index [cryptocellar.org] · book review: artificial intelligence: theory, logic and application...

171
INDEX Spring 1982 - Winter 1996 Vol. la, NO. 1 - V0115., NO. 4 Publ~shed by the Center for Cryptolog~c History May 1997

Upload: others

Post on 27-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

INDEX Spring 1982 - Winter 1996

Vol. la, NO. 1 - V0115., NO. 4

Publ~shed by the Center for Cryptolog~c History May 1997

Russ Kick
Text Box
Brought to you by The Memory Hole: www.thememoryhole.org/nsa/bibs.htm
Page 2: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813

Note to Cryptologic Quarterly Readers

This is the second cumulatave index of Cryptologrc Qwrterly arhcles It is sorted three ways by htle of &cle, by author, and by keywords Its purpose 1s twofold to g v e readers a general view of the scope of subjects that appear in Cryptologrc Qwrterly - and thus to sbmulate the mbng of artrcles - and to provide our readership mth a means to locate artacles they may wrsh to use as general informahon on the job or as research tools for operatzonal projects We pubhsh supplements annually

We hope you find the index useful and that you will contact the Quarterly staff ~f you would like wples of an artwle You may reach the office of Cryptologu: Quarterly a t 972-2895s or 301/688-6338b If you send a wntten request for an arbcle, address ~t to Cryptologac Quarterly, S542, SAB 2, Door 22

BARRY D CARLEEN Execubve EBtor, Cryptologrc Quarterly

Page 3: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813

T i t le I naex

Page 4: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813

( b l (1) 7' fb):3)-5C USC 403 (b] i 3 ) - l R USC 7 9 E ( b ) I 3 ) - 1 ' . I , . ~ 5 - 3 6 Cryptologic Quarterly Index by Title

ACQUAINTANCE: A Tool for Language Identification (U) I

Title /

Author Reference

ADAGIO: A Modern Analog-to- DigitaUDigital-to-Analog System for the R5 CYBERNAX Research System (U)

Address Given to Annual Cryptanalysis Exchange (U)

Vol5, Nos 1-2, Spr-Sum 86

ABM Treaty and the Dilemma of Indecision, The (U)

Admiral Gorshkov and Soviet Doctrine (U)

-

Agency Electronic Printing Standards: Today It's PostScript and Interpress Page Description Languages (U)

Alpe-Adria: A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)

Analysis of a Problem common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)

Analysis of the "Lehigh" Virus (U)

Analysis of the Random and Sequential Viruses (U)

Analysis of the Vectorization Abilities of Current C Compilers, An (U)

Analysis of TRS-80 Model I Passwor Encryption Algorithm (U) 1

Vol4,85 (CS Issue)

Vol 1 ,83 (CS Issue)

I Vol 5, No 3, Fall 86

Vol9, No 3, Fall 90

Vol7, No 3, Fall 88

Vol4, No 3, Fall 85

Vol9, No 2, Sum 90

Vol. 11, No. 4, Winter 92

Vol 10, No 2, Sum 91

Vol 1, No 1, Spr 82

Vol9, No 4, Win 91

Keyword

Defense Soviet Union

Computer systems Language Mathematics

Computer software Computer systems Computer hardware

Cryptanal y sis

Soviet Union

Electronic printing

Economics International f l a i r s

Language Linguistic Japan

Computer virus

Random viruses Sequential viruses Software analysis

Computer programming

Computer software

Cryptanalysis Computer software

( b ) (3;-P.L. 86-36 - 1

Page 5: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

~ - ,

1.k~' : 1) (I,) !3)-:8 nsc 798 :b ;m@I~~~.o3302O95(& 11;

( b l ( 3 ) - P . L . 86-36 REF ID:A5258%3.= . E6-36

I b) i 3 ) -18 USC 798

Title Author

Analyzing Vague Data (U)

Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (U)

Another Look at TEABALL, and Where We've Gone from There (U) I Application of Nonsymbolic Artificial Ihtelligence: Neural Networks (U) I

Applying Object Technology to Our CLOVER Network (U)

Approach to Isolating Nontraditional Targets, An (U)

Architecture and Implementation for a Large Scale Distributed Multiprocessor, An (U)

Architecture and Implementation for Linear Speedup of DSP Programs, An (U)

Artificial Intelligence and Expert Systems: Do They Have a Future in Management? (U)

Artificial Intelligence: Approach to Cryptodiagnosis (U)

ART: The Linked-Letter Language Model A Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text (U)

Reference Keyword

Vol, 83 (CS Issue) Computer systems

Vol. 11, No. 4, Image quality Winter 92 Ranked-order filters

Signals analysis

V0111, NO 1, SIGINT Support Spr 92 Vietnam War

Vol9, No 4, Artificial Win 91 intelligence

Neural networks

Vol. 13, No. 3, Fa11 94 INPOSEC Trusted product

evaluation I I I

Vo15,86 Cryptanalysis (CA Issue) Cryptography

Mathematics

Vol. 12, No. 2, Summer 93

Vol. 13, No. 3, Fall 94

Vol8, No 3, Fall 89

CLOVER Object-oriented

technology

ontra itiona 4 n - J targets

Computer networks Signal processor

Vol8, No 4, Computer networks Win 90 Signal processor

Vol9, No 2, Artificial Sum 90 intelligence

Management

Vol. 13, No. 1, Artificial Spring 94 intelligence

Cryptanalysis

Vol9, No 3, Language Modeling Fall 90

(0) (3)-P.L. 86-36

Page 6: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b i ( 1 i

$&$&Z?bi%; ra20954 (b) (1) (b) :3)-P.L. REF ID :A525813 '(b) ( 3 ) - P . L . 86-36

(b, ( 3 ) - E . L . 86-25 86-36

Title I Author Reference Keyword

Practical and Potential Applications (U)

Attempted Imposition of Sharia on the Sudan, The (U) I

-1~ro~ram Overview: History, Status, and Directions (U)

Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945fseee)

Vol9, No 1, Communications Spr 90 Ionosphere

1 Vol4, WQ 2, Middle East Sum 85

Begin and Arafat (U)

1I

Vol10, No 1, Computer Security Spr 91 COMSEC

Vol. 12, Cryptologic history Nos. 3-4, Fall/ Soviet problem Winter 1993

c Beyond Codes and Ciphers: The Expanded Meaning of Cryptology in the Late Twentieth Century (U)

Beyond "DRAGONS LAIR" (U) I Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)

Vol2, Nos 1-2, Middle East Spr-Sum 83

VO~. 14, NO. 1, BOURBON Spring 95 Cryptologic history

Soviet problem

Nolte, William M. Vol S, No 4, C V P ~ ~ O ~ Y Win 90 History

I

I Vol4.85 Computer systems (CS Issue)

Vol. 11, No. 3, Network Fall 92 management

Neural networks Telecommunications

BILLY Data Basemasking Vol8, No 3, Data base Management System Intervals (U) Fall 89 management

Supercomputer

Book Review: A Century of Spies: Intelligence in the Twentieth Century (U)

Book Review: Alan Turing: The Enigma (U)

Book Review: American Black Chamber, The (U)

Johnson, Thomas R. Vol. 15, No. 3, Fa11 96 Book review Intelligence

Mowry, David P. Vol2, Nos 3-4, Book review Fall-Win 83-84 Cryptanalysis

Enigma History

Black Chamber Book review Cryptanal ysia History

Page 7: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 (b (3 - P . L 86-36

Title

Book Review: America's Military Revolution: Strategy and Structure af'ter the Cold War (U)

Book Review: "And i Was There": Pearl Harbor and Midway - Breaking the Secrets (U)

Book Review: Artificial Intelligence: Theory, Logic and Application (L')

Author Reference Keyword

Vol. 13, No.1, Book review Spring 94 Cold War

Military strategy

Vol5, Nos 1-2, Book' review Spr-Sum 86 History

Japan Pearl Harbor World War I1

Vol5, No 3, Book review Fall 86 M i c i a 1

intelligence

Book Review: Atom Bomb Spies, The Vol6, N<#i 3-4, Book review (U) Fall-Win 87-88 Espionage

Book Review: Black Cipher (U) Vol. 14, No. 4, Winter 95

Book Review: Breaking the Maya Code (U)

Book Review: British and American Approaches to Intelligence (Uf

Hatch, David A. Vol. 13, No.1, Spring 94

Book Review: Chicksands: A u Vol. 13, N0.3, Millenium of History (U) Fall 94

Book Review: CIA in Guatemala, The (U)

Book Review: Citizens and Soldiers (U)

Gronet, Richard W. Vol 1, No 4, Win 83

I Vol6, Nos 3-4. Fall-Win 87-88

Book Review: Codebreakers: The Inside Story of Bletchley Park (U)

Book Review: Clash of Cultures: Managers and Professionals, The (U)

Filby, P. W. Vol. 13, No. 2,'- Summer 94

Nolte. William M. Vol7, No 2, Sum 88

Book Review: Code-Name Downfall: Vol. 15, No. 4, Winter The Secret Plan to Invade Jaoan - h 96

Book Review: Clausewitz (U) I Vol6, No 2, Sum 87

and Why Truman Dropped &e Bomb (U)

Book review Espionage

Book review Linguistics Maya code

Book review Britain Intelligence

Book review Chicksands Field sites

Book review CIA

Book review Military policy

Book review Management

Book review Military theory

Bletchley Park Book review Enigma Ultra

Atomic bomb Book review World War I1

Page 8: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 I ( b ) ( 3 ) - P . L. 56-36

\

P

Title 1 Author Reference Keyword

Book Review: Concise History of the Middle East, A (U)

Book Reuiew: ConllIctofDuty: The U.S. Navy's Intelligence Dilemma, 1919-1945 (U)

Book Review: Designing and Programming Personal Expert Systems (U)

Book Review: Does God Play Dice? The Mathematics of Chaos (U)

Book Review: Drawing the Line: Tales of Maps and Cartocontroversy (U)

Book Reuiew: Eavesdroppers, The (U)

Book review History Middle East

Nolte, William M. Vol2, Nos 1-2, Book review Spr-Sum 83 Intelligence

Johnson, Thomas R. Vol. 14, No.1, Spring Book review 95 Australian SIGINT

WWII

Book Review: Electronic Warfare: Element of Strategy and Multiplier of Combat Power (U)

Book Review: Essays on Strategy (U)

Book Review: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)

Book Reuiew: Eyeball to Eyeball: The Inside Story of the Cuban Missile Crisis (U)

Book Review: Family Treason (U)

Book Review: FBI-KGB War: A Special Agent's Story, The (U)

Vol5, No 3, Computer Fall 86 programming

Computer systems

Vol8, No 4, Book review Win 90 Mathematics

Val. 14, No. 4, Winter Book review 95 &P

Book Reuiew: French Secret Services: From the Dreyfus Atrclir to the Gulf War, The (U)

Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Seqrets W)

Voll, Nos 2-3, Book review Sum-Fall 82 Electronic warfare

Vol5, No 3, Book review Fall 86 Human factor

Middle East

Vo14, No 3, Book review Fall 85 Ethiopia

History

Hatch, David A. Vol. 11, No. 3, Book review Fall 92 Cuban Missile Crisis

I vol6, Nos 3-4, Book review Fall-Win 87-88 Espionage

Vol6, No 2, Book review Sum 87 Espionage

Soviet Union

Hanyok, Robert J. .- . . . .Val. 15, No. 4, Winter Book review 96 French secret service

Vol. 13., No. 2, Book review Summer 94 Economic espionage

Page 9: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

Title I Author Reference Keyword

Book Review: Guardians of the Sea: History of the United States Coast Guard from 1915 to the Present (U)

Book Review: Grand Failure! The Birth and Death of Communism in the Twentieth Century, The (U)

Book Review: Haile Selassie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)

Yo1 8, No 3, Book Review Fall 89 Communism

Vol7, No 2, Book review Sum 88 History

Coast Guard

Vol4, No 4, Book review Win 86 Ethiopia

History

Book Review: History of the German Vol8, No 3, Book review General Staff (U) Fall 89 Germany

Military forces

Book Review: Infamy: Pearl Harbor Vol 1 , Nos 2-3, Book review and Its Aftermath (U) Sum-Fall 82 Japan

Pearl Harbor

Book Reviela: Informing Statecraft Vol. 12, No.2, Book review (u) Summer 93 Intelligence

community

Book Review: Honorable Treachery: A History of U.S. Intelligence, Es- pionage, and Covert Action from the American Revolution to the CIA (U)

Book Review: Inside Hanoi's Secret Archives (U)

Hatch, David A. Vol. 13, No. 3, Fa11 94 Book review Espionage SIGINT

Hanyok, Robert J. Vol. 15. No. 1. Spring 96

Book Review: Inside Soviet Military Intelligence (U)

Book Review: Inside the Soviet Army (U)

Book Review: Intelligence and National Security (U)

Book Review: International Journal of Intelligence and Counterintelligence (U)

Book Review: Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)

VOI 5, NOS 1-2, Spr-Sum 86

Vol4, No 4, Win 86

Vol5, No 4, Win 87

Vol6, Nos 3-4, Fall-Win 87-88

V015, NOS 1-2, Spr-Sum 86

Book review POWllMIA Vietnam War

Book review Intelligence Soviet Union

Book review Soviet Union

Book review Intelligence Security

Book review Counterintelligence Intelligence

Book review Artificial

intelligence

Page 10: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Title

Book Review: Invasion of Japan: Alternative to the Bomb, The (U)

Book Reuiew: KGB: The Secret Work of Soviet Secret Agents (U)

Book Review: KGB Today: The Hidden Hand tU)

Book Review: Legitimacy and Force, Vol.1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)

Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)

Book Review: Marching Orders: The Untold Story of World War II (U)

Book Review: Marketing Warfare (U)

Book Review: Mask of Command, m e (U)

Book Review: Master Terrorist, The : The True Story behind Abu Nidhal (U)

REF IDzA525813

1 Author Reference Keyword

Johnson, Thomas R. Vol. 14., No. 2, Atomic bomb Summer 95 Book review

Japan WWII

Vol5, Nos 1-2, Book review Spr-Sum 86 KGB

Soviet Union

Vol5, Nos 1-2, Book review Spr-Sum 86 KGB

Soviet Union

Vol7, No 9. Book review Win 89 International

Affairs

Vol7, No 1, Book review Spr 88 COMINT

History ULTRA

Johnson, Thomas R. Vol. 14, No. 4, Winter Book review 95 World War I1

Vol5, No 4, Book review Win 87 Economic warfare

Human factor

Vol9. No 2, History Sum 90 Military policy

Vol6, No 1, Book review Spr 87 Middle East

Terrorism

Book Review: Missing Dimension: Vol5, No 4, Book review Governments and Intelligence Win 87 Intelligence Communities in the Twentieth Century, The (U)

Book Review: The New KGB: The Engine of Soviet Power (U)

Book Review: My Silent War (UI

Book Review: Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million (U)

Hanyok, Robert J.

Book Review: One American Must I I Die (U) I

Vol. 14, No. 3, Fa11 95 Book review Espionage

Vol5, Nos 1-2, Book review Spr-Sum 86 KGB

Soviet Union

Vol. 15, No. 2, Book review Summer 96 Espionage

Vol5, No 4, Book review Win 87 Human factor

Page 11: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 - (b) (3)-P.L. %t$ ID:A525813

Title 1 Author Reference Keyword

Book Review: One Hundred Days: Val. 11, NO. 2, The Memoir8 of the Falklands Battle Summer 92 Group Commander (U)

Book review Falklands War

Book Review: On ULTRA Adive I Farley, Robert D. Vol 10, Nos 3-4, Service (U) Fall-Win 91

Australian SIGINT operations

World War I1

Book Review: On Writing Well (U) I Vol7, No 3, Fall 88

Book review Writing

Book Review: Out of the Inner Circle: A Hacker's Guide to Computer Security (U)

Vol4, No 3, Fall 85

Book review Computer security

Vol5, No 4, Win 87

Book review Human factor

Book Review: Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)

Vol2, NOS 1-2, Spr-Sum 83

Book Review: Room 40: British Naval Intelligence 1914-18 (U)

Book review History Intelligence

Book Review: Ropes to Skip and the Ropes to Know: The Imer Life of an Organization, The (U)

Vol6, NOS 3-4, Fall-Win 87-88

Book review Management

Book Review: Sacred Rage: The Crusade of Modern Islam (U)

Vol6, NOS 3-4, Fall-Win 87-88

Book review Iran Middle East

Book Review: Secrecy and I Vol4, No 3, Fall 85

Book review CIA History Intelligence

Democracy: The CIA in Transition (UI

Book Review: Shadows of the Rising Sun: A Critical View of the "Japanese Miracle" (U)

V013, NOS 1-2, Spr-Sum 84

Book review Japan

Book Review: HGINT Secrets: The Signals Intelligence War, 1900 to Today, The

Vol. 12, No. 1, Spring 93

Book review Cryptologic history SICINT

Book Review: Spywars: Espionage Val. 14, No.2, and Canada from Gouzenko to Summer 95 Glmnost (U)

Book review Canada Espionage

Book Review: Spyworld: Inside the Vol. 14, No. 1, Spring Canadian and American Intelligence 95 Establishments (U)

Book review Canada Intelligence

community

Page 12: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 ( b ) (3) - P . L . 8 6 - 3 6

( b i (11

REF ID:A525813 ;;;I:{:;: y:: :ii (b)(3j-P.L. 86-36

Title r'

Author Reference Keyword

Book Review: Straw Giant, The (U) Vol9, No 4, Book review Win 91 Military forces

Book Review: Structure and Val 9, No 3, Book review Interpretations of Computer Fall 90 Computer s o f i w m Programs (U) Computer

programming

Book Review: The Target is Destroyed. What Really Happened to Flight 007 and What America Knew About I t (U)

Book Review: The Technical Writer's Handbook : Writing with Style and Clarity (U)

Book Review: Technical Writing for Beginners (U)

Book Review: To Arm A Nation (U) I Book Review: Ultra Americans: The U.S. Role in Breaking the Nazi Codes,The (U)

Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946, The (U)

Book Review: Vietnam Spook Show (U) I Book Review: Yen! Japan's New Financial Empire and Its Threat to America (U)

BRANFLAKE (U) I

I

Bringing User Power to the High Performance Workstation (U)

Johnson, Thomas R. Vol5, No 3, Book review Fall 86 Communications

SIClNT

1 Soviet Union

Vol9, No 1, Book review Spr 90 Writing

Vol4. No 4. Book review 1 Win86 Writing

Vol8, No 2, Book review Sum 89 ' Military forces

Vol5, No 3, Book review Fall 86 History

Intelligence ULTRA

Vol. 12, Nos. 3-4. Book review FalY BRUSA agreement Winter 93 Magic

Ultra

Vol11, No 1, Linguistics Spr 92 SIGINT support

Vietnam War

Vol8, No 1, Book re view Spr 89 Japan

1 r'l. 13, No. 4, Winte

Vol10, No 1, Telephone Spr 91 Traffic analysis

I Vol9, No 2, Computer networks Sum 90 Management

BS Attitudes: How Things Work in Vol.16, No. 4, Winter Bureaucracy Bureaucracies, The (U)

Page 13: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813

Title 1 Author Reference Key word

Calculation of Threat: A Review o Intelligence Community for Indications and Warning (U)

Business Manager and Business Communications, The (U)

CAP Production Software Library User (U) I

Vol 11, No 1, Communications Spr 92 Management

CCI Doctrine and the Simile of the I Cave: Time for Enlightenment (U) 1

Certitication of the Air Force Intelligence Officer: What Now? (U)

Challenges and Opportunities (U) I and Learners of a Second Langua

Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The (u)

Channel Capacity Algorithm (U)

China: Forbidden No More? (U) I Chinese KGB, The (U)

Church Cryptogram: Birth of Ou Nation's Cryptology, The (U) 1 "Cipher" Dispatches and the Electio of 1876 (U)

Vol 1, Nos 2-3, Intelligence Sum-Fall 82

I Vol4,85 Computer software (CS Issue) Computer systems

Vol. 16, Special Edition 96

Vol11,No 1, Spr 92

Vol. 12, No. 2, Summer 93

CCI Doctrine QUADRANT

m I I

Telephone

Air Force intelligence

Training

I Vol 10, Nos 3-4, Management Fall-Win 91

Vol4, No 4, Lankwage Win 86

V01.15. No. 4. Winter

Vol. 11. No. 2. Budget process Summer 92 Computer

programming Management

Vol2, Nos 1-2, Spr-Sum 83

Vol. 13, N0.4, Winter 94

Vol 1, No 1, Spr 82

Vol6. No 2, Sum 87

Vol. 1 1, No. 3, Fall 92

Communications Mathematics

China Travel

China KGB

Cryptology

Cryptologic history

Page 14: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDgA525813

tb ) ( 3 ) - P . L . 86-36

Title

Closer Look a t the First Russian Language Proficiency Test, A (U)

Cobra Judy Acquisition, The (U) I1

Author Reference Keyword

Vol. 12, No.& Language testing Summer 93

Closing Address. F ron t ie r s i n Supercomputing Conference (U)

Code Acquisition by Binary Autodirective Search (U) I

Faurer, Lincoln D., LT Vo12, Nos 1-2, Supercomputers GEN, USAF Spr-Sum 83 I .

Code.Train: A Computer-Based Morse Code Training Package (U) I Cognitive Proceases in Software Fault Detection (U) I Collection Challenges Represented by the Proliferation of Very Small Aperture Terminal Communications, The (U)

Combining Distributed Computing and Objectoriented Techniques (U)

Vol 1, No 4, Win 83

Vol. 13, No. 3, Fa11 94 Code synchronization Spread spectrum

communications

Vol6, Nos 3-4, Computer Fall-Win 87-88 programming

Training

Vol. 11, No. 2, Cognitive process Summer 92 Computer

programming Computer software

I I Vol. 13, No. 3, Fall 94 Collection VS AT

Vol. 15, No. 1, Spring Distributed 96 computing

Object-oriented I techniques

COMINT and the PRC Intervention in Vanderpool, Guy R. the Korean Wa&S469+ I

Comments on Supercomputing (U) I

VO~. 15, NO. 2, COMINT Summer 96 Korean War

Vol 7, No 2, Sum 88

Vol2, Kos 1-2, Supercomputers Spr-Sum 83

Communications and the Ionosphere Voll,No4, Communications (LT) Win 83 HF

Ionosphere

Communications Security and the Vol3, Nos 3-4, Communications Problem of Hamlet: To Be or Not to Fall-Win 84-85 security Be (U)

Communist Carol, A (U) Vol6, Nos 3-4, Parody Fall-Win 87-88

Page 15: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

( n ; (31-50 Uh(: 4[13

DOCID: 3020954 REF IDrA525813 ( 5 ) ( 3 1 - 1 8 iLlSC 7 9 8

(~'(3)-P.L. 36 -36

Title Author Reference Keyword i

Compacting the Masscomp Disk (U)

Comparing Visual Detection to Machine Vision for Detectiag the Presence of Laser Irradiation with an Electro-Optical Device (U)

Compariaon of Long P ipe l ine Protocols (U)

Computer Graphics Database Design Aid Package, A (U)

Computerized Identification of Message Families Using Graph Theory (U)

Vol8, No 2, Digi tizirrg Sum 89 Disk

Supercomputer

Vol4, No 4, Electronits Win 86 SICINT

I Val 7, No 4, Computer software Win 89 Computer networks

I Vol2.83 Computer graphics (CS Issue) Data base

V0l8, No 2, Computer graphics Sum 89 Communications

Computer Scripting of Arabic: I I Vol2,83 Computer systems the Impossible Dream- (CS Issue) L a m w e

Computer Virus Organization: A Defmitive Taxonomy and Anatomy of Computer Viruses (U)

Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)

Computers -The Wailing Wall (U)

Conditional Sigmage Analysis and Bulge Estimation (U) I

Vol4, Sum 85 (Supplement)

Meyer, Joseph A. Vol6, Nos 3-4, Fall-Win 87-88

Connect the Dots: Th Aid to Studying

Creating an Information Space: Cyc and Carnot (U)

Computer Virus Infections: is NSA Vulnerable? (U)

Creativity: Can It Be Taught? (U)

Vol4, No 3, Fall 85

Critical Programming Support during the Persian Gulf Crisis (U)

Vol5, No 3, Fall 86

I Vol 1,83 (CA Issue)

Computer security Computer systems

Computer systems Cryptanalysis

Computer security Computer virus

Computer security Computer virus

Cryptanalysis

Vol7, No 4, Computer systems Win 89 Mathema tics

Vol. 12, Nos. 3-4, Database Fall/ management Winter 93 systems

Vol.13, No. 4, Winter Creativity Management

Vol. 12, No. 1, Critical Spring 93 programming

support DESERT SHIELWSTORM

Page 16: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

i k ) (1)

DOCID)s3~-3912()1B54 (t) (31-18 USC 798 (b)(3I-P.L. 86-36

Title I Author Reference Keyword I

CRITICOUM Management: A User Interface (U)

Vol2,83 Computer graphics (CS Issue)

Voll ,Nol, Cryptanalysis Spr 82

Cryptanalysis: A Prognosis for the Eighties (U)

.Vol. 12, Nos. 3-4, Cryptanalysis FalU Winter 93

Cryptanalysis in the United Kingdom (U)

Vol. 13, No.4, Winter computers 94 Cryptanalysis

Cryptanalytic Use of High-Speed Digital Computing Machines (U)

Vol 1.83 c r y p t o ~ r a ~ h ~ (CA Issue) Cryptology

Cryptographic Applications of Singular Value Decomposition (U) I Cryptographic Mathematia of Enigma, The (U)

Vol. 13, No. 3, Fall Ciphers 1994 Cryptanalysis

Enigma Ultra

Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)

Vol. 14, No. 3, Fa11 95 Intelligence analysis Language

Cryptologic Origin of Braille, The (U) Vol. 14, No. 3, Fa11 96 Braille Communications

Vol. 13, No. 4, Winter Crypto-TA 94

Crypto-TA: The Mighty Morphin of Technical Analysis (U) I C R Y ~ N I C S or Cryptanalysis and Cryptography in Microelectronics (U)

Vol. 16, Special Cryptanalysis Edition 96 C ~ Y P W ~ ~ ~ P ~ Y

Microelectronics

Vol3, Nos 1-2, Economics Spr-Sum 84 Soviet Union

Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)

Vol.13, No. 1, Spring Cuban Missile Crisis 94

Cuban Missile Crisis: A SIGINT Perspective, The (U) I

Vol4, No 2, Computer Sum 86 progra-ming

Computer systems

DAEMON - A FOLK- System Guardian Spirit (U)

Vol. 15, Special Edition 96

[Sensitive Title]

Data Transmissions (U) Vol. 15, No. 3, Fa11 96 Collection equipment Receivers

Vol6, No 4, Computer systems Win 87 Data Base

Database Processing with Triple Modular Redundance (U) I Dealing with the Future: The Limits of Forecasting (U)

Vol. 15, No. 3, Fa11 96 Forecasting

Page 17: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Title I Author Reference Keyword

Debunking Some Old Myths about Critical-Grade Promotions (U) Spr 82

Performance Promotion

Decade of Information Service a t FANX, A (U)

Vol8, No 3, Fall 89

Information support Library

DEFSMAC: The Future Is Now (U) Vol. 13, No.1, Spring 94

Vol 10, Nos 3-4, Fall-Win 91

DEFSMAC LANs

Deployment of the First ASA Unit to Vietnam (U)

Army Security Agency Vietnam War

Design and Evaluation of rwosEC Systems: The Computer Security Contribution to the Composition Discuseion, The (U)

Vol. 12, No. I, Spring 93

Computer security 1NM)SEC

Designers vs Users: Bridging the Communication Gap (U)

I

Computer graphics

~ a n g u a l 3 D Orthography

Vol 10, Nos 3-4, Fall-Win 91

Personal computers

Developing a Document Image Processing System (U)

Vol. 11, No. 3, Fall 92

Desktop publishing Document image

processing

Developing a Feedback Maintenance System (FMS) on Carillon (U)

Vol4,85 (CS Issue)

Communications Computer Systems

Developing Effective User Documentation (L')

Vol6, No 1, Spr 87

Programmer

Development of Communications Security Equipment, The (U)

Vo1.15, No. 2, Summer 96

COMSEC

Training Development of Ctyptologic Vol9, NO 3, Training, 1949 to 1960, The (U) and uavla A. Hatch Fall 90

Decision support Development of Decision Support Analysis for Traffic Analysis (U) systems

Trac analysis

Vol. 12. Nos. 3-4, FalU Winter 93

Development of the Transposition Pseudo-Square Technique, The (L')

I Diabolical Diagnosis (U)

Vol 1.83 (CA Issue)

Cryptanal ysis

V012, NOS 3-4, Fall-Win 83-84

Communications SIGlNT

Vol5.86 (CA Issue)

Cryptanal ysis Cipher systems

Page 18: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

' b i l 3 i - 5 0 USC 4 C j - Title 1 Author Reference Key word

Vol9, No 4, Radio Win 91 communications

-

Vol 1, Nos 2-3, Friedman, W. F. Spr-Fall82 History

Human factor

Diary of William F. Friedman, 23 April-13 June 1943. Part I (U)

Friedman, William F.

Diary of William F. Friedman, 23 April -13 June 1943, Part I1 (U)

Friedman, W. F. History Human factor

Friedman, William F. Vol 1, NO 4, W in 83

Dictionary Searching by Syllabification and Syllable Indexing (U)

Vol. 11, No. 2, Summer 92

Computer programming

Language dictionary Pinyin dictionary

Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkley UNIX (U)

Vol10, No 2, Sum 91

Computer Programming

Computer software

Digital Communications: Introduction and Trends (U)

Vol 1, No 4, Win 83

Communications

Digital Subscriber Loops (U) Vol. 15, No. 1, Spring 96

ISDN Subscriber loops

Communications Data base Mathematics

Digital Voice Compression Algorithm with Robust Properties, A (U)

Vol2, Nos 1-2, Spr-Sum 83

McConnell, Vice Vol. 12, No. 1, Admiral J.M., USN Spring 93

Director's Welcome at the 1992 Cryptologic History Symposium, The (U)

Cryptologic history

Vol7, No. 3, Fall 88

Distributed File Access Over Heterogeneous Networks (U)

Computer networks

Distributed Processing on Powerful Personal Computers: Interim Results (U)

Vol4,85 (CS Issue) Computer networks

Counterintelligence

" r

Page 19: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

,,nQCID: 3020954 (b) :3)-50 USC 405 ( u i : 3 ) - - E USC -198 ( b ) : 3 i - 2 . L . 66 -36

Title I Author Reference Keyword

DOSNNIX Interoperability and E mail in the Agency (U)

Domain Name Service (U)

Vol 11,-No 1, Computer hardware Spr 92 Computer software

Vol 10, Nos 3-4, Fall-Win 91 SIGlNT suppo

Terrorism

Vol. 14, Nb. 2, Information Summer 05 networks

LANs System

administration

Dr. Louis W. Tordella, 1911-1996 (U) author unknown I Vol. 15, No. 1, Spring 96

Effects of Optical Components on System Performance, The (U)

Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)

Effects of Pictures on Adult Learning and Recall, The (U)

Eight Cryptologic Problems (U)

, Electronic Procurement Request ' Processing: A Goal for Improved Resources Management (U)

EMC -A Field Perspective (U)

Encapsulating Xt Callback Functions in C + + (U) Enhancing Auditory Perception (U)

Vol5, Nos 1-2, Spr-Sum 86

Vol8, No 1, Spr 89

Vol. 16, No. 2, Summer 96

Vol8. No 2, Sum 89

Tordella Deputy directors

Data Base Photo-reconnais- same

Cryptologic history Soviet problem

Cryptanalysis .

SIGINT

Digital optical systems Optical fibers

Military Forces Soviet Union

Vol. 11, No. 2, Training Summer 92 Visual learning

Vol 1,83 (CA Issue) Cryptology

Vo19, No 1, Management Spr 90 Procurement

Vol8, No 4, Electronics Win 90

Vol11, No 1, Computer Spr 92 programming

Vol I, Nos 2-3, Data base Sum-Fall 82 Translation

Page 20: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b) i i )

(b) (31-5C USC 105

~ ~ ~ 6 ~ 3 0 2 0 9 5 4 REF ID:A525831-3.~. 8 6 - 3 6

Title 1 Author

Error Messages: The Importance of Good Design (U)

Essential Diierence. The (U)

Evaluation of Conventional and LDD Devices for Submicron Geometries, An (U)

Examination of SSL Target Location Accuracies, An (U)

Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery, An (U)

Examples of Lattices in Computer Security Models (U) I Expanded MAX-MIN Priority Queue, An (U) I Exploratory Exploitation (U) ,I Facing the Post-Cold War Era (U)

Fall of the Shah: A Chaotic Approach, he (U) .

Farewell Address, A (U)

FARSEEING: A Study in Expert Systems (U)

Fault Simulation Requirements for Security Fault Analysis (U)

Fiber Distributed Data Interface. The (U)

First Generation Technical Viral Defense,A (U)

Reference Keyword

Vol11, No 1, Spr 92

Vol8, No. 1, Spr 89

Vol. 15, No. 2, Summer 96

Vol7, No. 3, Fall 88

Computer Programming

Computer systems

Human factor Management . - Transistors

Nolte, William M.

Vol. 13, No. 4, Winter 94

Vol4, No 2, Sum 86

Vol8, No 2, Sum 89

Vol5, No 4, Win 87

Human factor Soviet Union

Vol4, No 4, Computer security Win 86

Vol10, No 2, Computer software Sum 91

Vol5,86 (CA Issue) Cryptanalysis

Vol. 11, No. 4, Intelligence Winter 92 community

Post-Cold War

Chaos D~namical systems Indications and

warning

Artificial intelligence

Computer systems

Computer security

Computer Networks

Vol7, No 2, Sum 88

Computer security

Computer virus

Page 21: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDtA525813

Title I Author Reference Keyword I -

First U.S. Government Manual on 1 Gaddy, David W. Vol. 11, No. 4, cryptogra~h~ Cryptologic history I

- .

