pursuit of a SONET Link Encryptor Vol 10, No 1, (L') Spr 91
Platform Network Evolution, The (U) Vol9, No 4, Win 91
Problem Encountered with the Vol7, No 2, Variant Record Construct in Ada (U) Sum 88
Processor Interconnection Networks Vol8, No 3. from Cayley Graphs (U) Fall 89
Prototype System to Capture Logic Vol7, No 3. from Images for VLSI Reverse 7 Fall 88 Engineering, A (U)
DOCID: 3021075 REF ID:A525813
I Standards for Information Exchange among Computers (u) I
Keyword
XNS Ethernet Connections for the IBM PC XT (U)
Computer I An ~ A l ~ s i s of the Vectorization programming Abilities of Current C Compilers (U) I
Title Author Reference
Book Review: Designing and Programming Personal Expert Systems (U)
n Overview of a Systolic ' Array Prockssor for the Sun (U)
Book Review: Structure and Interpretations of Computer Programs (U)
Vol9, No 2, Sum 90
Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The
I (U) Code. Train: A Computer-Based Morse Code Training Package (U)
I Cognitive Processes in Software Fault Detection (U) I DAEMON - A FOLKLORE System Guardian Spirit (U'l
Dictionary Searching by Syllabification and Syllable Indexing (U)
Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)
I Encapsulating Xt Callback Functions in C + + (U) I
Vol4,85 (CS Issue) Vol4, No 1, Spr 85
I Vol10, No 2, Sum 91
Vol5, NO 3, Fall 86
Vol9, No 3, Fall 90
Vol. 11, No. 2, Summer 92
Vol6, Nos 3-4, Fall-Win 87-88
I Vol. 11, No. 2, Summer 92
I Vol4, No 2, Sum 85
Vol. 11, No. 2, Summer 92
Vol10, No 2, Sum 91
Vol11, No 1, Spr 92
DOCID: 3021075 (bi ( 1 ) (b) {3)-P.L. 86-36
Keyword I
REF XB i3AS2 5843
Title
I Error Messages: The Importance of Good Design (U)
Further Results in Programming the I I Icon: An Enchancement to the UNIX Language Hierarchy (U) 1
I IMP Syntax Graph, The CU) I Learning Theories and Computer- Assisted Language Instruction . Technologies: A Synthesis (U)
I Meeting the Programming Challenges of the Future (U) I Notes on Optimization (U)
Operational Application of VLSI Technology: Using the PF474 to Alleviate the Problem of Variant Names, An (U)
( Programming the SPS2 N) I
Computer security (COMSEC)
Author Reference
Structured Knowledge Acquisition Techniques (U)
Structured Testing as a Learning Tool (U) I Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)
A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)
Program Overview: us, and Directions (U)
Book Review: Out of the Inner Circle: A Hacker's Guide to Computer Security (U)
Vol 11, No I, Spr 92
Vol6, No 1, Spr 87
Vol6, No 1, Spr 87
Vol4, No 4, Win 86
Vol10, No 1, Spr 91
Vol 1 , Nos 23, Sum-Fall 82
Vol7, No 1, Spr 88
Vol4, No 2, Sum 85
Vol10, No 2, Sum 91
Vol 11, No 1, Spr 92
Vol9, No.4, Win 91
Vol7, N0.3, Fall 88
Vol10, No 2, Sum 91
Vol10, No 1, Spr 91
Vol4, No 3, Fall 85
DOCID: 3021075
Keyword 1 Title
Communications Security and the Problem of Hamlet: To Be or Not to Be (U)
Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)
I Computer Virus Infections: Is NSA Vulnerable? (U)
Computer Virus Organization: A Definitive Taxonomy and Anatomy of Computer Viruses (U)
Design and Evaluation of INP~SEC Systems: The Computer Security Contribution to the Composition Discussion, The (U)
I Development of a Hard Disk Erasure Procedure (U)
Development of Communications Security Equipment, The (U)
I Examples of Lattices in Computer Security Models (U)
Fault !3imulation Requirements for Security Fault Analysis (U)
I First Generation Technical Viral Defense, A (U) ,
FOLKLORE: One Approach to Security (U)
LOCKing Computers Securely (U)
Inference Through Polyinstantiation (U)
On the Desirability ofa Flexible and Dynamic Security ~ a t t i c e (U)
Author Reference
Vol3, Nos 3-4, Fall-Win 84-85
, Vo14,Sum85 (Supplement 1
Vol4, No 3, Fall 85
Vol5, No 3, Fall 86
Vol. 12, No. 1, Spring 93
Vol10, Nos 3-4, Fall-Win 91
Vo1.16, No. 2, Summer 96
Vol4, No 4, Win 86
Vol5, No 4, Win 87
Vol. 13, No. 3, Fall 94
Vol7,No 1, Spr 88
Vol. 11, No. 4, Winter 92
Vol10, No 2, Sum 91
DOCID: (@(E2dLO7656 REF IDrA525813
Keyword
Computer software
Reference
Vol8, No 2, Sum 89
Vol9, No 1, Spr 90
Vol10, No 2, Sum 91
Vol. 12, Nos. 34 , FalY Winter 93
Vol. 13, No. 1, Spring 94
Vol9, No 1, Spr 90
Vol4, No 3. Fall 86
Vol6, No 2, Sum 87
Vol8, No 3, Fall 89
Vol4,85 (CS Issue)
Vol10, No 2, Sum 91
Vol 1, No 1, Spr 82
Vol9, No 3, Fall 90
Vol4,85 (CS Issue)
Vol7, No 4, Win 89
Title
PCSE: A Design Implementation for PC Security (U)
Programmable COMSEC and the CYPRIS Crypto-Mieroproeessor (U)
Rapid Text Searching For Multiple Key Strings (U)
RATBAG Report, The (U)
SINCGARS Software Evaluation (U)
Stab at A2 Criteria, A (U1
Susceptibility of Multics to Viral Attacks, The (U)
Techniques for Representing Mandatory Security Policies in Non- Interference Theory, A (U)
Theoretical Implications of a Second Spectrum (U)
ADAGIO: A Modern Analog-to- DigitalIDigital- to- Analog System for the R5 CYBEWVAX Research System (U)
Analysis of the Vectorization Abilities of Current C Compilers, An (U)
Analysis of TRS80 Model I Password Encryption Algorithm (U1
Book Review: Structure and Interpretations of Computer Programs (U)
CAP Production Software Library User (U)
Comparison of Long Pipeline Protocols (U)
Author
REF IDrA525813 (b) (3)-P.L. 86-36
Keyword I Title Author Reference
Cognitive Processes in Software Fault Detection (U)
Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)
DOWNIX Interoperability and E- mail in the Agency (U)
Expanded MAX-MIN Priority Queue, An (U)
Full-Text Searching: Coming of Age (U)
GRAFYAKER: A Powerful Business Graphics Tool (U)
LARC: An Electrical Parameter Extraction Algorithm for VLSI Standard Cell Designs (U)
Platform Network Evolution, The (U)
Programmable COMSEC and the CYPRIS CrypbMicroprocessor (U)
Programming the SPS2 (U)
Prototyping Man-Machine Interface to Facilitate Early Identification of Software Deficiencies (U)
Vol. 11, No. 2, Summer 92
A
Vol10, No 2, Sum 91
Software Inspections (L'l
Software Maintenance: Putting Life Back into the Life Cycle (U)
Vol11, No 1, Spr 92
Vol10, No 2, Sum 91
Vol8, No 3, Fall 89
Vol4,85 (CS Issue)
Vol9, No 2, Sum 90
Vol9, No 4, Win 91
Vol9, No 1, Spr SO
Vol10, No 2, Sum 91
Vol4, No 4, Win 86
Vol6. No 1, Spring 87
Vol4,85 (CS Issue)
Vol5, No 4, Win 87
Keyword
Computer systems
REF ID:A525813 (b) ( 3 ) - P . L . 86-36
Title Author Reference
Systolic Array Processor for the Sun Sum 90 (U)
Structured Testing as a Learning Tool (U)
T3343 Software Evaluation Effort (U) I TQM and Software: New Paradigms for Development and Support (U)
TURBOTECH: An Architecture Management and Analysis System (U)
Using Lotus 1-2-3 as an EWNT Display and Analysis Tool (U)
ACQUAINTANCE: A Tool for Language Identifleation (U)
ADAGIO: A Modem Analog-to- DigitaYDigital-WAnalog System for the R5 CYBERNAX Research System (U)
Analyzing Vague Data (U)
Beyond "DRAGON'S LAIR" (U) I Book Review: Designing and Programming Personal Expert Systems (U)
CAP Production Software Library User (U)
Vol9, No.4, Win 91
Vol4,86 (CS Issue)
Vol11, No 1, Spr 92
Vol8, No 4, Win 90
Vol4. No 3, Fall 85
Vol7. N0.4 Win 89
Vol4,85 (CS Iasue)
Vol9, No 4, Win 91
Vol2.83 (CS Issue)
Vol5, No 3, Fall 86
Vol4,85 (CS Issue)
DOCID: 3021075
Keyword
i b ] i l i i b ) ( 3 ] 5 0 i:Si: 403 ih, ( 3 ! - i 8 I ISC 798
. (b] ( 3 1 - P . 1 . 86-36
REF ID:A525813) (3)-P.L. 86-36
Title Author
Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)
Computers- the Wailing Wall (U) Meyer, Joseph A.
Connect the Dots: ~4-I Aid to Studying Associations (U)
I DAEMON -A FQLKL~RE System Guardian Spirit (U)
Database Processing with Triple Modular Redundance (U)
Developing a Feedback Maintenance System (FMS) on Carillon (U)
Error Messages: The Importance of Good Design (U)
I FARSEEING: A Study in Expert Systems (U)
Graphic User Interface for the Transcriber-Analyst, A (U)
Geographic Information Systems (U)
Historical Intelligence Production Problems: Is Technology the (U)
HYPERCHANNEL: Its in ASHLAND'S Architecture (li)
I Ideograph Writing Patterns and Computer Input (U)
Influence of U.S. Cryptologic Organizations on the Digital Computer Industry (U)
Information Engineering Integrated Methodologies for Building a
' Transcriber Information Aids System (U)
Reference
Vol4, Sum 85 (Supplement)
V016, NOS 3-4, Fall-Win 87-88
Vol7, No.4, Win 89
Vol4, No 2, Sum 85
Vol5, No 4, Win 87
Vol4; 85 (CS Issue)
Vol11, No 1, Spr 92
Vol8, No 2, Sum 89
Vol2,83 (CS Issue) .
Vol 10, Nos 3-4, Fall-Win 92
Vol4, No 4, Win 86
Vol7, No 3, Fall 88
Vol4, No 3, Fall 85
Vol6, NOS 3-4, Fall-Win 87
Vol4.85 (CS Issue)
DOCID: 3021075 REF ID:A525813 (b) ( 3 ) - P . L . 86-36
Keyword 1 Title Author Reference
PEEVEY Assistant An "Electronic Performance Support System" (EPSS) for On-theJob Training of Computer Operators (U)
ib) (1)
Prototype Knowledge Base System for Technology Espionage: An Interim Report, A (U)
Language Expert System: Squeezing Gurin, Jacob (Jack) Vol4 No 1, the Expert Linguist into a Computer Spr 85
Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)
Signal Descriptor Language, A (U)
Standards for Information Exchange among Computers (U)
(h) (3)-50 USC 403 (b) (3)-P.L. 8 6 - 3 6
Vol11, No 1, Spr 92
Vol5, No 4, Win 87
(u)
Vol7, No. 3, Win 88
Vol3, NOS 2-3, Fall-Win 84-85
Vol7,No 1, Spr 88
0 Vol8, No 2, Sum 89
Vol7, No. 3, Win 89
NIKKEL 11 Signal processor or Gt t ing Your NIKKEL'S Worth, The (U)
i r ) 1 i ,k>, - ) -51 I1:f' 41J3 i t ? ) \ 3 ) - 1 E 11qr / L ,
( t i ' ) - F . L . P G - ? ~
I Vol9, No 1, Spr 90
-
Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)
1 aldo's Dream (U)
Susceptibility of Multics to Viral Vol4, No 3, Attacks, The (U) Fall 85
Time Is -Time Was -Time Is Past: Campaigne, Howard H. Vol6, Nos 3-4, Computers for Intelligence (U) Fall-Win 87-88
Tools for the Beginning Translator 1 iUl
I UCSD p-System, The (U)
Winning the Paper Chase: Operational Aplications of Computer Output Microfiche (U)
Vol3, Nos 1-2, Spr-Sum 04
Vol4,85 (CS Issue)
Vol 1, No 1, Spr 82
(b) (31-50 LSC 403
5 REF IDzA525813 (b) ( 3 ) - P . L . 86-36
Computer virus I Analysis of the "Lehigh" Virus (U)
Key word
Computer training
I Computer Virus Infections: Is NSA Vulnerable? (U) 1
Title Author
PEEVEY Assistant An "Electronic Performance Support Systemn (EPSS) for On-thedob Training of Computer Operators (U)
Computer Virus Organization: A Definitive Taxonomy and Anatomy of Computer Viruses (U)
I First Generation Technical Viral Defense, A (U) I I Susceptibility of Multics to Viral Attacks, The (U)
Creativity Creativity: Can It Be Taught? (U)
Counterintelligence Book Review: International Journal of Intelligence and Counter- intelligence (U)
Cryptanalysis I Address Given to Annual Cryptanalysis Exchange (U) I
Critical programming support
Analysis of TRS-80 Model I Password Encryption Algorithm (U)
I Artifcia1 Intelligence: Approach to Cryptodiagnosis (U)
Critical Programming Support During the Persian Gulf Crisis (U)
Reference
Vol11, No 1, Spr 92
Vol9, No 2, Sum 90
Vol4, No 3, Fall 85
Vol5, No 3, Fall 86
Vol7, No 2. Sum 88
Vol4, No 3, Fall 85
Vol6, Nos 3-4, Fall-Win 87-88
Vol. 13, No. 2, Summer 94
Vol. 12, Nos. 3-4, Fall/ Winter 93
Vol. 13, No. 1, Spring 94
Vol. 12, No. 1, Spring 93
Vol 1,83 (CS Issue)
Vol 1, No 1, Spr 82
Vol5,86 (CA Issue)
Vol. 13, No. 1, Spring 94
I Book Review: The American Black 7 Vo14,No 2, Chamber (U) Sum 85
Keyword
I Computers -the Wailing Wall (U) Meyer, Joseph A.
