Query Result Set
Skip Navigation Links
   ActiveUsers:1048Hits:19066678Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
NATIONAL SECURITY AGENCY (19) answer(s).
 
SrlItem
1
ID:   128705


Cyber operations: bridging form concept to cyber superiority / Kallberg, Jan; Thuraisingham, Bhavani   Journal Article
Thuraisingham, Bhavani Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export
2
ID:   138997


Dancing with Brazil / Farnsworth , Eric   Article
Farnsworth , Eric Article
0 Rating(s) & 0 Review(s)
Summary/Abstract BRAZIL IS on the move. Its economic strength over the past decade has provided the primary means for it to develop long-standing ambitions for a larger global-leadership stake—a path that U.S. policy makers have encouraged for many years, presuming that a stronger, democratic Brazil more actively engaged globally would be a natural ally for the United States. In so doing, however, it has pursued a foreign policy independent of Washington, leading at times to misunderstandings and dashed hopes. This was in evidence even before the revelations of National Security Agency contractor Edward Snowden in 2013 temporarily froze bilateral relations.
        Export Export
3
ID:   156023


Expanding scope / Johnson, Tanner   Journal Article
Johnson, Tanner Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
4
ID:   177940


General Intelligence Division: J. Edgar Hoover and the critical juncture of 1919 / Selden, Zachary   Journal Article
Selden, Zachary Journal Article
0 Rating(s) & 0 Review(s)
        Export Export
5
ID:   102984


Keeping secrets in the digital era / Antal, John   Journal Article
Antal, John Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words United States  Cyberspace  NSA  National Security Agency  Digital Ear 
        Export Export
6
ID:   126263


Labyrinthine role of news media in national security: case study Edward Snowden / Singh, Kirti   Journal Article
Singh, Kirti Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract News journalism achieved a new height with the publication of serious revelation made by American computer professional and ex-Central Intelligence Agency (CIA) and National Security Agency (NSA) employee , Edward Joseph Snowden on June 2013. Refreshing the memories of editor-in-chief and founder of Wikileaks, Julian Paul Assange, the recent example has once again exhibited how powerful and deadly the media can be in term of national security. The recent issue has once ignited the same debate on the role of the media: the media as a watchdog of a nation or a medium which provides a voice to the unheard, helps the whistleblowers to expose the cracks in our existing society and by doing so, performs a greater good for the public.
        Export Export
7
ID:   130338


Lead code-breaker of midway / Stillwell, Paul   Journal Article
Stillwell, Paul Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
8
ID:   100577


Leaner and meaner defense: how to cut the pentagon's budget while improving its performance / Adams, Gordon; Leatherman, Matthew   Journal Article
Adams, Gordon Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract Pentagon budgets have soared over the last decade, partly because of a failure to prioritize. In the coming age of austerity, major cuts are imperative -- and if done right, they will not harm U.S. interests.
        Export Export
9
ID:   134424


No place to hide: Edward Snowden, the NSA, and the US surveillance state / Greenwald, Glenn 2014  Book
Greenwald, Glenn Book
0 Rating(s) & 0 Review(s)
Publication New York, Metropolitan Books, 2014.
Description 259p.Hbk
Standard Number 9781627790734
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057924323.44820973/GRE 057924MainOn ShelfGeneral 
10
ID:   076354


Prometheus embattled: a post-9/11 report card on the National Security Agency / Aid, Matthew M   Journal Article
Aid, Matthew M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract Five years after the tragic events of September 11, 2001, the National Security Agency (NSA) has risen to the position of being the largest and most powerful intelligence agency in the US. Working in close conjunction with its English-speaking partners overseas, NSA is today the most prolific producer of top-quality intelligence information reaching senior US government policymakers and field commanders. But press reports over the past year concerning the Agency's controversial domestic eavesdropping program and problem-plagued modernization effort, have raised serious questions once again about the competency of the Agency's long-troubled management practices, as well as whether NSA, at the behest of the Bush administration, exceeded its legal authority by extending its operations into the US for the first time since the mid-1970s in contravention of the Foreign Intelligence Surveillance Act (FISA) of 1978.
        Export Export
11
ID:   128829


Repurposing cyber command / Cilluffo, Frank J; Clark, Joseph R   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013-14.
Summary/Abstract Recent debate about the organizational relationship between cyber command and the NSA stress political issues over force employment. This article focuses on the latter, making the case that cyber command should be split from the NSA, because nations that marshal and molilize their cyber power and integrate it into strategy and doctrine will ensure significant national security advantage. Cyber command provides the best route for developing the tactics, technique, and procedures necessary for achieving these goals.
        Export Export
12
ID:   111613


Strengthening intelligence threat analysis / Spielmann, Karl   Journal Article
Spielmann, Karl Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
13
ID:   114251


TICOM: the last great secret of World War II / Rezabek, Randy   Journal Article
Rezabek, Randy Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract Recent releases from the National Security Agency reveal details of TICOM, the mysterious 1945 operation targeting Germany's cryptologic secrets. Often mentioned by such authors as Kahn, Bamford, Parrish and Aldrich, for the first time the public has access to this information. This article provides a review in greater depth than has been previously covered in the open literature of the history of the TICOM operation, and its resulting intelligence, including the Germans' efforts against Soviet communications. In addition, some comments are provided on why TICOM has remained classified long after other similar information from World War II was declassified, and why locating TICOM documents is still difficult.
        Export Export
14
ID:   139961


Time for a rethink?: libertarians and foreign policy / Rohac , Dalibor   Article
Rohac , Dalibor Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Regardless of the party in power, libertarians are notoriously unhappy about US foreign and defense policy, skeptical of any active role that America can play in the world. Senator Rand Paul, for example, tried to formally end the US war in Iraq, proposed an end to military aid to Israel, and encouraged Americans to “fight back” against the National Security Agency’s invasion of their privacy. In 2011, he lambasted the intervention in Libya as unconstitutional, and questioned whether the US presence in Afghanistan was “vital to our national security interest.”
        Export Export
15
ID:   109537


Top-secret smartphone could become reality / Pugh, Steven   Journal Article
Pugh, Steven Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
16
ID:   140917


US Intelligence: evolution and anatomy / Lowenthal, Mark M 1984  Book
Lowenthal, Mark M Book
0 Rating(s) & 0 Review(s)
Publication New York, Praeger Publishers, 1984.
Description x, 134p.pbk
Series Washington Papers no; 105
Contents Vol. XII
Standard Number 0030715326
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
024695327.120973/LOW 024695MainOn ShelfGeneral 
17
ID:   108616


Valuing intelligence: opening a conversation / Nolte, William M   Journal Article
Nolte, William M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
        Export Export
18
ID:   125296


What it takes: in defense of the NSA / Cleave, Michelle Van   Journal Article
Cleave, Michelle Van Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract "Freedom must be won anew by every generation." I was reminded of the truth behind these words of my old boss, Jack Kemp, in considering the current debate over Edward Snowden and the collection programs of the National Security Agency.
        Export Export
19
ID:   100932


What's the use of Cryptologic history? / Budiansky, Stephen   Journal Article
Budiansky, Stephen Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract Continued secrecy surrounding signals intelligence during the Cold War has profoundly distorted the historical record, making a full and accurate military, diplomatic, and presidential history of the last half century impossible for now. Not only history, but the ongoing intelligence enterprise itself, would be better served by significantly greater openness. This article is adapted from the Schorreck Memorial Lecture in Cryptologic History, presented by the author at the National Cryptologic Museum, Ft. Meade, Maryland, 24 May 2010, and the National Security Agency, 26 May 2010.
        Export Export