Cryptography, The (U) Winter 92

Flight of the Condor, The (U) I Collection SICINT

~ L K U I R E : One Approach to Security 0

Vo1.13, No. 3, Fall 94 Computer security Cryptanalysts F'OLKLORE

Foreign Language Pdiciency Maintenance (U)

Vol. 12, No. 2, Summer 93

Cryptographic b ypase

INPOgEC

Formally Stating Cryptographic Bypass Requirements (U)

Vo1.13, No. 1, Spring 94

Four-Power Conference: Looking at a Few Unique Translations h m NSA's First Russian Language Proficiency Test, The (U)

Communications Frequency Hopping Vulnerability to Partial Band Jamming (U)

Vo11, No 1, Spr 82-

Frequency Management-No Longer an Agency Nemesis (U)

Vol. 13, No. 2, Summer 94

Frequency management

Telecommunications

DIRNSA From Chaoa Born: General Canine's First Charge to the NSA Workforce (U)

Vol6, No 2, Sum 87

Computer hardware Computer software Information support

Full-Text Searching: Coming of Age (U)

Vol8, No 3, Fall 89

Fundamentals of Electronic System Grounding (U) I I Vol 1, Nos 2-3,

Sum-Fall 82 Electronics

Further Results in Programming the I Vol6, No 1, Spr 87

Computer programming

HF

Future of Cryptology, The (U)

I I I

Meyer, Joseph A. Vol5.86 (CA Issue)

Future High Frequency Target Location System. The (U)

Future of High Frequencies in I Gerson, N.C. Vol. 11, No. 2, Cryptology - Part I, The (U) Summer 92

Gerson, N. C. Vol2, Nos 1-2, Spr-Sum 83

Cryptology HE' Communications

Future of High Frequencies in

. I Gerson, N.C. Vol. 11, No. 3, Cryptology - Part 11, The (U) Fall 92

Cryptology HF Communications

Page 22: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Title Author

Generalized GMW Sequences and an Application to Frequency Hopping (U)

Geographic Information Systems (U) I GKS: Its Comparison to Core and Its Feasibility of Use at NSA (U)

Glimpses of a Man: The Lie of Ralph J. Canine (U)

GLISSADE Lessons Learned from a Rapid Prototype (U)

Golden Age of Russia, The (U)

Corn NUGGET Award (U)

GOLD NUCGET Award for Excellence in Trac Analysis, The (U)

Gorbachev in Historical Perspective (U)

I 1 GRAFMAKER: A Powerful Business Graphics Tool (U)

Graphic User Interface for the Transcriber-Analyst, A (U) I

Reference Keyword

~01.15, No. 1, Spring Holographic camera INFOSEC

Vol 3, Nos 1-2, Electronics Spt-Sum 84 Engineering

Mathematics

I Val 10, Nos 3-4, Computer systems Fall-Win 91 I&rmation support

I Vol7, No 2, Computer Sum 88 Graphics

Vol6, No 2, Biography Sum 87 DIRNSA

Vol. 13, No. 3, Fall 94 GLISSADE Software system design

Vol. 13, No. 4, Winter Holbrook, James I 94 Russia

Vol. 15, No. 1, Spring COMINT 96 COLD NUGGET

TrafZic analysis

I Vol. 14, No. 2, GOLD NUGGET sum me^ 95 Tragic analysis

Vo18, No 4, Gorbaehev, Mikhail Win 90 History

Soviet Union

I Vol6, No 2, Sum 87

Vol4.85 Computer graphics (CS Issue) Computer software

Guerrillas in the Mist: C 0 ~ 1 ~ T a n d the Formation and Evolution of the Viet Minh, 1941-45 (U)

Handy-Dandy Field Site History: Fifty Years of Field Operations, 1946-1995, The (U)

HFDF Research Attempts: Past and Future (U)

I Vol2,83 Computer graphics (CS Issue) Computer systems

Hanyok, Robert d. Vol. 15, No. 1, Spring Viet,Minh 96 Vietnam

Johnson, Thomas R. Vol. 14, No. 1, Spring Cryptologic history 1995 Field sites

Gerson, N.C. Vol 1 , Nos 2-3, HF Sum-Fall 82

Page 23: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

D@C!JJD: 3 0 2 0 9 5 4 (b) (3)-P.L. 8 6 - 3 6

Title -- -- -- -

High-Altitude Electromagnetic Pulae (HEMP): "A Sleeping Electronic Intruder ," The (U)

High-Tech Trade War with Japan: Can Anyone Win?, The (U)

Historical Intelligence Production Problems: Is Technology the Answer? (U1

History of the South Vietnamese Directorate for Technical Security (U)

History of the TACOMETER Development, A (U)

Hitler Gambit Versus the Great Anyway, The (U)

HoIistic Analysis (U)

Hot Carrier E f f ~ t s on VLSI Devices (U)

Human Visual Perception and Man- Computer Interaction (U)

HYPERCHANNEL: It8 Applications h ASHLAND'S Architecture (U)

Hypermedia Implemented in Object- Oriented Database Management ,

Systems (U)

Icon: An Enhancement to the UNIX Language Hierarchy (U)

Identifying Spoken Languages: A Community Problem Whose Time Has Come (L')

Ideograph Writing Patterns and Computer Input (U)

If Cryptanalysis Is What We Do and Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)

REF I D : A 5 2 5 8 1 B (~)-P.L. "6-36

1 Author Reference Keyword

Vol5, No 3, Communications Fall 86 Electronics

Jelen, George F. Vd 5, Nos 1-2, Economic warfare Spr-Sum 06 Japan

V614, No 4. Collection Win 86 Computer systems

Intelligence

Vol. 13, No. 1, Spring Cryptologic history 94 Vietnam

I Vol. 12, No. 2. Summer 93

I Vol5, Nos 1-2, International affairs Spr-Sum 86

Vol4, No 1. Analysis 1 Spr85 Collection

I Vol6, No 1, Electron injection Spr 87

Vol4,85 Computer graphics (CS Issue)

I Vol7, No. 3, Computer networks Fall 88 Computer systems

Vol10, No. 1, Computer networks Spr91 Management

I Vol6, No 1, Computer Spr 87 Programming

Computer systems L~~guage

Nolte, William M. Vol9, No 2, Cryptology Sum 90

Page 24: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(bj 131-18 %SC 798 ,b)13)-P.L. 86-36

REF IDgA525813 ( b ) ( 3 ) - P . L . 86-36

Title I Author

Impressions of the 1995 American Translatorss Association Conference in Nashville aa Viewed from the Per-

u-spective of tw I I I

Improving Roductivity in Software Prototype Developments (U)

IMP Syntax Graph, The (U) I In Defense of Translation (U)

In France's Footsteps (U)

Inference and Cover Stories (U)

Reference Keyword

Vol. 15, No. 1, Spring Language 96 Translation

Vol. 14, No. 3, Fa11 95 Software prototype development

Vol4, No 4, Computer programming

Vol4. No 2, Linguistic Sum 85 LanESuatW

I Val 4, No 3, Intelligence Fall 85

Vol. 12, Nos. 3-4, Cover stories FalVWinter 93

Inference through Polyinatantiation Vol. 11, No. 4, Computer security (u) Winter 92 Polyinstantiation

Influence of U.S. Cryptologic Organizations on the Digital Computer Industry (U)

Information Engineering Integrated Methodologies for Building a Transcriber Information Aids System (U)

In Pursuit of a SONET Link Encryptor (U)

Information System Security Engineering: Application Customer Foeused(U)

Quality Initiatives (U)

Integrative Language Testing (U)

Intelligence: A Business or a Craft (U)

Snyder. Samuel S. Vol6. Nos 3-4, Computer systems Fall-Win 87-88 History

Yo1 4.85 Computer systems (CS Issue) Engineering .

Vol10, Nol, Computer networks Spr 91 Link encryption

Optical

Vol. 11, No. 3, Information security Fall 92 Open systems

Vol. 15, Special Edition 96

Vol. 14, No. 1, Spring Management 95 Strategic planning

TBM

Vol4, No 3, I-@- Fall 85

Vol7, No 3, Intelligence 1 Fa11 88 Management

Page 25: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

Title Author Reference Keyword

Intelligence and the American Johnson, Thomas R. Vol. 14, No. 3, Fa11 95 Book review Presidency (U) Intelligence

Intelligence Preparation of the Vol. 12, No. 2, IPB Battlefield: HOW Can NSA Improve Summer 93 Its Contributions to the IPB Process? (v)

International Telecommunications Val 5, No 3, Collection Revolution: VANS, ISDNs, and Fall 86 Telecommunications Other Assorted Collection Nightmares, The (U)

Internet: Opportunity and Challenge Vol. 16, No. 4, Winter Information services for the Information Services 96 Internet Organization at the National Security Agency (U)

INTERROGRAPH:. An Information Tool Vol2.83 Computer graphics for Counter-Terrorism Intelligence (CS Issue) Intelligence Centers (U)

Introduction: Examples of Powerful Vol2,83 Computer hardware Personal Computers (U) (CS Issue)

Introduction: Special Computer Vol4,85 Computer Science Issue (U) (CS Issue) Hardware

Intrbduction to a Historic Computer Vol. 13, No. 4, Winter Computers Document: Betting on the Future - 94 Cryptanalysis The 1946 Pendergrass Report, Pendergrass, J. T. Cryptanalysis and the Digital Computer, The (U)

Introduction to Asynchronous Vol. 14, No. 1, Spring ATM Transfer Mode (ATM) (U) 95 Communications

network technology

Introduction to Distributed Vol. 15, No. 3, Fall 96 Distributed Processing for the Layperson: processing Making the Move from the General Store to the Supermarket. . . , An (U)

Introduction to Object-Oriented Vol. 12, Nos. 3-4, Object-orientation Software Design and Development FalYWinter 93 Software design and Its Application a t NSA, An (U)

Introduction to Optical Lithography Vol6, Nos 3-4, Lithographer Modeling (U) Fall-Win 87-88 Optical

Introduction to Optical Projection Vol8, No 1, Lithographer Lithography Tools (U) .- - Spr 89 Optical

Page 26: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

Title 1 Author Reference Keyword

Introduction to Positive Photoresist Processing (U) I Introduction to Volume Modeling and Rendering, An (UI

Iranian Islamic Revolutionary Guard Corps: "Khomeini's KGB," The (U) I Iran-Iraq War: Regional Implications and Alternatives for Resolution, The (U)

I Was a Cryptologic Corporal! (U)

Vol6. No 2, Sum 87

Vol. 1 1, No. 3, Fall 92

Vol4, No 4, Win 86

Vol7, No 2, Sum 00

Vol I, No 4, Win 83

Lithographer Optical

Data manipulation Volume modeling Volume rendering

Iran Middle East

International affairs

Middle East

History Human factor

John H. Tiltman: A Reminiscence Personality (U) Sum-Fall 82 Tiltman, John H.

52 Software Process Improvement Effort Measures of Value, The (U)

KAL 007 Shootdown: A View from (U,

Korean Phonology System: An Automated Language Information Aid for Transcribers. The (U)

Language Cross-Training: Alternatives and Permutations (U)

Language Expert System: Squeezing the Expert Linguist into a Computer (U)

Language Identification (U)

Language Multimedia-A Makeover (v)

LARC: An Electrical Parameter Extraction Algorithm for VLSI Standard Cell Deaigns(U)

Vol. 15, No. 3, Fa11 96 Software process improvement

Vol. 12, Nos. 3-4, KAL 007 FalVWinter 93

.Val 8, No 1, L ~ ~ g ~ a g e Spr 89 Transcription system

Vol. 11, No. 3, Language training Fall 92 Linguistics

Vol4, No 1, Spr 85

Vol. 15, No. 3, Fall 96

Vol. 13, No. 2, Summer 94

Vol9, No 2, Sum 90

Computer systems Lanwage Linguistic

Computer-managed instruction

Language training Video technology

Computer software

Learning Theories and Computer- Vol10, No 1, Computer-assisted Assisted Language Instruction Spr 91 instruction Technologies: A Synthesis (U) Computer

programming Language

Page 27: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Title

Linguistic "Funny," A (U)

Listening to the Rum Runners (U)

Listing Algorithms (U)

LOCKing Computers Securely (U)

Long Live the King (U)

Looking Ahead to the 1990s (U)

Low Earth Orbit (LEO) Satellite Communications Systems Technology and Intercept Issues (U)

Low Noise Reception of Microwaves (U)

Machine Learning Approach to Text Type Identification, A (U)

Management of TDY Funds: A Graphical Approach (U)

Managerial Track, The (U)

Managing Change (U)

Managing the Future (U)

Mathematics: A Challenge for Business, Government, and Academia (U) u Mechanisms of S~GINTTechnology

Transfer, The (U)

Media Responsibility and National Security (U)

Author Reference Keyword

Mowry, David P. Vol2, Nos 1-2, Communications Spr-Sm 83 History

Vol2, Noa 3-4, Mathematics Fall-Win 83-84 I lVol"l, Computer security

I Becker. Gene Vol. 15, Special Middle East Edition 96 SIGINT

I. Unknown Author Vol 5, NOS 1-2, Human factor Spr-Sum 86 Management

VoI. 12, NOS. 3-4, Communication Fall/Winter 93 satellites

VQ~. 11. No. 3, Microwaves Fall 92 Signals collection

Vol. 13, No. 4, Winter Discrimination 1994 Selection

Text type

I Vol2,83 Computer graphics (CS Issue) Management

Vol 10, Nos 3-4, Management Fall-Win 91 Training

Vol11, No 1, Management

11 1 ;'!&No 1. Management

Studeman, W. 0.. Vol8, No 2, Mathematics VADM, USN Sum 89

Vol. 12, No, 2, Airborne Summer 93 reconnaissance

Shootdowns

Vol6, No 2, Compromise Sum 87 SIGINT seeurity

Ridskopf, Elizabeth Vol7, No 3, Security leaks Fall 88

Page 28: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(hi ( 1 i

I E ~ $ & ~ 1 ~ / 3 0 2 0 g 5 4 [a) ( 3 ) - ? . L . (36-36

Title

Meeting the Programming Challenges of the Future (U)

Meteor Burst Communications: An Ignored Phenomenon? (U)

I I

Middle Management and the Soviet Problem: Some Reflections

Military Intelligence Corps Hall of Fame (U)

MILK SUSS^ Proof-Concept ATM .Encryptor: Overview and Lessons Learned (U)

Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere (U)

MrnTAR (U)

Model for Automated Cryptovariable Distribution in a Cryptographic Network, A (U) .

Modem Error Correction (U)

Modem Signal Routing (U)

Modular Arithmetic in Hardware (U)

Mokueatsu: . h e Word, Two Leesons (U)

Morse Mechanization (U)

REF 1~:~525&iY'-~'~' 86-36

Author Reference Keyword

I Val 1, Nos 2-3, Computer Sum-Fall 82 Programming

Vol9, No 3, Communications Fall90 Collection

Vol. 13, No.2 Cryptologic history Summer 94 Soviet problem

I Vol2, Nos 1-2, Management Spr-Sum 83 Soviet Union

I Vol10, No 1, Intelligence Spr 91 Personalities

Vol. IS, No. 3, Fa11 96 ATM MLKBUSH

Vol5, Nos 1-2, Collection Spr-Sum 86 ELINT

I Vol7, No 1, Communications Spr 88 System

Vol6, No 2, LanWage Sum 87 Transcription system

Vol10, No 2, Computer security Sum 91 Cryptographic

network

Vol. 13, No. 4, Winter Modem errors

I94

Vo1.16, No. 4, Winter Signs1 routing 96

Vol. 11,No.4, ,Hardware Winter 92 descriptive

languages Modular arithmetic

Vol.14, No. 4, Winter Atomic bomb World War I1

I Vo1.15, No. 2, Morse Summer 96

Page 29: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID :(A)SB5E8P.38G36

Title Reference Keyword - Moscow's Realignment with Cairo: A Val 8, NO 4. Look at Gorbachev's New Political Win 90 T h i n k i i (U)

Move, or How NSA Came to Fort Johnson, Thomas R. Vol. 14, No. 2, Meade, The (U) Summer 95

Multidisciplinary Interaction: The Vol. 15, Time Is Now! (U) Special

Edition 96

Gorbachev, Mikhail Middle East Soviet Union

Cryptologic history NSA

Multidisciplinary interaction

SUNDIAL SINTER

Multimedia Data Bases: Design Issues, NSA Applications, and Prototypes (U)

I Vol9, No 2, Sum 90

Computer hardware Data base

Vol. 11, No. 3. Fall 92

National OPSEC Program, The (U) 10s OPSEC

Vol2, NOS 3-4, Fall-Win 83-84

Data base Naval Security Group Data Base Administration (U)

Vol. 15, Special Edition 96

Vol. 12, No; 1, Winter 93

Nearest Lattice Point Problem, The (U)

LLLalgorithm Mathematics Nearest lattice point

problem

Network System's Data Exchange (DX) IP Router: NSC's Product in Review (U)

Data exchange NSC DX router

Vol. 15, Special Edition 96

New View of Pearl Harbor: The U.S. Vol5, No 3. Navy and Communications Fall 86 Intelligence, A (U)

Communications History Japan Pearl Harbor

NIKKEL 11 S i l Processor or Getting Your NIKKEL'S Worth, The (U)

Vol7, No 1, Spr 88

Computer systems Signal processor

North Korean Attack on and Seizure of the USS Pueblo, The (U)

Vol. 11, No. 3, Fall 92

USS Pueblo

Vol. 11, No. 2, Summer 92

Churchill, Winston JN-25 Naval Code Pearl Harbor

Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)

Notes on Optimization (U) w Computer programming

Page 30: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID : 3 02 0 999)-' .L "-'" REF IDzA525813

Title I Author Reference Keyword

NSA and SAC (U)

NSA and the Supercomputer Industry (U) I NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)

NSA: How Much Do We Really Know about the Software Capability of Our Contractors?

NSA in the Cyberpunk Future: A Somewhat Educated Guess at Things to Come (U)

NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)

NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)

NSA Signal Collection Equipment and Systems: The Early Years - Receivers (U)

NSA's Lessons Learned Program (U)

NTSS - Yesterday, Today, and Tomorrow (U)

Object Oriented Programming with C+ + (U)

Obscenities in COMINT: A Need for Cognitive Knowledge (U) I Obtaining Maximum Performance in a Supercomputer Unix Environment (U)

Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twina and the Complexity of Intelligence Analysis (U)

Johnson, Thomas R. Vol5, Nos 1-2, Intelligence Spr-Sum 86 Support

Vol. 14, No. 4, Winter HPC technology 1 95 Supercomputers Vol. 15, No. 1. Spring Data Encryption 96 Standard (DES)

Public cryptography

Vol. 14, No. 1, Spring Software assurance 1 95 TCMM

Vol. 15, No. 3, Fall 96 Cyberspace Seeurity

Vol. 14, No. 4, Winter Antennas 96 HF collection

Signal c o l l ~ t i o n equipment

Vol. 16, No. 1, Spring HF collection 96 Magnetic tape

recorders

Vol. 14, No.2 Analog technology Summer 95 Digital technology

Receivers Signals

I Vol. 14, No. 3, Fall 96 Lessons learned

Vol. 13, No. 2, Communications Summer 94 systems

National Time Sensitive System

I Vol. 12, Nos. 3-4, Object oriented FalVWinter 93 programming

I Vol4, No 1, Language Spr 85 Linguistic

Vol7. No 2, Supercomputer Sum 88

VoI8, No 3, Intelligence analysis Fall 89 Mathematics

Page 31: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF

Title Author Reference Keyword

OJE: On the Job Enthusiasm A Layman's Perapeetive IZI) I

On NSA Reporting Style (Or Lack T h e r e d (U) I On Perverted Priorities (U)

On the Desirability of a Flexible and Dynamic Security httice (U)

On-Web Training: A Supervisot's Responsibility (U)

On the Selection Mechanism for Pseudonoise Seqwnees (U)

Opening Address, Annual Cryptanalysis Exchange (U)

Open Letter to William M. Nolte, An (U)

Operational Application of VLSI Technology: Using the PF474 to Alleviate the Problem of Variant Names, An (U)

Operations Management and Reaource Utilization for Signals Collection Using Knowledge-Based systems rS),

m Optical Disk Technology: CDs, WORMS and Erasable Disks (U)

Optical SIGINT Collectors (U)

Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)

Vd7, No 2, Human reaoureea Sum 88 M a n q m e n t

Vol. 13, No. 3, Fall 94

Soviet problem

Vol7, No 3, R ~ P ~ * S Fall 88

Vol3, Nos 1-2, L-WWm Spr-Sum 84 Linguistic

Vol10, No 2, Computer security

Vol8, No 2, Sum 89

Vol 1, Nos 23, Sum-Fall 82

Vol9, No 2, Sum 90

Vol4, No 2, Sum 86

Human resources Management Training

Communications Mathmatics

Cryptanalysis

Computer programming

Vol9, No 3, Management Fall 90 Signals collection

Computer systems TI WW

Vol8, No 2, Archival storage Sum 89 Computer sys tem

Optical

I Vol3, Nos 1-2, Collection s p r - s ~ m 84 SIGINT

Vol. 15, No. 3, Fa11 96 Solitona Telecommunications

(b) (1) (b) ( 3 1 - 5 0 USC 403 (b) ( 3 ) - P . L . 8 6 - 3 6

Page 32: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 - Title 1 Author Reference Key word

Radio traffic Traffic analysis

-

Origination and Evolution of Radio R a t r ~ e Analysis: The Period between the Wars, The (U)

Radio traffic Traffic analysis World War I

Origination and Evolution of Radio Mc Analysis: The World War I Era, The (U) F""

Radio traff~c Traffic analysis World War 11

Origination and Evolution of Radio Trac Analysis: World War 11, The 1

01.12, No. 1, Arab cryptology Cryptologic history

Origins of Cryptology: The Arab Contributions (U) I Origins of SGINT Hearability (U) 01.12, No. 2,

ummer 93 Hearability

Cryptologit history Soviet problem

Origine of the Soviet Problem: A Kirby, Oliver R. Vol. 11, No. 4, Personal View, The (U) Winter 92

Out of Control (U) Vol. 15, Special Edition 96

Computer security Espionage

Overview of -ME and Ita Application as a Knowledge-Based Mission Management System. An (U)

Vol8, No. 1, 1 Spr 89 Collection Management

Vol7, No 2, Sum 88

Pachydermic Personality Prediction Profile (U) I Human factor

Management

(Painful) Learning Experience from the Past, A (U1 I Vol. 12, Nos. 34,

FalUWinter 93 S i l s analysis

Parable of the Tail with No Teeth, The (U) I Management

Parable of the Tail with No Teeth, The Part 11: Into the Teeth ofthe Tail (U)

Vol8, No 2, Sum 89

Management

Parable of the Tail with No Teeth, The Part lII: The Raining Tail That Wagged the Teeth (U)

Vol8, No 4, Win 90

Management

Parable of the Tail with No Teeth,. The Part IV: The Tarnished Teeth of the Golden Tail (U)

Vol9, No 3, Fall 90

Management

Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail, The (U)

Vol 10, Nos 3-4, , Fall-Win 91

Management

Page 33: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b) (1)

DOCID: 3020954 REF ID:A525813 (b)(3)-50 USC 4C3 (b)(3)-18 USC 7 9 9

[b) 13)-P.L. 86-36 (b)(3)-P.L. 86-36

P

Title 1 , Author Reference Keyword

Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U) I Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (u) I Parallel Tauswotthe Generator, The (v)

-paldo's Dream (U)

Passing of an Extraordinary Man, The (U) I Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U) I PCSE: A Design Implementation for PC Security (U) I

8 I

An "Electronic Performance Support System" (EPSS) for On-the-Job Training of Computer Operators f688Bt- I Perfect Router for the RINGSTONE Backbone, A (U) I Platform Network Evolution, The (U)

Predicting Terrorism: An Indications and Warning Model

Priceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)

Primer on Specific Emitter Identitication, A (U)

Problem Encountered with the Variant.Reeord Construct in Ada (U)

Vol. 11, No. 2, Summer 92

Vol. 11, No. 4, Winter 92

Vol 1, No 1, Spr 82

Vol7, No 4, Win 89

Vol4, No 3, Fall 85

Vol. 15, No. 2, Summer 96

Vol8, No 2, Sum 89

Vol11, No 1, Spr 92

Vol. 12, No. 1, Spring 93

Vol5.86 (CA Issue)

Vol9, No 4, Win 91

Vol8, No 4, Win 90

Vol9, No 4, Win

Vol 1, No 4, Win 83

Vol7. No 2, Sum 88

Management

Logic Mathematics

Computer systems Mathemath

Fairbanks, Sydney Personality

Somalia U.S. policy

Computer security Personal computer

Computer systems Computer training

RINGSTONE backbone Router

configurationg

Computer network Computer software

Terrorism

COMINT World War I1 Japan

COMIHINT Emitter

Computer network Variant re&

Page 34: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 (3) (1) (~j(3)-50 USC 403 (3j (3)-15 USC 798 l s i ( 3 ) - P . T d . 86-36

REF (2U3'~%?25%3?5

Title Reference Keyword

Piocessor Interconnection Netwmka Val 8. NO 3, Computer graphics from Cayley Graphs (U) Fall 89 Computer networks

Supercomputer

Programmable COM8EC and the CYPRIS Crypto-Microprocessor (U)

Programming the SPS-2 (U)

Vol9, No 1, Computer software Spr 90 COMSEC

Microprocessor

Vol10, No 2, Computer Sum 91 programming

Computer software

Vol. 13, Na.4, Winter -1 94 Cryptologic history

Soviet problem

Project POSrCARD (U) Hanyok, Robert Vol. 13, No. 3, Fall 94 Deception POSrCARD Vietnam problem

Vo19, No 1. Signals collection Spr 90

Prototype Knowledge Base System for Technology Espionage: An Interim Report, A (U)

Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)

Prototyping Man-Machine Interface to Facilitate Early Identification of Software Defxiencies (U)

Pump or Bottleneck? Focus on the Intelligence Analyst (U)

I Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

Rapid Text Searching for Multiple Key Strings (U)

RATBAG Report, The (U) Jenkins, William

Vol5, No 4, Computer systems Win 86

Vol7, No 3, Computer networks Fall 88 Computer systems

Vol4, No 4, Win 86

Vol8, No 4, Win 90

Vol6, No 1, Spr 87

Vol9, No 2; Sum 90

Vol 10, No 2, Sum 91

Vol. 12, Nos. 3-4, FalVWinter 93

Computer software

Intelligence analysis

Computer software

Japan History Pearl Harbor Radio intelligence World War I1

Computer hardware Computer security Text searching '

Computer security

Page 35: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

: % Q ~ ~ ~ , a - ~ 3 0 2 0 9 5 4 REF 1 ~ ~ ~ 5 2 5 8 1 3 (b) ( 3 ) - P . L . 86-36

Title

Reading Between the Lines: Methods of Analysis of Soviet Military Literature (U)

Real-Time Signals Acquisition and Processing on UNIX Platforms +wJf&- Receiver Dynamics (U)

Recent Progress in Academic Cryptology (U)

Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)

Red and Purple: A Story Retold (U)

Author Werence Keyword

1 Vol4, No 3, Reparting Fall 86 So& Union

Vol. 11, No. 2, S i s acquisition Summer 92 Signals processing

UMX

Vo1.15, No. 4. Winter Receivers Terms

Vol4, No 2, Cryptology Sum 86

Vol. 14, No.2, Cryptologic history Summer 95 S i o v , Abraham

WWlI

Vol3, Nos 3-4, Cipher systems Fall-Win 84-85 Hiatory

Japan

Reflection of Sherman Kent, A (U) Caddy, David W. I Vol 5, Nos 1-2, Kent, Sherman A. Spr-Sum 86 Personality

Regierunga-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire (U)

Requiem for TEAM SPIRIT, A (U)

Restructuring the U.S. SIGINT System for Tomorrow's World (U) I Return of the Electronic Francophoneglos, The (U)

Revised Capability Maturity Model for Heretics, A (U)

Revisiting the Dispute over the Identification of "AF" as Midway (U)

Mowry, David P. Vo1 2, Nos 3-4, Cryptanalysis Fall-Win 83-84 History

Vol9, No 3, Fall 90

Computer software Memory devices

Vol. 11, No. 2, Korea Summer 92 Support to military

Operations TEAMSPlRLT

Vol8, No 3, International &airs I Fall 89 sraiNT requirements

Vol4, No 1, Data base Spr 85

Vol. 14, No. 2, Capability maturity Summer 96 model

Software process improvement

Vol. 13, No. 4, Winter Cryptologic history 94 Midway, Battle of

wwn RISC Does Windows (U) Vol8, No 3, Computer hardware

Fall 89 Microprocessor

Page 36: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOQIDr 3020954 (b) 13) -50 USC 403 (b) ( 3 ) -18 USC 798 i b ) (3)-P.L. 86-36

REF ID:j$735813 ( - P . L . 8 6 - 3 6

Title I Author Reference Keyword

The (U)

Role of Intelligence in the Post-Cold Vol. 11. No. 2. Intelligence War World. The (U) Summer 92 Poet-Cold War

Romanization of the Korean Vol11, No 1, Language (Korean) Language Based on the Character Spr 92 Values, The (U)

Rosetta Stone and Its Decipherment. Vol. 14, No. 3, Fall 96 Rosetta Stone The (U)

Satellite-Earth Radio Link Vol2, NOS 1-2, Communications Depolarization by Ice Crystals (U) Spr-Sum 83 Engineering

Securing Army Circuits during World War 11: A Potential Disaster Narrowly Averted (U)

Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)

Segment Storage: Hierarchical Graphics Storage System (U)

Select Yourself for War College (U)

Seward's Other Folly: America's First Encrypted Cable (U)

Shallow Junction Formation in Silicon Using Ion Implantation (U)

SIGINT and the Holocaust (U) '

SIGINT Goes to War (U)

Rowlett, Frank B. Vol6, No 1, Cryptanalysis Spr 87 History

World War I1

Vol. 15, Special Algorithm benign Edition 96 loading

Vol8, No 2, Computer graphics Sum 89

Vol5, No 3, Human factor Fall 86 Training

Vol. 12, No. 2, Cryptologic history Summer 93

Vol5, No 4, Microelectronics IWin86

Vol. 16, No. 2, Summer 96

Benson, Robert Louis Vol. 14, No. 1, Spring Cryptologic history 95 Holocaust

' WWII

1 Johruan, Thomas R. Vol. 15, No. 3, Fall 94 ruc;~~~doctrine

SGINT Requiremenb: Before, During, and After (U)

Vol. 14, No. 3, Fa11 95 Codebooks Cryptolinguistics

vol. 11, No. 2, SICINT reporting Summer 92 Training

Vol 7, No 1. Requirements Spr 88

Page 37: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813 :b) ( 3 ) - P . L . 86-36

SGINT Talking (U)

Title Author Reference Keyword

S i l Analysis - Some Parting Thoughts (U)

Vol11, No 1, Spr 92

Sienal Descriptor Language, A (U)

-

Signaling System No. 7: And What about Analysis (U)

SIGINT Support to Military Vd. 12, No. 1, Support to military Operations: Organizing for J3ffective Spring 93 operations CrisislContingeney Support (U)

Signalman's Odyssey (U)

Simulated Annealing and Iterative Improvement: An Experimental Comparison (U)

SINCGARS Software Evaluation (U)

SINIOS, NSA, and the National Estimates Process (U)

\-[A Case Study in UNIX System Optimization (U)

Hateh, David A. Vol. 12, No. 2, SIGINT jargon Summer 93

I Hudee, James G. Vol. 15, Na. 4, Winter Signal analysis W

Vol3, Nos 34, Computer systems Fall-Win 84-85 Electronics

Vol. 13, No. 3, Fa11 94 CCS7 Communications

networks

Vol4, No 1, History Spr 85 Human factor

Vol. 12, No. 1, Combinatorial Spring 93 optimization

Iterative improvement

Simulated annealing

I l;l. 13, No. 1, Spring Computer security Tactical radio

systems

N o h , William M. Vo19, No 1, Intelligence Spr 90 community

National Intelligence Estimates

Vol. 12, No. 1, , Signals tiammission Spring 93

UNIX

Software Application to Correct the Effwts of Transliteration "Errors" on Database Integrity, A (U)

Software Inspections (U) I Software Maintenance: Putting Life Back into the Life Cycle (U)

Vol. 12, No.2, Software applications Summer 93 Transliteration

Vol4,85 Computer software (CS Issue)

Vol5, No 4, computer software Win 87

Page 38: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813

. ( b ) ( 3 ) - P . L . 86-30

Title

Solved: A Long-hst Cipher from Siberia (U)

Solving xa = b (mod c) for x and Undedmating Recursions (U)

I Some Contributions toward a Course in COMINT Translation (U)

Author Reference Ke ywonl -

Vol. 13, No. 2, Ciphers Summer 94 Cryptologic history

I VOI. 11, NO. 4, c ~ p t a n a l y a s Winter 92 Signals Analysis

Undecimating recursions

Val. 14, No. 3, Fall 95

2 Win Vol9, 91 No 4, Training Translation

Soviet Military Establishment under Vol7, No 4, Gorbachev, Mikhail Gorbachev, The (U) VADM, USN Win 89 Intelligence

Soviet Union

Soviet "Scientific" Approach to Military Strategy: Strength or Weakness?, The (U)

Soviet Oil Production: Energy Balance Prospects for the Future (U)

So Where Do the Analysts Come From? (U) I

I t.'ol4, No 2, Oil Sum 86 Soviet Union

Space Weapons: Time for a Treaty? (U) I

I t ~ n Overview of a Systolic Array Processor for the Sun (U)

Spoken Language Library: A Unique Institution (U)

Stab at A2 Criteria, A (U)

Standards for Information Exchange among Computers (U)

Station "Cn and Fleet Radio Unit Melbourne (FRUMEL) Revisited (U)

Statistical Method for Quality '

Control of Microelectronic Chip Design, A (U)

Vo19, NO 1, ~ i l i t a r y forces Spr 90 Soviet Union

I Vol. 12, Nos. 3-4, Intelligence analysts FalVWinter 93 Management

I Vol8, No 4, Win 90

Space weapons Treaty

Vol. 14, No. 3, Fall 95 n & I

Computer networks Sum 90 Computer software

Gurin, Jacob (Jack) Vol5, No 3,

I Fall 86

I Vol9. No 1, Spr 90

I Vol9, No 1, Spr 90

Vol. 12, No. 2, Summer 93

Vol. 15, No. 2, Summer 96

English Language

Computer security

Computer network Computer systems

Cryptologic history FRUMEL Station C .

Chip design Statistics

Page 39: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID : ~ 5 2 5 $ ? 2 - ' . ~ . E"36

Title I Author Reference Keyword

Vol. 12, No. 1, Management Spring 93 Strategic

management

- - -

Strategic Management and Mid- h v e l Managers - Is There a Link? I I

Vol11, No 1, Computer Spr 92 programming

Expert systems Knowledge

acquisition

Vol9, No 4, I Win91 Computer

programming Computer software

Structured Testing as a Learning Tool (U)

Sub-HF Search and Acquisition (U) Gerson, N.C. Vol. 13, No.2, Summer 94

Radio frequencies Search

Supercomputer Performance (U) Vol3, Nos 1-2, Spr-Sum 84

Supercomputers

Supercomputers: Trends and Needs, A Government Perspective (U)

V012, NOS 1-2, Spr-Sum 83

Supercomputers

'- Vo14,No3, Fall 85

Susceptibility of Multi- to Vial Attacks, The (U)

Computer security Computer systems Computer viru

Vol. 15, No. 1, Spring ! 96

Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)

Mu1 ti-chip modules (MCM)

Synthetic diamond

Systems Engineering Profession and Its Importance to NSA, The (U)

Vol. 11, No. 2, Summer 92

Systems engineering Systems

management

Vol7. No 2, Sum 88

Tapered Wet Etching of ContactsUsing a Trilayer Silox Structure (U)

Electrochemical Photoresist

Vol. 15, Special Edition 96

TEABALL: Some Personal Observations of SIGINT at War (U)

SIGINT Vietnam War

Vol9, No 4, Win 91

Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)

Vol. IS, Special Edition 96

Satel1,ites Southeast Asia Space technology ,

Technique for Representing Mandatory Security Policies in Non- Interference Theory, A (U)

Vol6, No 2, Sum 87

Computer security

Page 40: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

i b ) !li

D O C ~ ~ ~ : ; ; ~ ~ ~ $ 9 54- (b) (3)-P.L. 06-36

REF IDrA525813

1 Author Reference - --

Keyword Title

Tech Track: Will It Work? (U) Vol7. No 1, Career planning Spr 88 Management

Vol. I$, No. 4, Winter Internet 96 Latin America

Vol8, No 3, Communications Fall 89 systems

Telecommunications

Tejiendo la Red Telarana (Weaving the World Wide Web) (U)

Telecommunications Automatic Monitoring and Control System (U)

I Vol. 12, No. 1, Safe combinations Spciag 93 Telephone codes

Telephone Codea and Safe Combinations: A Deadly Duo (U)

I Vol8. No 1, Management Spr 89

Ten Rules to Avoid Planning Foul- ups (U)

Vol8, No 3, Communications Fa11 89 COMSEC

Neutrinos

Theoretical Implications of a Second Spectrum (U)

Things Aren't What They Used to Be" (U) I Gurin, Jacob (Jack) Vol 1, No 1,

Bpi 82 Cryptology Editorial

1 Vol7, No 4, Win 89

rty Nations: Partners and mu, T3343 Software Evaluation Effort (U)

SIGINT Third Party

I Vol4,85 (CS Issue)

Computer software

Through Thailand by Train: A Personal Memoir (U)

Johnson, Thomas R. Vol4, No 3, Fall 85

History Human Factor

Thumbnail Review: Dirty Little Secrets: Military Information You're Not Supposed to Know (U)

1 Hatch, David A. Vol. 12, No. 2. Summer 93

Thumbnail review

Vol. 12, No. 2, Summer 93

TIDYTIFS I11 Systems Capabilities (U)

Time Is -Time Was -Time Is Past: Computers for Intelligence (U)

1 gmpaigne, Howard Val 6, NOS 3-4, Fall- Win 88-87

Computer systems Intelligence

Tools for the Beginning Translator (U)

Vol3, Nos 1-2, Spr-Sum 04

Computer systems Translation

Too Many Cryptologic Eggs in One Basket (U)

Vol7,No 1, Spr 88

Deployment Management

TQM and Software: New Paradigms for Development and Support (U)

Vol11, No 1, Spr 92

Computer software TQM

Page 41: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DW319a ,,,a R2 0 9 5 4 REF ID:A5'fZ)SB19L. 86-36 (b) (3)-18 USC 798 (b) (3)-F.L. 86-36

Title Author Reference Keyword I

Vol. 13, No.4, Winter 94

Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and HOW to Deal with Them (U)

TURBOTECH: An Architecture Management and Analysis System (U)

Twenty Questions to Evaluate Your Manager (U) I

Vol3, Nos 1-2, Japan Spr-Sum 84 LwP'ge

Linguistic Translation

Vol8, No 4, Computer software Win 90 Management

Requirements

Vol6, No 1, Management

UCSD pSystem, The (U) I , 1 ~ 0 1 4 . 8 5 (CS Iswe) Computer systems

Uncertain Summer of 1945, The (U) Wiley, Edward Vol. 14, No. 1, Spring Atomic bomb 95 Japan

WWII

United Pigeons Service (UPS)? (U) Unknown Author I Vol2, Nos 3-4, History Fall-Win 83-84

Unofficial Vocabulary (U)

Unternehmen BOLIVAR (U)

Use of Compressed Speech in Selecting Morse Code Operators, The (U)

I I Using Lotus 1-2-3 as an ELINT Display and Analysis Tool (U)

Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)

Value of Working Longer Hours for Promotion, The (U)

Video Teleconferencing: NSA Applications (U)

I Hatch, David A.