Title Author Reference
Book Reuiew: Alan Turing: The Mowry, Darid P. Vol2, Nos 3-4. Enigma (U) Fall-Win.83-84
I Conditional Sigmage Analysis and Bulge Estimation (U) I I Cryptanalysis: A Prognosis for the Eighties (U) I Cryptanalysis in the United Kingdom (U)
Cryptanalytic Use of High-Speed Digital Computing Machines (U) I Cryptographic Mathematics of Enigma, The (U1
CRYPTRONICS or Cryptanalysis and Cryptography in Microelectronics (U)
Development of the Tramposition PseudeSquare Technique, The (U) I Diabolical Diagnosis (U) I
Exploratory Exploitation (U) I I Farewell, Address, A (U) I I Introduction to a Historic Computer Document: Bettingon the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U) .
I Opening Address. Annual Cryptanalysis Exchange (U)
Vol6, NOS 3-4, Fall-Win 87-88
Vol 1,83 (CA Issue)
Vol 1, No 1, Spr 82
Vol. 12,.Noe. 3-4, Fall/ Winter 93
Vol. 13, No. 4, Winter 94
Vol. 13, No. 3, Fall 94
Vol. 15, Special Edition 96
Vol 1.83 (CA Issue)
Vol5,86 (CA Issue)
Vol8, No 1, Spr 89
Vol5.86 (CA Issue)
Vol4. No 2, Sum 85
Vol. 13, No. 4, Winter 94
Vol1, Nos 2-3, Sum-Fall 82
REF IDrA525813 ( b ) ( 3 ) - P . L . 86-36
Keyword Title Author. Reference
Vol5,86 (CA Issue)
Mowry, David P. Vol2, Nos 3-4, Menzer: Cryptographic Inventor Fall-Win 83-84 Extraordinaire (U)
Cryptanalysts
Cryptographii bypass
Cryptographic network
cr~~tol3raphy
Securing Army Circuits during World War 11: A Potential Disaster Narrowly Averted (U)
Solving xa= b (mod c) for x and an decimating Recursions (U) I
I FOLKLORE: One Appmach to Security 1 Formally Stating Cryptographic I Bypass Requirements (UI
A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)
Before BOURBON: American and British CoMINT Efforts Russia and the Soviet
I Cryptographic Applications of Singular Value Decomposition (U)
Rowlett, Frank B. Vole, No 1, - Spr 87
Vol. 11, No. 4, Winter 92
Vol. 13, No. 3, Fall 94
I Vol. 12, No.2, Summer 93
Vol10, No 2, Sum 9.1
I Vol5,86 (CA Issue)
Vol. 12, Nos. 3-4, FalYWinter 93
Vol 1,83 (CA Issue)
CRYPTRONICS or Cryptanalysis and Vol. 15, Special Cryptography in Microelectronics ([I Edition 96
First U.S. Government Manual on Gaddy, David W. Vol. 11, No. 4, Cryptography, The (U) Winter 92
Cryptolinguistics
Vol. 12, No. 1, Spring 93
Regierungs-Oberinspektor Fritz Mowry, David P. Vol2, Nos 3-4, Menzer: Cryptographic Inventor Fall-Win 83-84 Extraordinaire (U)
1 Vol. 14, No. 3, Fall 96
Cryptologic history Book Review: SIGINT%C~~~S: The Signals Intelligence War, I900 to Today, The
REF ID:A525813 (b ) ( 3 ) - P . L . 86-36
Title Author Reference
"Cipher' Dispatches and the ~lect ion I , , , 1 Vol. 11, No. 3, of 1876 (U) Fall 92
Director's Welcome a t the 1992 McComell, Vice Admiral Vol. 12, No. 1, Cryptologic History Symposium, The J.M., USN Spring 93 (U)
Vol. 13, No. 1,
First U.S. Government Manual on I Gaddy, David W. Vol. 11, No. 4, Cryptography. The (U) Winter 92
Handy-Dandy Field Site History: Johnson, Thomas R. Vol. 14, No. 1, Fifty Years of Field Operations, Spring 95 1945-1995. The (U)
History of the South Vietnamese Vol. 13, No. 1, Directorate for Technical Security Spring 94
I Vol. 13, No. 2, Summer 94
I
Move, or How NSA Came to Fort Johnson, Thomas R. Meade , The (U)
Origins of the Soviet Problem: A Kirby, Oliver R.
Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov
Vol. 14, No. 2 Summer 95
Vol. 13, No. 3, Fall 94
Vol. 12, No. 1, Spring 93
Vol. 11, No. 4, Winter 92
Vol. 13, No. 4, Winter 94
Vol. 14, No. 2, Summer 95
DOCID: 3021075 REF IDzA525813 ?b) (3)-P.L. 66-3E
Keyword I Title Author
Revisiting the Dispute over the Identification of "AF" as Midway (U)
I Seward's Other Folly: America's I I First Encrypted Cable (U)
SIGINT and the H6.locaust (U) Benson, Robert Louis
I Solved: A Long-Lost Cipher from Siberia (U)
I Station "CW and Fleet Radio unit Melbourne (FRUMEL) Revisited (U)
Way I t Used to Be or What's an RSM Anyway, The, Part I, (U)
Way It UsedtoBe,The, Part I1 (From ADVAlGENSto the Alphabet
1 (U)
Beyond Codes and Ciphers: The Nolte, William M. Expanded Meaning of Cryptology in the Late Twentieth Century (U)
Church Cryptogram: Birth of Our Nation's Cryptology, The (U)
Cryptographic Applications of Singular Value Decomposition (U)
I Eight Cryptologic Problems (Ul ,
Meyer, Joseph A.
Future of High Frequencies in Gerson, N.C. Cryptology - Part I, The (U)
Future of ~ i g h Frequencies in Gerson, N.C. ' crypto~ogy -Part [I, he (u)
If Cryptanalysis Is What We Do and Nolte, William M. Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)
Open Letter to William M. Xolte, An (U)
Reference
Vol. 13, No. 4, Winter 94
Vol. 12, No. 2, Summer 93
Vol. 14, No. 1, Spring 95
Vol. 13, No.2, Summer 94
Vol. 12, No.2, Summer 93
Vol. 13, No. 1, Spring 94
Vol. 13, No. 2, Summer 94
Vol8, No 4, Win 90
Vol6, No 2, Sum 87
Vol 1,83 (CA Issue)
Vol 1.83 (CA Issue)
Vol5.86 (CA Issue)
Vol. 11, No. 2, Summer 92
Vol. 11, No. 3, Fall 92
Vol9, No 2, Sum 90
Vol9, No 2, Sum 90
DQCID: 3021075 ( ~ i t 3 ) - 5 3 USC 403 ( 3 ) (31-18 USC 798 (S) (3)-P.L. 86-36
REF IDtA525813 : :(b) ( 3 ) - P . L . 8 6 - -36
Reference I Title Authot Keyword
Recent Progress in Academic Cryptology (U)
Vol4, No 2, Sum 85
I "Things Aren't What They Used to Gurin, Jacob (Jack) Be" (U)
Vol 1, No 1, Spr 82
What Every Cryptologist Should Johnson, Tho- R. Know about Pearl Harbor (U)
Who Are We? (U)
Vol6, No 2, Sum 87
Vol9, No 2, Sum 90
Vol. 13, No. 4, Winter 94 I Crypto-TA. The Mighty Morphin of
Technical Analysis (U) u Cuban Missile crisis Book Review. Eyeball to Eyeball: Hatch, David A.
The Inside Story of the Cuban Missile Crisis (U) - Vol. 11, No. 3,
Fall 92
I Cuban Missile Crisis: A SIGINT Perspective, The (U) I Vol. 13, No. 1,
spring94
NSA in the Cyberpunk Future: A Somewhat Educated Guess at Things to Come (U)
Vol. 16, No. 3. Fall 96
I BILLY Data Base~Tasking Management System Intervals (U)
Database Vol8, No 3, Fall 89
Computer Graphics Data Base Design Aid Package, A (U) I Vol2,83
(CS Issue)
Database Processing with Triple Modular Redundance (U)
Vol5, No 4, Win 87
Digital Voice Compression Algorithm with Robust Properties, A
Vol2, Nos 1-2, Spr-Sum 83
Vol5, Nos 1-2, Spr-Sum 86
Enhancing Auditory Perception (U) Gurin, Jacbb (Jack) I Vol 1, Nos 2-3, Sum-Fall 82
Multimedia Data Basea: Design Issues, NSA Applications, and Prototypes (U)
Vol9, No 2, Sum 90
Vol2, Nos 3-4, Fall-Win 83-84 I Naval Security Group Data Base
Administration (U)
REF IDrA525813
Keyword 1 Title
Return of the Electronic Francophoneglos, The (U)
Databases , Database
management systems
Data Encryption Standard (DES)
Data exfiltration
Data exchange
Data manipulation
Deception
Decision support systems
Defense
DEFSMAC
Deployment
Creating an Information Space: Cyc and Carnot (U)
NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)
1 [Sensitive Title]
Network System's Data Exchange (DX) IP Router: NSC's Product in
1 Review (U)
I Introduction to Volume Modeling and Rendering, An (U)
Author Reference
I Project POSTCARD(^) Hanyok, Robert
Development of Decision Support Analysis for Traffic Analysis (U)
ABM Treaty and the Dilemma of Indecision, The (U)
DEFSMAC: The Future Is Now (U)
I Too many Cryptologic Eggs in One Basket (U) u
Vol4, No 1, Spr 85
Vol. 15, Special Edition 96
Vol. 12, Nos. 3-4, FalVWinter 93
Vol. 15, No. 1, Spring 96
Vo1.15, Special Edition 96
Vol. 12, No. 1, Winter 93
Vol. 11, No. 3, Fall 92
Vol. 13, No. 3, Fall 94
Vol. 12, Nos. 3-4, FalltWinter 93
Vol5, Nos 1-2, Spr-Sum 86
Vol. 13, No. 1, Spring 94
Vol7, No 1, Spr 88
Deputy directors I Dr. Louis W. Tordella, 1911-1996 (U) author unknown Vol.15, No. 1, Spring 96
DESERT SHIEWSTORM Critical Programming Support During the Persian Gulf Crisis (U)
Desktop publishing Developing a Document Image I Processing System (U1
Dialed Number I Approach to Isolating Nontraditional Recognition Targets, An (U)
Vol. 12, No. 1, Spring 93
Vol. 1 1, No. 3, Fall 92
Vol. 13, No. 3, Fall 94
REF IDzA525813
Keyword I Title
Digital signals I Digital optical
systems
Digital technology
Receivers (U)
Effects of Optical Components on System Performance, The (U)
Digitizing I Compacting the Masscomp Disk (U)
DIRNSA From Chaos Born: General Canine's First Charge to the NSA Workforce (U)
Glimpses of a Man: The Life of Ralph - J. Canine (U)
Discrimination I Machine Learning Approach to Text Type Identification, A (U)
Disk 1 Compacting the Masscomp Disk (U)
Development of a Hard Disk Erasure Procedure (U)
Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)
Distributed computing
. Document image I Developing a Document Image processing Processing System (U)
Combining Distributed Computing and ObjecbOriented Techniques (U)
Distributed processing
n IASW~ uccess u SIGINT ooperationm
Introduction to Distributed Processing for the Layperson: Making the Move from the General Store to the Supermarket. . . ,An (U)
Author
Dynamical systems
Reference
-%4= Fall of the Shah: A Chaotic Approach, The (U)
vbl. 15, NO. 2, Summer 96
Vol. 14, No. 2, Summer 96
Vol8, No 2, Sum 89
Vole, No 2, Sum 87
Vol6, No 2, Sum 87
Vol. 13. No. 4, Winter 94
Vol8. No 2, Sum 89
Vol10, Nos 3-4, Fall-Win 91
Vol8, No 2, Sum 89
Vol. 15, No. 1, Spring 96
Vol. 15, No. 3, Fall 96
Vol. 11, No. 3, Fall 92
Vol 10, Nos 3-4, Fall-Win 91
Vol. 13, No. 4, Winter 94
REF ID:A525813 : ( b ) (3)-P.L.
