Query Result Set
Skip Navigation Links
   ActiveUsers:1247Hits:19121837Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
NSA (20) answer(s).
 
SrlItem
1
ID:   090494


Deconstructing our dark age future / Phillips, P Michael   Journal Article
Phillips, P Michael Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Key Words NSA  Dark Age 
        Export Export
2
ID:   122623


Desi treatment: the government opts for indigenous security solutions for cyber attacks instead of foreign ones / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Key Words European Union  Cyber Security  India  NSA  Cyber Attacks  Indigenous Security Solutions 
NSCS 
        Export Export
3
ID:   137584


Disrupting the intelligence community: America’s spy agencies need an upgrade / Harman, Jane   Article
Harman, Jane Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Some 40 years have passed since the Church Committee’s sweeping investigation of U.S. intelligence practices, fresh on the heels of the Watergate scandal. And ten years have gone by since the last major reorganization of the country’s spy agencies, enacted in the wake of 9/11. Both efforts led to a host of reforms—among them, the creation of the Senate and House Intelligence Committees, the passage of the Foreign Intelligence Surveillance Act (FISA), and the adoption of the Intelligence Reform and Terrorism Prevention Act, which I helped shepherd through Congress.
        Export Export
4
ID:   163803


From cold to cyber warriors: the origins and expansion of NSA’s Tailored Access Operations (TAO) to Shadow Brokers / Loleski, Steven   Journal Article
Loleski, Steven Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How did the National Security Agency (NSA) adopt the practice of hacking? This paper explores how NSA confronted the digital age by focusing on arguably NSA’s key organizational innovation as a microcosm of these broader changes: the Office of Tailored Access Operations (TAO). This paper develops a pragmatist model of organizational change showing how the practice of hacking became a practical solution to deal with the problems posed by a globally networked world through TAO’s case history. TAO’s aggressive expansion by developing a scalable Computer Network Exploitation (CNE) architecture was designed to keep NSA relevant in the twenty-first century
Key Words NSA  Cyber Warriors 
        Export Export
5
ID:   102984


Keeping secrets in the digital era / Antal, John   Journal Article
Antal, John Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Key Words United States  Cyberspace  NSA  National Security Agency  Digital Ear 
        Export Export
6
ID:   130571


Litmus test of news media's role: case study Edward Snowden / Singh, Kriti   Journal Article
Singh, Kriti Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Key Words National Security  Human Rights  Media  United States  Russia  War against Terrorism 
NSA  Democratic Society  Edward Snowden  NETCOM 
        Export Export
7
ID:   122919


Making easy questions easy: the difficulty of intelligence requirements / Manning, Brian; Wheaton, Kristan J   Journal Article
Wheaton, Kristan J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Intelligence analysts spend a good deal of time discussing accuracy in forecasting and they should. Saying accurate things about the future is arguably much more valuable to decisionmakers than saying accurate things about the present or past. Doing so is also inherently more difficult. Even when trying to say accurate things about the future, though, some questions are easier for analysts to answer than others. Why? What are the essential elements of a question that make it obviously more or less difficult to answer? How can these criteria be generalized across all questions? Intelligence professionals are not the only ones to recognize the inherent difficulties in different kinds of questions. Michael V. Hayden, the former Director of both the Central Intelligence Agency (CIA) and the National Security Agency (NSA), delights in telling this story: Some months ago, I met with a small group of investment bankers and one of them asked me, "On a scale of 1 to 10, how good is our intelligence today?" I said the first thing to understand is that anything above 7 isn't on our scale. If we're at 8, 9, or 10, we're not in the realm of intelligence-no one is asking us the questions that can yield such confidence. We only get the hard sliders on the corner of the plate. 1
        Export Export
8
ID:   158603


Media as a force multiplier for national security / Baru, Sanjaya   Journal Article
Baru, Sanjaya Journal Article
0 Rating(s) & 0 Review(s)
Key Words National Security  Media  Kargil War  NSA 
        Export Export
9
ID:   134424


No place to hide: Edward Snowden, the NSA, and the US surveillance state / Greenwald, Glenn 2014  Book
Greenwald, Glenn Book
0 Rating(s) & 0 Review(s)
Publication New York, Metropolitan Books, 2014.
Description 259p.Hbk
Standard Number 9781627790734
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
057924323.44820973/GRE 057924MainOn ShelfGeneral 
10
ID:   132535


On international privacy a path forward for the US and Europe / Rotenberg, Marc   Journal Article
Rotenberg, Marc Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The United States and its closest allies may be on a collision course over the future of privacy in the networked world. Whether leaders are able to find a policy solution will require that they understand the significance of the recent NSA disclosure as well as the development of modern privacy law. Long before a former NSA contractor spilled the secrets about the scope of the NSA's global surveillance, foreign governments worried about the ability of the United States to monitor those living in their countries. The increasing automation of personal information and the technological advantage that the United States enjoyed over other nations was already seen as a problem in the late 1960s. The concerns only increased as Internet-based commerce gave rise to the vast collection and storage
        Export Export
11
ID:   129939