I Mowry. David P.

Vol 10, Nos 3-4, Fall-Win 91

Vol3, Nos 3-4, Fall-Win 84-85

Vol 1, Nos 2-3, .

Sum-Fall 82

Language Terms

History Intelligence

Training

Vol4, No 1, Mathematics Spr 85

Vol4, No 3, Computer software Fall 85 Computer hardware

ELINT

Vol7, No 3, Computer Fall 88 programming

Computer hardware ELINT

Vol. 15, No. 4, Winter Promotions 96

Communications Teleconferencing

Page 42: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID : A52 5813 ' ' * I ( ' ) - ' . " .

Title 1 Author Reference Keyword

Volunteering. A Fresh Approach (U) Vol8, No I, Human resources . Spr 89 Management

Virtual Reality (U)

Warning and Crisis Management (U) Vol2, Nos 3-4, Communications Fall-Win 83-84 Management

Watch is Set: The Evolution of the T Vole, No 2, Telecommunications Operations Center, The (U) Sum 89 Watch operations

11

Vol. 12, Nos. 3-4, Humancomputer F a m i n t e r 93 interaction

Virtual reality

Way It Used to Be or What's an RSM Anyway, The, Part I (U)

Way It Used to Be, The. Part I1 (From ADVA /GENS to the Alphabet)

What Every Cryptologist Should Know About Pearl Harbor (UI

Where there's a will. . . . (U)

Who Are We? (U)

Vol. 13, No. 1, Spring Cryptologic history 94

Vol. 13, No.2, Cryptologic history Summer 94

Johnson, Tom Vo16, No 2, Cryptology Sum 87 History

Pearl Harbor

Vol3, NO^ 1-2, LWiWage Spr-Sum 84

Winning the Paper Chase: .

Operational Applications of Computer Output Microfiche (U)

With Pail and Shovel: The "Sandbox Approachn to Management and Leadership (U)

Work Force Skills and Mission Requirements Comparison System (U)

World War 11 German Army Field Cipher and How We Broke It, A (U) I

I v019, NO 2, Cryptd0gy Sum 90

Vol 1, No 1, Computer systems Spr 82

Vol6, No 4, Management Win 86

Vol. 14, No. 1, Spring Management 95 Work force skills

Vol. 14, No. 4, Winter German ciphers 1 95 World War I1

XNS Ethernet Connections for the Vol4,85 (CS Issue) Computer networks IBM PC XT (U) Vol4, No 1,

Spr 86

You've Got to Go by the Rules (U) Gurin, ~ k b (Jack) Vol2, Nos 3-4. I English Fall-Win 83-84 Lang~age

Page 43: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

-- - - -- ---- - -

DOCID: 3020954 REF IDzA525813

@I'

Author

Ell IEI

Page 44: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

ibi (1) (b) (31-50 USC 403

D(YCTD+ "500954 REF IDzA525813 (bi(3)-18 USC 799 (b'(3)-P.L. 86-36

v

Cryptologic Quarterly Index by Author

Author Title Reference Key word

Nearest Lattice Point Problem, The (U) Vol. 15, Special LLL-algorithm Edition 96 Mathematics

Nearest lattice point problem

I Yo1 5.86 (CA Issue)

Improving Productivity in Software Fall 95

E Vol. 14, No. 3, Software

Prototype Developments (U) prototype development

NSA: How Much Do We Really Know about the Software Capability of Our Contractors? (U)

Prototyping Man-Machine Interface to Facilitate Early Identification of

I Software Deficiencies (U)

I MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)

I Combining Distributed Computing and Object-Oriented Techniques (Ul

Vol. 14, No. 1, Spring 95

Vol4, No 4, Win 86

Vol. 15, No. 3, Fall 96

Vol. 15, No. 1, Spring 96

Software assurance

TCMM

Computer software

ATM MILKBUSH

Distributed computing

Object-oriented techniques

I Susceptibility of Multics to Viral Vol4, No 3, Computer security Attacks, The (U) Fall 85 Computer systems

Computer virus

I Origins of Cryptology: The Arab Vol. 12, No. 1, Arab cryptology Contributions (U) Spring 93 Cryptologic

history

Bringing User Power to the High Vol9, No 2, Computer Performance Workstation (L') Sum 90 networks

Management

Software Maintenance: Putting L i e Vol6, No 4, Computer Back into the Life Cycle (U) Win 87 software

Page 45: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Author 1 Title Keyword

Computer programming

L ~ ~ g u a g e dictionary

Pinyin dictionary

Vol. 11, No. 2, Summer 92

Vol. 13, No. 2, Summer 94

Frequency management

Telecommuni- cations

Microwaves Signals collection

Vol. 11, No. 3, Fall 92

Vol. 16, Special Edition 96

Call forwarding Data exfiltration

Vol. 15, No. 4, Winter 96

Receivers Terms

Communications system

Teleeommunicat-

I I I Telecommunications Automatic Vo18, No 3, Fall 89 I I Monitoring and Control System (U)

I

Space Weapons: Time for a Treaty? (U)

Vol. 15, Special Edition 96

Vol8, No 4, Win 90

Space weapons Treaty

I I Challenges and Opportunities (U) Vol 10, Nos 3-4, Fall-Win 91

Management

rogram Overview: and Directions (U)

Programming the SPS-2 (U)

Voll0, No 1, Spr 91

Computer security COMSEC

Vol 10, No 2, Sum 91

Computer programming

Computer s o h a r e

I 1 FARSEEING: A Study in Expert Systems Vol8, No 2, Sum 89

Artif~cial intelligence

Computer systems

I I Supercomputer Perlormanee (U) Vol3, NOS 1-2, Spr-Sum 84

Supercomputere

Page 46: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 (9) ( 3 ) - P . L . 36-26

REF ID:A525813

Author 1 Title Reference Keyword ,

Role of Intelligence in the Poat-Cold Vol. 11, No. 2, War World, The (U) Summer 92

Intelligence Poat-Cold War

I I Chineme KGB, The (U) Vol 1, No 1, Spr 82

China KGB

I I Development of Communications Vo1.15, No. 2, Security Equipment, The (U) Summer 96

I I. Work Force Skills and Mission Vol. 14, No. 1, Requirements Comparison System (U) Spring 95

Management Work force skills

I I Farewell Address, A (U) Vol4, No 2, Sum 86

Development of Cryptologic Trainiig, Vol9, No 3, 1949 to 1960, The (U) Fall 90

Training

Becker, Gene Long Live the King (U) Vol. 15, Special Edition 96

Middle East SICINT

Computer Vin;ls Organization: A Vol5, No 3, Definitive Taxonomy and Anatomy of Fall 86 Computer Viruses (U)

Computer security

Computer virus

First Generation Technical Viral Vol7, No 2, Defense, A (U) Sum 88

Computer security

Computer virus

1.0CKkrg Computers Securely (U) Vol7, No 1, Spr 88

Computer security

J2 Software Process Improvement Effort Vol. 15, No. 3, Measures of Value, The (U) Fall 96

Software process improvement

I Critical Programming Support during Vol. 12, NO. 1. the Persian Gulf Crisis (U) Spring 93

Critical programming support

DESERT SHIELJM3TORM

Solved: A Long-Lost Cipher from Siberia Vol. 13. No. 2. (U) Summer 94

Ciphers Cryptologic history

On the Desirability of a ~lexible and Vol10, No 2, Dynamic Security Lattice (U) Sum 91

Computer security

Benson, Robert Louis SICINT and the Holocaust (U) Vol. 14, No. 1, Spring 95

Cryptologic history Holoca~8t WWII .

Page 47: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813 [b) ( 3 ) - P . L . 86-36

Author Title Reference Keyword

BILLY Data BasetTasking Management V0l8, No 3, Database System Intervals (U) Fall 89 Management

Supercomputers

Data Transmissions (U) Vol. 15, No. 3, Collection Fall 96 equipment

Receivers

Morse Mechanization (U) Vo1.15, No. 2, Morse Summer 96

NSA Signal Collection Equipment and Vol. 14, No. 4, Antennas Systems: The Early Years - Antennas Winter 95 HF collection (U) Signal collection

equipment

NSA Signal Collection Equipment and Vol. 15, No. 1, HF collection Systems: The Early Years - Magnetic Spring 96 Magnetic tape Tape Recorders (U) recorders

NSA Signal Collection Equipment and Vol. 14, No. 2, Analog technology Systems: The Early Years - Receivers Summer 95 Digital technology (u) Receivers

Signals

CAP Production Software Library User Vol4.85 Computer (U) (CA Issue) Software

Computer systems

Inference and Cover Stories (U) Vol. 12, Nos. 3-4, Cover stories FalU Winter 93

Inference through Polyinstantiation (U) Vol. 11, No. 4, Computer Winter 92 security

Polyinstantiation

Applications of Nonsymbolic Artificial Vol9, No 4, Artificial Intelligence: Neural Networks (U) Win 91 intelligence

Neural networks

Bibliography of Neural Network Vol. 11, No. 3, Ketwork Applications to the Telecommunications Fall 92 management Industry, A (U) Neural networks

Telecommuni- cations

Page 48: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 [ b ) 3 ) - P . L . 86-36

REF IDzA525813

h Track Will It Work? (U) Vol7, No 1, Spr 88

igins of SICINT Hearability (U) Vol. 12, No. 2, Summer 93

ing Risks or What Every Vol. 15, NO. 4, 1 Student and NSAer Should Winter 96 t Taking Chances, The (UI

signers vs Users: Bridging the Vol2,83 mmunication Gap (U) (CS Issue)

amond: A Hard Rock Story Vol. 15, NO. 1, rcomputing Out of the Spring 96

stem Capabilities (U) Vol. 12, No. 2, Summer 93

xtraordinary Man, The Vol4, No 3, Fall 85

n Letter to William M. Nolte, An (U) V019, NO 2, Sum 90

Specialists: Meeting Vol. 14, No. 3, into the Twenty-first Fall 95

ricans: The Vol5, No 3, Nazi Codes, Fall 86

Author

Career planning Management

Title Reference Keyword

Cognitive Processes in Sottware Fault Vol. 11, No. 2, Cognitive process Detection (Ul Summer 92 Computer

programming

Hearability

Computer software

Risk management

Computer grap hies

Multi-chip modules (MCM)

Synthetic diamond

Personality

Intelligence analysis

L ~ ~ g u a g e

Book review History Intelligence ULTRA

Origination and Evolution of Radio Vol6, Nos 3-4, Radio communi- Trac Analysis: The Period Between Fall-Win 87-88 cations the Wars, The (U) Traffic analysis

Origination and Evolution of Radio Vol6, No 1, Radio Tr f l~c Analysis: The World War I Era, Spr 87 Communications The (U1 Tr&c analysis

World War 1

Page 49: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF .I~:A525813 (k) i 3 ) - F . L . 86-36

Author 1 Title

Origination and Evolution of Radio Trac Analysis: World War 11, The (U)

A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)

I I T3343 Software Evaluation Effort (U)

Further Results in Programming the

Future Spy Camera, The (U)

Introduction to a Historic Computer Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)

Programmable COMSEC and the CYPIUS Crypto-Microprocessor (U)

I I WE: On the Job Enthusiasm A Layman's Perspective (U)

I 1 Out of Control (U)

Theoretical Implications of a Second Spectrum (U)

Internet: Opportunity and Challenge for the Information Services Organization at the National Security Agency (UI

-1 Closer Look at the First Russian Language Proficiency Test, A (U)

Four-Power Conference: Looking a t a Few Unique Translations from NSA's First Russian Language Proficiency Test, The (U)

Reference Keyword

Vol7, No 4, Win 89

Radio communi- cations

Traffic analysis World War I1

Vol 10, No 2, Sum 91

Vol4.85 (CA Issue)

Vol6, No 1, Spr 87

Vol. 15, No. 1, Spring 96

Vol. 13, No. 4, Winter 94

Vol9, No 1, Spr 90

Vol7, No 2, Sum 88

Vol. 15, Special Edition 96

Vol8, No 3, Fall 89

Vol. 15. No. 4. Winter 96

Vol. 12, No. 2, Summer 93

Vol. 13, No. 1, Spring 94

Computer security Cryptographic

network

Computer software

Computer programming

Holographic camera

INFOSEC

Computers Cryptanalysis Pendergrass, J.T.

Computer software

COMSEC Microprocessor

Human resources Management

Computer security Espionage

Communications COMSEC Neutrinos

Information services

Internet

Language testing

Language testing.

Page 50: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

PQSTD* 3020954 t 3 - . . 88-36 REF ID : ~ 5 2 58#3:1-5c 403

( b ) (31-18 J S C 798 (b! ( 3 ) - P . L . 86-36

Author I Title Rpference Keyword

Callimahos, Lambros D. Rosette Stone and Its Decipherment, I The (U) Vol. 14, Ih. 3, Rosetta Stone Fall 95

Campaigne, Howard H. Time Is -Time Was -Time Is Past: Computers for Intelligence (U)

International Telecommunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The (U)

Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)

Programmable COMSEC and the CYPRIS Crypto-Microprocessor (U)

I Way It Used to Be or What's an RSM

1 Anyway, The, Part I (U)

Conditional Sigmage Analysis and Bulge Estimation (U)

Virtual Reality (U)

I

Pump or Bottleneck? Focus on the Intelligence Analyst (U)

Way It Used to Be, The, Part I1 (From ADVA /GENS to the Alphabet) (U)

Management of TDY Funds: A Graphical Approach (U)

I SIGINT Reporting Training: Some Suggestions for Change (U)

Reading Between the Lies: Methods of Analysis of Soviet Military Literature (U)

Vol6, Nos 3-4, Computer systems Fall-Win 87-88 Intelligence

Vol. 15, Special Edition 96

Vol5, No 3, m Telecommuni- Fall 86 cations

Collection

Vol. 15, Special Satellites Edition 96 Southeast Asia

Space technology

Vol9,Nol, COMSEC Spr 90 Microprocessor

Computer Software

Vol. 13, No. 1, Cryptologic history Spring 94

Vol. 13, No.2, Cryptologic history Summer 94

Vo12,83 Computer (CS Issue) graphics

Management

Vol 1,83 Cryptanalysis (CA Issue)

Vol. 12, Nos. 3-4, Human-computer FalY interaction Winter 93 Virtual reality

Vol8, No 4, Intelligence Win 90 analysis

Vol. 11, No. 2, SIGINT reporting Summer 92 Training

Vol4, No 3, Reporting Fall 85 Soviet Union

Page 51: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3 0 2 0 9 5 4 (bj(3)-F.L. 86-36

ib) i l l

REF ID:A5258%B'-50 (b) 131-18 U3C LSC 798 403

[b)(31-P.L. 86-36

Author I Title Reference Keyword

Digital Voice Compression Algorithm Vol2, Nos 1-2, Communications with Robust Properties, A (U) Spr-Sum 83 Database

Mathematics

Digital Communicatione: Introduction Vol 1, No 4, Communications and Trends (U) Win 83

Intelligence Preparation of the Vol. 12, N0.2, IPB Battlefield: How Can NSkImprove Its Summer 93 Contributions to the IPB Process? (U)

I Connect the Dots: ~hd-bid to Studying Associations (U)

Book Review: Electronic Warfare: Element of Strategy and Murtiplier of Combat Power (U)

Modular Arithmetic in Hardware (U)

Vol7, No 4, Computer systems Win 89 Mathematics

Vol7, No 4, Computer systems Win 89 Mathematics

Vol 1, No 2-3. Book review Sum-Fall 82 Electronic warfare

Vol. 11, No. 4, Hardware Winter 92 descriptive

languages Modular

arithmetic d I A Story of Vol 10, Nos 3-4,

Successful BGINT CooperationwC ; ; c. T Fall-Win 91 Terrorism

Compacting the Masscomp Disk (U) Vol8, No 2, Digitizing Sum 89 Disk

Supercomputere

Vol. 15, Special Edition 96

XNS Ethernet Connections for the IBM Vol4, No 1, Computer PC XT (U) Spr 85 networks

V014,85 (CS Issue)

I Development of a Hard Disk Erasure Vol10, Nos 3-4, Computer security Procedure (U) Fall-Win 91 Disks

Book Reuiew: America's Military Vol.13,No.l. Bookreview Revolution: Strategy and Structure Spring 94 Cold War after the Cold War (U) Military strategy

Page 52: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A5258&3 (b) (3) -5C USC 403 (b) (3) -18 JSC 798 [ b ) ( 3 ) -P.L. 85-36 -

Author Title Reference Keyword

Computer Scripting of Arabic: Not the Vol2.83 Computer systems Impossible Dream- (CS Issue) LanWage

Vol. 14, No. 3, Codebooks Fall 95 Cryptolinguistics

LARC: An Electrical Parameter Vol9, No 2, Computer Extraction Algorithm for VLSI Sum 90 Software Standard Cell Designs (U)

Synthetic Diamond: A Hard Rock Story Vol. 15. No. 1, Multi-chip That Moved Supercomputing Out of the Spring 96 modules Basement (U) (MCM)

Synthetic diamond

NSA's Lessons Learned Program (U) Vol. 14, No. 3, Lessons learned Fall 95

NIKKEL II Signal Processor or Getting Vol7, No 1, Computer systems Your NIKKEL'S Worth, The (U) Spr 88 Signal processor

ACQUAINTANCE: A Twl for Language Vol 7. No 4, Computer systems Identification (U) Win 89 Language

Mathematics

Connect the Dots: The PARENTAGE Aid Vo17, No 4, Computer systems to Studying Associations (U) Win 89 Ma thematics

Oh Boy ... You Really Have Your Hands Vol8, No 3, Intelligence Full! Two-Year-Old Twins and the Fall 89 analysis Complexity of Intelligence Analysis (U) Ma thema tics

PARENTAGE: Waldo's Dream (U) Vol7, No 4, Computer systems Win 89 Mathematics

World War 11 German Army Field Vol. 14, Xo. 4, German ciphers Cipher and How We Broke It, A (U) Winter 95 World War I1

CRYPTRONICS or Cryptanalysis and Vol. 15, Special Cry-ptanalysis Cryptography in Microelectronics (U) Edition 96 Cryptography

NIicroelectronics

Computer systems ELINT

Cobra Judy Acquisition, The (U) Voll,No4, Win 83 0

In France's Footsteps (U) Vol4, No 3, Intelligence Fall 85

Page 53: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

b ) 3 ) - P . L . 6 6 - 3 6

DOCID: 3020954 REF ID:A525813

I Address Given to Annual Cryptanalysis Vol 1,83 Cryptanalysis Exchange (U) (CS Issue)

Author

DOWNIX Interoperability and E-mail Vol11, No 1, Computer in the Agency (U) Spr 92 hardware

Computer software

Title Reference Keyword

Communist Carol, A (Ul Vol6, Nos 3-4, Parody Fall-Win 87-88

I Cryptanalysis: A Prognosis for the Vol 1, No 1, Cryptanalysis Eighties (U) Spr 82

I Essential Difference, The (U) Vol5, No 4, Human factor Win 87 Management

An Expanded MAX-MIN Priority Queue Vol10, No 2, Computer ' ( LuI Sum 91 software

I Statistical Method for Quality Control of Vol. 15, No. 2, Chip design Microelectronic Chip Design, A (U) Summer 96 Statistics

GLISSADE Lessons Leaned from a Rapid Vol. 13, No. 3, GUSSADE Prototype (U) Fall 94 Software system

design

Artifical Intelligence and Expert Vol9, No 2, Artificial Systems: Do They Have a Future in Sum 90 intelligence Management? (U) Management

Strategic Management and Mid-Level Vol. 12, No. 1, Management Managers: Is There a Link? (U) Spring 93 Strategic

management

Artifla1 Intelligence and Expert Vol9, No 2, Artificial Systems: Do They Have a Future in Sum 90 intelligence Management? (U) Management

I Telephone Codes and Safe Vol. 12, No. 1, Safe combinations Combinations: ~ . D e a d l ~ Duo (U) Spring 93 Telephone codes

I Encapsulating Xt Callback Functions in Vol11, No 1, Computer C+ + (U) Spr 92 Programming

Prototype Knowledge Base System for Vol5, No 4, Computer systems Technology Espionage : An Interim Win 87 Report, A (U)

(Painful) Learning Experience from the Vol. 12, Nos. 3-4, Signals analysis Past, A (U) FalY

Winter 93

Page 54: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813

Keyword Author

Computer Software

Management Requirements

Title Reference

TURBOTECH: An Architecture Vol8, No 4, Management and Analysis System (U) Win 90

Code Acquisition by Binary Vol. 13, No. 3, Autodirective Search (U) Fall 94

Code synch- ronization

Spread spectrum communi- cations

Farley, Robert D.

Fiber Distributed Data Interface, The (U)

Vol7, No 1, Spr 88

Computer networks

Book Review: On ULW Active Service (U)

Vol10, Nos 3-4, Fall-Win 91

Auetralian SICINT operations

World War II

Hitler Gambit Versus the Great Anyway, The (U)

International affairs

Vol5, No 1-2, Spr-Sum 86

Faurer, Lincoln D., LT GEN, USAF

Closing Address, Frontiers in Supercomputing Conference (U)

I

Vol2, Nos 1-2, Spr-Sum 83

Supercomputers

Operational Application of VLSI Technology: C'sing the PF474 to Alleviate the Problem of Variant Names, An (U)

Vol4, No 2, Sum 85

Computer programming

Vol. 12, No. 2, Summer 93

Software applications

Transliteration

Software Application to Correct the Effects of Transliteration "Errors" on Database Integrity, A (W

I Managing Change tU) Volll, KO. 1, Spr 92

Management

Parable of the Tail with No Teeth, The (U)

Management Vol7, .Yo 1, Spr 88

Parable of the Tail with No Teeth Part 11: Into the Teeth of the Tail, The (U)

Vol8, No 2, Sum 89

Management

Vol8, No 4, Win 90

Management Parable of the Tail with No Teeth Part 111: The Training Tail That '

1 Wagged the Teeth, The (U)

Parable of the Tail with No Teeth Part IV: The Tarnished Teeth of the Golden Tail, The (U)

Vol9, No 3, Fall 90

Management

Page 55: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813 (b) ; 3 ) - P . 1 , . 86-36

I Title Author Reference Keyword

The Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail (U)

Vol 10, Nos 3-4, Fall-Win 91

Management

Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U)

Vol. 11, No. 2, Summer 92

Management

Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (U)

Vol. 11, No. 4, Winter 92

Management

Book Review: Codebreakers: The Inside Story of Bletchley Park (U)

Vol. 13, N0.2, Summer 94

Bletchley Park Book review Enigma Ultra

Filby, P.W.

I Book Review: British and American Approaches to Intelligence (U)

Vol7, No 2, Sum 88

Book review Britain Intelligence

Book Review: Intelligence and National Security (U)

Book review Intelligence Security

Vol5, No 4, Win 87

Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (UI

Vol7, No 1, Spr 88

Book review COMINT History Ultra

Book Review: Room 40: British Naval Intelligence 1914-18 (U)

Vol2, Nos 1-2, Spr-Sum 83

Book review History Intelligence

Book Review: The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (U)

Vol5, No 4, Win 87

Book review Intelligence

Collection Challenges Represented b y the Proliferation of Very Small Aperture Terminal Communications, The (U)

Vol. 13, No. 3, Fa11 94

Collection VSAT

Vol4.85 (CS Issue)

Computer systems Engineering

Information Engineering: Integrated Methodologies for Building a Transcriber Information Aids System (U)

Page 56: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

)-50 USC 403 REF 1~:~52581#$' 3)-18 USC 793

Author I Title Reference Keyword ~

Multimedia Databases: Design Issues, NSA Applications, and Prototypes (U)

MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)

Voi 9, No 2, Database Sum 90 Computer

hardware

Vol. 15, No. 3, ATM Fall 96 MILKBUSH

Comparison of Long Pipeline Protocols Vol7, No. 4, Computer (I?) Win 89 software

Computer networks

In Pursuit of a SONET Link Encryptor Vol10. No 1, (L') Spr 91

Multidisciplinary Interaction: The Time Vol. 15, Is Now! (U) Special

Edition 96

Vol9, No. 3, Fall 90

I I Listing Algorithms (U)

I

Computer networks

Link encryptor Optical

Comments on Supercomputing (U)

Friedman, William F.

Multidisciplinary interaction

SUNDIAL SINTER

Diary of 23 April-13 June 1943. Part I (V)

Computer software

Memory devices

Vol2, Nos 3-4. Mathematics Fall-Win, 83-84

Vol4, Xo 1, Mathematics Spr 85 - Vol. 13, So. 3, Fall 94

targets

Vol2, Nos 1-2, Supercomputers Spr-Sum 83

Vol 1, Eios 2-3, Friedman, William Spr-Fall82 F.

History Human factor

Vol l,?Jo4, Friedman, William Win 83 F.

History Human factor

Page 57: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

, , , ,

b) ( 3 ) -50 USC 433

REF ID : ~5 b5818usc (b)(3;-P.L. 8 6 - 3 6 798

Author

n Gtuldy, David W.

I Title Reference Keyword

I IMP Syntax Graph, The (U) Vol4, No 4, Win 86

Computer programming

First U.S. Government Manual on Cryptography, The (U)

Vol. 11, No. 4, Winter 92

Cryptography Cryptologic

history

Kent, Sherman A. Personality I Reflection of Sherman Kent, A (U) Vol5, Nos 1-2,

Spr-Sum 88

Book Review: International Journal of Intelligence and Counterintelligence

Vol6, NOS 3-4, Fall-Win 87-88

Counterintellig- ence

Intelligence

Crypto-TA: The Mighty Morphin of Technical Analysis (U)

Vol. 13, No. 4, Winter 94

Glimpses of a Man: The Life of Ralph J. Canine (U)

Vol6,No 2, Sum 87

Biography DIRNSA

Data Transmissions (U) Vol. 15, No. 3, Fall 96

Collection equipment

Receivers

Vo1.15. No. 2. Summer 96

Morse I Morse Mechanization (U)

I NSA Signal Collection Equipment and Systems: The Early Years - Antennas

Vol. 14, No.4, Winter 95

Antennas HF collection Signal collection

equipment

NSA Signal Collection Equipment and, Systems: The Early Years - Magnetic Tape Recorders (U)

Vol. 15, No.1, Spring 96

HF collection Magnetic tape

recorders

I NSA Signal Collection Equipment and Systems: The Early Years - Receivers

Vol. 14, No. 2, Summer 95

Analog technology Digital technology Receivers Signals

Vol. 13, No. 4, Winter 94

Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)

Vo19. No 1, Spr 90

Management Procurement

Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)

V O ~ 7,No 3, Fall 88

Computer networks

Computer systems

Page 58: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF 1 ~ : ~ 5 2 5 $ ! % g 1-50 USC 403 1-18 L S C 798

(h) ( 3 ) - P . l . 86-36

I Author Title Reference Keyword I

#

Vol9,No 4, Win 91

Error Messages: The Importance of Vol 1 1, No 1, Computer Cood Design (U) Spr 92 programming

Computer systems

II Another Look at TEABALL, and Where Vol 11, No 1, S I G N support We've Cone from There (U) Spr 92 Vietnam War

Book Review: %etnam Spook Show (U) Vol11, No 1, Linguistics Spr 92 S I ~ N T support

Vietnam War

II Intelligence: A Business or a Craft (U) Vol7,No 3, Intelligence Fall 88 Management

Requiem for TEAM SPIRIT,A (U) Vol. 11, No. 2, Korea Summer 92 Support to military

operations TEAM SPI IUT

So Where Do the Analysts Come From? Vol. 12, Nos. 3-4, Intelligence FalV analysts Winter 93 Management

Gerson, N. C. I Artificial Ionospheric Modif~cation: Vol9, No 1, Communications Practical and Potential Applications (U) Spr 90 Ionosphere

Communications and the Ionosphere (U) Vol 1, No 4, Communications Win 83 HF

Ionosphere

Examination of SSL Target Location Vol. 15, No. 2, SSL tar t location Accuracies, An (U) SummerW I- -

I Future of High Frequencies in Vol. 11, No. 2, Cryptology i Crrptology - Part I, The (U) Summer 92 HF Communi- I cations Future of High Frequencies in Vol. 11, NO. 3, Cryptology Cryptology - Part 11, The (U) Fall 92 HF Communi-

cations

Future High Frequency Target Location Vol2, Nos 1-2, HF System, The (U) Spr-Sum 83

I HFDF Research Attempts: Past and Vol 1, Nos 2-3. HF Future (U) Sum-Fall 82

Page 59: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813

Author Title Reference Keyword

Sub-HF Search and Acquisition (U) Vol. 13, No. 2, Radio frequencies Summer 94 Search

Attempted Imposition of Sharia on the Vol4, No 2, Middle East Sudan, The (U) Sum 85

Computer Graphics Database Design Vol2,83 Computer Aid Package, A (U) (CS Issue) graphics

Database

Now Playing: Churchill as Pearl Vol. 11, No. 2, Churchill, Winston Harbor Villain or Do We Need Another Summer 92 JN-25 naval code Conspiracy Theory? (U) Pearl Harbor

Bringing User Power to the High Vol9, No 2, Computer Performance Workstation (U) Sum 90 networks

Management

Signaling System No. 7: And What Vol. 13, No.3, CCS7 about Analysis (U) Summer 94 Communications

networks

Vol. 15, No. 2, Summer 96

Analysis of the Random and Sequential Vol. 11, No. 4, Random viruses Viruses (U) Winter 92 Sequential viruses

Software analysis

Certification of the Air Force Vol. 12, No. 2, Air Force Intelligence Officer: What Now? (U) Summer 93 intelligence

Training

Creating an Information Space: Vol. 12, Nos. 3-4, Database Cyc and Carnot (U) Fall/ management

Winter 93 systems

Standards for Information Exchange Vo19, No I , Computer network among Computers (U) Spr 90 Computer systems

SPLASH: An Overview of a Systolic Vol9, No 2, Computer Array Processor for the Sun (U) Sum 90 networks

Computer software

Vol. 13, No.2, Counter- Summer 94 intelligence

Spaceborne

ABM Treaty and the Dilemma of 0

Vol5, Nos 1-2, Defense Indecision, The (U) Spr-Sum 86 Soviet Union -

56 (b) 1) (b) 131-56 USC (b) ( 2 ) - e usc (h) (3)-P I U i

Page 60: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID : A52 58$#:i-,, ,,, ,,, l ib) (3)-18 USC 79E !(b) ( 3 ) - P . L . 86-36

Title Reference

Gronet, Richard W.

Curin, Jacob (Jack)

Book Review: The CIA in Guatemala Vol 1, No 4, (u) Win 83

Cognitive Processes in Software Fault Vol. 11, No. 2, Detection (UI Summer 92

Impressions of the 1995 American Vol. 16, No. 1, Translators' Association Conference in Spring 96 Xashville as Viewed from the Perspective of thf

Translating by the Seat of Your Pants: Vol3, Nos 1-2. Some Observations about the Spr-Sum 84 Difficulties of Translation and How to Deal with Them (U)

Enhancing Auditory Perception (U) Vol 1, Nos 2-3, Sum-Fall 82

Language Expert System: Squeezing khe Vol4, No 1, Expert Linguist into a Computer (U) Spr 85

I Spoken Language Library: A Unique Vol5, No 3, Institution (U) Fall 86

'Things Aren't What They Used to Be" Vol 1 , No 1, Spr 82

I You've Got to Go by the Rules (L) Vol 2, Nos 3-4. Fall-Win 83-84

I I

Book Review: American Black Vol4, NO 2, Chamber. The (U) Sum 85

Book Reuiew: "And I Was There": Pearl Vol5, NOS 1-2, Harbor and Midway - Breaking the Spr-Sum 86 Secrets (L)

Keyword

Book review CIA

Cognitive process Computer

programming Computer

software

Language Translation

Japan L ~ n w a g e Linguistic Translation

Database Translation

Computer systems Language Linguistic

English Lanlwage

Cryptology Editorial

L=%uam English

Collection signals

Black Chamber Book review Cryptanalysis History

Book review History Japan Pearl Harbor World War I1

Page 61: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813

Author

Hanyok, Robert J.

Hatch, David A.

Title Reference Keyword

With Pail and Shovel: The "Sandbox Approach" to Management and Leadership (U)

Vol6, No 4, Win 86

Management

Book Review: Black Cipher (U) Vol. 14, No. 4, Winter 95

Book review Espionage

Book Review: French Secret Services: From the Dreyfus AfTair to the Gulf War, The (U)

Guerrilla8 in the Mist: COMINTand the Formation and Evolution of the Viet Minh, 194146 (U)

Vol. 15, No. 4, Winter 96

Book review French secret service

Vol. 15,No. 1, Spring 96

COXINT Viet Minh Vietnam

Book Reuiew: Inside Hanoi's Secret Archives (U)

Vol. 15, No. 1, Spring 96

Book review POW/MIA Vietnam War

Book Review: My Silent War (U) Vol. 14, No. 3, Fall 96

Book review Eepionage

Ptojeet POSTCARD (U) Vol. 13, No. 3, Fall 94

Deception PO6lCARD Vietnam problem

[Sensitive Title] Vol. 15, Special Edition 96

Call forwarding Data exfiltration

A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)

Vol10, No 2, Sum 91

Computer security Cryptographic

network

Examples of Lattices in Computer Security Models (U)

Vol4, No 4, Win 86

Computer security

Shallow Junction Formation in Silicon Using Ion Implantation (U)

Vol5, No 4, Win 86

Microelectronics

Book Review: Breaking the Maya Code (U)

Vol. 13, No. 1, Spring 94

Book review Linguistics Maya code

Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)

Vol. 15, Special Edition 96

Algorithm benign loading

Book Review: Eyeball to Eyeball: The Inaide Story of the Cuban Missile Crisis (U)

Vol. 11, No. 3, Fall 92

Book review Cuban Missile . Crisis

Page 62: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DQCSI3.t. d - U 0 9 5 4 REF I D r A 5 2 5 8 1 3 - Author I Title

Book Review: Honorable Treachery: A History of U.S. Intelligence, Espionage. and Covert Action from the American Revolution to the CIA (U)

Development of Cryptologic Training, 1949 to 1960, The (U)

SIGINT Talking (U)

,Thumbnail Review: Dirty Little Secrets: Military Information You're Not Supposed to Know (U)

Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)

Book Review: Shadows of the Rising Sun: A Critical .View of the "Japanese Miraclen (U)

I I In Defense of Translation (U)

I I On Perverted Priorities (U)

Low Earth Orbit (LEO) Satellite Communicatione Systems Technology and Intercept Issues (U)

Middle Management and the Soviet Problem: Some Reflections'o,

Signal Descriptor Language, A (U)

INTERROGRAPH: An Information Tool for Counter-Terrorism Intelligence Centers (U)

Modern Signal Routing (U)

d l Notes on Optimization (U)

Reference Keyword

Vol. 13, No.3, Book review Fall 94 Espionage

SIGINT

Vol9, No 3, Training Fall 90

Vol. 12, No. SIGINT jargon Summer 93

Vol. 12, No. 2 Thumbnail review Summer 93

Vol 10, Nos 3-4, Language Fall-Win 91 Terms

Vol4, No 3, Lw!uage Fall 85 Linguistic

Japan

Vol3, Nos 1-2, Book review Spr-Sum 84 Japan

Vol4, No 2, Language Sum 85 Linguistic

Vol3, Nos 1-2, Language Spr-Sum 04 Linguistic

Vol. 12, Nos. 3-4, Communication Fall/ satellites Winter 93

Vol2, Nos 1-2, Management Spr-Sum 83 Soviet Union

Vol3, Nos 2-3, Computer systems Fall-Win 84-85 Electronics

Vol2.83 Computer (CS Issue) graphics

Intelligence

Vo1.15, No. 4, Signalrouting Winter 96

Vol7, No 1, Computer Spr 88 programming

Page 63: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Author Title Reference Keyword

Korean Phonology System: An Vol8, No 1, L ~ ~ g ~ a f i e Automated Language Information Aid Spr 89 Transcription for Transcribers, The (U) system

Problem Encountered with the Variant Vol7, No 2, Computer Record Construct in Ada (U) Sum 88 network

Variant record

Decade of Information Service a t FANX, Vol8, NO 3, Information A (U) Fall 89 support

Library

SIGINT Support to Military Operations: Vol. 12, No. 1, Support to military Organizing for Effective Spring 93 operations Crisis/Contingency Support (U)

Introduction to Asynchronous Transfer Vol. 14. No. 1, ATM Mode (U) Spring 95 Communications

network technology

:gir2# TI L I

Vol 10, No 1, Telephone Spr 91 Traffic analysis

c Vol. 13, No. 4,

Electronic Procurement Request Vol9, No 1, Management Processing: A Coal for Improved Spr 90 Procurement Resources Management (U)

.On-the-Job Training: A Supervisor's V0l8, No 1, Training Responsibility (U) Spr 89 Management

Human resources

Cryptanalysis in the United Kingdom Vol. 12, Nos. 3-4, Cryptanalysis (U) Fall1

Winter 93

Linguistic "Funny," A (U) Vol5, Nos 1-2, Humor Spr-Sum 86 Linguistics

Page 64: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 - Author I Title Reference Keyword

Information System Security Engineering: Application Customer Focused (U)

Vol. 11, No. 3, Fall 92

Information security

Open systems

Signal analysis Hudec, James G.