Keyword I Title Authot
Economics 1 -
Alp-Adria: A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)
Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)
Economic warfare Review: Marketing Warfare
Economic espionage
Editorial
Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)
I High-Tech Trade War with Japan: Jelen, Ceorge F. Can Anyone Win?, The (U)
"Things Aren't What They Used to Gurin, Jacob (Jack) Be" (U)
Electrochemical I Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (U)
Electronics Comparing Visual Detection to Machine Vision for Detecting the Presence of Laser Irradiation with an Electro-Optical Device (U)
Electronic printing
I EMC - A Field Perspective (U)
Agency Electronic Printing Standards: Today It's PostScript and Interpress Page Description Languages (U)
I Fundameritals of Electronic System Grounding (Ul
Generalized GMW Sequences and an Application to Frequency Hopping (U)
86-36
Reference
Vol7, No 3, Fall 88
Vol3, Nos 1-2, Spr-Sum 84
Vol8, No 4, Win 90
Vol6, No 2, Sum 87
Vol. 13, N0.2, Summer 94
Vol5, No 4, Win 87
Vol5, NOS 1-2, Spr-Sum 86
Vol1, No 1, Spr 82
Vol7, No 2. Sum 88
Vol4, No 4, Win 86
Vol8, No 4, Win 90
Vol 1, Nos 2-3, Sum-Fall 82
Vol3, Nos 1-2, Spr-Sum 84
Doc~P~t~-;$ &P7 5 REF I D : A 5 2 5 8 1 3 (3\ (31-19 LISP 798 ( ? ! ( 3 ) - ? . L . 86-36 -
(b) (3)-P.L. 86-36
Keyword I Title Author Reference
Electronic warfare
High-Altitude Electromagnetic Pulse (HEMP): "A Sleeping ~lectfonic Intruder," The (U)
Signal Descriptor Language, A (U)
B w k Review: Electronic Warfare: Element of Strategy and Multiplier of Combat Power (U)
Electron injection 1 Hot Carrier Effects on VLSI Devices
Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere (U)
50 USC 403 I I
Using Lotus 1-2-3 as an Elint Display and Analysis Tool (U)
Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)
Emitter Primer on Swc Emitter Identification
Engineering
English
I Generalized GMW Sequences and an Application to Frequency Hopping (U)
Information Engineering: Integrated MethodoIogies for Building a Transcriber Information Aids System (U)
Satellite-Earth Radio Link Depolarizationby Ice Crystals (U)
Spoken Language Library: A Unique institution (U1
Gurin, Jacob Uack)
Vol 6, No 3, Fall 86
Vol3, Nos 2-3, Fall-Win 84-85
Vol 1, NOS 2-3, Sum-Fall 82
Vol6, No 1, Spr 87
VOI 5, NOS 1-2, Spr-Sum 86
Vol7, No 3, Fall 86
Vol 7, No 3, Fall 88
Vol 1, No 4, Win 83
Vol6,86 (CA Issue)
Vol. 14, No. 3, Fall 95
Vol4,85 (CS Issue)
Vol2, NOS 1-2, Spr-Sum 83
Vol5, No 3, Fall 88
DOCID: 3021075 REF ID:A525813 ib)(3I-P.L. 86-36
Keyword 1 Title Author Reference
Youye Got to Go by the Rules (U) Gurin, J w b (Jack) Vol2, Nos 3-4, Fall-Win 83-84
Enigma I Book Review: Alan Turing: The Mowry, David P. Vol2, Nos 3-4, Enigma (U) Fall-Win 03-84
Espionage
Book Review: Codebreakers: The Filby, P.W. Inside Story of Bletchley Park (U)
Cryptographic Mathematics of Enigma, The (U) r - 7 Book Review: Atom Bomb Spies, The ' u I Book Review: Black Cipher (U) Hanyok, Rabert J.
Book Review: Family Treason (U) n I Book Reuiew: FBI-KGB War: A Special Agent's Story, The (U) u
Vol6, Nos 3-4, i Fall-Win 87-88
Book Reuiew: Honorable Treachery: A History of U.S. Intelligence, Espionage, and.Covert Action from the American Revolution to the CIA(U)
1 B d Revinv: M y Silent War (U)
Book Review: Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million (U)
Book Review: Spywars: Espionage and Canada from Gouzenko to Glasnost (U)
I Out of Control (U)
Book Reuiew: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)
Book Reuiew: Haile Selassie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)
Vol. 13, No. 2, Summer 94
Vol. 13, No. 3, Fall 1994
Vol. 14, No. 4, Winter 95
Vol5, No 3, Fall 86
Vol6, No 2, Sum 87
Hatch, David A. Vol. 13, No. 3, Fall 94
Hanyok, Robert J. Vol. 14, No. 3, Fall 95
Vol. 15., No. 2, Summer 96
Johneon, Thomas R. Vol. 14, No. 2, Summer 96
Vol. 15, Special Edition 96
Vol4, No 3, Fall 85
Vol4, No 4, Win 86
' ~ ~ & i C B : ~ o ~ 3 0 2 1 0 7 5 [b) c 3 ) - 1 U USC I98 b)13)-P.-. 86-36
REF IDzA525813 "{bl (3)-P.L. 86-36 -
Keyword Title
Expert systems Structured Knowledge Acquisition Techniques (U)
Facsimile c Fairbanks, Sidney
Falklands War
Field sites
FOLKrnRE
Forecasting
Passing of an Extraordinary Man, The (U)
Book Review: One Hundred Days: The Memoirs of the Falklands Battle Group Commander (U)
French secret service
Frequency management
Friedman, William F.
I Book Review: Chicksands: A Millenium of History (Ul
Reference
v i l l i , NO 1, Spr 92
Vol. 13, No. 4, Winter 94
Vol. 15, Special Edition 96
Vol4, No 3, Fall 85
Vol. 11, No. 2, Summer 92
Vol11, No 1, Spr 92
Vol. 13, No. 3, Fall 94
Handy-Dandy Field Site History: Johnson, Tho- R. Vol. 14, No. 1, Fifty Years of Field Operations, Spring 96 1945-1995. The (U)
M)LKU)W: One Approach to Security Vol. 13, No. 3, (U) Fall 94
I Dealing with the Future: The Limits of Forecasting (U)
Book Reuiew: French Secret Services: Hanyok, Robert J. Vol. 14, No. 4, From the Dreyfus Affair to the Gulf Winter 96 War, The (U)
Frequency Management - No Longer an Agency Nemesis (L')
Diary of 23 April - 13 June 1943, Friedman, William F. Vol 1, Nos 2-3, Part I (U) Spr-Fall82
I Diary of 23 April - 13 June 1943, Friedman, William F. Vol1, No 4, Part I1 (U) Win 83
FRUMEL I Station "C" and Fleet Radio Unit Melbourne (FRUMEL) Revisited (U)
Vol. 12, No. 2, Summer 93
i 9 6 C I D : 3021075 1 ' (31-53 USC 193
REF ID:A525813 i ( b ) ( 3 ) - P . 1 , . 86-36
' k i 31-18 ;SC 798 ,k! (.3)-P.:,. 86-36
w
Keyword I Title
German ciphers I World War I1 German Army Field Cipher and How We Broke It, A (U) I
Germany I Book Review: History of the German General StafT(U)
GLISSADE I GUSSADE Lessons Learned from a Rapid Prototype (U) I
GOLD NUGGET Award GOLD NUGGET Award (U)
Gold Nugget Award for Excellence in Traffic Analysis, The (U) I
Gorbachev, Mikhail in Historical Perspective I
Moscow's Realignment with Cairo: Look a t Gorbachev's New Political Thinking (U)
Hardware descriptive languages
HE' collection
I Soviet Military Establishment under Studeman, W.O., VADM, Gorbachev, The (U) ' USN
Modular Arithmetic in Hardware (U)
Origins of SIGINT Hearability (U) 1 1 Communications and the Ionosphere Gemn, N. C.
Future High Frequency Target Gerson, N. C. Location System, The
HFDF Research Attempts: Past and Gerson, N. C. Future (U)
NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)
NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)
Reference
Vol. 15, No. 4, Winter 96
Vol8, No 3, Fall 89
Vol. 13, No. 3, Fall 94
Vol. 15, No. 1, Spring 96
Vol. 14, No. 2, Summer 95
Vo18, No 4, Win 90
Vol6, No 2, Sum 87
Vol8, No 4, Win 90
Vol7, No 4. Win 89
Vol. 11, No. 4, Winter 92
Vol. 12, No. 2, Summer 93
Vol 1, No 4, Win 83
Vol2, Nos 1-2, Spr-Sum 83
Vol 1, Nos 2-3, Sum-Fall 82
Vol. 14, No. 4, Winter 95
Vol. 15, No. 1, Spring 96
DOCID :
Keyword
HF communications
History
REF IDtA525813
Title Author Reference
I Future of High Frequencies in Gerson, N.C. Crypto1ogy -Part I, The (U)
I Future of High Frequencies in Gerson, N.C. Cryptology - Part 11, The (U)
Beyond Codes and Ciphers: The Nolte, William M. Expanded Meaning of Cryptology in the Late Twentieth Century (U)
Book Review: "And I Waa There": Pearl Harbor and Midway-Breaking the Secretq (U)
I Book Review: Alan Turing: The Mowry, David P. Enigma (U)
I Book Review: American Black Chamber, The (U)
I Book Review: Concise History of the Middle East, A (U)
Book Review: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)
Book Review: Guardians of the Sea: History of the United States Coast Guard from 1915 to the Present (U)
Book Review: Haile Selaesie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)
Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)
I Book Review: Mask of Command, The (L')
Book Review: Room 40: British Naval Intelligence 1914-18 (U)
I Book Review: Secrecy and Democracy: CIA in Transition, The
Val. 11, No. 2, Summer 92
Vol. 11, No. 3, Fall 92
Vol8, No 4, Win 90
Vol5, NOS 1-2, Spr-Sum 86
Vol2, Nos 34, Fall-Win 83-84
Vol4, No 2, Sum 85
Vol4, No 1, Spr 86
Vol4, No 3, Fall 86
Vol7, No 2, Sum 88
Vol4, No 4, Win 86
Vol7, No 1, Spr 88
Vol9, No 2, Sum 90
Vol2, NOS 1-2, Spr-Sum 83
Vol4, No 3, Fall 85
DOCID: 3021075 REF IDtA525813 (31 (3)-P.L. 8 6 - 3 6
Keyword I Title Author Reference
Book Review: ULTRA Americans: The U.S. Role in Breaking the Nazi I Codes, The (U)
Vol5, No 3, Fall 86
Vol 1, NOS 2-3, Spr-Fall82
Diary of 23 Apri 1- 13 June 1943, Friedman, William F. Part I (U)
Diary of 23 April - 13 June 1943, Friedman, Wiiliam F. Part I1 (U)
Gorbachev in Historical Perspective (U) 0
Vol 1. No 4, Win 83
Vo18, No 4, Win 90
Influence of U.S. Cryptologic Snyder, Samuel S. Organizations on the Digital Computer Industry (U)
Vol6, Nos 3-4, Fall-Win 87
I I Was a Cryptologic Corporal! (U) Unknown Author Volt, No4, Win 83
I Litening to the Rum Runners (U) Mowry, David P. Vol2, Nos 1-2, Spr-Sum 83
New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)
Vol5, No 3, Fall 86
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
v019, x o 2, Sum 90
Vol3, Nos 3-4, Fall-Win 84-85 I Red and Purple: A Story Retold (U) -
Regierungs-Oberinspektor Fritz Mowry, David P. Menzer: Cryptographic Inventor Extraordinaire (U)
Vol2, NOS 3-4, Fall-Win 83-84
Securing Army Circuits during Rowlett, Frank B. World War 11: A Potential Disaster Narrowly Averted (U)
Vol6, No 1, Spr 87
Vol4,No 1, Spr 85
1 SignalmanBs Odyssey (U)
Through Thailand by Train: A Johnson, Thomas R. Personal Memoir (U)
Vol4, No 3, Fall 85
Vol2, Noe 3-4, Fall-Win 83-84 I United Pigeon8 Service (UPS)? (U) Unknown Author
DOCID: 3021075
Keyword
Holbrook. James
Holocaust
Holographic camera
HPC technology
Human-computer interaction
Human factor
REF ID:A525813
Title Author Reference - -
Unternehmen BOLIVAR (Ul Mowry, David P.