Packing a punch: an inspiring defence minister along with a politician our armed forces / Sawhney, Pravin; Wahab, Ghazala   Journal Article
Sawhney, Pravin Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
12
ID:   076354


Prometheus embattled: a post-9/11 report card on the National Security Agency / Aid, Matthew M   Journal Article
Aid, Matthew M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2006.
Summary/Abstract Five years after the tragic events of September 11, 2001, the National Security Agency (NSA) has risen to the position of being the largest and most powerful intelligence agency in the US. Working in close conjunction with its English-speaking partners overseas, NSA is today the most prolific producer of top-quality intelligence information reaching senior US government policymakers and field commanders. But press reports over the past year concerning the Agency's controversial domestic eavesdropping program and problem-plagued modernization effort, have raised serious questions once again about the competency of the Agency's long-troubled management practices, as well as whether NSA, at the behest of the Bush administration, exceeded its legal authority by extending its operations into the US for the first time since the mid-1970s in contravention of the Foreign Intelligence Surveillance Act (FISA) of 1978.
        Export Export
13
ID:   128829


Repurposing cyber command / Cilluffo, Frank J; Clark, Joseph R   Journal Article
Cilluffo, Frank J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013-14.
Summary/Abstract Recent debate about the organizational relationship between cyber command and the NSA stress political issues over force employment. This article focuses on the latter, making the case that cyber command should be split from the NSA, because nations that marshal and molilize their cyber power and integrate it into strategy and doctrine will ensure significant national security advantage. Cyber command provides the best route for developing the tactics, technique, and procedures necessary for achieving these goals.
        Export Export
14
ID:   096329


Restructuring of Indian National Security Architecture / Verma, Anand K   Journal Article
Verma, Anand K Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
15
ID:   091239


Secrecy, security, and sex: the NSA, Congress, and the Martin-Mitchell defections / Barrett, David M   Journal Article
Barrett, David M Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract Congressional monitoring of intelligence activities has always been somewhat controversial, but its roots go back to the founding era of the United States, when the new Constitution gave both the President and Congress important roles in foreign affairs.
Key Words CIA  United States  NSA  Intelligence Agencies  Monitoring  Intelligence Activities 
        Export Export
16
ID:   122283


Secure and connected: the JWG report recommends a public private partnership to tackle cyber security issue / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
        Export Export
17
ID:   132440


Social laboratory: Singapore is testing whether mass surveillance and big data can not only portect national security, but actually engineer a more harmonious society / Harris, Shane   Journal Article
Harris, Shane Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
        Export Export
18
ID:   148921


Surveillance and international terrorism intelligence exchange: balancing the interests of national security and individual liberty / Lowe, David   Journal Article
Lowe, David Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Using the revelations Edward Snowden passed over to the press regarding the actions of the U.S.’s National Security Agency and the UK’s Government Communications Headquarters and their use of the Prism project, this article examines the law surrounding intelligence gathering in the U.S. and UK. Underpinning the analysis is the legal principle of proportionality as applied to balancing the interests of national security and individual liberties. After examining intelligence exchange procedures, which for the UK is through negotiated agreements between national security agencies and through the European Union’s policing agency, Europol, the main part of the article discusses legal challenges that have been made regarding surveillance and the use of anti-terror laws on citizens and the rationale behind the judicial decisions made in both the U.S. and UK jurisdictions. The argument forwarded is that there is a requirement for wide preventative powers being granted to counter-terrorism agencies and that the interests of national security and individual liberty are inclusive and, as shown by the cases covered in this article, we should rely on the judiciary to perform their function in applying proportionality to each case on its own merits.
Key Words National Security  Surveillance  NSA  GCHQ  Individual Liberty 
        Export Export
19
ID:   021039


Time to end abuses / Goodman Ryan April 2002  Article
Goodman Ryan Article
0 Rating(s) & 0 Review(s)
Publication April 2002.
Description 20-26
        Export Export
20
ID:   149875


Underground stations: tor takedowns highlight dark web alternatives / Bijou, Rodrigo   Journal Article
Bijou, Rodrigo Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The high public profile of the theoretically anonymous Tor network has made it a key target for law enforcement. As Tor-related arrests and takedowns multiply, Rodrigo Bijou examines how other privacy platforms and networks may come to take its place.
Key Words National Security  NSA  Law Enforcement  Criminals  Dark Web  Malware 
Tor Network  Malware Communication  Hacker Forums  Dark Markets  Darknet 
        Export Export