I Vol. 15, No. 4, Winter 96

Vol3, Nos 1-2, Spr-Sum 84

Vol5, KO 4, Win 87

Vol6, NOS 3-4, Fall-Win 87-88

Signal Analysis - Some Parting Thoughts (U)

Tools for the Beginning Translator (U)

Book Reuiew: One American Must Die

Computer systems Translation

Book review Human factor

Book review Iran Middle East

Middle East Terrorism

Book Reuiew: Sacred Rage: The Crusade of Modern Islam (U)

I I Book Review: The Master Terrorist: The True Story behind Abu Nidhal (U)

Vol6, KO 1, Spr 87

ATM MILKBUSH

MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)

Vol. 15, No. 3, Fall 96

I I Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)

Vol3. Nos 1-2, Economics Spr-Sum 84 Soviet Union

I1 Designers vs Users: Bridging the Communication Gap (U)

Vol2.83 Computer (CS Issue) graphics

Agency Electronic Printing Standards: Today It's PostSeript and Interpress Page Description Languages (U)

Vol9, No 3, Electronic printing Fall 90

Applying Object Technology to Our CLOVER Network (U)

High-Tech Trade War with Japan: Can Anyone Win?, The (U)

VO~. 12, NO. 2, CLOVER Summer 93 Object-Oriented

technology

Jelen, George F. Vol5, Xos 1-2, Economic warfare Spr-Sum 86 Japan

Stab a t A2 Criteria, A (U) Vol9, No 1, Computer security Spr 90

Jenkins, Virginia C. I Debunking Some Old Myths about Critical-Grade Promotions (U)

Vol 1, No 1, Performance Spr 82 Promotion

Jenkins, William RATBAG Report, The (U) Vol. 12, Nos. 3-4, Computer security FalU Winter 93

Page 65: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 ( 3 : ( 3 ) - P . L . 3 6 - 3 6

REF IDzA525813 - Author

Johnson, Thomas R.

Title Reference Keyword

Identifying Spoken Languages: A Vo1.15, No. 3, Language Community Problem Whose Time Has Fall 96 Come (U)

Book Review: Secrecy and Democracy: Vol4, No 3, Book review The CIA in Transition (U) Fall 85 CIA

History Intelligence

Meteor Burst Communications: An Vol9, No 3, Collection Ignored Phenomenon? (U) Fall 90 Communications

Book Review: A Century of Spies: Vol. 15, No.3, Book review Intelligence in the Twentieth Century Fall 96 Intelligence (U)

Book Review: Marching Orders: The Vol. 14, No. 4, Book review Untold Story of World War 11 (U) Winter 96 World War I1

Book Review: The Eavesdroppers (U) Vol. 14, No. 1, Book review Spring 95 Espionage

SIGINT

Book Review: The Invasion of Japan: Vol. 14, No.2, Atomic bomb Alternative to the Bomb (U) Summer 95 Book review

Japan WWII

Book Reuiew: Spywars: Espionage and Vol. 14, No. 2, Book review Canada from Couzenko to Glasnost (U) Summer 95 Canada

Espionage

Book Review: The Target Is Destroyed: Vol5, No 3, Book Review What Really Happened to Flight 007 Fall 86 Communications and What America Knew about It (U) SIGINT

Soviet Union

Handy-Dandy Field Site History: Fifty Vol. 14, No. 1, Cryptologic history Years of Field Operations, 1945-1995, Spring 95 Field sites The (U)

Intelligence and the American Vol. 14, No. 3, Book review Presidency (U) Fall 95 Intelligence

Move, or How NSA Came to Fort Meade, Vol. 14, No. 2, Cryptologic history The (U1 Summer 95 NSA

SIGINT Goes to War (U) Vol. 13, No. 3, SIGINT doctrine Fall 94

NSA and SAC (U) Vol5, Nos 1-2, Intelligence Spr-Sum 86 Support

Page 66: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 ~ b i ( 3 ) - P . L . 86-36

Author I

l b ) (1)

REF ID:A525813 'c) b) (3)-50 (31-18 USC usc 403 798

(b)(3)-P.L. 86-36

Title Reference Keyword

Through Thailand by Train: A Personal Vol4, No 3, History Memoir (U) Fall 85 Human factor

What Every Cryptologist Should Know about Pearl Harbor (U)

I TQM and Software: New Paradigms for Development and Support (U)

Begin and Arafat (U)

Cryptologic Origin of Braille, The (U)

1 The Plight of the Condor (U)

The Rornanization of the Korean Language Based on the Character Values (U)

Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (L')

Obscenities in COMINT: A Need for Cognitive Knowledge (U)

Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)

Vol6, No 2, cr~rptol0gy Sum 87 History

Pearl Harbor

Vol11, No 1, Spr 92

Vol2, NOS 1-2, Spr-Sum 83

Vol. 14, NO; 3, Fall 95

Vol10. No 1, Spr 91

Vol11, No 1, Spr 92

Computer software

TQM

Middle East

Braille Communications

Collection SIGINT

Laniwage . (Korean)

Vol7,No2, Electrochemical Sum 88 Photoresist

Vol. 15, Special Edition 96

v014, KO 1, L ~ ~ g ~ a g e Spr 85 - Linguistic

Vol. 13. No. 2, Book review Summer 94 Economic

espionage

Book Review: Informing Statecraft (U) Vol. 12, No. 2, Book review Summer 93 Intelligence

community

Book Review: S I G I ~ T Secrets: The Vol. 12, No. 1, Book review Signals Intelligence War, 1900 to Today, Spring 93 Cryptologic The history

SIGSN'S

Page 67: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 [bl ( 3 ' - ? . L . 86-36

Author -i REF ID:A525813 ;;;;;; - 5 0 . J s c 4 0 3

(bj(3j-18 LISC 798 (b) ( 3 ) -P.;. 86-36

Title Werenoe Keyword

Book Review: Ultra-Magic Deals and Vol. 12, Nos. 3-4, Book review the Most Secret Relationship, 1940- FalU BRUSA 1946, The (U) Winter 93 agreement

Magic Ultra

Foreign Language Proficiency Vol7, No 3, Language Maintenance (U) Fall 88

Book Review: Chicksands: A Millenium Vol. 13, No.3, Book review of History (U) Fall 94 Chicksands

Field sites

I 1 Vol. 15, Special Edition 96

Developing a Document Image Vol. 11, No. 3, Processing System (U) Fall 92

Introduction to Distributed Processing Vol. 15. NO. 3, for the Layperson: Making the Move Fall 96 from the General Store to the Supermarket. . . , An (U)

I I Twenty Questions to Evaluate Your Vole, No 1, Manager (U) Spr 87

I I Volunteering: A Fresh Approach (U) Vol8, NO 1, Spr 89

History of the TACOMETER Development, Vol. 12, No.2, A (U) Summer 93

Recent Progress in Academic Vol4, No 2, Cryptology (U) Sum 85

Decade of Information Service a t FANX, Vol8, No 3, Fall 89

Kirby, Oliver R.

UCSD p-System, The (U) Vol4.85 (CS Issue)

Origins of the Soviet Problem: A Vol. 1 1, No. 4, Personal View, The (U) Winter 92

Desktop publishing

Document image processing

Distributed processing

Management

Human resources Management

Cryptology

Cryptologic history

Soviet ptoblem

Information support

Library

Computer systems

(b) (1) (h) 3 - F . 1 , . 86-35

Page 68: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 { t ) ( 3 ) - F . 1 , . 86-36

REF ID : A52 58$3ji/-53 403

(C)13)-18 USC 198 (b) (3)-P.L. 8 6 - 3 6

Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesia (U)

Author

I Satellite-Earth Radio Link Depolarization by Ice Cryetals (U)

Title

Cornmunicationa Security and the Problem of Hamlet: To Be or Not to Be (U)

Language Multimedia-A Makeover (U)

II Holistic Analysis (U)

Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The (U)

Reference Keyword

Vol3, Nos 3-4, Communications Fall-Win 8485 Security

Vol. 13, No. 2, Computer- Summer 94 managed

instruction Language training Video technology

Vol10, No 1, Computer-assisted spr 91 instruction

Computer programming

Language

Vol 10, Nos 3-4, Fall-Win 91

Personal computers

Vol2, Nos 1-2, Communications Spr-Sum 83 Engineering

Vol4, No 1, Analysis Spr 85 Collection

Vol. 11, No. 2, Budget process Summer 92 Computer

programming Management

Vol9, No 4, Radio Communi- Win 91 cations

n Developing a Feedback Maintenance System (FMS) on Carillon (U)

T3343 Software Evaluation Effort (U)

Vol4,85 Communications (CS Issue) Computer systems

Vo14,85 Computer (CS Issuel software

Development of a Hard Disk Erasure Procedure (U)

Vol10, Nos 3-4, Computer security Fall-Win 91 Disks

Page 69: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813)(1) (b)13)-53 US: 403

( b ] (3)-18 USC 798 (h) ( 3 ) - J . I A . 8 6 - 3 6

'k) (j)-P.>. P 6 - 3 C -

Computer Virus Organization: A Vo15, No 3, Definitive Taxonomy and Anatomy of Fall 86 Computer Viruses (U)

Author

I I Military Intelligence Corps Hall of Vol10, No 1, Fame (U) Spr 91

Title Reference Keyword

I I Language Cross-Training: Alternatives Vol. 11, No. 3, and Permutations (U) Fall 92

Generalized GMW Sequences and an Vol3, Nos 1-2, Application to Frequency Hopping (U) Spr-Sum 84

Book Review: Concise History of the Vo14, No 1, Middle East, A (U) Spr 85

Calculation of Threat: A Review of Voll, Nos 2-3, Intelligence Community Initiatives for Sum-Fall 82 Indications and Warning (U)

I I Segment Storage: Hierarchical Vol8, No 2, Graphics Storage System (U) Sum 89

07 Shootdown: A View from Vol. 12, Nos. 3-4, FalU Winter 93 u Vol2, Nos 3-4, Fall-Win 83-84

I I LOCKing Computers Securely (U) Vol7, No 1, Spr 88

52 Software Process Improvement Effort Vol. 16, No. 3. Measures of Value, The (U) Fa11 96

Computer security

Computer virus

Intelligence Personalities

=angusg= training

Linguistics

Electronics Engineering Mathematics

Book review History Middle East

Intelligence

Computer Graphics

KAL 007 (hi (1) (b)(3)-P.; 86-36

Communications SIClNT

Computer security

Software process improvement

Case Study in UNlX System Vol. 12, No. 1, Signals Spring 93 transmission

Human Visual Perception and Man- Vol4,85 Computer Computer Interaction (U) (CS Issue) graphics

Millimeter Wave Transfer Function of Vol5, Nos 1-2, Collection the Earth's Clear Air Atmosphere (U) Spr-Sum 86 ELI~T

Page 70: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 (bj(3)-?.L. 86-36

Author I Title Reference Keyword

Lutwiniak, William

Signal Descriptor Language, A (U) Vol3, Nos 3-4, Computer systems Fall-Win 04-85 Electronics

I Vol. 15, No. 2, Summer 96

John H. Tiltman: A Reminiscence (U) Vol 1, Nos 2-3, Personality Sum-Fall 82 Tiltman, John H.

Introduction to Optical Lithography Modeling (U)

Introduction to Optical Projection Lithography Tools (U)

Introduction to Positive Photoresist Processing (U)

Gorbachev in Historical Perspective (U1

NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)

Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)

I Effects of Pictures on Adult Learning and Recall, The (U)

I Object Oriented Programming with C + + (L')

I Signalman's Odyssey (U)

I NSA: How Much Do We Really Know about the Software Capability of Our Contractors? (U)

1 Ideograph Writing Patterns and Computer Input (U)

Vol6. Nos 3-4, Fall-Win 87-88

Vol8, No 1, Spr 89

Vol6, No 2, Sum 87

Vol8, No 4, Win 90

Vol. 15, No. 1, Spring 96

Vol. 14, No. 2, Summer 95

Vol. 11, Wo. 2, Summer 92

Vol. 12, Nos. 3-4, Fall/ Winter

Vol4, No 1, Spr 85

Vol. 14, No. 1, Spring 95

Vol4, No 3, Fall 86

Optical Lithography

Optical Lithography

Optical Lithography

Gorbachev, Mikhail

History Soviet Union

Data Encryption Standard (DES)

Public cryptogra~h~

Cryptologic history Sinkov, Abraham WWII

Training Visual learning

Object Oriented programming

History Human factor

Software assurance

TCMM

Computer systems ~~~~

Page 71: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

( b l (11

REF ID : A52 !$3?;4;$: DOCID: 3020954 i i b)(j)-P.L. 8h-36 (b) ( 3 ) - P . L . 86-36

Author I Title Reference Keyword

Perfect Router for the RINGSTONE Vol. 12, No. 1, RINGSTONE Backbone, A (U) Spring 93 backbone

Router configurations

52 Software Process Improvement Effort Vol. 15, No. 3, Software process Measures of Value, The (U) Fall 96 improvement

Frequency Hopping Vulnerability to Vol 1, No 1, Communication Spr 82

Vol5,86 Cryptanalysis (CA Issue) cryptography

Mathematics

Cryptographic Applications of Singular Vol 1,83 C r Y ~ t o g r a ~ h ~ Value Decomposition (L') (CA Issue)

McConnell, Vice Admiral J.M., USN

Director's Welcome at the 1992 Cryptologic History Symposium, The (U)

In Pursuit of a SONET Link Encryptor (U)

Radio Intelligence in Japanese and American North Paciftc Naval and Air Operations (U)

Architecture and Implementation for a Large Scale Distributed Multiprocessor, An (U)

Vol. 12, No. 1, Spring 93

Vol10, No 1, Spr 91

Vol9, No 2, Sum 90

Vol8, No 3, Fall 89

Cryptologic history

Computer networks

Link Encryptor Optical

History Japan Pearl Harbor Radio intelligence World War I1

Computer networks

Signal processor

Architecture and Implementation for Vol8, No 4, Computer Linear Speedup of DSP Programs, An Win 90 networks (U) Signal processor

McManis, David Y. I Warning and Crisis Management (U) Vol2, Nos 3-4, Communications Fall-Win 83-84 Management

Geographic Information Systems (U) Vol 10, Nos 3-4, Computer systems Fall-Win 91 Information

support

Page 72: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

ibi (1)

DOCID: 3020954 REF ID:A5258$8 31-50 USC 403 3)-18 USC 738

(b) 13)-P.L. 96-36 ( b ) ( 3 ) - F . L . RO-36

Author I Title Reference Keyword

I Future of Cryptology. The (U) Vol5.86 Cryptology (CA Issuel

Vol5, Nos 1-2, Database Spr-Sum 86 Photo-

reconnaissance

I Soviet Oil Production: Energy Balance Vol4, No 2, Oil Prospects for the Future (U) Sum 85 Soviet Union

Meyer, Joseph A.

Development of Decision Support Vol. 12, Nos. 3-4, Decision support Analysis for Trafiic Analysis (U) FaIY systems

Winter 93 Traffic analysis

Computers -The Wailitlg Wall (U) Vol6, Nos 3-4, Computer systems Fall-Win 87-88 Cryptanalysis

Alpe-Adria: A Model for Regional Vol7, No. 3, Economics Economic and Cultural Cooperation or a Fa11 88 International Rebirth of Austria-Hungary? (U) affairs

Cryptographic Mathematics of Enigma, Vol. 13, No. 3, Ciphers The (U) Fall 94 Cryptanalysis

Enigma Ultra

NSA and the Supercomputer Industry Vol. 14, No. 4, HPC technology Winter 96 Supercomputers

Real-Time Signals Acquisition and Vol. 11, No. 2, Signals Processing on UNIX Platforms W%W- Summer 92 acquisition

S i a l s processing UNIX

SKYRAP: A Case Study in UNIX System Vol. 12, No. 1, Signals Optimization (U) Spring 93 transmission

SKYRAP UNIX

I Some Contributions toward a Course in Vol9, No 4, Training COMINTTranslation (U) Win 91 Translation

I TEABALL: Some Personal Observations Vol9, No 4, SIGINT of SICINT a t War (U) Win 91 Vietnam War

Diabolical Diagnosis (U) Vol5,86 Cryptanalysis (CA Issue) Cipher systems

I Exploratory Exploitation (U) Vol5.86 Cryptanalysis (CA Iasue)

Page 73: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 - Title Reference Keyword Author

T - - - -

Distributed Processing on Powerful Per- sonal Computers: Interim Results (U)

- - - -

Vol4.85 (CS Issue)

Computer networks

Further Results in Proarammina the - RISC Does Windows (U)

Vol6, No 1, Spr 87

Computer programming

Computer hardware

Microprocessor

Vol8, No 3, Fall 89

Artificial Intelligence: Approach to Cryptodiagnosis (U)

Vol. 13, No. 1, spring 94

Artificial intelligence

Cryptanalysis

Machine Learning Approach to Text Type Identiflation, A (U)

Vol. 13, No. 4, Winter 94

Discrimination Selection Text type

CRYPTROMCSor Cryptanalysis and Cryptography in Microelectronics (U)

Vol. 15, Special Edition 96

Cryptanalysis Cryptography Microelectronics

Nearest Lattice Point Problem, The (U) Vol . 1 5, Special Edition 96

LLL-algorithm Mathematics Nearest lattice

point problem

Evaluation of Conventional and LDD Devices for Submicron Geometries, An (U)

Vol8, No 1, Spr 89

Transistors

Hot Carrier Effects on VLSI Devices (U) Vol6, No 1, Spr 87

Electron ily'ection

Mowry, David P. I Book Review: Alan Turing: The Enigma Vol2, Nos 3-4, Fall-Win 83-84

Book review Cryptanalysis Enigma History

I Listening to theRum Runners (U) Vol2, NOS 1-2, Spr-Sum 83

Communications History

Regierungs-Oberinspektor Fritz Menzer: Cryptographic Inventor Extraordinaire (U)

Unternehmen BOLIVAR (U)

Vol2, Nos 3-4, Fall-Win 83-84

Cryptanalysis History

Vol3, Nos 3-4, Fall-Win 84-85

History Intelligence

I Developing Effective User Documentation (U)

Volf3. No 1, Spr 87

Programmer

Page 74: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A5258&3 (b)[3)-5C USC 403 (.b) (31-18 USC ?SIE

[b) 1 , 3 ) - l ' . L . 86-.36 ( b ) (3)-P.L. 86-36

Development of a Hard Disk Erasure Procedure (U)

Author

Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)

Title --

Software Inspections (Ul

I Platform Network Evolution, The (U)

I I Eight Cryptologie Problems (U)

Opening Address, Annual Cryptanalysis Exchange (U)

Artif cia1 Intelligence: Approach to Cryptdiagnosis (U)

Machine Learning Approach to Text Type Identification, A(U)

Book Review: One Hundred Days: The Memoirs of the Falklands Battle Group Commander (Ul

I I North Korean Attack on and Seizure of the USS Pueblo, The (U)

History of the South Vietnamese Directorate for Technical Security (C)

Beyond Codes and Ciphers: The Expanded Meaning of Cryptology in the Late Twentieth Century (U)

Book Reuiew: Conflict of Duty: The U.S. Navy's Intelligence Dilemma, 1919- 1945 (U)

Book Reuiew: Infamy: Pearl Harbor and Its Aftermath (U)

Reference Keyword

Vol4.85 Computer (CS Issue) software

Vol10, Nos 3-4, Computer security Fall-Win 92 Disks

Vol10, No 2, Computer Sum 91 programming

Computer software

Vol9, No 4, Computer network Win 91 Computer security

Vol 1,83 (CA Issue)

Vol 1, Nos 2-3, Sum-Fall 82

Vol. 13,No. I, Spring 94

Vol. 13, No. 4, , Winter 94

Vol. 11, No. 2, Summer 92

Cryptology

Cryptanalysis

Ar tiflcial intelligence

Cryptanalysis

Discrimination Selection Text type

Book review Falklands War

Vol. 11, No. 3, USS Pueblo Fall 92

Vol 11, No 1, Spr 92

Vol. 13, No. 1, Spring 94 Vietnam

Vol8. No 4, Cryptology Win 90 History

Vol2, Nos 1-2, Book review Spr-Sum 83 Intelligence

Vol 1, Nos 2-3, Book review Sum-Fall 82 Japan

Pearl Harbor

Page 75: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

-

DOCID: 3020954 REF ID:A525813 - Reference Keyword Author

-

Vol7, No 2, Book review Sum 88 Management

Title

Book Review: The Clash of Cultures: Managers and Professionals (U)

vdl. 11, No. 4, Intelligence Winter 92 community

Post-Cold War

Facing the PostcCold War Era (U)

If Cryptanalysis Is What We Do and Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)

Vol9, No 2, Cryptology Sum 90

I SINIOs, NSA, and the National Estimates ~ r & e s e (U)

Val 9, No Spr 90

National Intelligence Estimates

Intelligence community

Communications Mathemati-

Channel Capacity Algorithm (U) VOI 2, NOS 1-2, Spr-Sum 83

Deployment of the First ASA Unit to Vietnam (U1

Vol LO, NOS 3-4, Fall-Win 91

Army Security Agency Vietnam War

Admiral Corshkov and Soviet Doctrine (U)

Vol5, No 3, Fall 86

Vol9, No 3, Fall 90

Soviet Union

L a n w a e modeling

ART: The Linked-Letter Language Model A Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text (U)

Book Review: Atom Bomb Spies, The (U)

Vol6, Nos 3-4, Fall- Win 87-88

Book review Espionage

Book Review: Citizens and Soldiers (U) Vol6, Nos 3-4, Fall-Win 87-88

Book review Military policy

Book Review: Clausewitz (U) Book review Military theory

Vol6, No 2, Sum 87

Book Review: Does God Play Dice? The Mathematics of Chaos (U)

Vol8, No 4, Win 90

Book review Mathematics

I Book Review: Essays on Strategy (U) Vol5, No 3, Fall 86

Book review Human factor Middle East .

Book Review: Family Treason (U) VOI 6, NOS 3-4, Fall-Win 87-88

Book review Espionage

Page 76: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813

I Author Title Reference Keyword

Book Review: Guardians of the Sea: Vol7, No 2, Coast Guard History of the United States Coast Sum 88 History Guard from 1915 to the Present (U)

Book Review: History of the German Vol8, No 3, Book review General StafT(U) Fall 89 Germany

Military forces

Book Review: Inside the Soviet Army Vol4, No 4, Baak review (U) Win 86 Soviet Union

Book Review: Inside Soviet Military Vol5, Nos 1-2, Book review Intelligence (U) Spr-Sum 86 Intelligence

Soviet Union

Book Review: KGB: The Secret Work of Vol5, Nos 1-2, Book review Soviet Secret Agents (U) Spr-Sum 86 KGB

Soviet Union

Book Review: KGB Today: The Hidden Vol5, No 1-2, Book review Hand (U) Spr-Sum 86 KGB

Soviet Union

Book Review: Legitimacy and Force, Vol7, No 4, Book review Vol. 1, Political and Moral Dimensions; Win 89 International Vol. 2, National and International affairs Dimensions (U)

Book Review: Marketing Warfare (U) Vol5, No 4, Book review Win 87 Economic warfare

Human factor

Book Review: Mask of Command, The Vol9, No 2, History (U) Sum 90 Military policy

Book Review: The New KGB: The Vol5, Nos 1-2, Book review Engine of Soviet Power (U) Spr-Sum 86 KGB

Soviet Union

Book Review: On Writing Well (C) Vol7, No 3, Book review Fall 88 Writing

Book Review: Positioning: The Battle Vol5, No 4, Book review for Your Mind (How to be Seen and Win 87 Iiuman factor Heard in the Overcrowded Marketplace) (U)

Book Review: Straw Giant, The (U) Vol9, No 4, Book review Win 91 Military forces

Page 77: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813 (b) ( 1 1 (b) (31-18 USC 798 (bl(3)-P.L. 86-36 -

Author I Title Reference Keyword

I BOO& ~evielu:~tructure and Computer software

Computer programming

Interpretations of Computer Programs ((UI

Book Review: Technical Writer's Handbook: Writing with Style and Clarity, The (U)

Vol9, No 1, Spr 90

Book review Writing

I Book Review To Arm A Nation (U) Vol8, No 2, Sum 89

Book review Military forces

Pachydermic Personality Prediction Profile (U)

Human factor Management

Vol7, No 2, Sum 88

Select Yourself for War College (U) Vol5, No 3, Fall 86

Human factor Training

Soviet "Scientific" Approach to Military Strategy: Strength or Weakness?, The (U)

Overview of a Systolic Array Processor for the Sun (U)

I I

Vol9, No 1, Spr 90

Military forces Soviet Union

Vol9, No 2, Sum 90

Computer network Computer

sohware

S Attitudes: How Things Work in ureaucracies, The (U)

Vo1.15, No. 4, Winter 96

Bureaucracy

in the Cyberpunk Future: A mewhat Educated Guess a t Things to

ome (U)

Vol. 15, No. 3' Fall 96

Cyberspace Security

Vol. 13, No. 3, Fall 94

IXFOSEC Trusted product

e-

I I the Transposition Technique, The (U)

Vol 1,83 (CA Issue)

Cryptanalysis

r and Purple: A Story Retold (U) Vol3, Nos 3-4. Fall-Win 84-85

Cipher systems History Japan

Vol4,85 (CS Issue)

Computer systems Computer

hardware Computer

software

Page 78: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A52581$,,:,, (b] :3)-50 IJSC 403 (b)(3)-1E USC 798

Author I Title Reference Keyword

Communications History Japan Pearl Harbor

I I New View of Pearl Harbor: The U.S. Vol5, No 3. I I Navy and Communications Intelligence, Fall 86

Priceless Advantage: COMINT in the Vol9, No 4, Battles of Coral Sea and Midway, A (U) Win 91

COMINT

J a w World War I1

Revisiting the Dispute over the Vol. 13, No. 4, Identification of "AFn as Midway (U) Winter 94

Cryptologic history Midway, Battle of WWII

Management 1 1 Managing the Future (U) Vol4, No 1, SPr 85

Distributed File Access Over Heterogeneous Networks (U)

Vol7, No3, Fall 88

Computer networks

Hypermedia Implemented in Object- Oriented Database Management Systems (U)

Vol10, No 1, Spr 91

Computer networks

Management

Mechanisms of SlGlNT Technology, The / lm Compromise SIGINT security

Vol6, No 2, Sum 87

Restructuring the U.S. SiGINT System for Tomorrow's World (U)

Vol8, No 3, Fall 89

SIGINf Requirements International

affairs

Third Party Nations: Partners and Targets (U)

Vol7, No 4, Win 89

SICINT Third Party

I I Too Many Cryptologic Eggs in One Basket (U)

Vol7, No 1, Spr 88

Deployment Management

I Overview of GLADSOME and Its Vol8, No 1, Application as a Knowledge-Based Spr 89 Mission Management System, An (U)

Collection Management

Vol6. No 1, Spr 87

Vol. 13, No. 4, Winter 94

Computer Software

Computers Cryptanalysis

Iranian Islamic Revolutionary Guard Vol4, No 4, Corps: "Khomeini's KGB," The (U) Win 86

Iran Middle East

Page 79: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 ( b ) 13)-P.L. kh-36

Bib) (1)

REF I D : ~ 5 2 5 8 1 3 ~ ' ~ ~ ~ 1:j::; ::: '.! . [b) . (3)-P.;. 86-36

Cryptologic history

Airborne reconn-

Microprocessor

Naval Security Group Database Vol2, Nos 3-4, Database Administration (U) Fall-Win 83-84

Supercomputers: Trends and Needs ,A Vol2, Nos 1-2, Supercomputers Government Perspective (U) Spr-Sum 83

Database Processing with Triple Vol5, No 4, Computer systems Modular Redundance (U) Win 87 Data base

Technique for Representing Mandatory Vol6, No 2, Computer security Security Policies in Non-Interference Sum 87

Page 80: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 It, ( 3 1 - P . L . 86-36

Author

REF . D , (1)

1~:~5258&21-50 IJSC 4113 ijbj (3)-18 USC 798

Title Reference Keyword

Vol5,86 Cryptanalysis (CA Issuel C r r p t o g r a ~ h ~

Mathematics

Book Review: Ethiopia a t Bay: A Vol4, No 3, Book review Personal Account of the Haile Selassie Fall 85 Ethiopia

1 Years (U) History

Book Review: Haile Selassie's War: The Vo14, No 4, Book review Italian-Ethiopian Campaign, 1935-1941 Win 86 Ethiopia (U) History

DAEMON- A FOLKLORE System Vol4, No 2, Computer Guardian Spirit (U) Sum 85 programming

Computer systems

Vol l l ,Nol , -1 Spr 92 Telephone

The Watch is Set: The Evolution of the Vol8, No 2, Telecommunicat- T Operations Center (U) Sum 89 ions

Watch operations

I Signal Descriptor Language, A (U) Vol3, Nos 3-4, Computer systems Fall-Win 84.85 Electronics

Code. Train: A Computer-Based Morse Vol6, Nos 3-4, Computer Code Training Package (U) Fall-Win 87-88 programming

Training

Ten Rules to Avoid Planning Foul-Upa Vol8, No 1, Management (U) Spr 89

I V015.86 (CA Issue)

CCI Doctrine and the Simile of the Cavei Vo1.15. Special CCI doctrine Time for Enlightenment (L') Edition 96 QUADRANT

Revised Capability Maturity Model for Vol. 14, No. 2, Capability Heretics, A (U) Summer 95 maturity

model Software process

I improvement

Page 81: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 (h i 1 3 - E . L . (36-36

REF IDzA525813 i b ) (1) l b ) (3)-P.L. 86-36 -

Author I Title Reference Keyword

Computer Security Certification Vol4, Sum 85 Implications to Networked U.S. (Supplement) National Security Establishment Automated Data Processing Systems

Computer security

Computer systems

IOSS OPSEC II National OPSEC Program, The (U) Vol. 11, No. 3,

Fa11 92

Modem Error Correction (U) Vol. 13, No. 4, Winter 94

Modem errors

Network System's Data Exchange (DX) Vol. 12, No. 1, IP Router: XSC's Product in Review (U) Spring 93

Data exchange NSC DX router

Computerized Identification of Message Vol8, No 2, Families Using Graph Theory (U) Sum 89

Communications Computer

Graphics

Fundamentals of Electronic System Vol 1, Nos 2-3. Grounding (U) Sum-Fa11 82

Electronics

II Cryptographic Applications of Singular Vol 1,83 Value Decomposition (U) (CA Issue)

Vol9, No 3, Fall 90

Computer software

Memory devices

Rindskopf, Elizabeth R. I Media Responsibility and National Vol7, No 3. Security (UI Fall 88

Security leaks

Value of Working Longer Hours for Vol. 15, No. 4, Promotion, The (U) Winter 96

Promotions

Dealing with the Future: The Limits of Vol. 15, No. 3, Forecasting (U) Fall 96

Forecasting

FOLKLORE: One Approach to Security Vol. 13, No. 3, (L') Fall 94

Computer security Cryptanalysts FOLKLORE

Introduction to Volume Modeling and Vol. 11, No. 3, Rendering, An (U) Fall 92

Data manipulation Volume modeling Volume rendering

Virtual Reality (U) Vol. 12, Nos. 3-4, Human-computer Fall/ interaction Winter 93 Virtual reality

Rolfe, Susan H. China: Forbidden No More? (U) Vol. 13, No. 4, China Winter 94 Travel

Page 82: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 :(b) f 2 ) - t > . I , . 86-36

REF IDgA525813

Author

El Rowlett, Frank B.

Title Reference Keyword

Iran-Iraq War: Regional Implications Vol 7, No 2, International and Alternatives for Resolution, The (U) Sum 88 affairs

Middle East

Paved with Good Intentions: How the Vol. 15, No. 2, Somalia Road to Somalia Turned into a Detour to Summer 96 U.S. policy Chaos (U)

Mokusatsu: One Word, Two Vo1.14, No. 4, Atomicbomb Lessons (U) Winter 95 World War 11

Effects of Optical Components on Vol. 15, No. 2, Digital optical System Performance, The (U) Summer 96 systems

Optical fibers

Securing Army Circuits during World Vol6, No 1, Cryptanalysis War 11: A Potential Disaster Narrowly Spr 87 History Averted (U) World War I1

The Business Manager and Business Vol11, No 1, Communications Communications (U) Spr 92 Management

Introduction to Asynchronous Transfer Vol. 14, No. 1, ATM Mode (ATM) (U) Spring 95 Communications

network technology

Icon: An Enhancement to the UNIX Vol6, No 1, Computer Language Hierarchy (U) Spr 87 programming

T3343 Software Evaluation Effort (UI Vol4.85 Computer (CS Issue) software

Formally Stating Cryptographic Bypass Vol. 12, No. 2, Cryptographic Requirements (U) Summer 93 bypass

INFOSEC

Computer Virus Infections: Is NSA Vol4, No 3, Computer Vulnerable? (U) Fall 85 Security

Computer virus

Computer Virus Organization: A Vol5, No 3, Computer Definitive Taxonomy and Anatomy of Fall 86 Security Computer Viruses (U) Computer virus

LOCKing Computers Securely (U) Vol7, No 1, Computer Spr 88 Security

Page 83: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813 (b) (3)-P.L. 86-36

Author Title Reference Keyword

Processor Interconnection Netnorks Vol8, No 3, Computer from Cayley Graphs (U) Fall 89 graphics

Computer networks

Supercomputer

E f f ~ t a of Perestrojka on the Soviet Vol8, No 2, Military forces Armed Forces Portend New Challenges Sum 89 Soviet Union to the Oflice of Soviet Military Forces (U)

Analysis of TRS-80 Model I Password Vol1, No 1, Computer Encryption Algorithm (U) Spr 82 software

Cryptanaly sis

Introduction to Object-Oriented Vol. 12, Nos. 3- Object-Orientation Software Design and Development and 4,FalU Software design Its Application a t NSA, An (U) Winter 93

Graphic User Interface for the Vol2,83 Computer Transcriber-Analyst, A (U) (CS Issue) IPphi-

Computer systems

Analyzing Vague Data (U) Vol2,83 Computer systems (CS Issue)

Ideograph Writing Patterns and Vol4, No 3, Computer Computer Input (U) Fall 85 systems

L a w w I e

Introduction: Examples of Powerful Vol2.83 Computer Personal Computers (U) (CS Issue) hardware

Simulated Annealing and Iterative Vol. 12, No. 1, Combinatorial Improvement: An Experimental Spring 93 optimization Comparison (U) Iterative

improvement Simulated

annealing

Generalized GMW Sequences and an Vol3, Nos 1-2, Electronics Application to Frequency Hopping (U) Spr-Sum 84 Engineering

I Mathematics

On the Selection Mechanism for Vol8, No 2, Communications Pseudonoise Sequences (U) Sum 89 Mathematics

Page 84: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3 0 2 0 9 5 4 REF ID : ~ 5 2 5f#$%/-50 ,,, j ( b ) ( 3 ) - 1 8 USC 798 i i b ) ( 3 i - P . L . 86-36

. Author Title Reference Key word

Domain Name Service (U) Vol. 14, No. 2, Idormation Summer 95 networks

LAN9 System

administration

Fault Simulation Requirements for Vol5, No 4, Computer security Security Fault Analysis (U) Win 87

I Vol11, No 1, Computer systems Spr 92 Computer

training

I

Use of Compressed Speech in Selecting Vol 1, Nos 2-3, Training Morse Code Operators, The (U) Sum-Fall 82

n I I

Golden Age of Russia, The (U) Vol. 13, No. 4, Holbrook. James Winter 94 Russia

Historical Intelligence Production Vol4, No 4, Collection Problems: Is Technology the Answer? Win 86 Computer systems

Intelligence

8: Vol6, No 2, Economies ASIGINT Sum87 Oorbachev,

Mikhail Sovietunion

I1 Who Are We? (U) Vol9, No 2, Cryptology Sum 90

Vol9, No. 3, Fall 90

52 Software Process Improvement Effort Vol. 15, NO. 3, Measures of Value, The (U) Fall 96

Sum 85 I I v014e

Book Review: Code-?lame Downfall: The Vo1.15, No.4, Secret Plan to Invade Japan -and Why Winter 96 Truman Dropped the Bomb (U)

Computer software

Memory devices

Software process improvement

Security

Atomic bomb Rook review World War I1

Page 85: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 (u)(?)-P.L. 8 6 - 3 5

ib) ( l i

REF ID : A52 5811130 3 0 3 (b) (3)-18 USC 798 (bi (3)-P.L. 86-36

Author I Title Reference

Boo& Review: Drawing the Line: Tales of Vol. 14, No.4, Maps and Cartocontroversy (U) Winter 95

Book Review: Nightmover: How Aldrich Vol. 15, NO. 2, Ames Sold the CIA to the KGB for $4.6 Summer 96 Million (U)

I Book Review: Spyworld: Inside the Vol. 14, No. 1, , Canadian and American Intelligence Spring 95

Establishments (U)

SIGINT Requirements: Before, During, and After (U)

An Analysis of the Vectorization Abilities of Current C Compilers (U)

Bibliography of Neural Network Applicationa to the Telecommunications Industry, A (U)

Video Teleconferencing: NSA Applications (U)

Influence of U .S. Cryptologic Organizations on the Digital Computer Industry (U)

Snyder, Samuel S.