What Every Cryptologht Should Johnson, T h o r n R. Know about Pearl Harbor (U)
Golden Age of Russia, The (U)
srCIm and the Holocaust (U)
0 Benson, Robert Louis
Future Spy Camera, The (U)
NSA and the Supercomputer Industry (U)
Virtual Reality (U)
Book Review: Essays on Strategy (U) I
Book Review: Marketing Warfare (U)
Book Review: One American Must Die (U) I Book Review: Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded I Marketplace) (U)
Diary of 23 April - 13 June 1943, Friedman, William F. Part I (U)
Diary of 23 April - 13 June 1943, Friedman, William F. Part I1 (U)
Essential Difference, The (U)
Examination of the Possible Effects 1 of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery. An
1 (U,
I Was a Cryptologic Corporal! (U) Unknown Author
Vol3, Nos 3-4, Fall-Win 84-85
Vol6. No 2, Sum 87
Vol. 13, No.4. Winter 94
Vol. 14, No. 1, Spring 95
Vol. 15, No. 1, Spring 96
Vol. 14, No. 4, Winter 96
Vol5, No 3, Fall 86
Vol5, No 4, Win 87
Vol5, No 4, Win 87
Vol 1, Nos 2-3, Spr-Fall82
Vol 1, No 4, Win 83
Vol5, No 4, Win 87
Vol 7, No 3, Fall 88
Vol 1, No 4, Win 83
REF ID:A525813
Keyword 1 Title Author
Looking Ahead to the 1990s (U) Unknown Author
I Pachydermic Personality Prediction Profile (U)
Human resources
Humor
Image quality
Indications and Warning
Information networks
Select Yourself for War College (U)
I Signalmanos Odyssey (U) I I I I
Through Thailand by Train: A Johnson, Thomas R. Personal Memoir (U)
I OJE: On the Job Enthusiasm A Layman's Perspective (U)
On-the J o b Training: A Supervisor's Responsibility (U)
I Volunteering: A Fresh Approach (U)
Linguistic "Funny," A (U) I I I Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (U)
I Fall of the Shah: A Chaotic Approach, The (U)
I Domain Name Service (U) I I Information
Security INFOSEC
Systems: The Computer Security Contribution to the Composition Discussion, The (U)
Formally Stating Cryptographic Bypass Requirements (U) u
Reference
Vol6, NOS 1-2, Spr-Sum 86
Vol7. No 2, Sum 88
Vol5, No 3, Fall 86
Vol4, No 1, Spr 85
Vol4, No 3, Fall 85
Vol7, No 2, Sum 88
Vol8, No 1, Spr 89
Vol8, No 1, Spr 89
Vol5, Nos 1-2, Spr-Sum 86
Vol. 11, No. 4, Winter 92
Vol. 13, No. 4, Winter 94
Vol. 14, No. 2, Summer 95
Vol. 13, No. 3, Fall 94
Vol. 12, No. 1, Spring 93
Vol. 12, No. 2, Summer 93
REF IDzA525813 /h)(3)-P.L. 06-36
Keyword 1 Author Reference Title
Future Spy Camera, The (U) Vol. 16, No. 1, Sprine 96
Information System Security Engineering: Application Customer Focused (U)
Vol. 11, No. 3, Fall 92
Vol. 15, No. 4, Winter 96
Information services Internet: Opportunity and Challenge I for the information ~ervicea I I Organization at the National Security Agency (U)
Vol8, No 3, Fall 89
Information support Decade of Information Service a t FANX, A (U)
Full-Text Searching: Coming of Age I (U) Fall 89 I Va8,N03s
I Geographic Information Systems (U) Vol10, Nos 3-4, Fall-Win 91
1 Vol. 14, No. 3, Fall 96
INMARSAT
Book Review: A Century of Spies: Johnson, Thomas R. Intelligence in the Twentieth Century (U)
Intelligence Vol. 15, No. 3, Fall 96
Vol7, No 2, Sum 88 I Book Review: British and American
Approaches to Intelligence (U)
Book Review: Conflict of Duty: The Nolte. William M. U.S. Navy's Intelligence Dilemma, 1919-1945 (Ul
Vol2, NOE 1-2, Spr-Sum 83
Vol5, Nos 1-2, Spr-Sum 86 I Book Review: Inside Soviet Military
Intelligence (U)
Book Review: Intelligence and National Security (U)
Vol5, No 4, Win 87
Vole, Nos 3-4, Fall-Win 87-88
Book Review: International Journal of Intelligence and Counterintelligence (U)
Book Review: Positioning: The Olsen, Peter C. Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)
Vol5, No 4, Win 87
DOCID: 3021075 REF, IDzA525813 '[b) (3)-E.L. 86-36
Keyword I Title
I B d Review: Room 40: British Naval Intelligence 1914-18 (U)
Book Review: Secrecy and Democracy: The CIA in Transition (U)
Book Review: The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (U)
Book Review: The ULTRA ~mericans: The U.S. Role in Breaking the Nazi Codes (U)
Calculation of Threat: A Review of Intelligence Community Initiatives for Indications and Warning (U)
Historical Intelligence Production Problems: Is Technology the Answel (U)
I In France's Footsteps (U)
Author . Reference
Vol2, NOS 1-2, Spr-Sum 83
Vo14, No 3, Fall 85
Vol5, No 4, Win 87
Vol5, No 3, Fall 86 .
Vol 1, Nos 2-3, Sum-Fall 82
Vol4, No 4, Win 86
I , I Vol4, No3, Fall 85
I Intelligence and the American Johnson, Thomas R. Vol. 14, No. 3, Presidency (U) Fall 95
Intelligence: A Business or a Craft ( W
INTERROCRAPH; An Information Tool for Counter-Terrorism Intelligence Centers (U)
Military Intelligence Corps Hall of Fame (U)
Role of Intelligence in the Post-cold War World,The (U)
Vol7, No 3, Fall 88
Vol2,83 (CS Issue)
Vol10, No 1, Spr 91
Vol. 11, No. 2, Summer 92
I Soviet Military Establishment under Studeman, W.O., VADM, Vol7, NO 4, Gorbachev, The (U) USN Win 89
I Time Is -Time Was -Time Is Past: Campaigne, Howard H. Vol6, Nos 3-4, Computers for Intelligence (U) Fall-Win 87-88
I Unternehmen BOLIVAR (U) Mowry, David P. Vol3, Nos 3-4, Fall-Win 84-85
DOCID: 3021075 REF IDzA525813
Keyword 1 ' Title Author Reference
Intelligence analysis
1ntelligen;ce analysts
Intelligence community
Intelligence support
International affairs
Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)
Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twins and the Complexity of Intelligence Analysis (U)
Pump or Bottleneck? Focus on the Intelligence Analyst (U)
So Where Do the Analysts Come From? (U)
Book Review: Informing Statecraft I Book Reuiaw: Spyworld: Inside the I I Canadian and American Intelligence Establishments (U)
Facing the Post-Cold-War Era (U) Nolte, William M.
SINIOs, NSA, and the National Nolte, William M. Estimates Process (U)
NSA and SAC (U) Johnson, Thomas R.
~ l ~ e - ~ d r i a : A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)
Book Review :Legitimacy and Force, Vol. 1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)
I Hitler Gambit Versus the Great Anyway, The (U)
Iran-Iraq War: Regional Implications and Alternatives for Resolution, The (U)
~ e s t r u c t u r i n ~ the U.S. ~ 1 ~ 1 h ~ S y s t e r n for Tomorrow's World (U)
Vol. 14, No. 3, Fall 96
Vol8, No 3, Fall 89
Vo18, No 4, Win 90
Vol. 12, Nos. 3-4, FalWinter 93
.Vol. 12, No. 2, Summer 93
Vol. 14, No. 1, Spring 95
Vol. 11, No. 4, Winter 92
Vol9. No 1, Spr 90
Vol5, Nos 1-2, Spr-Sum 86
Vol7, No 3, Fall 88
Vol7, No 4, Win 89
Vol5, NOS 1-2, Spr-Sum 86
Vol7, No 2, Sum 88
Vol8, No 3, Fall 89
DOCID: 3021075 REF ID:A525813 4b) ( 3 ) - P . L . 8 6 - 3 6
Keyword I Title Author Reference . -
Internet Internet: Opportunity and Challenge for the Information Services Organization a t the National Security Agency (U)
1
Ionosphere
1 0 s
IPB
Iran
I Tejiendo la Red Telarana (Weaving the World Wide Web) (U)
Artificial Ionospheric Modification: Cerson. N. C. Practical and Potential Applications (U)
Communications and the Ionosphere Gerson, N. C.
7 The National OPSEC Program, The (U)
Intelligence Preparation of the Battlefield: How Can NSA Improve Its Contributions to the IPB Process? (UI
Bwk Review: Sacred Rage: The Crusade of Modern Islam (U) ~ Iranian Islamic Revolutionary Guard Corps: "Khomeini's KGM," The (U) I
ISDN I Digital Subscriber Loops (U) I Iterative
improvement
Japan
Simulated Annealing and Iterative Improvement: An Experimental .
Comparison (U)
Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)
Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)
I I Book Reuiew: Infamy: Pearl Harbor and Its Aftermath (U)
Book Review: Invasion of Japan: Alternative to the Bomb, The (U)
I
Nolte, William M.
Johnson, Thomas R.
Vol. 15, No. 4, Winter 96
Vol. 15, No. 4, Winter 96
Vol9, No 1, Spr 90
Vol 1, No 4, Win 83
Vol. 11, No. 3, Fall 92
Vol. 12, No. 2, Summer 93
Vol6, NOS 3-4, Fall-Win 87-88
Vol 4, No 4, Win 86
Vol. 15, No. 1, Spring 96
Vol. 12, No. 1, Spring 93
Vol4, No 3, Fall 85
Vol5, Nos 1-2, Spr-Sum 86
Vol 1, Nos 2-3, Sum-Fall 82
Vol. 14, No. 2, Summer 95
I Title Author
I
Keyword
DOCID: 3021075
Book Reuiew: Listening to the Enemy: Key Documente on the Role of Communications Intelligence in the War with Japan (U)
Book Reuiew: Shadows of the Rising Sun: A Critical View of the "Japanese Miracle" (U)
JN-25 Naval Code
KAL 007
Kent. Sherman A.
KGB
Book Review: Yen! Japan's New Financial Empire and Its Threat to America (UI
I High-Tech Trade War with Japan: Jelen, George F. Can Anyone Win?, The (U)
New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)
Riceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
Red and Purple: A Story Retold (Zn
Translating by the Seat of Your Pants: Some Observations about the
I Diffculties of Translation and How to Deal with Them (U) 1 Uncertain Summer of 1945, The (U) Wiley, Edward
Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)
7 Shootdown: A View from
I
Reflection of Sherman Kent, A (U) Gaddy, David W.
I Book Review: KGB: The Secret Work of Soviet Secret Agents (U)
Reference
Vol7, No 1, Spr 88
Vol3, NOS 1-2, Spr-Sum 84
Vol8, No 1, Spr 89
Vol 5, NOS 1-2, Spr-Sum 86
Vol6, No 3, Fall 86
Vol9, No 4, Win 91
Vol9, No 2, Sum 90
Vol3, NOS 3-4, Fall- Win 84-85
Vol3, Nos 1-2, Spr-Sum 84
Vol. 14, No. 1, Spring 95
Vol. 11, No. 2, Summer 92
Vol. 12, Nos. 3-4, FalWinter 93
Vo15. Nos 1-2, Spr-Sum 86
Vol5, Nos 1-2, Spr-Sum 86
I DOCID: 3021075 REF ID:A525813 [k) ( 3 ) - P . 1 . 86-36 -
Keyword I Title
Knowledge acquisition
Korea
Korean War
Language
I Book Review: KGB Today: The Hidden Hand (U)
I Book Review: The New KGB: Engine of Soviet Power (Ul
I Book Review: The New KGB: Engine of Soviet Power (U)
Structufed Knowledge Acquisition Techniques (U)
Requiem for TEAM SPIRIT. A (U)
Command the PRC Intervention in the Korean W a r f s e W F
ACQUAINTANCE: A Tool for Language Identification (U)
Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese. An (U)
Challenges Encountered by Teachers and Learners of a Second Language
Computer Scripting of Arabic: Not the Impossible D r e a m t 9 8 8 8 t
Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)
I Foreign Language Proficiency Maintenance (U)
Identifying Spoken Languages: A Community Pmblem Whose Time Has Come (U)
I Ideograph Writing Patterns and Computer Input (U)
Author Reference
Vol5, Nos 1-2, Spr-Sum 86
Vol5, Nos 1-2, Spr-Sum 86
Vol5, Noe 1-2, Spr-Sum 86
Vol 1, No 1,. Spr 82
Vol11, No 1, Spr 92
Vol. 11, No. 2, Summer 92
Vanderpaol, Guy R. Vol. 15, No. 2, Summer 96
Vol7, No 4, Win 89
Vol4, No 3, Fall 85
Vol4, No 4, Win 8%
Vol2,83 (CS Issue)
Vol. 14, No. 3, Fall 96
Vol7. No 3, Fall 88
Vol. 15. No. 3, Fall 96
Vol4, No 3, Fall 85
t ( )-50 USC 403
REF 1~:~525$i$- (b)(3~-P.L. 18 usc 86-36 138
Keyword I Title Author - - -
I --
Impressions of the 1995 American Tramlators' Association Conference in Nashville as Viewed from the Perspective of th (U) 0 I In Defense of Translation (U)
I Integrative Language Testing (U)
Korean Phonology System: An Automated Canguage Information Aid for Transcribers, The (U)
Lanjjuage Expert System: Squeezing Gurin, Jacob (Jack) the Expert Linguist into a Computer (UI
Language Identification EU)
Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesis (U)
I Cognitive Knowledge (U) I I On Perverted Priorities (U) L Spoken Language Library: A Unique Gurin, Jacob (Jack) Institution (U)
Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them (U)
u I Unofficial Vocabulary (U) Hatch, David A.