Processor Interconnection Networks from Cayley Graphs (U)

Solving xn = b (mod c) for x and Undecimating Recursions (U)

Vol7, No 1, Spr 88

Vol10. No 2, Sum 91

Vol. 11, No. 3, , Fa11 92

Vol3, Nos 3-4, Fall-Win 84-85

Vol6, Nos 3-4, Fall-Win 87

Vol8, No 3, Fall 89

Vol. 11, No. 4. Winter 92

GRAFMAKER: A Powerful Business Vol4.85 Graphics Tool (U) (CS Issue)

Keyword

Book review Maphl Book review Espionage

Book review Canada Intelligence

community

Requirements

Computer programming

Computer software

Network management

Neural networks Telecommuni-

cations

Communications Teleconferencing

Computer systems History

Computer graphics

Computer networks

Supercomputers

Cryptanalysis Signals analysis

recursions L'ndecimating

Cryptanalysis SIGINT

Computer graphics

Computer software

Page 86: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 :b)13)-E.L. 86-36

REF ID:A5258&3(,, ( b ~ (3)-50 USC 403 (b) (31-18 USC 798 (b)(3)-P.L. 86-36 -

I Title Reference Author Keyword

Decade of Information Service a t FANX, Vol8, No 3, A (U) Fall 89

Id rmat ion support

Library

I The Managerial Track (U) Vol 10, Nos 3-4, Fall-Win 91

Management Training

Book Review: Artif~cial Intelligence: Vol5, No 3, Theory, Logic, and Application (U) Fall 86

Book review M i c i a 1

intelligence

Book Reuiew: Designing and Programming Personal Expert Systems (U)

Book Reuiew: Into the Heart of the Mind: An American Quest for Artif~cial Intelligence (U)

Vol5, No 3, Fall 86

Book review Computer

programming Computer systems

Vol5, Nos 1-2, Spr-Sum 86

Book review Artificial

intelligence

Book Reuiew: Out of the Inner Circle: A Hacker's Guide to Computer Security (UI

Vol4, No 3, Fall 85

Book review Computer security

I Book Review: Technical Writing for Beginners (U)

Vol4, No 4, Win 86

Book review Writing

Book Reuiew: The New KGB: Engine of Soviet Power (U)

Vol5, Nos 1-2, Spr-Sum 86

Book review KGB Soviet Union

Book Review: The Ropes to Skip and the Vol6, Nos 3-4, Ropes to Know: The Inner Life of an Fall-Win 87-88 Organization (U)

Book review Management

Vol5, Nos 1-2, Spr-Sum 86

Database Photo- .

reconnaissance

Fall of the Shah: A Chaotic Approach, Vol. 13, No. 4, The (U) Winter 94

Chaos Dynamical

systems Indications and

warning

DEFSMAC: The Future Is Now (U) Vol. 13, No. I , Spring 94

DEFSMAC LAYS

I Language Identification (U) Vol. 15, No. 3, Fall 96

Page 87: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

it) (3)-P.L. 86-36

REF ID:A525813 Ib) (1) (b) (31-50 USC 403

Title Reference Keyword - -

Moscow's Realignment with Cairo: A Look a t hrbachev's New Political Thinking (UI

Structured Knowledge Acquisition Techniques (U)

Mathematics: A Challenge for Business, Government, and Academia (U)

Soviet Military Establishment under Gorbachev, The (U)

MILSTAR (U)

SPLASH: An Overview of a Systolic Array Processor for the Sun (U)

Debunking Some Old Myths about Critical-Grade Promotions (U)

Primer on Specific Emitter Identification, A (U)

NTSS - Yesterday, Today and Tomorrow (U)

Introduction Special Computer Science Issue (U)

Where there's a will. . . (U)

- - -

Vol8, No 4, Gorbachev, Win 90 Mikhail

Middle East Soviet Union

Vol11, No 1, Computer Spr 92 programming

Expert systems Knowledge Acquisition

Vol8, No 2, Mathematics Sum 89

Vol7, No 4, Gorbachev, Win 89 Mikhail

Intelligence Oil Soviet Union

Vol7, No 1, Communications Spr 88 systems

Vol9, No 2, Computer Sum 90 networks

Computer sof'tware

Vol 1, No 1, Performance Spr 82 Promotion

Vol 1, No 4. COMINT Win 83 Emitter

Vol. 13, No. 2, Communication Summer 94 systems

National Time Sensitive System

Vol4,85 Computer (CS Issue) hard ware

Vol3, Nos 1-2, Language Spr-Sum 8.4

Page 88: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

( 9 ; (3)-P.L. 36-36

REF ID:A525813 (33 (1) ( 3 ) ( 3 ) - E O USC 403 (b: (3)-18 USC 798 (~i(3)-P.L. 86-35 -

Author 1 Title Reference Keyword

Vol. 13, No. 3, GLISSADE Fall 94 Software system

design

i

I I Structured Testing as a Learning Tool

GLlSSADE Lessons Learned from a Rapid Prototype (U)

Vol , No 4, Computer Win 91 programming

Computer software

Vol4, No 3, Language Fall 85

Vol. 11, No. 3, Fall 92

LwPage training

Linguistics

Language Cross-Training: Alternatives and Permutations (U)

I I Analysis of the "Lehighn Virus (U) Vol9, No 2, Sum 90

Computer virus

Vol. 11, No. 4, Winter 92

Random viruses Sequential viruses Software analysis

Analysis of the Random and Sequential Viruses (U)

I I Predicting Terrorism: An Indications and Warning M o d e l m

Vol8, No 4, Win 90

Terrorism

Vol7, No 3, Fall 88 I I On NSA Reporting Style (Or Lack

Thereof) (U) Reporting

I I Obtaining Maximum Performance in a Supercomputer Unix Environment (U)

Vol7. No 2, Supercomputer Sum 88

Design and Evaluation of INF'OSEC Systems: The Computer Security Contribution to the Composition Discussion, The (UI .

Vol. 12. No. 1. Computer security Spring 93 INFOSEC

I I Stab st A2 Criteria, A (U) Vol9, No 1, Computer security Spr 90

SKYRAP: A Case Study in UNIX System Optimization (U)

Vol. 12, No. 1, Signals Spring 93 transmission

SKYRAP UNIX

Vo1.15, No. 4, Winter 96 u

Collection

Return of the Electronic Francophoneglos, The (U)

Vol4, No 1, Database Spr 85

Page 89: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

ib) (1)

REF ID:A5258&B3)-50 ib) (31-18 USC LISC 798 4 0 3

( b ) ( 3 1 - P . L . 86-36 DOCID: 3020954

.(bi ( 3 ) - P . L . 86-36

Keyword Author

Hietory Human factor

Title Reference

Unknown Author I I Was a Cryptologic Corporal (U) Vol 1, No 4, Win 83

Human factor Management

Looking Ahead to the 1990s (U) Vol5, Nos 1-2, Spr-Sum 86

I United Pigeons Service (UPS)? (U) Vol2, Nos 3-4, Fall-Win 83-84

T3343 Software Evaluation Effort (U) Vol4, $6 (CS Issue)

Computer software

Meeting the Programming Challenges Vol 1, Nos 2-3, of the Future (U) Sum-Fall 82

Computer programming

I Co~rNTand the PRC Intervention in the Vol. 15, No. 2, Korean War- Summer 96

Vanderpool, Guy R. COUINT Korean War

111 Vol 6. No 2, Language Transcription

system

Computer networks

Computer systems

II Tejiendo la Red Telarana (Weaving the Vol. 15, No. 4, World Wide Web) (U). Winter 96

Internet Lntin America

Systems Engineering Profession and Its Vol. 11, No. 2, Importance to NSA, The (U) Summer 92

Systems engineering

Systems management

Examination of the Possible Effects of Vol7, No 3, Slavic Chauvinism on the Economic and Fall 88 Political Development of the Southern Soviet Periphery, An (U)

Human factor Soviet Union

Creativity: Can It Be Taught? (U) Vol. 13, No. 4, Winter 94

Creativity Manage me nt

Integrating Strategic Planning and Vol: 14, No. 1, Quality Initiatives (U) Spring 95

hfanagement Strategic planing TQM

I I Optical Disk Technology: CDs, I Vol8, Xo 2, WORMS, and Erasable Disks (U) Sum 89

Archival storage Computersystems Optical

Page 90: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813

Author Title Reference Keyword -,#

Parallel Tausworthe Generator, The (U) Vol 1, No 1, Logic Spr 82 Mathematics

Security, Infrastructure, and Vol. 15, Special Algorithm benign Management Issues Surrounding Edition 96 loading Algorithm Benign Loading (U)

"Cipher" Dispatches and the Election of Vol. 11, No. 3, Cryptologic 1876 (U) Fall 92 history

Seward's Other Folly: America's First Vol. 12, No. 2, Cryptologic history Encrypted Cable (U) Summer 93

Using Lotus 1-2-3 as an Elint Display Vol4, No 3, Computer and Analysis Tool (U) Fall 85 hardware

Computer programming

ELlNT

Using Lotus 1-2-3 to Parse Coastline Vol7, No 3, Computer Message Track Data (U) Fall 88 programming

Computer systems ELINT

Digital Subscriber Loops (L3 Vol.15,Mo.1, ISDN Spring 96 Subscriber loops

Optical Solitons: The Fourth Generation Vol. 15, No. 3, Solitons of Transoceanic Optical Fiber Tele- Fall 96 Telecommuni- communications (U) cations

Beyond "DRAGON'S LAIR (U) Vol4,85 Computcr systems (CS Issue)

High-Altitude Electromagnetic Pulse Vol5, No 3, Communications (HEMP): "A Sleeping Electronic Fall 86 Electronics Intruder." The (U)

SINCGARS Software Evaluation (U) Vol. 13, No. 1, Computer security Spring 94 Tactical radio

systems

Station "C" and Fleet Radio Unit Vol. 12, No. 2, Cryptologic history Melbourne (FRUMEL) Revisited (U) Summer 93 FRUMEL

Station C

Winning the Paper Chase: Operational Vol 1. No 1, Computer systems Applications of Computer Output .. . Spr 82 Microfiche (U)

Telephone Codes and Safe Vol. 12, No. 1, Safe combinations Combinations: A Deadly Duo (U) Spring 93 Telephone codes

Page 91: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813

Author I Title Reference Keyword

II Cuban Missile Crisis: A SIGINT Perspective, The (U)

Rapid Text Searching for Multiple Key Strings (U)

11 Another Look at Ranked-Order Filters. Noisy Images, and V i l Perception (U)

Comparing Visual Detection to Machine Vision for Detecting the Presence of .

Laser Irradiation with an Electro- Optical Device (U)

II Optical SIGINT Collectors (U)

In Pursuit of a SONET Link Encryptor II (U)

Wiley, Edward 1 Uncertain Summer of 1946, The (U)

Operations Management and Resource Utilization for Signals Collection Using Knowledge-Based SystemsWL

A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)

I Book Reuiew: he FBI-KGB War: A Special Agent's Story (U)

PCSE: A Design Implementation for PC Security (U)

Vol. 13, No. 1, spring 94

Vol LO, No 2, Sum 91

Vol. 11, No. 4, Winter 92

Vol4, No 4, Win 86

Vol3, NOS 1-2, Spr-Sum 84

Vol10. No 1, Spr 91

Vol. 14, No. 1, spring 95

Vol9, No 3, Fall 90

Vol10, No 2, Sum 91

Vol6, No 2, Sum 87

Vol8, No 2, Sum 89

Cuban Missile Cr i s i~

Computer hardware

Computer security Text searching

Image quality Ranked-order

filters Signals analyeis

Electronics SIGINT

Collection SIGINT

Computer networks

Link encryptor Optical

Atomic bomb Japan WWII

Management S i l s collection

Computer security

Cryptographic network

Soviet Union espionage

computer security Personal

computer

Page 92: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 (b):3)-F.L. 86-36

REF ID:A525813

Author I Title Reference Keyword

Full-Text Searching: Coming of Age (U) Vo18, No 3, Computer Fall 89 hardware

Computer software

Information support

I Conditional Sigmage Analysis and Vol1,83 Cryptanalysis Bulge Estimation (U) (CA Issue)

CRITICOMM Management: A User Vol2,83 Computer Interface (U) (CS Issue) graphics

On the Selection Mechanism for Vol8, No 2, Communications Pseudonoise Sequences (U) Sum 89 Ma thematics

T3343 Software Evaluation Effort (U) Vol4.85 Computer (CS Issue) software

GKS: Its Comparison to Core and Its Vol7, No 2, Computer Feasibility of Urn a t NSA (U) Sum 88 graphics

Book Review: The Grand Failure: The Vol8, No 3. Book review Birth and Death of Communism in the Fall 89 Communism Twentieth Century(U1

Book Review: Yen! Japan's New Vol8, No 1, Book review Financial Empire and Its Threat to Spr 89 Japan America (U)

I Challenges Encountered by Teachers Vol4, No 4, Language and Learners of a Second Language (U) Win 86

Page 93: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDgA525813

Page 94: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF IDzA525813

(hi ( i Cryptologic Quarterly Index by Keyword

Algorithm benign loading

Keyword

ADVENTURE TRAIL

Airborne Reconnaissance

Air Force intelligenca

Security, Infrastructure, and Management Issues Surrounding Algorithm Benign Loading (U)

Title Author

Certification of the Air Force Intelligence Officer: What Now? (U)

Analog ciphony I Analog technology

Analysis

Antennas

Arab cryptology

Archival storage

NSA Signal Collection Equipment and Systems,: The Early Years - Receivers (U)

Holistic Analysis (U)

NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)

Origins of Cryptology: The Arab Contributions (U)

Optical Disk Technology: CDs, I WORMS, and Erasable Disks (U)

Artificial intelligence

Army Security Agency

Applications of Nonsymbolic Artificial Intelligence: Neural Networks (U)

Deployment of the First ASA Unit to Vietnam (U) I

Reference .

Vol. 15, Special Edition 96

Vol. 12, No. 2, Summer 93

Vol. 12, No.2, Summer 93

Vol. 15, Special Edition 96

Vol. 15, Special Edition 96

Vol. 14, No.2, Summer 95

Vol4, No 1, Spr 86

Vol. 14, No. 4, Winter 95

Vol. 12, No. 1, Spring 93

Vol8. No 2, .

Sum 89

Vol 10, Nos 3-4, Fall-Win 91

Vol9, No 4, Win 91

Page 95: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813

Keyword I Title Author Reference

ATM

Atomic bomb

Artif~cial Intelligence: ro roach to Cryptodiagnosis (U)

Artificial Intelligence and Expert Systems: Do They Have a Future in LManagement? (U)

Book Review: Artificial Intelligence: j Theory, b g i ~ and Application (ul I Book Review: Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)

FARSEEING: A Study in Expert Systems (L')

Introduction to Asynchronous Transfer Mode (U) I MILKBUSH Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)

Book Review: Code-Name Dowdalt: The Secret Plan to Invade Japan - and Why Truman Dropped the Bomb (U)

Vol. 13, No. 1, Spring 94

Vol9, No 2, Sum 90

Vol5, No 3, Fall 86

Vol5, Nos 1-2, Spr-Sum 86

Vol8, No 2, Sum 89

Vol. 14, No. 1, Spring 95

Vol. 15, No. 3, Fall 96

Vol. 15, No. 4, Winter 96

Book Review: The Invasion of Japan: Johnson, Thomas R. Vol. 14, No. 2, Alternative to the Bomb (U) Summer 95

Mokusatsu: One Word. Two I Vo1.14. No. 4, Lessons (U) Winter 95

Uncertain Summer of 1945, The (U) Wiley, Edward Vol. 14, No. 1, Spring 95

Australian SIGINT Book Review: The Eavesdroppers (U) Johnson, Thomas R. I Vol. 14, No. 1, Spring 95

Australian SIGINT operations

Biography

Book Review: On ULTRA Active Farley, Robert D. Service (U) ' From Chaos Born: General Canine's 1 I First Charge to the NSA Workforce (U) I Glimpses of a Man: The Life of Ralph J. Canine (U)

Vol10, Nos 3-4, Fall-Win 91

Vol6, No 2, Sum 87

Vol6. S o 2. Sum 87

Page 96: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Keyword I Title Author Reference

Bletchley Park

Black Chamber

America's Military Revolution: Strategy and Structure af'ter the Cold War (U)

Book Review: Codebreakers: The Filby, P. W. Vol. 13, No. 2, Inside Story of Bletchley Park (U) 1 Summer 94

Vol. 13, No. 4, Winter 94

Book Review: American Black Chamber, The (U)

Book review

Vol4, No 2, Sum 85

A Century of Spies: Intelligence in Johnson, Thomas R. Vol. 15, KO. 3, the Twentieth Century (U) Fall 96

"And I Was There": Pearl Harbor and Vol5, Nos 1-2. Midway - Breaking the Secrets (U) Spr-Sum 86

Alan Turing: The Enigma (U) Mowry, David P. Vol2, Nos 3-4. Fall-Win 83-84

American Black Chamber, The (U) 1 Vol4, No 2, Sum 85

Artificial Intelligence: Theory, Logic and Application (U) I I Vol5, No 3,

Fall 86

Atom Bomb Spies, The (U) I I Vole, Nos 3-4 Fall-Win 87-88

Black Cipher (U) Hanyok, Robert J. Vol. 14, No. 4, Winter 95

I Breaking the Maya Code (U) Hatch, David A.

British and American Approaches to Intelligence (U)

Chicksands: A Millenium of History

Vol. 13, No. 1, Spring 94

Vol7, s o 2, Sum 88

Vol. 13, No. 3, Fall 94

CLA in Guatemala, The (U1 Gronet, Richard W. Vol 1 , KO 4, Win 83

Clash of Cultures: Managers and h'olte, William NI. Vol7, KO 2, Professionals, The (U) Sum 88

I Clausewitz (U) Vol6, No 2, Sum 87

Page 97: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954

Keyword 1 Title Author

Codebreakers: The Inside Story of Filby, P.W. Bletchley Park (Ul

Code-Name Downfall: The Secret Plan to Invade Japan -and Why Truman Dropped the Bomb (U)

Concise History of the Middle East, A

Conflict of Duty: The U.S. Navy's Nolte, William M. Intelligence Dilemma, 1919-1946 (U)

I

I Designing and Programming Personal Expert Systems (U) I

I Does God Play Dike? The Mathematics of Chaos (U)

I Drawing the Line: Tales of Map8 and- Cartocontroversy (U)

I Eavesdroppers, The (U) Johnson, Thomas R.

Electronic Warfare: Element of Strategy and Multiplier of Combet Power (U)

(Essays on Strategy (U)

Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)

Eyeball to Eyeball: The Inside Story Hatch, David A. of the Cuban Missile Crisis (U)

Family Treason (U)

I FBI-KGB War: A Special Agent's Story. The (U)

French Secret Services: From the Hanyok, Robert 3. Dreyfus Affair to the Gulf War, The (U)

Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)

Reference

Vol. 13, No. 2, Summer 94

Vol. 16, No. 4, Winter 96

Vol4, No 1, Spr 85

Vol2, NOS 1-2, Spr-Sum 83

Vol5, No 3, Fall 86

Vol8, No 4, Win 90

Vol. 14, No. 4, Winter 95

Vol. 14, No. 1, Spring 95

Vol 1, Nos 2-3, Sum-Fall 82

Vol5, No 3, Fall 86

Vol4, No 3, Fall 85

Vol. 11, No. 3, Fall 92

Vol5. No 3. Fall 86

Vol6. No 2, Sum 87

Vol. 15, No. 4, Winter 96

Vol. 13. No. 2. Summer 94

Page 98: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3020954 REF ID:A525813 qb) ( 3 ) - P . L . 86-36

Keyword 1 Title

Grand Failure: The Birth and Death of Comrnulrjsm in the Twentieth Century, The (U)

Guardians ofthe Sea: History of the URited States Coast Guard from 1915 to the Present (U)

Haile Selassie's War: Italian- Ethiopian Campaign, 1935-1941 (Ul

History of the German General Staff

Author Reference

Vol8, No 3, Fall 89

Vo17, No 2, Sum 88

Vol4, No 4, Win 86

Vol8, No 3, Fall 89

Honorable Treachery: A History of Hatch, David A. U.S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (U)

Infamy: Pearl Harbor and Its Nolte, William M. Aftermath (U)

Informing Statecraft (U) 0 I Inside Hanoi's Secret Archives (U) Hanyok, Robert J.

Inside Soviet Military Intelligence (U)

Inside the Soviet Army (U)

Intelligence and National Security (U)

Intelligence and the American Johnson, Thomas R. Presidency (U)

Into the Heart of the Mind: An American Quest for Artificial Intelligence (U)

Invasion of Japan: Alternative to the Johnson, Thomas R. Bomb, The (U)

KGB: The Secret Work of Soviet Secret Agents (U)

KGB Today: The Hidden Hand (U) I I

Vol. 13, No. 3, Fall 94

VOI 1, NOS 2-3, Sum-Fall 82

Vol. 12, No. 2, Summer 93

Vol. 15, No. 1, Spring 96

Vol5, Nos 1-2, Spr-Sum 86

Vol4, No 4, Win 86

Vol5, No 4, Win 87

Vol. 14, No. 3, Fall 95

Vol5, NOS 1-2, Spr-Sum 86

Vol. 14, No. 2, Summer 95

Vol5, Nos 1-2. Spr-Sum 86

Vol5. NOS 1-2, Spr-Sum 86

Page 99: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813 ( b ) ( 3 ) - P . L . 8 6 - 3 6

Keyword Title Author

Legitimacy and Force, Vol. 1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)

Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan W)

Marching Orders: The Untold Story Johnson, Thomas R. of World War I1 (Ul

Marketing Warfare (U)

I Mask of Command, The (U) I I I Master Terrorist: The True Story behind Abu Nidhal. The CUI I Missing Dimension: Governments and Intelligence Communities in the Twentieth Century. The (U)

( My Silent War (U) Hanyok, Robert J.

New KGB: The Engine of Soviet Power, The (U)

New KGB: The Engine of Soviet Power, The (U)

I Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million 1 (U)

On Writing Well (U)

One American Must Die (U)

One Hundred Days: The Memoirs of the Falklands Battle Group Commander (U)

I Out of the Inner Circle: A Hacker's I I Guide to Computer Security (U)

Reference -

Vol7, No. 4, Win 89

Vol7,Nol, Spr 88

Vol. 14, No. 4, Winter 95

Vol5. No 4, Win 87

Vol9, No 2, Sum 90

Vol6, No 1, Spr 87

Vol5, No 4, Win 87

Vol. 14, No. 3, Fall 95

Vol5, Nos 1-2, Spr-Sum 86

VOI 5, NOS 1-2, Spr-Sum 86

Vol. IS., No. 2, Summer 96

Val 7, No 3, Fall 88

Vol5, No 4, Win 87

Vol. 11, No. 2, Summer 92

Vol4, No 3, Fall 85

Page 100: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 ( b ) (3) -P. L. 86-36

Keyword I Title Author

Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)

Room 40: British Naval Intelligence 1914-18 (U) I Ropes to Skip and the Ropes to Know: The Inner Life of an Organization (U) I I Sacred Rage: The Crussde of Modern Islam (U) I I Secrecy and Democracy: The CIA in Transition (U) I Shadows of the Rising Sun: A Critical View of the "Japanese Miraclen (U)

I 8101NT Secrets: The Signals . I I Intelligence War, 1900 to Today, The

I Spy wars: Espionage and Canada Johnson, Thomas R. from Couzenko to Glasnost t U)

Spyworld: Inside the Canadian and American Intelligence Establishments (U)

( Straw Giant, The (U)

Target is Destroyed: What Really Happened to Flight 007 and What America Knew About It, The (U)

I Technical writer's Handbook: Writing with Style and Clarity, The (L')

Technical Writing for Beginners (U)

I To Arm A Nation (U)

Johnson, Thomas R.

I ULTRA Americans: The U.S. Role i Breaking the Nazi Codes, The (U)

Reference --

Vol5, No 4, Win 87

Vol2, Nos 1-2, Spr-Sum 83

Vol6, Nos 3-4, Fall- Win 87-88

Vol6, Nos 3-4, Fall-Win 87-88

Vol4, No 3, Fall 85

Vol3, NOS 1-2, Spr-Sum 84

Vol. 12, No. 1, Spring 93

Vol. 14, No. 2, Summer 95

Vol. 14, No. 1, Spring 95

Vol9, No 4, Win 91

Vol5, No 3, Fall 86

Vol9. No 1. Spr 90

Vol4, No 4, Win 86

Vol8, No 2, Sum 89

Vol5, No 3, Fall 86

Page 101: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A5258&7,3 , , i -

Keyword I Title Author

I Yen! Japan's New Financial Empire and Its Threat to America (U) I

-

BOURBON Before BOURBON: American and British COMINT Efforts against Russia and the Soviet Union before 1945GU333

Ultra-Magic Deals and the Most Secret Relationship, 1940-1946, The

Braille Cryptologic Origin of Braille. The (U)

BRANFLAKE

Britain

BRANFLAKE (U,

I Book Review: British and American Approaches to Intelligence (U) I I Book Reuiew: Room 40: British Naval Intelligence 1914-18 (U)

Budget process

BRUSA agreement

I Changing Development Environment from One of System u

Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946 The, (U)

Creation to One of System ~volution without Benefit of Changes to the Institutional Support Process, The (U)

Reference

Vol. 12, Nos. 3-4, Fall/ Winter 93

Vol 8, No 1, Spr 89

Vol. 12, Nos. 3-4, FalUWinter 93

Vol. 14, No. 1, Spring 95

Vol. 13, No. 1, Spring 94

Vol. 13, No.2, Summer 94

Vol. 14, No. 3, Fall 95

Vol. 13, No. 4, Winter 94

Vol2, Nos 1-2, Spr-Sum 83

Vol. 12, NOS. 3-4, FalU Winter 93

Vol. 11, No. 2, Summer 92

Page 102: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 i ib ) (1)

(b) (3) -P.L. 86-36 (b) (31-50 LSC 403

. (b) (31-18 LSC 798 ib) (31-t.L. 86 -36

Canada

Keyword

Bureaucracy

Call forwarding

Capability maturity model

Career planning

Title Author Reference

Book Review: Spywars: Espionage Johnson, Thomas R. and Canada from Gouzenko to Glasnost (U) I

BS Attitudes: How Things Work in Bureaucracies, The (U)

[Sensitive Title1

Book Review: Spyworld: Inside the Canadian and American Intelligence Eatablishments(U)

Vo1.15, No. 4, Winter 96

Vol. 16, Special Edition 96

I Revised Capability Maturity Model for Heretics. A (U)

I Tech Track: Will I t Work? (U)

Chaos

CCI doctrine

CCS7

Fall of the Shah: A Chaotic Approach, The (U)

CCI Doctrine and the Simile of the Cave: Time for Enlightenment (U)

Signaling System No. 7: And What about Analysis (U)

Chicksands I Book Review: Chicksands: A Millenium of History(U1 1

China

Chip design

I China: Forbidden No More (U)

Chinese KGB, The (U)

Statistical Method for Quality Control of Microelectronic Chip Design, A (U)

I

Vol. 14, No. 2, Summer 95

Vol. 14, No. 1, Spring 95

Vol. 14, No. 2, Summer 95

Vol7, No 1, Spr 88

Vol.15, Special Edition 96

Vol. 13, No. 3, Fall 94

Vo1.15, No. 4, Winter 96

Vol11, No 1, Spr 92.

Vol. 13, No. 4, Winter 94

Vol. 13, No. 3, Fall 94

Vol. 13, No. 4, Winter 94

Vol 1, No 1, Spr 82

Vol. 15, No. 2. Summer 96

No Code

Page 103: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

D O C % ~ ~ - L & & ~ I L O ~ 5 ! a (?)-I8 USC 798 ( n j ( 3 ) - P . L . 56-56

Keyword

Churchill, Winston

CIA

REF ID:A525823) ( 3 ) - P . L . 86-36 - I Title Author Reference

Book Review: Secrecy and Vol4, No 3, Democracy: The CIA in Transition Fall 85 (U)

Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)

Book Review: The CIA in Guatemala Gronet, Richard W. I (U)

Vol. 11, No. 2, Summer 92

Ciphers I Cryptographic Mathematics of Enigma. The (U)

I Solved: A Long-Lost Cipher from Siberia (U)

Cipher systems I Diabolical Diagnosis (U) I Red and Purple: A Story Retold (U) I

CLOVER I Applying Object Technology to Our CLOVER Network (U)

Coast Guard Book Review: Guardians of the Sea: History of the United States Coast Guard from 1919 to the Present (U)

Codebooks

Cognitive process

Code synchronization

Cold War

I

Code Acquisition by Binary Autodirective Search (U)

Cognitive Processes in Software Fault Detection (U)

Book Review: America's Military Revolution: Strategy and Structure after the Cold War (U)

I

Cobra Judy Acquisition, The (U1

Vol 1, No 4, Win 83

Vol. 13, No. 3, Fall 94

Vol. 13, No.2, Summer 94

Vol5,86 (CA Issue)

Vol3, Nos 3-4, Fall-Win 84-85

Vol. 12, No. 2, Summer 93

Vol7, No 2, Sum 88

Vol. 14, No. 3, Fall 95

Vol. 13, No. 3, Fall 94

Vol. 11, No. 2. Summer 92

Vol. 13, No. 1, Spring 94

Vo1.15, No. 4, 1 Winter 96

I Voll.No4, Win 83

Page 104: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b, (1)

REF ID:A525813 ( b ) ( 3 ) - P . L . 86-36

DRF;RDX 3PX8075 (b\ ( 3 ) - P . L . 86-36 -

Reference

Flight of the Condor, The (U)

Historical Intelligence Production Problems: Is Technology the Answer?

Holistic Analysis (U)

International Telecommunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The

Meteor Burst Communications: An Ignored Phenomenon? (U)

Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere

Optical SIGrNT Collectors (U)

Collection equipment

Combinatorial Simulated Annealing and Iterative Improvement: An Experimental

COMINT Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)

Page 105: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOUZD,: 3021075 (b)(3)-50 USC 403 (b) (31-19 LSC 798 [b) (31-P. I . 86-16

REF I D z A 5 2 5 8 1 3 (b) ( 3 ) - P . L . 8 6 - 3 6

Keyword 1 Title Author Reference

COMINT C O m and the PRC Intervention in Vanderpool, Guy R. the Korean W-

Communications

Guemllas in the Mist: C o ~ l ~ ~ a n d Hanyok, Robert J. the Formation and Evolution of the Viet Minh, 1941-45 (U) - Priceless Advantage: COMINT in the Battles of Caral Sea and Midway, A (U)

, Primer on Specific Emitter I Identificaticsn, A (U) I

Artificial Ionospheric Modification: Practical and Potential Applications (U)

Book Revieur: The Target is Johnson, Thomas R. Destroyed: What Really Happened to Flight 007 and What America Knew About I t (U)

I Channel Capacity Algorithm (U)

Communications and the Ionosphere Gerson, N. C. 1 1111 Communications Security and the Problem of Hamlet: To Be or Not to Be (U)

Computerized Identification of Message Families Using Graph Theory (U)

I Cryptologic Origin of Braille, The (U)

I Developing r Feedback Maintenance System (FMS) on Carillon (U)

I Digital Communications: Introduction and Trends (U)

Vol. 15, No. 2, Summer 96

Vol. 15, No. 2, Spring 96

Vol9, No 4, Win 91

Vol 1, No 4, Win 83

Vo19, No 1, Spr 90

Vol5, No 3, Fall 86

Vol2, Nos 1-2, Spr-Sum 83

Vol 1, No 4, Win 83

Vol3. Nos 3-4, Fall-Win 84-85

Vol8, No 2, Sum 89

Vol. 14, No. 3, Fall 95

Vol4,85 (CS Issue)

V012, NOS 3-4, Fall-Win 83-84

Vol 1, No 4. Win 83

Page 106: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813 jb) ( 3 ) - P . L . 86-36

I Title Author Reference Keyword

Digital Voice Compression Algorithm with Robust Properties, A

-

Vol2, Nos 1-2, Spr-Sum 83

I Frequency Hopping Vulnerability to Partial B a d Jamming (U)

Vol 1, No 1, Spr 82

Vol5. No 3, Fall 86

High-Altitude Electromagnetic Pulse (HEMP): "A Sleeping Electronic Intruder," The (U)

I Listeming to the Rum-Runners (W Mowry, David P. Vol2, Nos 1-2, Spr-Sum 83

Meteor Burst Communications: An Ignored Phenomenon? (U)

Vol9, No 3, Fall 90

New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)

Vol5, No 3, Fall 86

I On the Selection Mechanism for Pseudonoise Sequences (U)

Vol 8, No 2, Sum 89

I Satellite-Earth Radio Link Depolarization by Ice Crystals (U) I V012, NOS 1-2,

Spr-Sum 83

I The Business Manager and Business Communications (u) I Vol11,No1,

Spr 92

Theoretical Implications of a Second Spectrum (U) I Vol8, No 3,

Fall 89

I Video Teleconferencing: NSA Applications (U)

V013, NOS 3-4, Fall-Win 04-85

Warning and Crisis Management (U) McManis, David Y. Vol2, Nos 3-4, Fall-Win 83-84

I Signaling System No. 7: And What about Analysis (U)

Communications networks

Vol. 13. No. 3, Fall 94

Introduction to Asynchronous Transfer Mode (ATM) (U1

Vol. 14, No. 1, Spring 95

Communications network technology

Vol. 12, Nos. 3-4, Fall/ Winter 93

Communication Satellites

Low Earth Orbit (LEO) Satellite Communications Systems Technology and Intercept Issues (U)

Communications systems

( MILSTAR (U) I I Vol7,No 1, Spr 88

Page 107: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813

Keyword I Title

NTSS-Yesterday, Today and Tomorrow (U)

Telecommunications Automatic Monitoring and Control System (U)

Communism Book Review: The Grand Failure: The Birth and Death of Communism in the Twentieth Century (U)

Computer security Out of Control (U) I Compromise

Computers

Mechanisms of Sigint Technology, The (U)

Cryptanalytic Use of High-Speed Digital Computing Machines (U)

Introduction to a Historic Computer Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)

Computer-managed Multimedia-A Makeover instruction

Computer- assisted instruction

Computer graphics Computer Graphics Data Base I Design Aid Package, A (U)

Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesis (U)

Computerized Identification of Message Families Using Graph Theory (U)

CRITICOMM Management: A User Interface (U)

Designers vs Users: Bridging the Communication Gap (U)

GKS: Its Comparison to Core and Its Feasibility of Use a t NSA (U)

GRAFMAKER: A Powerful Business Graphics Tool (U)

Author Reference

Vol. 13, No. 2, Summer94 .