Where there's a will.. . (U)
Reference
Vol. 15, No. 1, Spring 96
Vol4, No 2, Sum 85
Vol4, No 1, Fall 85
Vol8, No 1, Spr 89
Vol4, No 1, Spr 85
Vol. 15, No. 3, Fa11 96
Vol10, No 1, Spr 91
Vol6, No 2, Sum 87
Vol4, No 1, Spr 85
Voi 3. Nos 1-2, Spr-Sum 84
Vol5, No 3, Fall 86
Vol3, Nos 1-2, Spr-Sum 84
Vol 10, Nos 3-4, Fall-Win 91
Vol3. Nos 1-2, Spr-Sum 84
REF IDzA525813 (k) ( 3 ) - P . L . 86-36
I Keyword Title Author Reference
You've Got to Go by the Rules (U) Gurin, Jacob (Jack) Vol2, Nos 3-4, Fall-Win 83-84
Language dictionary Dictionary Searching by Syllabification and Syllable Indexing
Language (Korean) I
Language modeling
Language testing
Language training
Laser signals
Latin america
The Romanization of the Korean Language Based on the Character Values (U)
ART: The Linked-Letter Language Model Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text, A (U)
Closer Look a t the First Russian Language Proficiency Test, A (U)
Four-Power Conference: Looking at a Few Unique Translations from NSA's First Russian Language Proficiency Test, The (U)
Language Cross-Training: Alternatives and Permutations (U)
Language Multimedia -A Makeover ,
(U)
DEFSMAC: The Future Is Now (U)
( Domain Name Service (Ul
I Tejiendo la Red Telarana (Weaving the World Wide Web) (U)
I Lessons learned I NSASs Lessons Learned Program (U)
Library Decade of Information Service at FANX, A (U)
Vol. 11, No. 2, Summer 92
Vol 10, Nos 3-4, Fall-Win 91
Vol11, No 1, Spr 92
Vol9, No 3, Fall 90
Vol. 12, No. 2, Summer 93.
Vol. 13, No. 1, Spring 94
Vol. 11, No. 3, Fall 92
Vol. 13, No. 2, Summer 94
Vol. 13, No. 1, Spring 94
Vol. 14, No. 2, Summer 95
Vol7, No 2, Sum 88
Vol. 16, No. 4, Winter 96
Vol. 14, No. 3, Fall 95
Vo18, No 3, Fall 89
DOCID: 3021075 REF ID:A525813
Keyword I Title
Linguistic
Linguistics
Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)
Book Review: Vietnam Spook Show (U)
In Defense of Translation (U)
Book Review: Breaking the Maya Code (U)
Authar Reference
Vol4, No 2, Sum 85
1
Hatch, David A. Vol. 13, No. 1, Spring 94
Vol4, No 3, Fall 85
Vol11, No 1, Spr 92
Language Cross-Training: Alternatives and Permutations (U)
Vol. 11, No. 3, I Fall 92 I I
Language Expert System: Squeezing Gurin, Jacob (Jack) Vol4, No 1, the Expert Linguist into a Computer Spr 85 (U)
Linguistic "Funny," A (U)
Obscenities in COMINT: A Need for Cognitive Knowledge (U)
I On Perverted Priorities (U)
Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them (U)
Link encryption ( In Pursuit of a SONET Link Encryptor
Lithograph I Introduction to Optical Lithography Modeling (U)
I Introduction to Optical Projection Lithography Tools (U)
Introduction to Positive Photoresist , Processing (U)
Nearest Lattice Point Problem, The 1 (U1
Vol5, Nos 1-2, Spr-Sum 86
Vol4, No 1, Spr 85
Vol3, NOS 1-2, Spr-Sum 84
Vol3, Nos 1-2, Spr-Sum 84
Vol10, No 1, Spr 91
Vol6, NOS 3-4, Fall-Win 87-88
Vol8, No 1, Spr 89
Vol6, No 2, Spr 85
Vol. 16, Special Edition 96
DOCID: 3021075 (I= ) (1) ID) (31-50 iJSC 403 ib) (31-18 USC 798 (b) (3)-P.L. 86-36
Key word 1
REF IDgA525813
(b) ( 3 ) - P . L . 3 6 - 3 6
Title Author
Logic Parallel Tausworthe Generator, The
Magic
Magnetic tape recorders
Management
I Book Review: The Ultra-Magic Deals and the Most Secret Relationship (U)
NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)
Artificial Intelligence and Expert Systems: Do They Have a Future in Management? (Ul
I BILLY Data BasePTasking Management System Intervals (U)
Book Review: Ropes to Skip and the Ropes to Know: The Inner Life of an Organization (U)
Book Review: The Clash of Cultures: Nolte, William M. Managers and Professionals (U)
I Bringing User Power to the High Performance Workstation (U)
Business Manager and Business Communications, The (U)
I Challenges and Opportunities (U)
Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process. The (U)
I Creativity: Can It Be Taught? (U)
Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)
Reference
Vol 1, No 1, Spr 82
Vol. 15, Special Edition 96
Vol. 12, Nos. 3-4, FalVWinter 93
Voi. 15, No. 1, Spring 96
Vol9, No 2, Sum 90
Vol8, No 3, Fall 89
Vol6, Nos 3-4, Fall-Win 87-88
Vol7, No 2, Sum 88
Vol9, No 2, Sum 90
Vol11,No1, Spr 92
Vol 10, Nos 3-4, Fall-Win 91
Vol. 11, No. 2;; Summer 92
Vol. 13, No. 4, Winter 94
Vo19, No 1, Spr 90
Keyword 1 Title
1
I
REF IDzA525813
( b ) 3 ) - P . L . 8 6 - 3 6
DOCID: 3021075
(bl ( 1 : :hi 1 3 , -50 113il ,111.3 (h; (3;-18 lJ:;C 798 (h! ( 3 : - P . L . 86-36
Author Reference
I Essential Difference, The (U) I Vol5; NO 4, Win 87
Hypermedia Implemented in Objectr Oriented Database Management Systems (U)
I Integrating Strategic Planning and Quality Initiatives (U)
Intelligence: A Business or a Craft (UI
Looking Ahead to the 1990% (U)
Vol. 14, No. 1, Spring 95
I Management of TDY Funds: A Graphical Aproach (U)
I Managerial Track, The (U) I
Unknown Author Vol5, Nos 1-2, Spr-Sum 86
Managing Change (U)
I Managing the Future (U) I Middle Management and the Soviet Problem: Some RefIectionsW
I OJE: On the Job Enthusiasm A Layman's Perspective (U) I On-theJob Training: A Supervisor's Responsibility (U) I
Application as a Knowledge-Based Mission Management System, An (U)
I Pachydermic Personality Prediction Profile (U) I I Parable of the Tail with No Teeth (U) I
Vol2,83 CS Issue)
Vol 10, NOS 3-4, Fall-Win 91
Vol11, No 1. Spr 92
Vol4, No 1, Spr 85
Vol2, Nos 1-2, Spr-Sum 83
Vol7, No 2, Sum 88
Vol8, No 1, Spr 89
Vol9, No 3, Fall 90
Vol8, No 1, Spr 89
Vo17, No 2, Sum 88
Vol7.No 1, Spr 88
REF IDzA525813 (~1(3)-?.L. 8 6 - 3 6
I
1 Keyword I Title
DOCID: 3021075
Parable of the Tail with No Teeth Part 11: Into the Teeth of the Tale (U)
Parable of the Tail with No Teeth Part 111: The Training Tale that Wagged the Teeth (U)
Parable of the Tail with No Teeth Part IV: The Tarnished Teeth of the Golden Tail (U)
Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U)
" .
Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (U)
So Where Do the Analysts Come From? (U)
Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail (U)
Strategic Management and Mid- Level Managers - Is There a Link? (U)
I Tech Track: Will It Work? IU)
I Ten Rules to Avoid Planning Foul- Ups (U) I
I Too Many Cryptologic Eggs in One Basket (U) I TURBOTECH: An Architecture Management and Analysis System (U)
Twenty Questions to Evaluate Your Manager (U)
1 Volunteering: A Fresh Approach (U) I
Author
I Warning and Crisis Management (U) McManis, David Y.
Reference
Vol8, No 2, Sum 89
Vol8, No 4, Win 90
Vol9, No 3, Fall 90
Vol10, NO$ 3-4, Fall-Win 91
Vol. 11, No. 2, Summer 92
Vol. 11, No. 4, Winter 92
Vol. 12, Kos. 3-4, FalU Winter 93
Vol. 12, No. 1, Spring 93
Vol7, No 1, Spr 88
Vol8, No 1, Spr 89
Vol7, No 1, Spr 88
Vol8, KO 4, Win 90
Vol6, No 1, Spr 87
Vol8, No 1, Spr 89
Vol2, Nos 3-4, Fall-W in 83-84
DOCID: 3021075 REF ID:A525813
b)(3)-50 USC 403 (b) (31-18 USC 798 fb) (3)-P.L. 86-36 -
K e y d 1 Title AuCbor Reference
Maps
Mathematics
I With Pail and Shovel: The "Sandbox Aproaehn to Management and Leadership (U)
Work Force Skille and Miiion Requirements Comparison System (U)
Book Review: Drawing the Line: Tales of Mape and Cartocontroversy (U)
I ACQUAINTANCE: A Tool for Language Identifleation (U)
I Book Review: Doe# God Play Dm? The Mathematics of Chaos (U)
I Channel Capacity Algorithm (U)
Connect the Dots: Th Aid to Studying
Digital Voice Compreesion Algorithm with Robust Properties, A (U)
Generalized GMW Sequences and an Application to Frequency Hopping (U) I listing AlgorithmN)
Mathematics: A Challenge for Business, Government, and Academia (U)
Nearest Lattice Point Problem, The I (U) Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twins and the Complexity of Intelligence Analysis (U)
Vol5, No 4, Win 86
Val. 14, No. 1, Spring 95
Vol. 14, No.4, I winter95
Val?, No.4 Win 89
Vol 986 (CAIme) .
Vol8, No 4, Win 90
Vol2, NOB 1-2, Spr-Sum 83
Vol7, No 4, Win 89
Vol2, Nos 1-2, Spr-Sum 83
Vol3, Nos 1-2, I Spr-sumw
Vol8, Nos 3-4, Fall-Win 83-84
Studeman, W. O., VADM, Vol2, No 2, USN Sum 89
Vol. 26, Special Edition 96
Vol8, No 3, Fall 89
, DOCID: 3021075 REF IDzA525813
Keyword I Title Author Reference
I On the Selection Mechanidm for Pseudonoise Sequences (U)
Parallel Tausworthe Generator, The 1 (UI 1 " ' ) 13)-50 USC 403 i t , ) (31-18 usc 798 I-paldo's h u m (U) i L ) (3)-P.L. 86-36
Maya code ' Book Review: Breaking the Maya Code (U)
Hatch, David A.