Vol8, No 3, Fall 89

Vol8, No 3, Fall 89

Vol6, No 2, Sum 87

Vol . 1 5, Special Edition 96

Vol. 13, No. 4, Winter 94

Vol. 13, No. 4, Winter 94

Vol10, No 1, Spr 91

Vol. 13, No. 2 , Summer 94

Vol2,83 (CS Issue)

Vol8, No 2, Sum 89

Vol2.83 (CS Issue)

Vol2,83 (CS Issue)

Vol7, No 2, Sum 88

Vol4.85 (CS Issue)

Page 108: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813

Keyword I Title

I Graphic User Interface for the Transcriber-Analyst, A (U)

I Human Visual Perc'eption and Man- Computer Interaction (U)

INTERROGRAPH; An Information Tool for Counter-Terrorism Intelligence Centers (U)

I Management of TDY Funds: A Graphical Approach (U)

Processor Intercoenection Networks from Cayley Graphs (U)

I Segment Storage: Hierarchical Graphics Storage System (U)

I DOSNNIX Interoperability and E- mail in the Agency iU)

Computer hardware

Full-Text Searching: Coming of Age (1111

ADAGIO: A Modem Analog-to- DigitaYDigital-*Analog System for the R5 CYBERNAX Research System (U)

I Introduction: Examples of Powerful Personal Computers (U)

I Introduction: Special Computer Science Issue (U)

Multimedia Data Bases: Design Issues, NSA Applications, and Prototypes (U)

I Rapid Text Searching for Multiple Key Strings (U)

RISC Does Windows (U)

I Using Lotus 1-2-3 as an ELINT Display and Analysis Tool (U)

I Using Lotus 1-2-3 to Parse Coastline I Message Track Data (U)

Author Reference

Vol2.83 (CS Issue)

Vol4,85 (CS Issue)

Vol2,83 (CS Issue)

Vol2.83 (CS Issue)

Vol8, No 3, Fall 89

Vol8, No 2, Sum 89

Vol4,85 (CS Issue)

Vol 11, No 1, Spr 92

Vol8, No 3, Fall 89

Vol2.83 (CS Issue)

Vol4,85 (CS Issue)

Vol9, No 2. Sum 90

Vol 10, No 2, Sum 91

Vol8. No 3, Fall 89

Vol4, No 3, Fall 85

Vol7, No 3, Fall 88

Page 109: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813

(b) ( 3 ) - P . L . 8 6 - 3 6 - Keyword Title Author Reference

Computer networks A Model for Automated Vol10, No 2, Cryptovariable Distribution in a Sum 91 Cryptographic Network (U)

Architecture and Implementation for Vol8, No 3, a Larp Scale Distributed Fall 89 Multiprocessor, An (U)

Architecture and Implementation Vol8, No 4, for Linear Speedup of DSP Programs, Win 90 An (U)

Bringing User Power to the High Vol9, No 2, Performance Workstation (U) Sum 90

Comparison of Long Pipeline Vol7, No 4, Protocols (U) Win 89

Distributed File Access Over Vol7, No 3, Heterogeneous Networks (U) Fall 88

Distributed Processing on Powerful Vol4,85 Personal Computers: Interim Results (CS Issue) (U)

Fiber Distributed Data Interface, Vol7, No 1, The (Ul Spr 88

HYPERCHANNEL: Its Applications VoJ 7, No 3, in ASHLAND'S Architecture (U) Fall 88

Hypermedia Implemented in Object- Vol 10, No 1, Oriented Database Management Spr 91 Systems (U)

In Pursuit of a SONET Link Encryptor Vol 10, No 1, (L') Spr 91

Platform Network Evolution, The (U) Vol9, No 4, Win 91

Problem Encountered with the Vol7, No 2, Variant Record Construct in Ada (U) Sum 88

Processor Interconnection Networks Vol8, No 3. from Cayley Graphs (U) Fall 89

Prototype System to Capture Logic Vol7, No 3. from Images for VLSI Reverse 7 Fall 88 Engineering, A (U)

Page 110: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813

I Standards for Information Exchange among Computers (u) I

Keyword

XNS Ethernet Connections for the IBM PC XT (U)

Computer I An ~ A l ~ s i s of the Vectorization programming Abilities of Current C Compilers (U) I

Title Author Reference

Book Review: Designing and Programming Personal Expert Systems (U)

n Overview of a Systolic ' Array Prockssor for the Sun (U)

Book Review: Structure and Interpretations of Computer Programs (U)

Vol9, No 2, Sum 90

Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process, The

I (U) Code. Train: A Computer-Based Morse Code Training Package (U)

I Cognitive Processes in Software Fault Detection (U) I DAEMON - A FOLKLORE System Guardian Spirit (U'l

Dictionary Searching by Syllabification and Syllable Indexing (U)

Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)

I Encapsulating Xt Callback Functions in C + + (U) I

Vol4,85 (CS Issue) Vol4, No 1, Spr 85

I Vol10, No 2, Sum 91

Vol5, NO 3, Fall 86

Vol9, No 3, Fall 90

Vol. 11, No. 2, Summer 92

Vol6, Nos 3-4, Fall-Win 87-88

I Vol. 11, No. 2, Summer 92

I Vol4, No 2, Sum 85

Vol. 11, No. 2, Summer 92

Vol10, No 2, Sum 91

Vol11, No 1, Spr 92

Page 111: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 (bi ( 1 ) (b) {3)-P.L. 86-36

Keyword I

REF XB i3AS2 5843

Title

I Error Messages: The Importance of Good Design (U)

Further Results in Programming the I I Icon: An Enchancement to the UNIX Language Hierarchy (U) 1

I IMP Syntax Graph, The CU) I Learning Theories and Computer- Assisted Language Instruction . Technologies: A Synthesis (U)

I Meeting the Programming Challenges of the Future (U) I Notes on Optimization (U)

Operational Application of VLSI Technology: Using the PF474 to Alleviate the Problem of Variant Names, An (U)

( Programming the SPS2 N) I

Computer security (COMSEC)

Author Reference

Structured Knowledge Acquisition Techniques (U)

Structured Testing as a Learning Tool (U) I Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)

A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)

Program Overview: us, and Directions (U)

Book Review: Out of the Inner Circle: A Hacker's Guide to Computer Security (U)

Vol 11, No I, Spr 92

Vol6, No 1, Spr 87

Vol6, No 1, Spr 87

Vol4, No 4, Win 86

Vol10, No 1, Spr 91

Vol 1 , Nos 23, Sum-Fall 82

Vol7, No 1, Spr 88

Vol4, No 2, Sum 85

Vol10, No 2, Sum 91

Vol 11, No 1, Spr 92

Vol9, No.4, Win 91

Vol7, N0.3, Fall 88

Vol10, No 2, Sum 91

Vol10, No 1, Spr 91

Vol4, No 3, Fall 85

Page 112: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword 1 Title

Communications Security and the Problem of Hamlet: To Be or Not to Be (U)

Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)

I Computer Virus Infections: Is NSA Vulnerable? (U)

Computer Virus Organization: A Definitive Taxonomy and Anatomy of Computer Viruses (U)

Design and Evaluation of INP~SEC Systems: The Computer Security Contribution to the Composition Discussion, The (U)

I Development of a Hard Disk Erasure Procedure (U)

Development of Communications Security Equipment, The (U)

I Examples of Lattices in Computer Security Models (U)

Fault !3imulation Requirements for Security Fault Analysis (U)

I First Generation Technical Viral Defense, A (U) ,

FOLKLORE: One Approach to Security (U)

LOCKing Computers Securely (U)

Inference Through Polyinstantiation (U)

On the Desirability ofa Flexible and Dynamic Security ~ a t t i c e (U)

Author Reference

Vol3, Nos 3-4, Fall-Win 84-85

, Vo14,Sum85 (Supplement 1

Vol4, No 3, Fall 85

Vol5, No 3, Fall 86

Vol. 12, No. 1, Spring 93

Vol10, Nos 3-4, Fall-Win 91

Vo1.16, No. 2, Summer 96

Vol4, No 4, Win 86

Vol5, No 4, Win 87

Vol. 13, No. 3, Fall 94

Vol7,No 1, Spr 88

Vol. 11, No. 4, Winter 92

Vol10, No 2, Sum 91

Page 113: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: (@(E2dLO7656 REF IDrA525813

Keyword

Computer software

Reference

Vol8, No 2, Sum 89

Vol9, No 1, Spr 90

Vol10, No 2, Sum 91

Vol. 12, Nos. 34 , FalY Winter 93

Vol. 13, No. 1, Spring 94

Vol9, No 1, Spr 90

Vol4, No 3. Fall 86

Vol6, No 2, Sum 87

Vol8, No 3, Fall 89

Vol4,85 (CS Issue)

Vol10, No 2, Sum 91

Vol 1, No 1, Spr 82

Vol9, No 3, Fall 90

Vol4,85 (CS Issue)

Vol7, No 4, Win 89

Title

PCSE: A Design Implementation for PC Security (U)

Programmable COMSEC and the CYPRIS Crypto-Mieroproeessor (U)

Rapid Text Searching For Multiple Key Strings (U)

RATBAG Report, The (U)

SINCGARS Software Evaluation (U)

Stab at A2 Criteria, A (U1

Susceptibility of Multics to Viral Attacks, The (U)

Techniques for Representing Mandatory Security Policies in Non- Interference Theory, A (U)

Theoretical Implications of a Second Spectrum (U)

ADAGIO: A Modern Analog-to- DigitalIDigital- to- Analog System for the R5 CYBEWVAX Research System (U)

Analysis of the Vectorization Abilities of Current C Compilers, An (U)

Analysis of TRS80 Model I Password Encryption Algorithm (U1

Book Review: Structure and Interpretations of Computer Programs (U)

CAP Production Software Library User (U)

Comparison of Long Pipeline Protocols (U)

Author

Page 114: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDrA525813 (b) (3)-P.L. 86-36

Keyword I Title Author Reference

Cognitive Processes in Software Fault Detection (U)

Differing Strategies for Process Group Management and Signal Handling in AT&T System V UNIX and Berkeley UNIX (U)

DOWNIX Interoperability and E- mail in the Agency (U)

Expanded MAX-MIN Priority Queue, An (U)

Full-Text Searching: Coming of Age (U)

GRAFYAKER: A Powerful Business Graphics Tool (U)

LARC: An Electrical Parameter Extraction Algorithm for VLSI Standard Cell Designs (U)

Platform Network Evolution, The (U)

Programmable COMSEC and the CYPRIS CrypbMicroprocessor (U)

Programming the SPS2 (U)

Prototyping Man-Machine Interface to Facilitate Early Identification of Software Deficiencies (U)

Vol. 11, No. 2, Summer 92

A

Vol10, No 2, Sum 91

Software Inspections (L'l

Software Maintenance: Putting Life Back into the Life Cycle (U)

Vol11, No 1, Spr 92

Vol10, No 2, Sum 91

Vol8, No 3, Fall 89

Vol4,85 (CS Issue)

Vol9, No 2, Sum 90

Vol9, No 4, Win 91

Vol9, No 1, Spr SO

Vol10, No 2, Sum 91

Vol4, No 4, Win 86

Vol6. No 1, Spring 87

Vol4,85 (CS Issue)

Vol5, No 4, Win 87

Page 115: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Keyword

Computer systems

REF ID:A525813 (b) ( 3 ) - P . L . 86-36

Title Author Reference

Systolic Array Processor for the Sun Sum 90 (U)

Structured Testing as a Learning Tool (U)

T3343 Software Evaluation Effort (U) I TQM and Software: New Paradigms for Development and Support (U)

TURBOTECH: An Architecture Management and Analysis System (U)

Using Lotus 1-2-3 as an EWNT Display and Analysis Tool (U)

ACQUAINTANCE: A Tool for Language Identifleation (U)

ADAGIO: A Modem Analog-to- DigitaYDigital-WAnalog System for the R5 CYBERNAX Research System (U)

Analyzing Vague Data (U)

Beyond "DRAGON'S LAIR" (U) I Book Review: Designing and Programming Personal Expert Systems (U)

CAP Production Software Library User (U)

Vol9, No.4, Win 91

Vol4,86 (CS Issue)

Vol11, No 1, Spr 92

Vol8, No 4, Win 90

Vol4. No 3, Fall 85

Vol7. N0.4 Win 89

Vol4,85 (CS Iasue)

Vol9, No 4, Win 91

Vol2.83 (CS Issue)

Vol5, No 3, Fall 86

Vol4,85 (CS Issue)

Page 116: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword

i b ] i l i i b ) ( 3 ] 5 0 i:Si: 403 ih, ( 3 ! - i 8 I ISC 798

. (b] ( 3 1 - P . 1 . 86-36

REF ID:A525813) (3)-P.L. 86-36

Title Author

Computer Security Certification Implications to Networked U.S. National Security Establishment Automated Data Processing Systems (U)

Computers- the Wailing Wall (U) Meyer, Joseph A.

Connect the Dots: ~4-I Aid to Studying Associations (U)

I DAEMON -A FQLKL~RE System Guardian Spirit (U)

Database Processing with Triple Modular Redundance (U)

Developing a Feedback Maintenance System (FMS) on Carillon (U)

Error Messages: The Importance of Good Design (U)

I FARSEEING: A Study in Expert Systems (U)

Graphic User Interface for the Transcriber-Analyst, A (U)

Geographic Information Systems (U)

Historical Intelligence Production Problems: Is Technology the (U)

HYPERCHANNEL: Its in ASHLAND'S Architecture (li)

I Ideograph Writing Patterns and Computer Input (U)

Influence of U.S. Cryptologic Organizations on the Digital Computer Industry (U)

Information Engineering Integrated Methodologies for Building a

' Transcriber Information Aids System (U)

Reference

Vol4, Sum 85 (Supplement)

V016, NOS 3-4, Fall-Win 87-88

Vol7, No.4, Win 89

Vol4, No 2, Sum 85

Vol5, No 4, Win 87

Vol4; 85 (CS Issue)

Vol11, No 1, Spr 92

Vol8, No 2, Sum 89

Vol2,83 (CS Issue) .

Vol 10, Nos 3-4, Fall-Win 92

Vol4, No 4, Win 86

Vol7, No 3, Fall 88

Vol4, No 3, Fall 85

Vol6, NOS 3-4, Fall-Win 87

Vol4.85 (CS Issue)

Page 117: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813 (b) ( 3 ) - P . L . 86-36

Keyword 1 Title Author Reference

PEEVEY Assistant An "Electronic Performance Support System" (EPSS) for On-theJob Training of Computer Operators (U)

ib) (1)

Prototype Knowledge Base System for Technology Espionage: An Interim Report, A (U)

Language Expert System: Squeezing Gurin, Jacob (Jack) Vol4 No 1, the Expert Linguist into a Computer Spr 85

Prototype System to Capture Logic from Images for VLSI Reverse Engineering, A (U)

Signal Descriptor Language, A (U)

Standards for Information Exchange among Computers (U)

(h) (3)-50 USC 403 (b) (3)-P.L. 8 6 - 3 6

Vol11, No 1, Spr 92

Vol5, No 4, Win 87

(u)

Vol7, No. 3, Win 88

Vol3, NOS 2-3, Fall-Win 84-85

Vol7,No 1, Spr 88

0 Vol8, No 2, Sum 89

Vol7, No. 3, Win 89

NIKKEL 11 Signal processor or Gt t ing Your NIKKEL'S Worth, The (U)

i r ) 1 i ,k>, - ) -51 I1:f' 41J3 i t ? ) \ 3 ) - 1 E 11qr / L ,

( t i ' ) - F . L . P G - ? ~

I Vol9, No 1, Spr 90

-

Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)

1 aldo's Dream (U)

Susceptibility of Multics to Viral Vol4, No 3, Attacks, The (U) Fall 85

Time Is -Time Was -Time Is Past: Campaigne, Howard H. Vol6, Nos 3-4, Computers for Intelligence (U) Fall-Win 87-88

Tools for the Beginning Translator 1 iUl

I UCSD p-System, The (U)

Winning the Paper Chase: Operational Aplications of Computer Output Microfiche (U)

Vol3, Nos 1-2, Spr-Sum 04

Vol4,85 (CS Issue)

Vol 1, No 1, Spr 82

Page 118: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b) (31-50 LSC 403

5 REF IDzA525813 (b) ( 3 ) - P . L . 86-36

Computer virus I Analysis of the "Lehigh" Virus (U)

Key word

Computer training

I Computer Virus Infections: Is NSA Vulnerable? (U) 1

Title Author

PEEVEY Assistant An "Electronic Performance Support Systemn (EPSS) for On-thedob Training of Computer Operators (U)

Computer Virus Organization: A Definitive Taxonomy and Anatomy of Computer Viruses (U)

I First Generation Technical Viral Defense, A (U) I I Susceptibility of Multics to Viral Attacks, The (U)

Creativity Creativity: Can It Be Taught? (U)

Counterintelligence Book Review: International Journal of Intelligence and Counter- intelligence (U)

Cryptanalysis I Address Given to Annual Cryptanalysis Exchange (U) I

Critical programming support

Analysis of TRS-80 Model I Password Encryption Algorithm (U)

I Artifcia1 Intelligence: Approach to Cryptodiagnosis (U)

Critical Programming Support During the Persian Gulf Crisis (U)

Reference

Vol11, No 1, Spr 92

Vol9, No 2, Sum 90

Vol4, No 3, Fall 85

Vol5, No 3, Fall 86

Vol7, No 2. Sum 88

Vol4, No 3, Fall 85

Vol6, Nos 3-4, Fall-Win 87-88

Vol. 13, No. 2, Summer 94

Vol. 12, Nos. 3-4, Fall/ Winter 93

Vol. 13, No. 1, Spring 94

Vol. 12, No. 1, Spring 93

Vol 1,83 (CS Issue)

Vol 1, No 1, Spr 82

Vol5,86 (CA Issue)

Vol. 13, No. 1, Spring 94

Page 119: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

I Book Review: The American Black 7 Vo14,No 2, Chamber (U) Sum 85

Keyword

I Computers -the Wailing Wall (U) Meyer, Joseph A.

Title Author Reference

Book Reuiew: Alan Turing: The Mowry, Darid P. Vol2, Nos 3-4. Enigma (U) Fall-Win.83-84

I Conditional Sigmage Analysis and Bulge Estimation (U) I I Cryptanalysis: A Prognosis for the Eighties (U) I Cryptanalysis in the United Kingdom (U)

Cryptanalytic Use of High-Speed Digital Computing Machines (U) I Cryptographic Mathematics of Enigma, The (U1

CRYPTRONICS or Cryptanalysis and Cryptography in Microelectronics (U)

Development of the Tramposition PseudeSquare Technique, The (U) I Diabolical Diagnosis (U) I

Exploratory Exploitation (U) I I Farewell, Address, A (U) I I Introduction to a Historic Computer Document: Bettingon the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U) .

I Opening Address. Annual Cryptanalysis Exchange (U)

Vol6, NOS 3-4, Fall-Win 87-88

Vol 1,83 (CA Issue)

Vol 1, No 1, Spr 82

Vol. 12,.Noe. 3-4, Fall/ Winter 93

Vol. 13, No. 4, Winter 94

Vol. 13, No. 3, Fall 94

Vol. 15, Special Edition 96

Vol 1.83 (CA Issue)

Vol5,86 (CA Issue)

Vol8, No 1, Spr 89

Vol5.86 (CA Issue)

Vol4. No 2, Sum 85

Vol. 13, No. 4, Winter 94

Vol1, Nos 2-3, Sum-Fall 82

Page 120: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDrA525813 ( b ) ( 3 ) - P . L . 86-36

Keyword Title Author. Reference

Vol5,86 (CA Issue)

Mowry, David P. Vol2, Nos 3-4, Menzer: Cryptographic Inventor Fall-Win 83-84 Extraordinaire (U)

Cryptanalysts

Cryptographii bypass

Cryptographic network

cr~~tol3raphy

Securing Army Circuits during World War 11: A Potential Disaster Narrowly Averted (U)

Solving xa= b (mod c) for x and an decimating Recursions (U) I

I FOLKLORE: One Appmach to Security 1 Formally Stating Cryptographic I Bypass Requirements (UI

A Model for Automated Cryptovariable Distribution in a Cryptographic Network (U)

Before BOURBON: American and British CoMINT Efforts Russia and the Soviet

I Cryptographic Applications of Singular Value Decomposition (U)

Rowlett, Frank B. Vole, No 1, - Spr 87

Vol. 11, No. 4, Winter 92

Vol. 13, No. 3, Fall 94

I Vol. 12, No.2, Summer 93

Vol10, No 2, Sum 9.1

I Vol5,86 (CA Issue)

Vol. 12, Nos. 3-4, FalYWinter 93

Vol 1,83 (CA Issue)

CRYPTRONICS or Cryptanalysis and Vol. 15, Special Cryptography in Microelectronics ([I Edition 96

First U.S. Government Manual on Gaddy, David W. Vol. 11, No. 4, Cryptography, The (U) Winter 92

Cryptolinguistics

Vol. 12, No. 1, Spring 93

Regierungs-Oberinspektor Fritz Mowry, David P. Vol2, Nos 3-4, Menzer: Cryptographic Inventor Fall-Win 83-84 Extraordinaire (U)

1 Vol. 14, No. 3, Fall 96

Cryptologic history Book Review: SIGINT%C~~~S: The Signals Intelligence War, I900 to Today, The

Page 121: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 (b ) ( 3 ) - P . L . 86-36

Title Author Reference

"Cipher' Dispatches and the ~lect ion I , , , 1 Vol. 11, No. 3, of 1876 (U) Fall 92

Director's Welcome a t the 1992 McComell, Vice Admiral Vol. 12, No. 1, Cryptologic History Symposium, The J.M., USN Spring 93 (U)

Vol. 13, No. 1,

First U.S. Government Manual on I Gaddy, David W. Vol. 11, No. 4, Cryptography. The (U) Winter 92

Handy-Dandy Field Site History: Johnson, Thomas R. Vol. 14, No. 1, Fifty Years of Field Operations, Spring 95 1945-1995. The (U)

History of the South Vietnamese Vol. 13, No. 1, Directorate for Technical Security Spring 94

I Vol. 13, No. 2, Summer 94

I

Move, or How NSA Came to Fort Johnson, Thomas R. Meade , The (U)

Origins of the Soviet Problem: A Kirby, Oliver R.

Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov

Vol. 14, No. 2 Summer 95

Vol. 13, No. 3, Fall 94

Vol. 12, No. 1, Spring 93

Vol. 11, No. 4, Winter 92

Vol. 13, No. 4, Winter 94

Vol. 14, No. 2, Summer 95

Page 122: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 ?b) (3)-P.L. 66-3E

Keyword I Title Author

Revisiting the Dispute over the Identification of "AF" as Midway (U)

I Seward's Other Folly: America's I I First Encrypted Cable (U)

SIGINT and the H6.locaust (U) Benson, Robert Louis

I Solved: A Long-Lost Cipher from Siberia (U)

I Station "CW and Fleet Radio unit Melbourne (FRUMEL) Revisited (U)

Way I t Used to Be or What's an RSM Anyway, The, Part I, (U)

Way It UsedtoBe,The, Part I1 (From ADVAlGENSto the Alphabet

1 (U)

Beyond Codes and Ciphers: The Nolte, William M. Expanded Meaning of Cryptology in the Late Twentieth Century (U)

Church Cryptogram: Birth of Our Nation's Cryptology, The (U)

Cryptographic Applications of Singular Value Decomposition (U)

I Eight Cryptologic Problems (Ul ,

Meyer, Joseph A.

Future of High Frequencies in Gerson, N.C. Cryptology - Part I, The (U)

Future of ~ i g h Frequencies in Gerson, N.C. ' crypto~ogy -Part [I, he (u)

If Cryptanalysis Is What We Do and Nolte, William M. Cryptanalysts Are What We Are, Then Where Does That Leave the Rest of Us? (U)

Open Letter to William M. Xolte, An (U)

Reference

Vol. 13, No. 4, Winter 94

Vol. 12, No. 2, Summer 93

Vol. 14, No. 1, Spring 95

Vol. 13, No.2, Summer 94

Vol. 12, No.2, Summer 93

Vol. 13, No. 1, Spring 94

Vol. 13, No. 2, Summer 94

Vol8, No 4, Win 90

Vol6, No 2, Sum 87

Vol 1,83 (CA Issue)

Vol 1.83 (CA Issue)

Vol5.86 (CA Issue)

Vol. 11, No. 2, Summer 92

Vol. 11, No. 3, Fall 92

Vol9, No 2, Sum 90

Vol9, No 2, Sum 90

Page 123: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DQCID: 3021075 ( ~ i t 3 ) - 5 3 USC 403 ( 3 ) (31-18 USC 798 (S) (3)-P.L. 86-36

REF IDtA525813 : :(b) ( 3 ) - P . L . 8 6 - -36

Reference I Title Authot Keyword

Recent Progress in Academic Cryptology (U)

Vol4, No 2, Sum 85

I "Things Aren't What They Used to Gurin, Jacob (Jack) Be" (U)

Vol 1, No 1, Spr 82

What Every Cryptologist Should Johnson, Tho- R. Know about Pearl Harbor (U)

Who Are We? (U)

Vol6, No 2, Sum 87

Vol9, No 2, Sum 90

Vol. 13, No. 4, Winter 94 I Crypto-TA. The Mighty Morphin of

Technical Analysis (U) u Cuban Missile crisis Book Review. Eyeball to Eyeball: Hatch, David A.

The Inside Story of the Cuban Missile Crisis (U) - Vol. 11, No. 3,

Fall 92

I Cuban Missile Crisis: A SIGINT Perspective, The (U) I Vol. 13, No. 1,

spring94

NSA in the Cyberpunk Future: A Somewhat Educated Guess at Things to Come (U)

Vol. 16, No. 3. Fall 96

I BILLY Data Base~Tasking Management System Intervals (U)

Database Vol8, No 3, Fall 89

Computer Graphics Data Base Design Aid Package, A (U) I Vol2,83

(CS Issue)

Database Processing with Triple Modular Redundance (U)

Vol5, No 4, Win 87

Digital Voice Compression Algorithm with Robust Properties, A

Vol2, Nos 1-2, Spr-Sum 83

Vol5, Nos 1-2, Spr-Sum 86

Enhancing Auditory Perception (U) Gurin, Jacbb (Jack) I Vol 1, Nos 2-3, Sum-Fall 82

Multimedia Data Basea: Design Issues, NSA Applications, and Prototypes (U)

Vol9, No 2, Sum 90

Vol2, Nos 3-4, Fall-Win 83-84 I Naval Security Group Data Base

Administration (U)

Page 124: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDrA525813

Keyword 1 Title

Return of the Electronic Francophoneglos, The (U)

Databases , Database

management systems

Data Encryption Standard (DES)

Data exfiltration

Data exchange

Data manipulation

Deception

Decision support systems

Defense

DEFSMAC

Deployment

Creating an Information Space: Cyc and Carnot (U)

NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)

1 [Sensitive Title]

Network System's Data Exchange (DX) IP Router: NSC's Product in

1 Review (U)

I Introduction to Volume Modeling and Rendering, An (U)

Author Reference

I Project POSTCARD(^) Hanyok, Robert

Development of Decision Support Analysis for Traffic Analysis (U)

ABM Treaty and the Dilemma of Indecision, The (U)

DEFSMAC: The Future Is Now (U)

I Too many Cryptologic Eggs in One Basket (U) u

Vol4, No 1, Spr 85

Vol. 15, Special Edition 96

Vol. 12, Nos. 3-4, FalVWinter 93

Vol. 15, No. 1, Spring 96

Vo1.15, Special Edition 96

Vol. 12, No. 1, Winter 93

Vol. 11, No. 3, Fall 92

Vol. 13, No. 3, Fall 94

Vol. 12, Nos. 3-4, FalltWinter 93

Vol5, Nos 1-2, Spr-Sum 86

Vol. 13, No. 1, Spring 94

Vol7, No 1, Spr 88

Deputy directors I Dr. Louis W. Tordella, 1911-1996 (U) author unknown Vol.15, No. 1, Spring 96

DESERT SHIEWSTORM Critical Programming Support During the Persian Gulf Crisis (U)

Desktop publishing Developing a Document Image I Processing System (U1

Dialed Number I Approach to Isolating Nontraditional Recognition Targets, An (U)

Vol. 12, No. 1, Spring 93

Vol. 1 1, No. 3, Fall 92

Vol. 13, No. 3, Fall 94

Page 125: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813

Keyword I Title

Digital signals I Digital optical

systems

Digital technology

Receivers (U)

Effects of Optical Components on System Performance, The (U)

Digitizing I Compacting the Masscomp Disk (U)

DIRNSA From Chaos Born: General Canine's First Charge to the NSA Workforce (U)

Glimpses of a Man: The Life of Ralph - J. Canine (U)

Discrimination I Machine Learning Approach to Text Type Identification, A (U)

Disk 1 Compacting the Masscomp Disk (U)

Development of a Hard Disk Erasure Procedure (U)

Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)

Distributed computing

. Document image I Developing a Document Image processing Processing System (U)

Combining Distributed Computing and ObjecbOriented Techniques (U)

Distributed processing

n IASW~ uccess u SIGINT ooperationm

Introduction to Distributed Processing for the Layperson: Making the Move from the General Store to the Supermarket. . . ,An (U)

Author

Dynamical systems

Reference

-%4= Fall of the Shah: A Chaotic Approach, The (U)

vbl. 15, NO. 2, Summer 96

Vol. 14, No. 2, Summer 96

Vol8, No 2, Sum 89

Vole, No 2, Sum 87

Vol6, No 2, Sum 87

Vol. 13. No. 4, Winter 94

Vol8. No 2, Sum 89

Vol10, Nos 3-4, Fall-Win 91

Vol8, No 2, Sum 89

Vol. 15, No. 1, Spring 96

Vol. 15, No. 3, Fall 96

Vol. 11, No. 3, Fall 92

Vol 10, Nos 3-4, Fall-Win 91

Vol. 13, No. 4, Winter 94

Page 126: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 : ( b ) (3)-P.L.

Keyword I Title Authot

Economics 1 -

Alp-Adria: A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)

Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds? (U)

Economic warfare Review: Marketing Warfare

Economic espionage

Editorial

Book Review: Friendly Spies: How America's Allies Are Using Economic Espionage to Steal Our Secrets (U)

I High-Tech Trade War with Japan: Jelen, Ceorge F. Can Anyone Win?, The (U)

"Things Aren't What They Used to Gurin, Jacob (Jack) Be" (U)

Electrochemical I Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (U)

Electronics Comparing Visual Detection to Machine Vision for Detecting the Presence of Laser Irradiation with an Electro-Optical Device (U)

Electronic printing

I EMC - A Field Perspective (U)

Agency Electronic Printing Standards: Today It's PostScript and Interpress Page Description Languages (U)

I Fundameritals of Electronic System Grounding (Ul

Generalized GMW Sequences and an Application to Frequency Hopping (U)

86-36

Reference

Vol7, No 3, Fall 88

Vol3, Nos 1-2, Spr-Sum 84

Vol8, No 4, Win 90

Vol6, No 2, Sum 87

Vol. 13, N0.2, Summer 94

Vol5, No 4, Win 87

Vol5, NOS 1-2, Spr-Sum 86

Vol1, No 1, Spr 82

Vol7, No 2. Sum 88

Vol4, No 4, Win 86

Vol8, No 4, Win 90

Vol 1, Nos 2-3, Sum-Fall 82

Vol3, Nos 1-2, Spr-Sum 84

Page 127: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Doc~P~t~-;$ &P7 5 REF I D : A 5 2 5 8 1 3 (3\ (31-19 LISP 798 ( ? ! ( 3 ) - ? . L . 86-36 -

(b) (3)-P.L. 86-36

Keyword I Title Author Reference

Electronic warfare

High-Altitude Electromagnetic Pulse (HEMP): "A Sleeping ~lectfonic Intruder," The (U)

Signal Descriptor Language, A (U)

B w k Review: Electronic Warfare: Element of Strategy and Multiplier of Combat Power (U)

Electron injection 1 Hot Carrier Effects on VLSI Devices

Millimeter Wave Transfer Function of the Earth's Clear Air Atmosphere (U)

50 USC 403 I I

Using Lotus 1-2-3 as an Elint Display and Analysis Tool (U)

Using Lotus 1-2-3 to Parse Coastline Message Track Data (U)

Emitter Primer on Swc Emitter Identification

Engineering

English

I Generalized GMW Sequences and an Application to Frequency Hopping (U)

Information Engineering: Integrated MethodoIogies for Building a Transcriber Information Aids System (U)

Satellite-Earth Radio Link Depolarizationby Ice Crystals (U)

Spoken Language Library: A Unique institution (U1

Gurin, Jacob Uack)

Vol 6, No 3, Fall 86

Vol3, Nos 2-3, Fall-Win 84-85

Vol 1, NOS 2-3, Sum-Fall 82

Vol6, No 1, Spr 87

VOI 5, NOS 1-2, Spr-Sum 86

Vol7, No 3, Fall 86

Vol 7, No 3, Fall 88

Vol 1, No 4, Win 83

Vol6,86 (CA Issue)

Vol. 14, No. 3, Fall 95

Vol4,85 (CS Issue)

Vol2, NOS 1-2, Spr-Sum 83

Vol5, No 3, Fall 88

Page 128: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813 ib)(3I-P.L. 86-36

Keyword 1 Title Author Reference

Youye Got to Go by the Rules (U) Gurin, J w b (Jack) Vol2, Nos 3-4, Fall-Win 83-84

Enigma I Book Review: Alan Turing: The Mowry, David P. Vol2, Nos 3-4, Enigma (U) Fall-Win 03-84

Espionage

Book Review: Codebreakers: The Filby, P.W. Inside Story of Bletchley Park (U)

Cryptographic Mathematics of Enigma, The (U) r - 7 Book Review: Atom Bomb Spies, The ' u I Book Review: Black Cipher (U) Hanyok, Rabert J.

Book Review: Family Treason (U) n I Book Reuiew: FBI-KGB War: A Special Agent's Story, The (U) u

Vol6, Nos 3-4, i Fall-Win 87-88

Book Reuiew: Honorable Treachery: A History of U.S. Intelligence, Espionage, and.Covert Action from the American Revolution to the CIA(U)

1 B d Revinv: M y Silent War (U)

Book Review: Nightmover: How Aldrich Ames Sold the CIA to the KGB for $4.6 Million (U)

Book Review: Spywars: Espionage and Canada from Gouzenko to Glasnost (U)

I Out of Control (U)

Book Reuiew: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)

Book Reuiew: Haile Selassie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)

Vol. 13, No. 2, Summer 94

Vol. 13, No. 3, Fall 1994

Vol. 14, No. 4, Winter 95

Vol5, No 3, Fall 86

Vol6, No 2, Sum 87

Hatch, David A. Vol. 13, No. 3, Fall 94

Hanyok, Robert J. Vol. 14, No. 3, Fall 95

Vol. 15., No. 2, Summer 96

Johneon, Thomas R. Vol. 14, No. 2, Summer 96

Vol. 15, Special Edition 96

Vol4, No 3, Fall 85

Vol4, No 4, Win 86

Page 129: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

' ~ ~ & i C B : ~ o ~ 3 0 2 1 0 7 5 [b) c 3 ) - 1 U USC I98 b)13)-P.-. 86-36

REF IDzA525813 "{bl (3)-P.L. 86-36 -

Keyword Title

Expert systems Structured Knowledge Acquisition Techniques (U)

Facsimile c Fairbanks, Sidney

Falklands War

Field sites

FOLKrnRE

Forecasting

Passing of an Extraordinary Man, The (U)

Book Review: One Hundred Days: The Memoirs of the Falklands Battle Group Commander (U)

French secret service

Frequency management

Friedman, William F.