Memory devices 8 Microeledronics
1 Microprocessor
Microwaves
Middle East
I CRYPTRONICS or Cryptanalysis and Cryptography in Microelectronics (U)
I Shallow Junction Formation in Silicon Using Ion Implantation (U)
Programmable COMSEC and the CYPRIS Crypto-Microprocessor (U)
I RISC Does Windows (U)
I Attempted Imposition of Sharia on the Sudan. The (U)
I Begin and Arafat (U)
I Book Review: Concise History of the Middle East, A (U)
I Book Review: Essays on Strategy (U)
Book Review: Master Terrorist: The True Story behind Abu Nidhal. The (U)
I Saered Rage: The Crusade of X d e r n Islam (U)
Vol8, No 2, Sum 89
Vol1,No 1, Spr 82
Vol7. No 4, Win 89
Vol4, No 1, Spr 85
Vol. 13, No. 1, Spring 94
Vol9, No 3, Fall 90
Vol. 15, Special Edition 96
Vol5, No 4, Win 86
Vol9, No 1, Spr 90
Vol8, No 3, Fall 89
Vol. 11, No. 3, Fall 92
Vol4, No 2, Sum 85
Vol2, Nos 1-2, Spr-Sum 83
Vol4, No 1, Spr 85
Vol5, No 3, Fall 86
Vol6, No 1, Spr 87
Vol8, Noe 3-4, Fall-Win 87-88
DOCID: 3021075
Keyword
Midway, Battle of
Military forces
Military policy
Military strategy
Military theory
MILKBUSH
REF I D : A 5 2 5 u & ) - p . ~ . 86-36
Title Author Reference
ranian Islamic Revolutionary Guard lorps: "Khomeini's KGM," The (U) I ran-Iraq War: Regional Implications ~ n d Alternatives for Resolution, The U)
Long Live the King (U) Becker, Gene
Moscow's Realignment with Cairo: A Look at Gorbachev's New Political rhinking (U)
Revisiting the Dispute over the [dentification of "AF" as Midway (U)
Book Review: History of the German General Staff (U)
Book Reuiew: Straw Giant, The (U)
Book Reuiew: To Arm A Nation (U)
Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)
Soviet "Scientific" Approach'to Military Strategy: Strength or Weakness?, The (L')
Book Review: Citizens and Soldiers (U)
Book Reuiew: Mask of Command, The (U)
Book Review: America's Military Revolution: Strategy and Structure &r the Cold War (UI
Book Reuiew: Clausewitz (U)
MILKBUSH: Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)
Vol4, No 4, Win 86
Vol7, No 2, Sum 88
Vol. 15, Special Edition 96
Vol8, No 4, Win 90
Vol. 13, No. 4, Winter 94
Vol8, No 3, Fall 89
Vol9, No 4, Win 91
Vol8, No 2, Sum 89
Vol8. No 2. Sum 89
Vol9, No 1, Spr 90
VOI 6, NOS 3-4, Fall-Win 87-88
Vol9, No 2, Sum 90
Vol. 13, No. 1, Spring 94
Vol 6, No 2. Sum 87
Vol. 15, No. 3, Fall 96
REF IDzA525813 ;(b) (3) - P . L . 86-36
I
I
I
Keyword I Title Author Reference
DOCID: 3021075
Modem errors
Modular arithmetic
Morse
Multichip modules (MCM)
Multidisciplinary interaction
National Intelligence Estimates
National Time Sensitive System
Nearest lattice point problem
Network management
Neural networks
Neutrinos
Nontraditional targets
NSA
NSC DX router
Modem Error Correction (UI I I Modular Arithmetic in Hardware (U) I I Morse Mechanization (U) I Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)
Multidisciplinary Interaction: The Time Is Now! (U)
Vol. 13, No. 4, Winter 94
Vol. 11, No. 4, Winter 92
Vo1.15, No. 2, Summer 96
Vol. 15, No. 1, Spring 96
Vol. 15, Special Edition 96
I SINIOs, NSA, and the National Nolte, William M. Vol9, No 1, Estimates Process (U) Spr 90
NTSS - Yesterday, Today and Tomorrow (U)
Nearest Lattice Point Pr~blem, The 1 lUl Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)
Applications of Nonsymbolic Artificial Intelligence: Neural Networks (U)
Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)
Theoretical Implications of a Second Spectrum (U)
Approach to Isolating Nontraditional Targets (L')
Move, or How NSA Came to Fort
1 Meade, The (U)
Network System's Data Exchange (DX) IP Router: NSC's Product in Review (U)
Vol. 13, No. 2, Summer 94
Vol. 15, Special Edition 96
Vol. 11, No. 3, Fall 92
Vol9, No 4, Win 91
Vol. 11, No. 3, Fall 92
Vol8, No 3, Fall 89
Vol. 13, No. 3, Fall 94
Vol. 14, No. 2, Summer 95
Vol. 12, No. 1, Winter 93
DOCID: 3021075 REF ID:A525813
( b ) ( 3 ) - P . L . 8 6 - 3 6
Keyword 1 Title Author Reference
Object-oriented software
Object-oriented techniques
Object-oriented technology
Oil
Open systems
OPSEC
Optical
Introduction to ObjecbOriented Software Deeign and Development and Its Application a t NSA, An (U)
Object-Oriented Programming with C+ + (U) Combining Distributed Computing and Object-Oriented Technique8 (U)
Applying Object Technology to Our CMVER Network (U)
Soviet Oil Production: Energy Balance Rospects for the Future (Ul
Information System Security Engineering: Application Customer Focused (U)
National OffeC Program, The (U)
Introduction to Optical Lithography Modeling (Ul
Introduction to Optical Projection Lithography Tools (U)
Introduction to Positive Photoresist
Vol. 12, Nos. 3-4, FalYWinter 93
Vo1.12, Nos. 3-4, FalVWinter 93
Vol. 15, No. 1, Spring !J6
Vol. 12, No. 2, Summer 93
Vol4, No 2, Sum 85
Vol. 11, No. 3, Fall 92
Vol. 11, No. 3, Fall 92
Vole, Nos 3-4, Fall-Win 87-88
Vol8, No 1, Spr 89
Vol6, No 2, Spr 85
Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)
Optical SIGINT Collectors (U)
ibi (1)
Vol10, No 1, Spr 91
Vol8. No 2, Sum 89
Vol3, Nos 1-2, Spr-Sum 84
Vol. 15, No. 2, Summer 96
Vol 10, Nos 3-4, Fall-Win 91
Vol. 13, No. 4, Winter 94
(bj(3j-50 USC 403 ibj(3)-18 USC 798 [bj (3)-P.L. 86-36
148
REF IDtA525813
Title Author -
Communist Carol, A (U)
Reference Keyword
Parody Voi 6, Nos 3-4, Fall-Win 87-88
Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)
Pearl Harbor Vol6, Nos 1-2, Spr-Sum 06
Book Review: Infamy: Pearl Harbor Nolte, William M. and Its Aftermath (U)
New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (u) 1
Vol 1, Nos 2-3, Sum-Fall 82
Vol5, No 3, Fall 86
Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)
Voi. 11, No. 2, Summer 92
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
Vol9, No 2, Sum 90
What Every Cryptologist Should Johnson, Thomas R. Know about Pearl Harbor (U)
Introduction to a Historic Computer 7 1 Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)
Vol6, No 2, Sum 87
Pendergrass, J. T. Vol. 13, No. 4. Winter 94
Debunking Some Old Myths about Critical-Grade Promotions (U)
Performance Vol 1, No 1, Spr 82
Personal computer I PCSE: A Design Implementation for PC Security (U)
Vol8, No 2, Sum 89
Personalities ,
Vol10, No 1, Spr 91 I Military Intelligence Corps Hall of I d
Fame (U)
Personality I John H. Tiltman: A Reminiscence (U) Lutwiniak, William Vol 1, Nos 2-3, Sum-Fall 82
I Passing of an Extraordinary Man, The (U)
Vol4, No 3, Fall 85
(Reflection of Sherman Kent, A (U) Gaddy, David W. Vol5, Nos 1-2, Spr-Sum 86
Vol5, Nos 1-2, Spr- Sum 86
Photo- reconnaissance
$%lka~c 03021075 ' 0 1 (3;-18 USC 798
REF ID:A525813 (b) ( 3 : - P . L . 86-36 ':(b) ( 3 ) - P . L . 8 6 - 3 6
Keyword I Title Author Reference
Vol6, No 2, Spr 85
Photoresist
I Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (U) I
F
Introduction to Positive Photoresist Processing (U)
Vol 7, No 2, Sum 88
Vol. 11, No. 2, Summer 92
Pinyin dictionary
Polyinstantiakion Inference Through P o l y i n a t i o n I 1 lUl
Dictionary Searching by Syllabication and Syllable Indexing (U)
VoI. 11, No. 4, Winter 92
POSTCARD I Project POSTCARD (U) Hanyok, Robert Vol. 13, No. 3, Fall 94
Post-Cold War I Facing the Post-Cold War Era (U) Molte, William M. Vol. 11, No. 4, Winter 92
I Role of Intelligence in the Post-Cold War World, The (U) m Vol.' 11, No. 2,
Summer 92
I Book Review: Inside Hanoi's Secret Hanyok, Robert J. Archives (U)
Vol. 25, No. 1, Spring 96
Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)
Procurement Vol9, No 1, Spr 90
Developing Effective User Documentation (U)
Vol6, No 1, Spr 87
Programmer
Debunking Some Old Myths about Critical-Grade Promotions (U)
Vol 1, No 1, Spr 82
Promotions
Value of Working Longer Hours for Promotion, The (U)
Vol. 15, No. 4, Winter 96
NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)
Vol. 15, No. 1, Spring 96
Public cryptogra~hy
Vo1.15, Special Edition 96
QUADRANT CCI Doctrine and the Simile of the Cave: Time for Enlightenment (U)
Vol9, No 4, . Win 91
Radio communications
REF ID : A5W$1-3.L. 86-36
Keyword 1 Title Author
Radio frequencies
Radio intelligence
Randomizing
Random viruses
Ranked-order filters
Receivers
Origination and Evolution of Radio Tr&c Analysis, The Period Between the Wars. The (U)
Origination and Evolution of Radio Traffic Analysis, The World War I Era, The (U)
Origination and Evolution of Radio Traffc Analysis, World War 11, The (U)
( SubHF Search and Acquisition (U)
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
Ana.lysis of the Random and Sequential Viruses (U)
Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (Ul
Data Transmissions (U)
Gerson, N.C.
NSA Signal Collection Equipment and Systems: The Early Years - Receivers (L')
v I Receiver Dynamics (U)
Recorder
Reporting Thereon (L')
Reading Between the Lines: Methods of Analysis of Soviet Military Literature (L')
Requirements I srG1NT Requirements: Before, During, and After (U)
Reference
Vol6, NOS 3-4, Fall-Win 87-88
Vol6, No 1, Spr 87
Vol7, No 4, Win 89
Vo1.13, No. 2, Summer 94
Vol9, No 2, Sum 90
Vol9, No 4, Win 91 .
Vol. 11, No. 4, Winter 92
Vol. 1 1, No. 4, Winter 92
Vol. 15, No. 3, Fall 96
Vol. 14, No. 2, Summer 95
Vol. 15, No. 4, Winter 96
Vol. 15, No. 2, Summer 96
Vol7, No 3 Fall 88
Vol4, No 3, Fall 85
Vol7, No 1, Spr 88
D ~ & E ~ : U S C ~ Q ~ 10 7 5 (b: (3)-18 USC 748 !b: [ 3 ) - ? . L . 86-35
Keyword I Title Author Reference
Restructuring the U.S. SIGINT System Vol8, No 3, for Tomorrow's World (U) Fall 89
BINGSTOtw backbone
Risk management
Rosette Stone
Router configurations
RSA system
Russia
Safe combinations
Satellites
Search
Security
I TURBOTECH: An Architecture 1 Management and Analysis System I Perfect Router for the Backbone, A (U) I
Vol8, No 4, Win 90
Vol. 12, No. 1, spring 93
Risks of Taking Risks or What Every Vol. 15, No. 4, High School Student and NSAer Winter 96 Should Know about Taking Chances, The (U)
Rosetta Stone and Its Decipherment, Callimabos, Lambros D. Vol. 14, No. 3, Fall 95
I Perfect Router for the RINGSToNE Vol. 12, No. 1, Backbone, A (U) Spring 93
I Golden Age of Russia, The (U)
I Telephone Codes and Sale Combinations: A Deadly Duo (U) I
Vol. 15, Special Edition 96
I Vol. 13, No. 4, Winter 94
I Vol. 12, No. 1, spring 93
Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)
Sub-HF Search and Acquieition (U)
Vol. 15, Special Edition 96
Gerson, N.C. Vol. 13, No. 2, Summer 94
Book Review: Intelligence and National Security (U)
Communications Security and the Problem of Hamlet. To Be or Not to Be (U)
1
I Vol5, No 4, Win 87
V013, ~4 3-4, Fall-Win 64-85
Vol4, No 2, Sum 85
. NSA in the Cyberpunk Future: A Vol. 15, No. 3, Somewhat Educated Guess at Things Fall 96 to Come (U)
REF ID:A525813 .(bl(3)-?.L. 96-36
Keyword I Title Author
Security leaka
SED problem
Selection
Media Responsibility and National Rindakopf, Eliaabeth R. Secuity (U)
BRANFLAKE (u) r l V017, No 3, Fall 88
Vol. 13, No. 4, Winter
Machine Learning Approach to Text Type I& ntiflmtion, A (U) I
Reference
Book Review: Honorable Treachery: Hatch, David A. A History of U.S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (v)
Book Review: SIGINT Secrets: The Signals Intelligence War, 1900 to Today, The
Sequential viruses
Shootdowna
SIDESPIN
Book Review: Target is Destroyed: Johnson, Thomas R. What Really Happened to Flight 007 and What America Knew About I t , The (U)
I I
Analysis of the Random and Sequential Viaes (U)
C
Comparing visual Detection to Machine Vision for Detecting the Presence of Laser Irradiation with an Electro-Optical Device (U)
I Flight of the Condor, The (U) I L I lang Live the King (U) Becker, Gene
Vol. 13, No. 4, Winter 94
Vol. 11, No. 4, Winter 92
Vol. 12, No. 2, Summer 93
Vol. 16, No. 2, Summer 96
Vol. 13, No. 3, Fall 94
Vol. 12, No. 1, Spring 93
Vol5, No 3. ' Fall 86
Vol4, No 4, Win 86
Vol2, Nos 3-4, Fall-Win 83-84
Vol8,Nol, Spr 89
Vol10, No 1, Spr 91
Vol. 16, Special Edition 96
DOCID: 3021075
Keyword 1
REF IDzA525813
Title
Optical S~GINT Collectors (U)
I Restructuring the U.S. s 1 ~ 1 ~ ~ S y s t e r n for Tomorrow's World (U)
I SIGrNT Reporting Training: Some Suggestions for Change (U)
I TEABALL: Some Personal Observations of S~GINT a t War (UI
I Third Party Nations: Partners and 1 I I I Targets (u) I
SIGINT jargon
SIGINT doctrine
I SIGINT Talking (U)
SIGINTG~~S to War (U)
SIGINT security Mechanisms of SIGINT Technology.
SICINT support I Another Look a t TEABALL, and Where We've Gone from There (U)
Book Review: Vietnam Spook Show l (UI
A Story of
Signal analysis
Signal collection Low Noise Reception of Microwaves I (UI
Operations Management and Resource Utilization for Signals Collection Using Knowledge-Based Systems*
Johnson. Thornam R.
Hatch, David A.
Hudec, James G.
Reference
Vol3, Nos 1-2, Spr-Sum 84
Vol8, No 3, Fall 89
Vol. 11, No. 2, Summer 92
Vol9. No 4, Win 91
Vol7, No 4, Win 89
Vol. 13, No. 3. Fall 94
Vol. 12, No. 2, Summer 93
Vol6, No 2, Sum 87
Vol 11, No 1, Spr 92
Vol11, No 1, Spr 92
Vol10, Nos 3-4, Fall-Win 92
Volll , No 1, Spr 92
Vol. 15, No. 4, Winter 96
Vol. 11, No. 3, Fall 92
Vol9, No 3, Fall 90
Vol9, No 1, Spr 90
:hi (1) :b)13)-50 JSC 403 i t ) (31-18 LISC 798 :b) 13)-P.;. 86-36
REF ID:A525813 (b) ( 3 ) - P . L . 86-36
Signal processor
Keyword
Signal collection equipment
Signal routing
Title Author Reference
NSA Signal Collection Equipment Vol. 14, No.4, and Systems: The Early Years - Winter 96 Antennas (U)
Signals
Signals acquisition
Signals analysis
Signals exploitation
Signals processing
Signals transmission
Simulated annealing
Architecture and Implementation for Large Scale Distributed Multiprocessor, An (U)
Architecture and Implementation for Linear Speedup of DSP Programs, An (U) I NIKKEL I1 Signal Procensor or Getting YO~~NIKKEL'S Worth, The (U) I Modern Signal Routing (U) - 1 NSA =gnal Collection Equipment and Systems: The Early Years - Receivers (U)
Real-Time Signals Acquisition and Processing on UNIX Platforms +Feu@+ Another Look at Ranked-Order Filters, Noisy Images, and Visual Perception (U)
(Painful) Learning Experience from the Past, A (U)
Solving xa = b (mod c) for x and Undecimating Recursions (U)
TIDYTIPS 111 System Capabilities (U)
Real-Time Signals Acquisition and Processing on UNIX Platforms wax%
Case Study in UNIX
Simulated Annealing and Iterative Improvement: An Experimental Comparison (U)
I
Vol8, No 3, Fall 89
Vo1.8, No 4, Win 90
Vol7, No 1, Spr 88
Vo1.15, No. 4, Winter 96
Vol. 14, No. 2, Summer 95
Vol. 11, No. 2, Summer 92
Vol. 11, No. 4, Winter 92
1 Vol. 12, NOS. 3-4, Fa1 Win te r 93
I Vol. 11, No. 4, Winter 92
Vol. 12, No. 2, Summer 93
Vol. 11, No. 2, Summer 92 r Vol. 12, No. 1, Spring 93
Vol. 12, No. 1, Spring 93
ib) (bl(3)-50 USC 403 l b ) (31-18 USC 798 (b)(3)-P.;. 86-36
DOCID: 3021075 REF IDzA525813 ib ) ( 3 ) - P . L . 8 6 - 3 6 -
Keyword 1 Title Author Reference
Case Study in UNIX System Optimization (U)
Sinkov, Abraham
SINTER
I Vol. 12, No. 1, Spring 93
Software analysis
Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)
Multidisciplinary. Interaction: The Time Is Now! (U)
I Analysis of the Random and Sequential Viruses (U)
Vol. 14, No. 2, Summer 95
Vol. 15, Special Edition 96
Vol. 11, No. 4, Winter 92
Software Application to Cprrect the Effects of Transliteration "Errors" on Database Integrity, A (U)
Vol. 12, No. 2, Summer 93
Sohare! applications
Vol. 14, No. 1, Spring 96
Software assurance NSA. How Much Do We Really Know about the Software Capability of Our Contractors? (U)
Vol. 12, Nos. 3-4, FalVWinter 93
Introduction to Object-Oriented Sofhvare Design and Development and Its Application a t NSA, An (U)
Software design
Vol. 12, Nos. 3- 4, Fall /Winter 93 I Object-Oriented Programming with
C+ + (U) Vol. 15, No. 3, Fall 96
Software process improvement
52 Software Process Improvement Effort Measures of Value, The (U)
I Revised Capability Maturity Model for Heretics, A (U) 1 Vol. 14, No. 2,
Summer 95
I Improving Productivity in Software Prototype Developments (U)
Vol. 14, No. 3, Fall 95
Software prototype development
I GLISSADE Lessons Learned from a Rapid Prototype (U)
Vol. 13. No. 3. Fall 94
Software system design
Vol. 16, No. 3, Fall 96
Solitons Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)
Vol. 15, No. 2, Summer 96
Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U)
Somalia
(b) (31-50 USC 403 it) (31-18 USC 798
REF ID:A52581& ( 3 , - , . L . 8 6 - 3 4
Soviet cryptology
Soviet problem
I I
Origins of the Soviet Problem: A Kirby, Oliver R. Personal View. The (U)
Soviet Union ABM Treaty and the Dilemma of Indecision, The (U)
Admiral Gorshkov and Soviet Doctrine (U)
Book Review: FBI-KGB War:A Special Agent's Story, The (UI
Book Review: Inside Soviet Military Intelligence (U)
Book Review: Inside the Soviet Army / (UI I Book Review: KGB: The Secret Work of Soviet Secret Agents (U)
Reference
Vol. 16, Special Edition 96
Vol. 14, No. 3, Fall 96
Vol. 12, Nos. 3-4, FalVWinter 93
Vol. 14, No. 1, Spring 96
Vol. 13, No. 1, Spring 94
Vol. 13, No.2, Summer 94
Vol. 13, No. 3. Fall 94
Vol. 11, No. 4, Winter 92
Vol. 13, No. 4, Winter 94
Vol5, Nos 1-2, Spr-Sum 86
Vol5, No 3, Fall 86
Vol6, No 2, Sum 87
Vo15, Nos 1-2, Spr-Sum 86
Vol4, No 4, Win 86
Vol6, Nos 1-2, Spr-Sum 86
DOCID: 3021075 REF IDzA525813 '(b) ( 3 ) -P.L. 86-36
I Book Review: The New KGB: I I V0l5, NOS 1-2, Engine of Soviet Power (U) Spr-Sum 86
Keyword
I Book Review: The New KGB: Vol5, NOS 1-2, Engine of Soviet Power (U) Spr-Sum 86
Book Review: The Target ia Johnson, Thomas R. Vol5, No 3, Destroyed: What Really Happened to Fall 86 Flight OM and What America Knew About It (U)
Title Author Reference
Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds: (U)
Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)
Book Review: KGB Today: The Hidden Hand (U)
I Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Develo~ment
Val 5, Nos 1-2, Spr-Sum 86
of the Southern Soviet periphGy, An I Gorbachev in Historical Perspective
I Middle Management and the Soviet Problem: Some Ref lect ionsw
I Moscow's Realignment with Cairo: A Look at Gorbachev's New Political Thinking (U)
1 Vol3, Nos 1-2, Spr-Sum 84
Vol9, No 4, Win 91
Vol8, No 2, Sum 89
I Vol7, No 3, Fall 88
Vo18, No 4, Win 90
Vol6, No 2, Sum 87
VOI 2, NOS 1-2, Spr-Sum 83
Vol8, No 4, Win 90
. DOCID: 3021075 REF IDtA525813
(b)'3)-F.L. 66-36
v
Keyword I Title Author Reference
Vol4, No 3. Fall 85
Reading Between the Lines: Methods of Analysis of Soviet Military Literature (U) u
( b ) (lo lbi :31-50 USC 103
Soviet Military Establishment under Studernan, W.O.. VADM, Gorbachev, The (U) USN
Soviet Oil Production: Energy Balance Prospects for the Future (U)
Vol7, No 4, Win 89
Vol4, No 2, Sum 86
Vol9, No 1, Spr 90
Spaceborne
0 Vol. 13, No. 2, Summer 94
Space technology (t) 1) (t) t3)-P.L. 86-36
Space weapons
Vol. 16. Special Edition 96
Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)
Vol8, No 4, Win 90 I Space Weapons: Time for a Treaty?
(U) I I History of the TACOMETER
Development (U) Vol. 12, No. 2, Summer 93
Vol. 13, No. 3, Fall 94
Spread spectrum communication@ I Code Acquisition by Binary
Autodirective Search (U) 1 Vol. 15, Special Edition 96
SS7
SSL target location Examination of SSL Target Location Gerson, N. C. Accuracies, An (U) I Vol. 15, No. 2,
Summer 96
Vol. 12. No. 2, Summer 93
Station C I Station "C" and Fleet Radio Unit Melbourne (FRUMELI Revisited(U)
Vol. 16, No. 2, Summer 96
Statistics I Statistical Method for Quality Control of Microelectronic Chip Design, A (U)
Vol. 24, No. 1. Spring 95
Strategic planning
Vol. 12, No. 1, Spring 93
Integrating Strategic Planning and Quality Initiatives (U)
Strategic management
Strategic Management and Mid- Level Managers - Is There a Link? (U)
DOCID: 3021075 REF IDzA525813
p [b) 3 ) - F . L 86-36
Keyword 1 Title Author, Reference
SUNDIAL
I
Multidisciplinary Interaction: The Time Is Now! (U)
-
Subscriber loops Digital Subscriber Loop (U)
Vol. 15, Special Edition 96
Vol 7, No 2, Sum 88
Vol. 15, No. 1. Spring 98
Support to military operations
Supercomputers
Synthetic diamond
BILLY Data BaaeR'asking Management System Intervals (U)
System administration
I Closing Address, Frontiers in Faurer, Lincoln D., LT Vol2, Nos 1-2, Supercomputing Conference (U) GEN. USAF Spr-Sum 83
I Comments on Supercomputing (U) I Compacting the Masscomp Disk (U)
I NSA and the Supercomputer Industry (U)
Obtaining Maximum Performance in a Supercomputer Unix Enviomment (U)
I Processqr Interconnection Networks from Cayley Graphs (U)
I Supercomputer Performance (U)
I Supercomputers: Trends and Needs A Government Perspective (U)
Requiem for TEAM SPIRIT, A (U)
SIGINT Support to Military Operations: Organking for Effective Crisis/Contingency Support (U)
Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)
Domain Name Service (U)
I Vol2, Nos 1-2, Spr-Sum 83
Vo18, No 2, Sum 89
Vol. 14, No. 4, Winter 95
Vol7, No 2, Sum 88
Vol8, No 3, Fall 89
Vol3, NOS 1-2, Spr-Sum 84
Vol2, Nos 1-2, Spr-Sum 8.3
Vol. 11, No. 2, Summer 92
Vol. 12, No. 1, Spring 93
Vol. 15, No. 1, Spring 96
Vol. 14, No.2, Summer 95
DOCID: 3021075 REF IDzA525813
Keyword 1 Title Author Referenee
Systems engineering Systems Engineering Profession and ) It. Importance to NSA, T h o
I Systems The System Engineering Profession management and Its Importance to NSA, The (U)
TACOMETER I History of the TACOMETER Development, A(U)
Tactical radio I SINCGARS Software Evaluation (U) systems
TCHM NSA: How Much Do We Really Know about the SoRware Capability of Our Contractors? (U)
TEAM SPIRIT
Frequency Management - No Longer an Agency Nemesis (U)
Requiem for TEAM SPIRIT, A (U)
Telecommunications
International Telemmmunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The (U)
Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)
Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)
Telecommunications Automatic Monitoring and Control System (U)
I Watch is Set: The Evolution of the T Operations Center. The (U)
Vol. 11, No. 2, Summer 92
Teleconferencing
Vol. 11, No. 2, Summer 92
Video Teleconferencing; NSA Applications (U)
Vol. 12, No. 2, Summer 93
Vol. 13, No. 1, Sprin@I 94
Vol. 14, No. 1, Spring 95
Vol. 11, No. 2, Summer 92
Vol. 11, No. 3, Fall 92
Vol. 13, No. 2, Summer 94
Vol5, No 3, Fall 86
Vol. 15, No. 3. Fall 96
Vole, No 3, Fall 89
I Vol8, No 2, Sum d9
Vol3, Nos 3-4, Fall-Win 84-85
Vol10, No 1, Spr 91
i b ) : I ) (b) (3)-50 USC 4 C 3 ib) : 3 ) - 1 E USC 799
REF ID:A525813 (b) (5)-15 USC 7 9 5
Telephone codes
commnnications
Terms
Unofficial Vocabulary (U) Hatch, David A.