I Book Review: Chicksands: A Millenium of History (Ul

Reference

v i l l i , NO 1, Spr 92

Vol. 13, No. 4, Winter 94

Vol. 15, Special Edition 96

Vol4, No 3, Fall 85

Vol. 11, No. 2, Summer 92

Vol11, No 1, Spr 92

Vol. 13, No. 3, Fall 94

Handy-Dandy Field Site History: Johnson, Tho- R. Vol. 14, No. 1, Fifty Years of Field Operations, Spring 96 1945-1995. The (U)

M)LKU)W: One Approach to Security Vol. 13, No. 3, (U) Fall 94

I Dealing with the Future: The Limits of Forecasting (U)

Book Reuiew: French Secret Services: Hanyok, Robert J. Vol. 14, No. 4, From the Dreyfus Affair to the Gulf Winter 96 War, The (U)

Frequency Management - No Longer an Agency Nemesis (L')

Diary of 23 April - 13 June 1943, Friedman, William F. Vol 1, Nos 2-3, Part I (U) Spr-Fall82

I Diary of 23 April - 13 June 1943, Friedman, William F. Vol1, No 4, Part I1 (U) Win 83

FRUMEL I Station "C" and Fleet Radio Unit Melbourne (FRUMEL) Revisited (U)

Vol. 12, No. 2, Summer 93

Page 130: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

i 9 6 C I D : 3021075 1 ' (31-53 USC 193

REF ID:A525813 i ( b ) ( 3 ) - P . 1 , . 86-36

' k i 31-18 ;SC 798 ,k! (.3)-P.:,. 86-36

w

Keyword I Title

German ciphers I World War I1 German Army Field Cipher and How We Broke It, A (U) I

Germany I Book Review: History of the German General StafT(U)

GLISSADE I GUSSADE Lessons Learned from a Rapid Prototype (U) I

GOLD NUGGET Award GOLD NUGGET Award (U)

Gold Nugget Award for Excellence in Traffic Analysis, The (U) I

Gorbachev, Mikhail in Historical Perspective I

Moscow's Realignment with Cairo: Look a t Gorbachev's New Political Thinking (U)

Hardware descriptive languages

HE' collection

I Soviet Military Establishment under Studeman, W.O., VADM, Gorbachev, The (U) ' USN

Modular Arithmetic in Hardware (U)

Origins of SIGINT Hearability (U) 1 1 Communications and the Ionosphere Gemn, N. C.

Future High Frequency Target Gerson, N. C. Location System, The

HFDF Research Attempts: Past and Gerson, N. C. Future (U)

NSA Signal Collection Equipment and Systems: The Early Years - Antennas (U)

NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)

Reference

Vol. 15, No. 4, Winter 96

Vol8, No 3, Fall 89

Vol. 13, No. 3, Fall 94

Vol. 15, No. 1, Spring 96

Vol. 14, No. 2, Summer 95

Vo18, No 4, Win 90

Vol6, No 2, Sum 87

Vol8, No 4, Win 90

Vol7, No 4. Win 89

Vol. 11, No. 4, Winter 92

Vol. 12, No. 2, Summer 93

Vol 1, No 4, Win 83

Vol2, Nos 1-2, Spr-Sum 83

Vol 1, Nos 2-3, Sum-Fall 82

Vol. 14, No. 4, Winter 95

Vol. 15, No. 1, Spring 96

Page 131: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID :

Keyword

HF communications

History

REF IDtA525813

Title Author Reference

I Future of High Frequencies in Gerson, N.C. Crypto1ogy -Part I, The (U)

I Future of High Frequencies in Gerson, N.C. Cryptology - Part 11, The (U)

Beyond Codes and Ciphers: The Nolte, William M. Expanded Meaning of Cryptology in the Late Twentieth Century (U)

Book Review: "And I Waa There": Pearl Harbor and Midway-Breaking the Secretq (U)

I Book Review: Alan Turing: The Mowry, David P. Enigma (U)

I Book Review: American Black Chamber, The (U)

I Book Review: Concise History of the Middle East, A (U)

Book Review: Ethiopia a t Bay: A Personal Account of the Haile Selassie Years (U)

Book Review: Guardians of the Sea: History of the United States Coast Guard from 1915 to the Present (U)

Book Review: Haile Selaesie's War: Italian-Ethiopian Campaign, 1935- 1941 (U)

Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U)

I Book Review: Mask of Command, The (L')

Book Review: Room 40: British Naval Intelligence 1914-18 (U)

I Book Review: Secrecy and Democracy: CIA in Transition, The

Val. 11, No. 2, Summer 92

Vol. 11, No. 3, Fall 92

Vol8, No 4, Win 90

Vol5, NOS 1-2, Spr-Sum 86

Vol2, Nos 34, Fall-Win 83-84

Vol4, No 2, Sum 85

Vol4, No 1, Spr 86

Vol4, No 3, Fall 86

Vol7, No 2, Sum 88

Vol4, No 4, Win 86

Vol7, No 1, Spr 88

Vol9, No 2, Sum 90

Vol2, NOS 1-2, Spr-Sum 83

Vol4, No 3, Fall 85

Page 132: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDtA525813 (31 (3)-P.L. 8 6 - 3 6

Keyword I Title Author Reference

Book Review: ULTRA Americans: The U.S. Role in Breaking the Nazi I Codes, The (U)

Vol5, No 3, Fall 86

Vol 1, NOS 2-3, Spr-Fall82

Diary of 23 Apri 1- 13 June 1943, Friedman, William F. Part I (U)

Diary of 23 April - 13 June 1943, Friedman, Wiiliam F. Part I1 (U)

Gorbachev in Historical Perspective (U) 0

Vol 1. No 4, Win 83

Vo18, No 4, Win 90

Influence of U.S. Cryptologic Snyder, Samuel S. Organizations on the Digital Computer Industry (U)

Vol6, Nos 3-4, Fall-Win 87

I I Was a Cryptologic Corporal! (U) Unknown Author Volt, No4, Win 83

I Litening to the Rum Runners (U) Mowry, David P. Vol2, Nos 1-2, Spr-Sum 83

New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)

Vol5, No 3, Fall 86

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

v019, x o 2, Sum 90

Vol3, Nos 3-4, Fall-Win 84-85 I Red and Purple: A Story Retold (U) -

Regierungs-Oberinspektor Fritz Mowry, David P. Menzer: Cryptographic Inventor Extraordinaire (U)

Vol2, NOS 3-4, Fall-Win 83-84

Securing Army Circuits during Rowlett, Frank B. World War 11: A Potential Disaster Narrowly Averted (U)

Vol6, No 1, Spr 87

Vol4,No 1, Spr 85

1 SignalmanBs Odyssey (U)

Through Thailand by Train: A Johnson, Thomas R. Personal Memoir (U)

Vol4, No 3, Fall 85

Vol2, Noe 3-4, Fall-Win 83-84 I United Pigeon8 Service (UPS)? (U) Unknown Author

Page 133: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword

Holbrook. James

Holocaust

Holographic camera

HPC technology

Human-computer interaction

Human factor

REF ID:A525813

Title Author Reference - -

Unternehmen BOLIVAR (Ul Mowry, David P.

What Every Cryptologht Should Johnson, T h o r n R. Know about Pearl Harbor (U)

Golden Age of Russia, The (U)

srCIm and the Holocaust (U)

0 Benson, Robert Louis

Future Spy Camera, The (U)

NSA and the Supercomputer Industry (U)

Virtual Reality (U)

Book Review: Essays on Strategy (U) I

Book Review: Marketing Warfare (U)

Book Review: One American Must Die (U) I Book Review: Positioning: The Battle for Your Mind (How to be Seen and Heard in the Overcrowded I Marketplace) (U)

Diary of 23 April - 13 June 1943, Friedman, William F. Part I (U)

Diary of 23 April - 13 June 1943, Friedman, William F. Part I1 (U)

Essential Difference, The (U)

Examination of the Possible Effects 1 of Slavic Chauvinism on the Economic and Political Development of the Southern Soviet Periphery. An

1 (U,

I Was a Cryptologic Corporal! (U) Unknown Author

Vol3, Nos 3-4, Fall-Win 84-85

Vol6. No 2, Sum 87

Vol. 13, No.4. Winter 94

Vol. 14, No. 1, Spring 95

Vol. 15, No. 1, Spring 96

Vol. 14, No. 4, Winter 96

Vol5, No 3, Fall 86

Vol5, No 4, Win 87

Vol5, No 4, Win 87

Vol 1, Nos 2-3, Spr-Fall82

Vol 1, No 4, Win 83

Vol5, No 4, Win 87

Vol 7, No 3, Fall 88

Vol 1, No 4, Win 83

Page 134: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813

Keyword 1 Title Author

Looking Ahead to the 1990s (U) Unknown Author

I Pachydermic Personality Prediction Profile (U)

Human resources

Humor

Image quality

Indications and Warning

Information networks

Select Yourself for War College (U)

I Signalmanos Odyssey (U) I I I I

Through Thailand by Train: A Johnson, Thomas R. Personal Memoir (U)

I OJE: On the Job Enthusiasm A Layman's Perspective (U)

On-the J o b Training: A Supervisor's Responsibility (U)

I Volunteering: A Fresh Approach (U)

Linguistic "Funny," A (U) I I I Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (U)

I Fall of the Shah: A Chaotic Approach, The (U)

I Domain Name Service (U) I I Information

Security INFOSEC

Systems: The Computer Security Contribution to the Composition Discussion, The (U)

Formally Stating Cryptographic Bypass Requirements (U) u

Reference

Vol6, NOS 1-2, Spr-Sum 86

Vol7. No 2, Sum 88

Vol5, No 3, Fall 86

Vol4, No 1, Spr 85

Vol4, No 3, Fall 85

Vol7, No 2, Sum 88

Vol8, No 1, Spr 89

Vol8, No 1, Spr 89

Vol5, Nos 1-2, Spr-Sum 86

Vol. 11, No. 4, Winter 92

Vol. 13, No. 4, Winter 94

Vol. 14, No. 2, Summer 95

Vol. 13, No. 3, Fall 94

Vol. 12, No. 1, Spring 93

Vol. 12, No. 2, Summer 93

Page 135: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813 /h)(3)-P.L. 06-36

Keyword 1 Author Reference Title

Future Spy Camera, The (U) Vol. 16, No. 1, Sprine 96

Information System Security Engineering: Application Customer Focused (U)

Vol. 11, No. 3, Fall 92

Vol. 15, No. 4, Winter 96

Information services Internet: Opportunity and Challenge I for the information ~ervicea I I Organization at the National Security Agency (U)

Vol8, No 3, Fall 89

Information support Decade of Information Service a t FANX, A (U)

Full-Text Searching: Coming of Age I (U) Fall 89 I Va8,N03s

I Geographic Information Systems (U) Vol10, Nos 3-4, Fall-Win 91

1 Vol. 14, No. 3, Fall 96

INMARSAT

Book Review: A Century of Spies: Johnson, Thomas R. Intelligence in the Twentieth Century (U)

Intelligence Vol. 15, No. 3, Fall 96

Vol7, No 2, Sum 88 I Book Review: British and American

Approaches to Intelligence (U)

Book Review: Conflict of Duty: The Nolte. William M. U.S. Navy's Intelligence Dilemma, 1919-1945 (Ul

Vol2, NOE 1-2, Spr-Sum 83

Vol5, Nos 1-2, Spr-Sum 86 I Book Review: Inside Soviet Military

Intelligence (U)

Book Review: Intelligence and National Security (U)

Vol5, No 4, Win 87

Vole, Nos 3-4, Fall-Win 87-88

Book Review: International Journal of Intelligence and Counterintelligence (U)

Book Review: Positioning: The Olsen, Peter C. Battle for Your Mind (How to be Seen and Heard in the Overcrowded Marketplace) (U)

Vol5, No 4, Win 87

Page 136: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF, IDzA525813 '[b) (3)-E.L. 86-36

Keyword I Title

I B d Review: Room 40: British Naval Intelligence 1914-18 (U)

Book Review: Secrecy and Democracy: The CIA in Transition (U)

Book Review: The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century (U)

Book Review: The ULTRA ~mericans: The U.S. Role in Breaking the Nazi Codes (U)

Calculation of Threat: A Review of Intelligence Community Initiatives for Indications and Warning (U)

Historical Intelligence Production Problems: Is Technology the Answel (U)

I In France's Footsteps (U)

Author . Reference

Vol2, NOS 1-2, Spr-Sum 83

Vo14, No 3, Fall 85

Vol5, No 4, Win 87

Vol5, No 3, Fall 86 .

Vol 1, Nos 2-3, Sum-Fall 82

Vol4, No 4, Win 86

I , I Vol4, No3, Fall 85

I Intelligence and the American Johnson, Thomas R. Vol. 14, No. 3, Presidency (U) Fall 95

Intelligence: A Business or a Craft ( W

INTERROCRAPH; An Information Tool for Counter-Terrorism Intelligence Centers (U)

Military Intelligence Corps Hall of Fame (U)

Role of Intelligence in the Post-cold War World,The (U)

Vol7, No 3, Fall 88

Vol2,83 (CS Issue)

Vol10, No 1, Spr 91

Vol. 11, No. 2, Summer 92

I Soviet Military Establishment under Studeman, W.O., VADM, Vol7, NO 4, Gorbachev, The (U) USN Win 89

I Time Is -Time Was -Time Is Past: Campaigne, Howard H. Vol6, Nos 3-4, Computers for Intelligence (U) Fall-Win 87-88

I Unternehmen BOLIVAR (U) Mowry, David P. Vol3, Nos 3-4, Fall-Win 84-85

Page 137: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813

Keyword 1 ' Title Author Reference

Intelligence analysis

1ntelligen;ce analysts

Intelligence community

Intelligence support

International affairs

Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)

Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twins and the Complexity of Intelligence Analysis (U)

Pump or Bottleneck? Focus on the Intelligence Analyst (U)

So Where Do the Analysts Come From? (U)

Book Review: Informing Statecraft I Book Reuiaw: Spyworld: Inside the I I Canadian and American Intelligence Establishments (U)

Facing the Post-Cold-War Era (U) Nolte, William M.

SINIOs, NSA, and the National Nolte, William M. Estimates Process (U)

NSA and SAC (U) Johnson, Thomas R.

~ l ~ e - ~ d r i a : A Model for Regional Economic and Cultural Cooperation or a Rebirth of Austria-Hungary? (U)

Book Review :Legitimacy and Force, Vol. 1, Political and Moral Dimensions; Vol. 2, National and International Dimensions (U)

I Hitler Gambit Versus the Great Anyway, The (U)

Iran-Iraq War: Regional Implications and Alternatives for Resolution, The (U)

~ e s t r u c t u r i n ~ the U.S. ~ 1 ~ 1 h ~ S y s t e r n for Tomorrow's World (U)

Vol. 14, No. 3, Fall 96

Vol8, No 3, Fall 89

Vo18, No 4, Win 90

Vol. 12, Nos. 3-4, FalWinter 93

.Vol. 12, No. 2, Summer 93

Vol. 14, No. 1, Spring 95

Vol. 11, No. 4, Winter 92

Vol9. No 1, Spr 90

Vol5, Nos 1-2, Spr-Sum 86

Vol7, No 3, Fall 88

Vol7, No 4, Win 89

Vol5, NOS 1-2, Spr-Sum 86

Vol7, No 2, Sum 88

Vol8, No 3, Fall 89

Page 138: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813 4b) ( 3 ) - P . L . 8 6 - 3 6

Keyword I Title Author Reference . -

Internet Internet: Opportunity and Challenge for the Information Services Organization a t the National Security Agency (U)

1

Ionosphere

1 0 s

IPB

Iran

I Tejiendo la Red Telarana (Weaving the World Wide Web) (U)

Artificial Ionospheric Modification: Cerson. N. C. Practical and Potential Applications (U)

Communications and the Ionosphere Gerson, N. C.

7 The National OPSEC Program, The (U)

Intelligence Preparation of the Battlefield: How Can NSA Improve Its Contributions to the IPB Process? (UI

Bwk Review: Sacred Rage: The Crusade of Modern Islam (U) ~ Iranian Islamic Revolutionary Guard Corps: "Khomeini's KGM," The (U) I

ISDN I Digital Subscriber Loops (U) I Iterative

improvement

Japan

Simulated Annealing and Iterative Improvement: An Experimental .

Comparison (U)

Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)

Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)

I I Book Reuiew: Infamy: Pearl Harbor and Its Aftermath (U)

Book Review: Invasion of Japan: Alternative to the Bomb, The (U)

I

Nolte, William M.

Johnson, Thomas R.

Vol. 15, No. 4, Winter 96

Vol. 15, No. 4, Winter 96

Vol9, No 1, Spr 90

Vol 1, No 4, Win 83

Vol. 11, No. 3, Fall 92

Vol. 12, No. 2, Summer 93

Vol6, NOS 3-4, Fall-Win 87-88

Vol 4, No 4, Win 86

Vol. 15, No. 1, Spring 96

Vol. 12, No. 1, Spring 93

Vol4, No 3, Fall 85

Vol5, Nos 1-2, Spr-Sum 86

Vol 1, Nos 2-3, Sum-Fall 82

Vol. 14, No. 2, Summer 95

Page 139: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

I Title Author

I

Keyword

DOCID: 3021075

Book Reuiew: Listening to the Enemy: Key Documente on the Role of Communications Intelligence in the War with Japan (U)

Book Reuiew: Shadows of the Rising Sun: A Critical View of the "Japanese Miracle" (U)

JN-25 Naval Code

KAL 007

Kent. Sherman A.

KGB

Book Review: Yen! Japan's New Financial Empire and Its Threat to America (UI

I High-Tech Trade War with Japan: Jelen, George F. Can Anyone Win?, The (U)

New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (U)

Riceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

Red and Purple: A Story Retold (Zn

Translating by the Seat of Your Pants: Some Observations about the

I Diffculties of Translation and How to Deal with Them (U) 1 Uncertain Summer of 1945, The (U) Wiley, Edward

Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)

7 Shootdown: A View from

I

Reflection of Sherman Kent, A (U) Gaddy, David W.

I Book Review: KGB: The Secret Work of Soviet Secret Agents (U)

Reference

Vol7, No 1, Spr 88

Vol3, NOS 1-2, Spr-Sum 84

Vol8, No 1, Spr 89

Vol 5, NOS 1-2, Spr-Sum 86

Vol6, No 3, Fall 86

Vol9, No 4, Win 91

Vol9, No 2, Sum 90

Vol3, NOS 3-4, Fall- Win 84-85

Vol3, Nos 1-2, Spr-Sum 84

Vol. 14, No. 1, Spring 95

Vol. 11, No. 2, Summer 92

Vol. 12, Nos. 3-4, FalWinter 93

Vo15. Nos 1-2, Spr-Sum 86

Vol5, Nos 1-2, Spr-Sum 86

Page 140: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

I DOCID: 3021075 REF ID:A525813 [k) ( 3 ) - P . 1 . 86-36 -

Keyword I Title

Knowledge acquisition

Korea

Korean War

Language

I Book Review: KGB Today: The Hidden Hand (U)

I Book Review: The New KGB: Engine of Soviet Power (Ul

I Book Review: The New KGB: Engine of Soviet Power (U)

Structufed Knowledge Acquisition Techniques (U)

Requiem for TEAM SPIRIT. A (U)

Command the PRC Intervention in the Korean W a r f s e W F

ACQUAINTANCE: A Tool for Language Identification (U)

Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese. An (U)

Challenges Encountered by Teachers and Learners of a Second Language

Computer Scripting of Arabic: Not the Impossible D r e a m t 9 8 8 8 t

Cryptologic Area Specialists: Meeting Customer Needs into the Twenty-first Century (U)

I Foreign Language Proficiency Maintenance (U)

Identifying Spoken Languages: A Community Pmblem Whose Time Has Come (U)

I Ideograph Writing Patterns and Computer Input (U)

Author Reference

Vol5, Nos 1-2, Spr-Sum 86

Vol5, Nos 1-2, Spr-Sum 86

Vol5, Noe 1-2, Spr-Sum 86

Vol 1, No 1,. Spr 82

Vol11, No 1, Spr 92

Vol. 11, No. 2, Summer 92

Vanderpaol, Guy R. Vol. 15, No. 2, Summer 96

Vol7, No 4, Win 89

Vol4, No 3, Fall 85

Vol4, No 4, Win 8%

Vol2,83 (CS Issue)

Vol. 14, No. 3, Fall 96

Vol7. No 3, Fall 88

Vol. 15. No. 3, Fall 96

Vol4, No 3, Fall 85

Page 141: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

t ( )-50 USC 403

REF 1~:~525$i$- (b)(3~-P.L. 18 usc 86-36 138

Keyword I Title Author - - -

I --

Impressions of the 1995 American Tramlators' Association Conference in Nashville as Viewed from the Perspective of th (U) 0 I In Defense of Translation (U)

I Integrative Language Testing (U)

Korean Phonology System: An Automated Canguage Information Aid for Transcribers, The (U)

Lanjjuage Expert System: Squeezing Gurin, Jacob (Jack) the Expert Linguist into a Computer (UI

Language Identification EU)

Learning Theories and Computer- Assisted Language Instruction Technologies: A Synthesis (U)

I Cognitive Knowledge (U) I I On Perverted Priorities (U) L Spoken Language Library: A Unique Gurin, Jacob (Jack) Institution (U)

Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them (U)

u I Unofficial Vocabulary (U) Hatch, David A.

Where there's a will.. . (U)

Reference

Vol. 15, No. 1, Spring 96

Vol4, No 2, Sum 85

Vol4, No 1, Fall 85

Vol8, No 1, Spr 89

Vol4, No 1, Spr 85

Vol. 15, No. 3, Fa11 96

Vol10, No 1, Spr 91

Vol6, No 2, Sum 87

Vol4, No 1, Spr 85

Voi 3. Nos 1-2, Spr-Sum 84

Vol5, No 3, Fall 86

Vol3, Nos 1-2, Spr-Sum 84

Vol 10, Nos 3-4, Fall-Win 91

Vol3. Nos 1-2, Spr-Sum 84

Page 142: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813 (k) ( 3 ) - P . L . 86-36

I Keyword Title Author Reference

You've Got to Go by the Rules (U) Gurin, Jacob (Jack) Vol2, Nos 3-4, Fall-Win 83-84

Language dictionary Dictionary Searching by Syllabification and Syllable Indexing

Language (Korean) I

Language modeling

Language testing

Language training

Laser signals

Latin america

The Romanization of the Korean Language Based on the Character Values (U)

ART: The Linked-Letter Language Model Reference-Text-in-Core Algorithm for Recognizing Putative Plain Text, A (U)

Closer Look a t the First Russian Language Proficiency Test, A (U)

Four-Power Conference: Looking at a Few Unique Translations from NSA's First Russian Language Proficiency Test, The (U)

Language Cross-Training: Alternatives and Permutations (U)

Language Multimedia -A Makeover ,

(U)

DEFSMAC: The Future Is Now (U)

( Domain Name Service (Ul

I Tejiendo la Red Telarana (Weaving the World Wide Web) (U)

I Lessons learned I NSASs Lessons Learned Program (U)

Library Decade of Information Service at FANX, A (U)

Vol. 11, No. 2, Summer 92

Vol 10, Nos 3-4, Fall-Win 91

Vol11, No 1, Spr 92

Vol9, No 3, Fall 90

Vol. 12, No. 2, Summer 93.

Vol. 13, No. 1, Spring 94

Vol. 11, No. 3, Fall 92

Vol. 13, No. 2, Summer 94

Vol. 13, No. 1, Spring 94

Vol. 14, No. 2, Summer 95

Vol7, No 2, Sum 88

Vol. 16, No. 4, Winter 96

Vol. 14, No. 3, Fall 95

Vo18, No 3, Fall 89

Page 143: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813

Keyword I Title

Linguistic

Linguistics

Analysis of a Problem Common to Translation of Both Handwritten Japanese and Romanized Japanese, An (U)

Book Review: Vietnam Spook Show (U)

In Defense of Translation (U)

Book Review: Breaking the Maya Code (U)

Authar Reference

Vol4, No 2, Sum 85

1

Hatch, David A. Vol. 13, No. 1, Spring 94

Vol4, No 3, Fall 85

Vol11, No 1, Spr 92

Language Cross-Training: Alternatives and Permutations (U)

Vol. 11, No. 3, I Fall 92 I I

Language Expert System: Squeezing Gurin, Jacob (Jack) Vol4, No 1, the Expert Linguist into a Computer Spr 85 (U)

Linguistic "Funny," A (U)

Obscenities in COMINT: A Need for Cognitive Knowledge (U)

I On Perverted Priorities (U)

Translating by the Seat of Your Pants: Some Observations about the Difficulties of Translation and How to Deal with Them (U)

Link encryption ( In Pursuit of a SONET Link Encryptor

Lithograph I Introduction to Optical Lithography Modeling (U)

I Introduction to Optical Projection Lithography Tools (U)

Introduction to Positive Photoresist , Processing (U)

Nearest Lattice Point Problem, The 1 (U1

Vol5, Nos 1-2, Spr-Sum 86

Vol4, No 1, Spr 85

Vol3, NOS 1-2, Spr-Sum 84

Vol3, Nos 1-2, Spr-Sum 84

Vol10, No 1, Spr 91

Vol6, NOS 3-4, Fall-Win 87-88

Vol8, No 1, Spr 89

Vol6, No 2, Spr 85

Vol. 16, Special Edition 96

Page 144: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 (I= ) (1) ID) (31-50 iJSC 403 ib) (31-18 USC 798 (b) (3)-P.L. 86-36

Key word 1

REF IDgA525813

(b) ( 3 ) - P . L . 3 6 - 3 6

Title Author

Logic Parallel Tausworthe Generator, The

Magic

Magnetic tape recorders

Management

I Book Review: The Ultra-Magic Deals and the Most Secret Relationship (U)

NSA Signal Collection Equipment and Systems: The Early Years - Magnetic Tape Recorders (U)

Artificial Intelligence and Expert Systems: Do They Have a Future in Management? (Ul

I BILLY Data BasePTasking Management System Intervals (U)

Book Review: Ropes to Skip and the Ropes to Know: The Inner Life of an Organization (U)

Book Review: The Clash of Cultures: Nolte, William M. Managers and Professionals (U)

I Bringing User Power to the High Performance Workstation (U)

Business Manager and Business Communications, The (U)

I Challenges and Opportunities (U)

Changing Development Environment from One of System Creation to One of System Evolution without Benefit of Changes to the Institutional Support Process. The (U)

I Creativity: Can It Be Taught? (U)

Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)

Reference

Vol 1, No 1, Spr 82

Vol. 15, Special Edition 96

Vol. 12, Nos. 3-4, FalVWinter 93

Voi. 15, No. 1, Spring 96

Vol9, No 2, Sum 90

Vol8, No 3, Fall 89

Vol6, Nos 3-4, Fall-Win 87-88

Vol7, No 2, Sum 88

Vol9, No 2, Sum 90

Vol11,No1, Spr 92

Vol 10, Nos 3-4, Fall-Win 91

Vol. 11, No. 2;; Summer 92

Vol. 13, No. 4, Winter 94

Vo19, No 1, Spr 90

Page 145: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Keyword 1 Title

1

I

REF IDzA525813

( b ) 3 ) - P . L . 8 6 - 3 6

DOCID: 3021075

(bl ( 1 : :hi 1 3 , -50 113il ,111.3 (h; (3;-18 lJ:;C 798 (h! ( 3 : - P . L . 86-36

Author Reference

I Essential Difference, The (U) I Vol5; NO 4, Win 87

Hypermedia Implemented in Objectr Oriented Database Management Systems (U)

I Integrating Strategic Planning and Quality Initiatives (U)

Intelligence: A Business or a Craft (UI

Looking Ahead to the 1990% (U)

Vol. 14, No. 1, Spring 95

I Management of TDY Funds: A Graphical Aproach (U)

I Managerial Track, The (U) I

Unknown Author Vol5, Nos 1-2, Spr-Sum 86

Managing Change (U)

I Managing the Future (U) I Middle Management and the Soviet Problem: Some RefIectionsW

I OJE: On the Job Enthusiasm A Layman's Perspective (U) I On-theJob Training: A Supervisor's Responsibility (U) I

Application as a Knowledge-Based Mission Management System, An (U)

I Pachydermic Personality Prediction Profile (U) I I Parable of the Tail with No Teeth (U) I

Vol2,83 CS Issue)

Vol 10, NOS 3-4, Fall-Win 91

Vol11, No 1. Spr 92

Vol4, No 1, Spr 85

Vol2, Nos 1-2, Spr-Sum 83

Vol7, No 2, Sum 88

Vol8, No 1, Spr 89

Vol9, No 3, Fall 90

Vol8, No 1, Spr 89

Vo17, No 2, Sum 88

Vol7.No 1, Spr 88

Page 146: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813 (~1(3)-?.L. 8 6 - 3 6

I

1 Keyword I Title

DOCID: 3021075

Parable of the Tail with No Teeth Part 11: Into the Teeth of the Tale (U)

Parable of the Tail with No Teeth Part 111: The Training Tale that Wagged the Teeth (U)

Parable of the Tail with No Teeth Part IV: The Tarnished Teeth of the Golden Tail (U)

Parable of the Tail with No Teeth Part VI: The Tale of the Tested Tooth and Tail (U)

" .

Parable of the Tail with No Teeth Part VII: A Tale of Teeth Decay Prevention (U)

So Where Do the Analysts Come From? (U)

Parable of the Tail with No Teeth Part V: The Tale of the Rearranged Tooth and Tail (U)

Strategic Management and Mid- Level Managers - Is There a Link? (U)

I Tech Track: Will It Work? IU)

I Ten Rules to Avoid Planning Foul- Ups (U) I

I Too Many Cryptologic Eggs in One Basket (U) I TURBOTECH: An Architecture Management and Analysis System (U)

Twenty Questions to Evaluate Your Manager (U)

1 Volunteering: A Fresh Approach (U) I

Author

I Warning and Crisis Management (U) McManis, David Y.

Reference

Vol8, No 2, Sum 89

Vol8, No 4, Win 90

Vol9, No 3, Fall 90

Vol10, NO$ 3-4, Fall-Win 91

Vol. 11, No. 2, Summer 92

Vol. 11, No. 4, Winter 92

Vol. 12, Kos. 3-4, FalU Winter 93

Vol. 12, No. 1, Spring 93

Vol7, No 1, Spr 88

Vol8, No 1, Spr 89

Vol7, No 1, Spr 88

Vol8, KO 4, Win 90

Vol6, No 1, Spr 87

Vol8, No 1, Spr 89

Vol2, Nos 3-4, Fall-W in 83-84

Page 147: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813

b)(3)-50 USC 403 (b) (31-18 USC 798 fb) (3)-P.L. 86-36 -

K e y d 1 Title AuCbor Reference

Maps

Mathematics

I With Pail and Shovel: The "Sandbox Aproaehn to Management and Leadership (U)

Work Force Skille and Miiion Requirements Comparison System (U)

Book Review: Drawing the Line: Tales of Mape and Cartocontroversy (U)

I ACQUAINTANCE: A Tool for Language Identifleation (U)

I Book Review: Doe# God Play Dm? The Mathematics of Chaos (U)

I Channel Capacity Algorithm (U)

Connect the Dots: Th Aid to Studying

Digital Voice Compreesion Algorithm with Robust Properties, A (U)

Generalized GMW Sequences and an Application to Frequency Hopping (U) I listing AlgorithmN)

Mathematics: A Challenge for Business, Government, and Academia (U)

Nearest Lattice Point Problem, The I (U) Oh Boy ... You Really Have Your Hands Full! Two-Year-Old Twins and the Complexity of Intelligence Analysis (U)

Vol5, No 4, Win 86

Val. 14, No. 1, Spring 95

Vol. 14, No.4, I winter95

Val?, No.4 Win 89

Vol 986 (CAIme) .

Vol8, No 4, Win 90

Vol2, NOB 1-2, Spr-Sum 83

Vol7, No 4, Win 89

Vol2, Nos 1-2, Spr-Sum 83

Vol3, Nos 1-2, I Spr-sumw

Vol8, Nos 3-4, Fall-Win 83-84

Studeman, W. O., VADM, Vol2, No 2, USN Sum 89

Vol. 26, Special Edition 96

Vol8, No 3, Fall 89

Page 148: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

, DOCID: 3021075 REF IDzA525813

Keyword I Title Author Reference

I On the Selection Mechanidm for Pseudonoise Sequences (U)

Parallel Tausworthe Generator, The 1 (UI 1 " ' ) 13)-50 USC 403 i t , ) (31-18 usc 798 I-paldo's h u m (U) i L ) (3)-P.L. 86-36

Maya code ' Book Review: Breaking the Maya Code (U)

Hatch, David A.