Terrorism Book Review: The Master Terrorist:
Predicting Terrorism: An Indications and Warning Model
Text searching I Rapid Text Searching For Multiple Key Strings (U)
Text type I Machine Learning Approach to Text Type Identification, A (U)
Third party I Third Party Nations: Partners and Targets (U)
TIDYTIPS ( Tromps m system Capabilities (u)
Thumbnail review Hatch, David A. Dirty Little Secrets: Military Information You're Not Supposed to Know (U)
Time edge scores c Tiltman, John H.
Reference
John H. Tiltman: A Reminiscence (U) Lutwiniak, William
-- -
Vol11, No 1, Spr 92
Vol. 12, No. 1, Spring 93
Vol9, No 4, Win 91
Val. 15, No. 4, Winter 96 .. .
Vol 10, Nos 3 4 , Fall-Win 91
Vol6, No 1, Spr 87
Vol 10, Nos 3-4, Fall-Win 91
Vol8. No 4, Win 90
Vol10, No 2, Sum 91
Vol7, No 4, Win 89
Vol. 12, No. 2, Summer 93
Vol. 12, No. 2, Summer 93
Vol 1 , Nos 2-3, Sum-Fall 82
Vol. 15, Special Edition 96
Keyword I Title Author
I
I
DOCID: 3021075 REF IDtA525813 (b) (3)-P.L. 86-36 -
Vol. 15, No. 1, Spring 96
Tordella
TQM
TRACKER
TraEic analysis
Vol. 14, No. 1, Spring 96
Dr. Louis W. Tordella, 1911-1996 (U) author unknown
Integrating Strategic Planning and Quality Initiatives (U)
TQM and Software: New Paradigme for Development and Support (U)
Accuracies, An (U)
El Examination of SSL Target Location Gerson, N. C.
-
Vol11, No 1, Spr 92
Vol. 15, No. 2, Summer 96
Training
\ b ill
Vol10, No 1. Spr 91
Development of Decision Support Analysis for Trac Analysis (U)
GOLD NUGGET Award (U)
Gold Nugget Award for Excellence in Traffic Analysis (U)
Origination and Evolution of Radio Trflic Analysis, The Period Between the Wars, The (U)
Origination and Evolution of Radio Trac Analysis, The World War I Era, The (U)
Origination and Evolution of Radio Traffic Analysis, World War 11, The (U)
Certification of the Air Force Intelligence Ofticer: What Now? (U)
Code. Train: A Computer-Based Morse Code Training Package (U)
Development of Cryptologic Training, 1949 to 1960, The (U)
Vol. 12, Nos. 3-4, FalVWinter 93
(b' (3)-53 JSC 403 (b' ( 3 ) - 1 8 [J>7(7
[h ( ? ) - ? . L A . q h ->h .
Vol. 15, No. 1, Spring 96 .
Vol. 14, No. 2, Summer 95
'Vol6, NO 3-4, Fall-Win 87-88
Vol6. No 1, Spr 87
Vol7, No 4, Win 89
Vol. 13, No. 4, Winter 94
Vol. 12, No. 2, Summer 93
Vol6, Nos 3-4, Fall-Win 87-88
Vol9, No 3, Fall 90
DOCID: 3021075 REF IDzA525813 ( b ) (3)-P.L. 8 6 - 3 6
TOP SECRET UMBRA
Keyword 1 Title Author
Effecta of Pictures on Adult Learning and Recall, The (U)
I Managel Track, The (U) I I
Transcription system
Transliteration
Transistors
Translation
On-the-Job Training: A Supervisor's Responeibility (U)
Select Yourself for War College (U)
I srclm Reporting Training. Some Suggestions for Change (U) I Some Contributions Toward a Course in C~hf~~TTranslation (U)
Use of Compressed Speech in Selecting Morse Code Operators, The (U)
Korean Phonology System: An Automated Language Information Aid for Transcribers, The (U)
Software Application to Correct the Effects of Transliteration "Errors" on Database Integrity, A (U)
Evaluation of Conventional and LDD Devices for Submicron Geometries,
I An (U) ' I
I Enhancing Auditory Perception (U)
Impressions of the 1995 American Translators' Association Conference in Nashville as Viewed from the Perspective of th m- I
Gurin, Jacob
Some Contributions Toward a Course in COMNT Translation (U)
Reference
Vol. 11, No. 2, Summer 92
Vol 10, Nos 3-4, , Fall-Win 91
Vol8, No 1, Spr 89
Vol5, No 3, Fall 86
Vol. 11, No. 2, Summer 92
Vol9, No 4, Win 91
Vol 1, Nos 2-3, Sum-Fall 82
Vol8, No 3, Spr 89
Vol6, No 2, Sum 87
Vol. 12, No. 2, Summer 93
Vol 1, Nos 2-3, Sum- Fall 82
Vol. 15, No. 1, Spring 96
Vol9, No 4, Win 91
DOCID: 3021075
(bl(1: (b) (3;-18 USC 798 (bi (3)-P.L. 86-36
REF IDzA525813
Key word I Title
Treaty
Tools for the Beginning Translator (U)
Translating by the Seat of Your Pants: Some Observations about the DiE~(:ulties of Translation and How to Deal with Them (U)
China: Forbidden No More? (U)
Space Weapons: Time for a Treaty? (U)
Ultra
Undecimating recursions
I
Book Review: Codebreakers: The I Inside Story of Bletchley Park (U) I Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U) ,
Book Review: ULTRA Americans: The U.S. Role in Breaking the Nazi Codes, The (U)
Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946, the (U)
I Cryptographic Mathematics of Enigma, The (U)
Solving xa = b (mod c) for x and Undecimating Recursions (LT)
Author
Filby, P.W.
Reference
V01'3, NW 1-2, Spr-Sum 84
Vol3, Nos 1-2, Spr-Sum 84
Vol. 13, No. 4, Winter 94
Vol8, No 4, Win 90
Vol. 13, No. 3, Fall 94
Vol. 13, No. 3, Fall 94
Vol. 13, No. 2, Summer 94
Vol7, No 1, Spr 88
Vol5, No 3, Fall 86
Vol. 12, Nos. 3-4, FalWinter 93
Vol. 13, No. 3, Fall 94
Vol. 11, No. 4, Winter 92
DOCID: 3021075
Keyword
UNIX
U.S. policy
USS Pueblo
Variant record
Video technology
Viet Minh
Vietnam
Vietnam problem
Vietnam War
Virtual reality
REF ID:A525813
Title
Real-Time Signals Acquisition and Processing on UNIX Platforms
A Case Study in UNIX
Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U)
I North Korean Attack on and Seizure of the USS Pueblo, The (U)
I Problem Encountered with the .
Variant Record Construct in Ada (U)
Language Multimedia - A Makeover I RI1
Reference - - -
Vol. 11, No. 2, Summer 92
Vol. 12, No. 1, Spring 93
Vol. 15, No. 2, Summer 96
Vol. 11, No. 3, Fall 92
Vol7, No 2, Sum 88
Vol. 13, No. 2, Summer 94
Guerrillas in the Mist: coadrN~and Hanyok, Robert J. Vol. 15, No. 1, the Formation and Evolution of the Spring 96 Viet Minh, 1941-45 (U)
Guerrillas in the Mist: COhll~~and Hanyok, Robert J. Vol. 15, No. 1, the Formation and Evolution of the Spring 96 Viet Minh, 194145 (U)
History of the South Vietnamese Vol. 13, No. 1, Directorate for Technical Security Spring 94 (U)
Hanyok, Robert Vol. 13, No. 3, Fall 94
Another Look a t TEABAU, and Where'We've Gone from There (U)
I Book Review: Inside Hanoi's Secret Hanyok, Robert 3. Vol. 15, No.1, Archives (U) Spring 96
Book Review: Vietnam Spook Show I RT) Deployment of the First ASA Unit to Vietnam (U)
I TEABALL: Some Personal Observations of SIGINT at War (U)
Virtual Reality (U)
Vol 11, No 1, Spr 92
Vol to, Nos 3-4, Fall-Win 91
Vol9, No 4, Win 91
Vol. 12, Nos. 3-4, FalYWinter 93
'DOCID: 3021075
Keyword
Visual learning
Volume modeling
Volume rendering
VSAT
Watch operations
Work force skills
World War I
World War I1
REF IDzA525813
(b) ( 3 ) - P . L . 8 6 - 3 6
Title Author Reference
I Effects of Pictures on Adult Learning and Recall, The (U)
* Virtual Reality (U)
I Introduction to Volume Modeling and Rendering, An (U)
Vol. 12, Nos. 3-4, FalWinter 93
I Introduction to Volume Modeling and Rendering, An (U) I Collection Challenges Represented by the Proliferation of Very Small Aperture Terminal Communications,
1 The (U)
Watch is Set: The Evolution of the T Operations Center. The (U)
I Work Force Skills and Mission I Requirements Comparison System (U)
Origination and Evolution of Radio Traffic Analysis, The World War I Era, The (U)
Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)
Book Review: Code-Name Downfall: The Secret Plan to Invade Japan - and Why Truman Dropped the Bomb (U)
Book Review: Eavesdroppers, The Johnson, Thomas R. (U 1
I Book Review: Invasion of Japan: ~ohnson, Thomas R. Alternative to the Bomb, The (U)
I Book Review: Marching Orders: The Johnson, Thomas R. Untold Story of World War I1 (U)
I Book Review: On ULTRA Active Service (U)
Origination and Evolution of &dio Traffic Analysis. World War 11, The (U)
Vol. 11, No. 2, Summer 92
Vol. 11, No. 3, Fall 92
Vol. 11, No. 3, Fall 92
Vol. 13, No. 3, Fall 94
Vol8, No 2, Sum 89
Vol. 14, No. 1, Spring 95
V016, No 1, Spr 87
Vol5, NOS 1-2, Spr-Sum 86
Vol. 15. No. 4, Winter 96
Vol. 14, No. 1, Spring 95
Vol. 14, No. 2, Summer 95
Vol. 14, No. 4, Winter 95
Vol 10, Nos 3-4, Fall-Win 91
Vol7, No 4, Win 89
DOCID: 3021075 REF 1~:~525813
Keyword
Writing
Title Author Reference -L
Mokusatsu: One Word, Two Lessons (U)
Priceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)
Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)
Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)
Revisiting the Dispute over the Identification of "AF" as Midway (U)
Vo1.14, No+4, Winter 95
Vo19, No 4, Win 91
Vol9, No 2, Sum 90
Vol. 14, No. 2, Summer 95
Vol. 13, No. 4, Winter 94
Securing Army Circuits during Rowlett, Frank B. Vole, No 1, World War 11: A Potential Disaster Spr 87 Narrowly Averted (U) . -
SIGINT and the Holocaust (U) Benson, Robert Louis Vol. 14, No. 1, Spring 95
Uncertain Summer of 1945 (U) Wiley, Edward Vol. 14, No. 1, Spring 95
World War I1 German Army Field Cipher and How We Broke It, A (U)
Book Review: On Writing Well (U)
Book Review: Technical Writers Handbook: Writing with Style and Clarity, The (U)
Book Review: Technical Writing for Beginners (U)
Vol. 14, No. 4, Winter 96
Vol7, No 3, Fall 88
Vol9, No 1, Spr 90
-.
-\ Vol4, No 4, Win \. 86