Memory devices 8 Microeledronics

1 Microprocessor

Microwaves

Middle East

I CRYPTRONICS or Cryptanalysis and Cryptography in Microelectronics (U)

I Shallow Junction Formation in Silicon Using Ion Implantation (U)

Programmable COMSEC and the CYPRIS Crypto-Microprocessor (U)

I RISC Does Windows (U)

I Attempted Imposition of Sharia on the Sudan. The (U)

I Begin and Arafat (U)

I Book Review: Concise History of the Middle East, A (U)

I Book Review: Essays on Strategy (U)

Book Review: Master Terrorist: The True Story behind Abu Nidhal. The (U)

I Saered Rage: The Crusade of X d e r n Islam (U)

Vol8, No 2, Sum 89

Vol1,No 1, Spr 82

Vol7. No 4, Win 89

Vol4, No 1, Spr 85

Vol. 13, No. 1, Spring 94

Vol9, No 3, Fall 90

Vol. 15, Special Edition 96

Vol5, No 4, Win 86

Vol9, No 1, Spr 90

Vol8, No 3, Fall 89

Vol. 11, No. 3, Fall 92

Vol4, No 2, Sum 85

Vol2, Nos 1-2, Spr-Sum 83

Vol4, No 1, Spr 85

Vol5, No 3, Fall 86

Vol6, No 1, Spr 87

Vol8, Noe 3-4, Fall-Win 87-88

Page 149: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword

Midway, Battle of

Military forces

Military policy

Military strategy

Military theory

MILKBUSH

REF I D : A 5 2 5 u & ) - p . ~ . 86-36

Title Author Reference

ranian Islamic Revolutionary Guard lorps: "Khomeini's KGM," The (U) I ran-Iraq War: Regional Implications ~ n d Alternatives for Resolution, The U)

Long Live the King (U) Becker, Gene

Moscow's Realignment with Cairo: A Look at Gorbachev's New Political rhinking (U)

Revisiting the Dispute over the [dentification of "AF" as Midway (U)

Book Review: History of the German General Staff (U)

Book Reuiew: Straw Giant, The (U)

Book Reuiew: To Arm A Nation (U)

Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)

Soviet "Scientific" Approach'to Military Strategy: Strength or Weakness?, The (L')

Book Review: Citizens and Soldiers (U)

Book Reuiew: Mask of Command, The (U)

Book Review: America's Military Revolution: Strategy and Structure &r the Cold War (UI

Book Reuiew: Clausewitz (U)

MILKBUSH: Proof-of-Concept ATM Encryptor: Overview and Lessons Learned (U)

Vol4, No 4, Win 86

Vol7, No 2, Sum 88

Vol. 15, Special Edition 96

Vol8, No 4, Win 90

Vol. 13, No. 4, Winter 94

Vol8, No 3, Fall 89

Vol9, No 4, Win 91

Vol8, No 2, Sum 89

Vol8. No 2. Sum 89

Vol9, No 1, Spr 90

VOI 6, NOS 3-4, Fall-Win 87-88

Vol9, No 2, Sum 90

Vol. 13, No. 1, Spring 94

Vol 6, No 2. Sum 87

Vol. 15, No. 3, Fall 96

Page 150: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDzA525813 ;(b) (3) - P . L . 86-36

I

I

I

Keyword I Title Author Reference

DOCID: 3021075

Modem errors

Modular arithmetic

Morse

Multichip modules (MCM)

Multidisciplinary interaction

National Intelligence Estimates

National Time Sensitive System

Nearest lattice point problem

Network management

Neural networks

Neutrinos

Nontraditional targets

NSA

NSC DX router

Modem Error Correction (UI I I Modular Arithmetic in Hardware (U) I I Morse Mechanization (U) I Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)

Multidisciplinary Interaction: The Time Is Now! (U)

Vol. 13, No. 4, Winter 94

Vol. 11, No. 4, Winter 92

Vo1.15, No. 2, Summer 96

Vol. 15, No. 1, Spring 96

Vol. 15, Special Edition 96

I SINIOs, NSA, and the National Nolte, William M. Vol9, No 1, Estimates Process (U) Spr 90

NTSS - Yesterday, Today and Tomorrow (U)

Nearest Lattice Point Pr~blem, The 1 lUl Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)

Applications of Nonsymbolic Artificial Intelligence: Neural Networks (U)

Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)

Theoretical Implications of a Second Spectrum (U)

Approach to Isolating Nontraditional Targets (L')

Move, or How NSA Came to Fort

1 Meade, The (U)

Network System's Data Exchange (DX) IP Router: NSC's Product in Review (U)

Vol. 13, No. 2, Summer 94

Vol. 15, Special Edition 96

Vol. 11, No. 3, Fall 92

Vol9, No 4, Win 91

Vol. 11, No. 3, Fall 92

Vol8, No 3, Fall 89

Vol. 13, No. 3, Fall 94

Vol. 14, No. 2, Summer 95

Vol. 12, No. 1, Winter 93

Page 151: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF ID:A525813

( b ) ( 3 ) - P . L . 8 6 - 3 6

Keyword 1 Title Author Reference

Object-oriented software

Object-oriented techniques

Object-oriented technology

Oil

Open systems

OPSEC

Optical

Introduction to ObjecbOriented Software Deeign and Development and Its Application a t NSA, An (U)

Object-Oriented Programming with C+ + (U) Combining Distributed Computing and Object-Oriented Technique8 (U)

Applying Object Technology to Our CMVER Network (U)

Soviet Oil Production: Energy Balance Rospects for the Future (Ul

Information System Security Engineering: Application Customer Focused (U)

National OffeC Program, The (U)

Introduction to Optical Lithography Modeling (Ul

Introduction to Optical Projection Lithography Tools (U)

Introduction to Positive Photoresist

Vol. 12, Nos. 3-4, FalYWinter 93

Vo1.12, Nos. 3-4, FalVWinter 93

Vol. 15, No. 1, Spring !J6

Vol. 12, No. 2, Summer 93

Vol4, No 2, Sum 85

Vol. 11, No. 3, Fall 92

Vol. 11, No. 3, Fall 92

Vole, Nos 3-4, Fall-Win 87-88

Vol8, No 1, Spr 89

Vol6, No 2, Spr 85

Optical Disk Technology: CDs, WORMS, and Erasable Disks (U)

Optical SIGINT Collectors (U)

ibi (1)

Vol10, No 1, Spr 91

Vol8. No 2, Sum 89

Vol3, Nos 1-2, Spr-Sum 84

Vol. 15, No. 2, Summer 96

Vol 10, Nos 3-4, Fall-Win 91

Vol. 13, No. 4, Winter 94

(bj(3j-50 USC 403 ibj(3)-18 USC 798 [bj (3)-P.L. 86-36

148

Page 152: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF IDtA525813

Title Author -

Communist Carol, A (U)

Reference Keyword

Parody Voi 6, Nos 3-4, Fall-Win 87-88

Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)

Pearl Harbor Vol6, Nos 1-2, Spr-Sum 06

Book Review: Infamy: Pearl Harbor Nolte, William M. and Its Aftermath (U)

New View of Pearl Harbor: The U.S. Navy and Communications Intelligence, A (u) 1

Vol 1, Nos 2-3, Sum-Fall 82

Vol5, No 3, Fall 86

Now Playing: Churchill as Pearl Harbor Villain or Do We Need Another Conspiracy Theory? (U)

Voi. 11, No. 2, Summer 92

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

Vol9, No 2, Sum 90

What Every Cryptologist Should Johnson, Thomas R. Know about Pearl Harbor (U)

Introduction to a Historic Computer 7 1 Document: Betting on the Future - The 1946 Pendergrass Report, Cryptanalysis and the Digital Computer, The (U)

Vol6, No 2, Sum 87

Pendergrass, J. T. Vol. 13, No. 4. Winter 94

Debunking Some Old Myths about Critical-Grade Promotions (U)

Performance Vol 1, No 1, Spr 82

Personal computer I PCSE: A Design Implementation for PC Security (U)

Vol8, No 2, Sum 89

Personalities ,

Vol10, No 1, Spr 91 I Military Intelligence Corps Hall of I d

Fame (U)

Personality I John H. Tiltman: A Reminiscence (U) Lutwiniak, William Vol 1, Nos 2-3, Sum-Fall 82

I Passing of an Extraordinary Man, The (U)

Vol4, No 3, Fall 85

(Reflection of Sherman Kent, A (U) Gaddy, David W. Vol5, Nos 1-2, Spr-Sum 86

Vol5, Nos 1-2, Spr- Sum 86

Photo- reconnaissance

Page 153: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

$%lka~c 03021075 ' 0 1 (3;-18 USC 798

REF ID:A525813 (b) ( 3 : - P . L . 86-36 ':(b) ( 3 ) - P . L . 8 6 - 3 6

Keyword I Title Author Reference

Vol6, No 2, Spr 85

Photoresist

I Tapered Wet Etching of Contacts Using a Trilayer Silox Structure (U) I

F

Introduction to Positive Photoresist Processing (U)

Vol 7, No 2, Sum 88

Vol. 11, No. 2, Summer 92

Pinyin dictionary

Polyinstantiakion Inference Through P o l y i n a t i o n I 1 lUl

Dictionary Searching by Syllabication and Syllable Indexing (U)

VoI. 11, No. 4, Winter 92

POSTCARD I Project POSTCARD (U) Hanyok, Robert Vol. 13, No. 3, Fall 94

Post-Cold War I Facing the Post-Cold War Era (U) Molte, William M. Vol. 11, No. 4, Winter 92

I Role of Intelligence in the Post-Cold War World, The (U) m Vol.' 11, No. 2,

Summer 92

I Book Review: Inside Hanoi's Secret Hanyok, Robert J. Archives (U)

Vol. 25, No. 1, Spring 96

Electronic Procurement Request Processing: A Goal for Improved Resources Management (U)

Procurement Vol9, No 1, Spr 90

Developing Effective User Documentation (U)

Vol6, No 1, Spr 87

Programmer

Debunking Some Old Myths about Critical-Grade Promotions (U)

Vol 1, No 1, Spr 82

Promotions

Value of Working Longer Hours for Promotion, The (U)

Vol. 15, No. 4, Winter 96

NSA Comes Out of the Closet: The Debate over Public Cryptography in the Inman Era (U)

Vol. 15, No. 1, Spring 96

Public cryptogra~hy

Vo1.15, Special Edition 96

QUADRANT CCI Doctrine and the Simile of the Cave: Time for Enlightenment (U)

Vol9, No 4, . Win 91

Radio communications

Page 154: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID : A5W$1-3.L. 86-36

Keyword 1 Title Author

Radio frequencies

Radio intelligence

Randomizing

Random viruses

Ranked-order filters

Receivers

Origination and Evolution of Radio Tr&c Analysis, The Period Between the Wars. The (U)

Origination and Evolution of Radio Traffic Analysis, The World War I Era, The (U)

Origination and Evolution of Radio Traffc Analysis, World War 11, The (U)

( SubHF Search and Acquisition (U)

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

Ana.lysis of the Random and Sequential Viruses (U)

Another Look a t Ranked-Order Filters, Noisy Images, and Visual Perception (Ul

Data Transmissions (U)

Gerson, N.C.

NSA Signal Collection Equipment and Systems: The Early Years - Receivers (L')

v I Receiver Dynamics (U)

Recorder

Reporting Thereon (L')

Reading Between the Lines: Methods of Analysis of Soviet Military Literature (L')

Requirements I srG1NT Requirements: Before, During, and After (U)

Reference

Vol6, NOS 3-4, Fall-Win 87-88

Vol6, No 1, Spr 87

Vol7, No 4, Win 89

Vo1.13, No. 2, Summer 94

Vol9, No 2, Sum 90

Vol9, No 4, Win 91 .

Vol. 11, No. 4, Winter 92

Vol. 1 1, No. 4, Winter 92

Vol. 15, No. 3, Fall 96

Vol. 14, No. 2, Summer 95

Vol. 15, No. 4, Winter 96

Vol. 15, No. 2, Summer 96

Vol7, No 3 Fall 88

Vol4, No 3, Fall 85

Vol7, No 1, Spr 88

Page 155: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

D ~ & E ~ : U S C ~ Q ~ 10 7 5 (b: (3)-18 USC 748 !b: [ 3 ) - ? . L . 86-35

Keyword I Title Author Reference

Restructuring the U.S. SIGINT System Vol8, No 3, for Tomorrow's World (U) Fall 89

BINGSTOtw backbone

Risk management

Rosette Stone

Router configurations

RSA system

Russia

Safe combinations

Satellites

Search

Security

I TURBOTECH: An Architecture 1 Management and Analysis System I Perfect Router for the Backbone, A (U) I

Vol8, No 4, Win 90

Vol. 12, No. 1, spring 93

Risks of Taking Risks or What Every Vol. 15, No. 4, High School Student and NSAer Winter 96 Should Know about Taking Chances, The (U)

Rosetta Stone and Its Decipherment, Callimabos, Lambros D. Vol. 14, No. 3, Fall 95

I Perfect Router for the RINGSToNE Vol. 12, No. 1, Backbone, A (U) Spring 93

I Golden Age of Russia, The (U)

I Telephone Codes and Sale Combinations: A Deadly Duo (U) I

Vol. 15, Special Edition 96

I Vol. 13, No. 4, Winter 94

I Vol. 12, No. 1, spring 93

Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)

Sub-HF Search and Acquieition (U)

Vol. 15, Special Edition 96

Gerson, N.C. Vol. 13, No. 2, Summer 94

Book Review: Intelligence and National Security (U)

Communications Security and the Problem of Hamlet. To Be or Not to Be (U)

1

I Vol5, No 4, Win 87

V013, ~4 3-4, Fall-Win 64-85

Vol4, No 2, Sum 85

. NSA in the Cyberpunk Future: A Vol. 15, No. 3, Somewhat Educated Guess at Things Fall 96 to Come (U)

Page 156: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 .(bl(3)-?.L. 96-36

Keyword I Title Author

Security leaka

SED problem

Selection

Media Responsibility and National Rindakopf, Eliaabeth R. Secuity (U)

BRANFLAKE (u) r l V017, No 3, Fall 88

Vol. 13, No. 4, Winter

Machine Learning Approach to Text Type I& ntiflmtion, A (U) I

Reference

Book Review: Honorable Treachery: Hatch, David A. A History of U.S. Intelligence, Espionage, and Covert Action from the American Revolution to the CIA (v)

Book Review: SIGINT Secrets: The Signals Intelligence War, 1900 to Today, The

Sequential viruses

Shootdowna

SIDESPIN

Book Review: Target is Destroyed: Johnson, Thomas R. What Really Happened to Flight 007 and What America Knew About I t , The (U)

I I

Analysis of the Random and Sequential Viaes (U)

C

Comparing visual Detection to Machine Vision for Detecting the Presence of Laser Irradiation with an Electro-Optical Device (U)

I Flight of the Condor, The (U) I L I lang Live the King (U) Becker, Gene

Vol. 13, No. 4, Winter 94

Vol. 11, No. 4, Winter 92

Vol. 12, No. 2, Summer 93

Vol. 16, No. 2, Summer 96

Vol. 13, No. 3, Fall 94

Vol. 12, No. 1, Spring 93

Vol5, No 3. ' Fall 86

Vol4, No 4, Win 86

Vol2, Nos 3-4, Fall-Win 83-84

Vol8,Nol, Spr 89

Vol10, No 1, Spr 91

Vol. 16, Special Edition 96

Page 157: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword 1

REF IDzA525813

Title

Optical S~GINT Collectors (U)

I Restructuring the U.S. s 1 ~ 1 ~ ~ S y s t e r n for Tomorrow's World (U)

I SIGrNT Reporting Training: Some Suggestions for Change (U)

I TEABALL: Some Personal Observations of S~GINT a t War (UI

I Third Party Nations: Partners and 1 I I I Targets (u) I

SIGINT jargon

SIGINT doctrine

I SIGINT Talking (U)

SIGINTG~~S to War (U)

SIGINT security Mechanisms of SIGINT Technology.

SICINT support I Another Look a t TEABALL, and Where We've Gone from There (U)

Book Review: Vietnam Spook Show l (UI

A Story of

Signal analysis

Signal collection Low Noise Reception of Microwaves I (UI

Operations Management and Resource Utilization for Signals Collection Using Knowledge-Based Systems*

Johnson. Thornam R.

Hatch, David A.

Hudec, James G.

Reference

Vol3, Nos 1-2, Spr-Sum 84

Vol8, No 3, Fall 89

Vol. 11, No. 2, Summer 92

Vol9. No 4, Win 91

Vol7, No 4, Win 89

Vol. 13, No. 3. Fall 94

Vol. 12, No. 2, Summer 93

Vol6, No 2, Sum 87

Vol 11, No 1, Spr 92

Vol11, No 1, Spr 92

Vol10, Nos 3-4, Fall-Win 92

Volll , No 1, Spr 92

Vol. 15, No. 4, Winter 96

Vol. 11, No. 3, Fall 92

Vol9, No 3, Fall 90

Vol9, No 1, Spr 90

:hi (1) :b)13)-50 JSC 403 i t ) (31-18 LISC 798 :b) 13)-P.;. 86-36

Page 158: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 (b) ( 3 ) - P . L . 86-36

Signal processor

Keyword

Signal collection equipment

Signal routing

Title Author Reference

NSA Signal Collection Equipment Vol. 14, No.4, and Systems: The Early Years - Winter 96 Antennas (U)

Signals

Signals acquisition

Signals analysis

Signals exploitation

Signals processing

Signals transmission

Simulated annealing

Architecture and Implementation for Large Scale Distributed Multiprocessor, An (U)

Architecture and Implementation for Linear Speedup of DSP Programs, An (U) I NIKKEL I1 Signal Procensor or Getting YO~~NIKKEL'S Worth, The (U) I Modern Signal Routing (U) - 1 NSA =gnal Collection Equipment and Systems: The Early Years - Receivers (U)

Real-Time Signals Acquisition and Processing on UNIX Platforms +Feu@+ Another Look at Ranked-Order Filters, Noisy Images, and Visual Perception (U)

(Painful) Learning Experience from the Past, A (U)

Solving xa = b (mod c) for x and Undecimating Recursions (U)

TIDYTIPS 111 System Capabilities (U)

Real-Time Signals Acquisition and Processing on UNIX Platforms wax%

Case Study in UNIX

Simulated Annealing and Iterative Improvement: An Experimental Comparison (U)

I

Vol8, No 3, Fall 89

Vo1.8, No 4, Win 90

Vol7, No 1, Spr 88

Vo1.15, No. 4, Winter 96

Vol. 14, No. 2, Summer 95

Vol. 11, No. 2, Summer 92

Vol. 11, No. 4, Winter 92

1 Vol. 12, NOS. 3-4, Fa1 Win te r 93

I Vol. 11, No. 4, Winter 92

Vol. 12, No. 2, Summer 93

Vol. 11, No. 2, Summer 92 r Vol. 12, No. 1, Spring 93

Vol. 12, No. 1, Spring 93

ib) (bl(3)-50 USC 403 l b ) (31-18 USC 798 (b)(3)-P.;. 86-36

Page 159: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 ib ) ( 3 ) - P . L . 8 6 - 3 6 -

Keyword 1 Title Author Reference

Case Study in UNIX System Optimization (U)

Sinkov, Abraham

SINTER

I Vol. 12, No. 1, Spring 93

Software analysis

Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)

Multidisciplinary. Interaction: The Time Is Now! (U)

I Analysis of the Random and Sequential Viruses (U)

Vol. 14, No. 2, Summer 95

Vol. 15, Special Edition 96

Vol. 11, No. 4, Winter 92

Software Application to Cprrect the Effects of Transliteration "Errors" on Database Integrity, A (U)

Vol. 12, No. 2, Summer 93

Sohare! applications

Vol. 14, No. 1, Spring 96

Software assurance NSA. How Much Do We Really Know about the Software Capability of Our Contractors? (U)

Vol. 12, Nos. 3-4, FalVWinter 93

Introduction to Object-Oriented Sofhvare Design and Development and Its Application a t NSA, An (U)

Software design

Vol. 12, Nos. 3- 4, Fall /Winter 93 I Object-Oriented Programming with

C+ + (U) Vol. 15, No. 3, Fall 96

Software process improvement

52 Software Process Improvement Effort Measures of Value, The (U)

I Revised Capability Maturity Model for Heretics, A (U) 1 Vol. 14, No. 2,

Summer 95

I Improving Productivity in Software Prototype Developments (U)

Vol. 14, No. 3, Fall 95

Software prototype development

I GLISSADE Lessons Learned from a Rapid Prototype (U)

Vol. 13. No. 3. Fall 94

Software system design

Vol. 16, No. 3, Fall 96

Solitons Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)

Vol. 15, No. 2, Summer 96

Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U)

Somalia

Page 160: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

(b) (31-50 USC 403 it) (31-18 USC 798

REF ID:A52581& ( 3 , - , . L . 8 6 - 3 4

Soviet cryptology

Soviet problem

I I

Origins of the Soviet Problem: A Kirby, Oliver R. Personal View. The (U)

Soviet Union ABM Treaty and the Dilemma of Indecision, The (U)

Admiral Gorshkov and Soviet Doctrine (U)

Book Review: FBI-KGB War:A Special Agent's Story, The (UI

Book Review: Inside Soviet Military Intelligence (U)

Book Review: Inside the Soviet Army / (UI I Book Review: KGB: The Secret Work of Soviet Secret Agents (U)

Reference

Vol. 16, Special Edition 96

Vol. 14, No. 3, Fall 96

Vol. 12, Nos. 3-4, FalVWinter 93

Vol. 14, No. 1, Spring 96

Vol. 13, No. 1, Spring 94

Vol. 13, No.2, Summer 94

Vol. 13, No. 3. Fall 94

Vol. 11, No. 4, Winter 92

Vol. 13, No. 4, Winter 94

Vol5, Nos 1-2, Spr-Sum 86

Vol5, No 3, Fall 86

Vol6, No 2, Sum 87

Vo15, Nos 1-2, Spr-Sum 86

Vol4, No 4, Win 86

Vol6, Nos 1-2, Spr-Sum 86

Page 161: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 '(b) ( 3 ) -P.L. 86-36

I Book Review: The New KGB: I I V0l5, NOS 1-2, Engine of Soviet Power (U) Spr-Sum 86

Keyword

I Book Review: The New KGB: Vol5, NOS 1-2, Engine of Soviet Power (U) Spr-Sum 86

Book Review: The Target ia Johnson, Thomas R. Vol5, No 3, Destroyed: What Really Happened to Fall 86 Flight OM and What America Knew About It (U)

Title Author Reference

Cuban-Mexican Oil Cooperation: Loosening the Tie that Binds: (U)

Effects of Perestrojka on the Soviet Armed Forces Portend New Challenges to the Office of Soviet Military Forces (U)

Book Review: KGB Today: The Hidden Hand (U)

I Examination of the Possible Effects of Slavic Chauvinism on the Economic and Political Develo~ment

Val 5, Nos 1-2, Spr-Sum 86

of the Southern Soviet periphGy, An I Gorbachev in Historical Perspective

I Middle Management and the Soviet Problem: Some Ref lect ionsw

I Moscow's Realignment with Cairo: A Look at Gorbachev's New Political Thinking (U)

1 Vol3, Nos 1-2, Spr-Sum 84

Vol9, No 4, Win 91

Vol8, No 2, Sum 89

I Vol7, No 3, Fall 88

Vo18, No 4, Win 90

Vol6, No 2, Sum 87

VOI 2, NOS 1-2, Spr-Sum 83

Vol8, No 4, Win 90

Page 162: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

. DOCID: 3021075 REF IDtA525813

(b)'3)-F.L. 66-36

v

Keyword I Title Author Reference

Vol4, No 3. Fall 85

Reading Between the Lines: Methods of Analysis of Soviet Military Literature (U) u

( b ) (lo lbi :31-50 USC 103

Soviet Military Establishment under Studernan, W.O.. VADM, Gorbachev, The (U) USN

Soviet Oil Production: Energy Balance Prospects for the Future (U)

Vol7, No 4, Win 89

Vol4, No 2, Sum 86

Vol9, No 1, Spr 90

Spaceborne

0 Vol. 13, No. 2, Summer 94

Space technology (t) 1) (t) t3)-P.L. 86-36

Space weapons

Vol. 16. Special Edition 96

Technical Implications of Emerging Space Programs in Southeast Asian Countries, The (U)

Vol8, No 4, Win 90 I Space Weapons: Time for a Treaty?

(U) I I History of the TACOMETER

Development (U) Vol. 12, No. 2, Summer 93

Vol. 13, No. 3, Fall 94

Spread spectrum communication@ I Code Acquisition by Binary

Autodirective Search (U) 1 Vol. 15, Special Edition 96

SS7

SSL target location Examination of SSL Target Location Gerson, N. C. Accuracies, An (U) I Vol. 15, No. 2,

Summer 96

Vol. 12. No. 2, Summer 93

Station C I Station "C" and Fleet Radio Unit Melbourne (FRUMELI Revisited(U)

Vol. 16, No. 2, Summer 96

Statistics I Statistical Method for Quality Control of Microelectronic Chip Design, A (U)

Vol. 24, No. 1. Spring 95

Strategic planning

Vol. 12, No. 1, Spring 93

Integrating Strategic Planning and Quality Initiatives (U)

Strategic management

Strategic Management and Mid- Level Managers - Is There a Link? (U)

Page 163: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813

p [b) 3 ) - F . L 86-36

Keyword 1 Title Author, Reference

SUNDIAL

I

Multidisciplinary Interaction: The Time Is Now! (U)

-

Subscriber loops Digital Subscriber Loop (U)

Vol. 15, Special Edition 96

Vol 7, No 2, Sum 88

Vol. 15, No. 1. Spring 98

Support to military operations

Supercomputers

Synthetic diamond

BILLY Data BaaeR'asking Management System Intervals (U)

System administration

I Closing Address, Frontiers in Faurer, Lincoln D., LT Vol2, Nos 1-2, Supercomputing Conference (U) GEN. USAF Spr-Sum 83

I Comments on Supercomputing (U) I Compacting the Masscomp Disk (U)

I NSA and the Supercomputer Industry (U)

Obtaining Maximum Performance in a Supercomputer Unix Enviomment (U)

I Processqr Interconnection Networks from Cayley Graphs (U)

I Supercomputer Performance (U)

I Supercomputers: Trends and Needs A Government Perspective (U)

Requiem for TEAM SPIRIT, A (U)

SIGINT Support to Military Operations: Organking for Effective Crisis/Contingency Support (U)

Synthetic Diamond: A Hard Rock Story That Moved Supercomputing Out of the Basement (U)

Domain Name Service (U)

I Vol2, Nos 1-2, Spr-Sum 83

Vo18, No 2, Sum 89

Vol. 14, No. 4, Winter 95

Vol7, No 2, Sum 88

Vol8, No 3, Fall 89

Vol3, NOS 1-2, Spr-Sum 84

Vol2, Nos 1-2, Spr-Sum 8.3

Vol. 11, No. 2, Summer 92

Vol. 12, No. 1, Spring 93

Vol. 15, No. 1, Spring 96

Vol. 14, No.2, Summer 95

Page 164: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813

Keyword 1 Title Author Referenee

Systems engineering Systems Engineering Profession and ) It. Importance to NSA, T h o

I Systems The System Engineering Profession management and Its Importance to NSA, The (U)

TACOMETER I History of the TACOMETER Development, A(U)

Tactical radio I SINCGARS Software Evaluation (U) systems

TCHM NSA: How Much Do We Really Know about the SoRware Capability of Our Contractors? (U)

TEAM SPIRIT

Frequency Management - No Longer an Agency Nemesis (U)

Requiem for TEAM SPIRIT, A (U)

Telecommunications

International Telemmmunications Revolution: VANS, ISDNs, and Other Assorted Collection Nightmares, The (U)

Bibliography of Neural Network Applications to the Telecommunications Industry, A (U)

Optical Solitons: The Fourth Generation of Transoceanic Optical Fiber Telecommunications (U)

Telecommunications Automatic Monitoring and Control System (U)

I Watch is Set: The Evolution of the T Operations Center. The (U)

Vol. 11, No. 2, Summer 92

Teleconferencing

Vol. 11, No. 2, Summer 92

Video Teleconferencing; NSA Applications (U)

Vol. 12, No. 2, Summer 93

Vol. 13, No. 1, Sprin@I 94

Vol. 14, No. 1, Spring 95

Vol. 11, No. 2, Summer 92

Vol. 11, No. 3, Fall 92

Vol. 13, No. 2, Summer 94

Vol5, No 3, Fall 86

Vol. 15, No. 3. Fall 96

Vole, No 3, Fall 89

I Vol8, No 2, Sum d9

Vol3, Nos 3-4, Fall-Win 84-85

Vol10, No 1, Spr 91

i b ) : I ) (b) (3)-50 USC 4 C 3 ib) : 3 ) - 1 E USC 799

Page 165: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

REF ID:A525813 (b) (5)-15 USC 7 9 5

Telephone codes

commnnications

Terms

Unofficial Vocabulary (U) Hatch, David A.

Terrorism Book Review: The Master Terrorist:

Predicting Terrorism: An Indications and Warning Model

Text searching I Rapid Text Searching For Multiple Key Strings (U)

Text type I Machine Learning Approach to Text Type Identification, A (U)

Third party I Third Party Nations: Partners and Targets (U)

TIDYTIPS ( Tromps m system Capabilities (u)

Thumbnail review Hatch, David A. Dirty Little Secrets: Military Information You're Not Supposed to Know (U)

Time edge scores c Tiltman, John H.

Reference

John H. Tiltman: A Reminiscence (U) Lutwiniak, William

-- -

Vol11, No 1, Spr 92

Vol. 12, No. 1, Spring 93

Vol9, No 4, Win 91

Val. 15, No. 4, Winter 96 .. .

Vol 10, Nos 3 4 , Fall-Win 91

Vol6, No 1, Spr 87

Vol 10, Nos 3-4, Fall-Win 91

Vol8. No 4, Win 90

Vol10, No 2, Sum 91

Vol7, No 4, Win 89

Vol. 12, No. 2, Summer 93

Vol. 12, No. 2, Summer 93

Vol 1 , Nos 2-3, Sum-Fall 82

Vol. 15, Special Edition 96

Page 166: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

Keyword I Title Author

I

I

DOCID: 3021075 REF IDtA525813 (b) (3)-P.L. 86-36 -

Vol. 15, No. 1, Spring 96

Tordella

TQM

TRACKER

TraEic analysis

Vol. 14, No. 1, Spring 96

Dr. Louis W. Tordella, 1911-1996 (U) author unknown

Integrating Strategic Planning and Quality Initiatives (U)

TQM and Software: New Paradigme for Development and Support (U)

Accuracies, An (U)

El Examination of SSL Target Location Gerson, N. C.

-

Vol11, No 1, Spr 92

Vol. 15, No. 2, Summer 96

Training

\ b ill

Vol10, No 1. Spr 91

Development of Decision Support Analysis for Trac Analysis (U)

GOLD NUGGET Award (U)

Gold Nugget Award for Excellence in Traffic Analysis (U)

Origination and Evolution of Radio Trflic Analysis, The Period Between the Wars, The (U)

Origination and Evolution of Radio Trac Analysis, The World War I Era, The (U)

Origination and Evolution of Radio Traffic Analysis, World War 11, The (U)

Certification of the Air Force Intelligence Ofticer: What Now? (U)

Code. Train: A Computer-Based Morse Code Training Package (U)

Development of Cryptologic Training, 1949 to 1960, The (U)

Vol. 12, Nos. 3-4, FalVWinter 93

(b' (3)-53 JSC 403 (b' ( 3 ) - 1 8 [J>7(7

[h ( ? ) - ? . L A . q h ->h .

Vol. 15, No. 1, Spring 96 .

Vol. 14, No. 2, Summer 95

'Vol6, NO 3-4, Fall-Win 87-88

Vol6. No 1, Spr 87

Vol7, No 4, Win 89

Vol. 13, No. 4, Winter 94

Vol. 12, No. 2, Summer 93

Vol6, Nos 3-4, Fall-Win 87-88

Vol9, No 3, Fall 90

Page 167: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF IDzA525813 ( b ) (3)-P.L. 8 6 - 3 6

TOP SECRET UMBRA

Keyword 1 Title Author

Effecta of Pictures on Adult Learning and Recall, The (U)

I Managel Track, The (U) I I

Transcription system

Transliteration

Transistors

Translation

On-the-Job Training: A Supervisor's Responeibility (U)

Select Yourself for War College (U)

I srclm Reporting Training. Some Suggestions for Change (U) I Some Contributions Toward a Course in C~hf~~TTranslation (U)

Use of Compressed Speech in Selecting Morse Code Operators, The (U)

Korean Phonology System: An Automated Language Information Aid for Transcribers, The (U)

Software Application to Correct the Effects of Transliteration "Errors" on Database Integrity, A (U)

Evaluation of Conventional and LDD Devices for Submicron Geometries,

I An (U) ' I

I Enhancing Auditory Perception (U)

Impressions of the 1995 American Translators' Association Conference in Nashville as Viewed from the Perspective of th m- I

Gurin, Jacob

Some Contributions Toward a Course in COMNT Translation (U)

Reference

Vol. 11, No. 2, Summer 92

Vol 10, Nos 3-4, , Fall-Win 91

Vol8, No 1, Spr 89

Vol5, No 3, Fall 86

Vol. 11, No. 2, Summer 92

Vol9, No 4, Win 91

Vol 1, Nos 2-3, Sum-Fall 82

Vol8, No 3, Spr 89

Vol6, No 2, Sum 87

Vol. 12, No. 2, Summer 93

Vol 1, Nos 2-3, Sum- Fall 82

Vol. 15, No. 1, Spring 96

Vol9, No 4, Win 91

Page 168: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

(bl(1: (b) (3;-18 USC 798 (bi (3)-P.L. 86-36

REF IDzA525813

Key word I Title

Treaty

Tools for the Beginning Translator (U)

Translating by the Seat of Your Pants: Some Observations about the DiE~(:ulties of Translation and How to Deal with Them (U)

China: Forbidden No More? (U)

Space Weapons: Time for a Treaty? (U)

Ultra

Undecimating recursions

I

Book Review: Codebreakers: The I Inside Story of Bletchley Park (U) I Book Review: Listening to the Enemy: Key Documents on the Role of Communications Intelligence in the War with Japan (U) ,

Book Review: ULTRA Americans: The U.S. Role in Breaking the Nazi Codes, The (U)

Book Review: Ultra-Magic Deals and the Most Secret Relationship, 1940- 1946, the (U)

I Cryptographic Mathematics of Enigma, The (U)

Solving xa = b (mod c) for x and Undecimating Recursions (LT)

Author

Filby, P.W.

Reference

V01'3, NW 1-2, Spr-Sum 84

Vol3, Nos 1-2, Spr-Sum 84

Vol. 13, No. 4, Winter 94

Vol8, No 4, Win 90

Vol. 13, No. 3, Fall 94

Vol. 13, No. 3, Fall 94

Vol. 13, No. 2, Summer 94

Vol7, No 1, Spr 88

Vol5, No 3, Fall 86

Vol. 12, Nos. 3-4, FalWinter 93

Vol. 13, No. 3, Fall 94

Vol. 11, No. 4, Winter 92

Page 169: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075

Keyword

UNIX

U.S. policy

USS Pueblo

Variant record

Video technology

Viet Minh

Vietnam

Vietnam problem

Vietnam War

Virtual reality

REF ID:A525813

Title

Real-Time Signals Acquisition and Processing on UNIX Platforms

A Case Study in UNIX

Paved with Good Intentions: How the Road to Somalia Turned into a Detour to Chaos (U)

I North Korean Attack on and Seizure of the USS Pueblo, The (U)

I Problem Encountered with the .

Variant Record Construct in Ada (U)

Language Multimedia - A Makeover I RI1

Reference - - -

Vol. 11, No. 2, Summer 92

Vol. 12, No. 1, Spring 93

Vol. 15, No. 2, Summer 96

Vol. 11, No. 3, Fall 92

Vol7, No 2, Sum 88

Vol. 13, No. 2, Summer 94

Guerrillas in the Mist: coadrN~and Hanyok, Robert J. Vol. 15, No. 1, the Formation and Evolution of the Spring 96 Viet Minh, 1941-45 (U)

Guerrillas in the Mist: COhll~~and Hanyok, Robert J. Vol. 15, No. 1, the Formation and Evolution of the Spring 96 Viet Minh, 194145 (U)

History of the South Vietnamese Vol. 13, No. 1, Directorate for Technical Security Spring 94 (U)

Hanyok, Robert Vol. 13, No. 3, Fall 94

Another Look a t TEABAU, and Where'We've Gone from There (U)

I Book Review: Inside Hanoi's Secret Hanyok, Robert 3. Vol. 15, No.1, Archives (U) Spring 96

Book Review: Vietnam Spook Show I RT) Deployment of the First ASA Unit to Vietnam (U)

I TEABALL: Some Personal Observations of SIGINT at War (U)

Virtual Reality (U)

Vol 11, No 1, Spr 92

Vol to, Nos 3-4, Fall-Win 91

Vol9, No 4, Win 91

Vol. 12, Nos. 3-4, FalYWinter 93

Page 170: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

'DOCID: 3021075

Keyword

Visual learning

Volume modeling

Volume rendering

VSAT

Watch operations

Work force skills

World War I

World War I1

REF IDzA525813

(b) ( 3 ) - P . L . 8 6 - 3 6

Title Author Reference

I Effects of Pictures on Adult Learning and Recall, The (U)

* Virtual Reality (U)

I Introduction to Volume Modeling and Rendering, An (U)

Vol. 12, Nos. 3-4, FalWinter 93

I Introduction to Volume Modeling and Rendering, An (U) I Collection Challenges Represented by the Proliferation of Very Small Aperture Terminal Communications,

1 The (U)

Watch is Set: The Evolution of the T Operations Center. The (U)

I Work Force Skills and Mission I Requirements Comparison System (U)

Origination and Evolution of Radio Traffic Analysis, The World War I Era, The (U)

Book Review: "And I Was There": Pearl Harbor and Midway - Breaking the Secrets (U)

Book Review: Code-Name Downfall: The Secret Plan to Invade Japan - and Why Truman Dropped the Bomb (U)

Book Review: Eavesdroppers, The Johnson, Thomas R. (U 1

I Book Review: Invasion of Japan: ~ohnson, Thomas R. Alternative to the Bomb, The (U)

I Book Review: Marching Orders: The Johnson, Thomas R. Untold Story of World War I1 (U)

I Book Review: On ULTRA Active Service (U)

Origination and Evolution of &dio Traffic Analysis. World War 11, The (U)

Vol. 11, No. 2, Summer 92

Vol. 11, No. 3, Fall 92

Vol. 11, No. 3, Fall 92

Vol. 13, No. 3, Fall 94

Vol8, No 2, Sum 89

Vol. 14, No. 1, Spring 95

V016, No 1, Spr 87

Vol5, NOS 1-2, Spr-Sum 86

Vol. 15. No. 4, Winter 96

Vol. 14, No. 1, Spring 95

Vol. 14, No. 2, Summer 95

Vol. 14, No. 4, Winter 95

Vol 10, Nos 3-4, Fall-Win 91

Vol7, No 4, Win 89

Page 171: INDEX [cryptocellar.org] · Book Review: Artificial Intelligence: Theory, Logic and Application (L') Author Reference Keyword . Vol. 13, No.1, Book . review Spring 94 Cold War Military

DOCID: 3021075 REF 1~:~525813

Keyword

Writing

Title Author Reference -L

Mokusatsu: One Word, Two Lessons (U)

Priceless Advantage: COMINT in the Battles of Coral Sea and Midway, A (U)

Radio Intelligence in Japanese and American North Pacific Naval and Air Operations (U)

Recollections of a Pioneer Cryptanalyst: Dr. Abraham Sinkov (U)

Revisiting the Dispute over the Identification of "AF" as Midway (U)

Vo1.14, No+4, Winter 95

Vo19, No 4, Win 91

Vol9, No 2, Sum 90

Vol. 14, No. 2, Summer 95

Vol. 13, No. 4, Winter 94

Securing Army Circuits during Rowlett, Frank B. Vole, No 1, World War 11: A Potential Disaster Spr 87 Narrowly Averted (U) . -

SIGINT and the Holocaust (U) Benson, Robert Louis Vol. 14, No. 1, Spring 95

Uncertain Summer of 1945 (U) Wiley, Edward Vol. 14, No. 1, Spring 95

World War I1 German Army Field Cipher and How We Broke It, A (U)

Book Review: On Writing Well (U)

Book Review: Technical Writers Handbook: Writing with Style and Clarity, The (U)

Book Review: Technical Writing for Beginners (U)

Vol. 14, No. 4, Winter 96

Vol7, No 3, Fall 88

Vol9, No 1, Spr 90

-.

-\ Vol4, No 4, Win \. 86