Search results
Jump to navigation
Jump to search
Page title matches
- The '''National Security Agency (NSA)''', formally the '''National Security Agency/Central Security Service''' is part of the [[United States Department of De | author = National Security Agency72 KB (10,689 words) - 08:11, 4 May 2024
- * Bamford, James. (1983) ''The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization''. Informative, but Bamfor * Bamford, James. (2002) ''Body of Secrets: Anatomy of the Ultra-Secret National Security Agency''1 KB (159 words) - 15:30, 27 May 2008
- ...'''DIRNSA''', the '''Director, National Security Agency''' commands the [[National Security Agency]], and is a serving military officer, normally of three-star rank (lieutena2 KB (249 words) - 05:48, 8 April 2024
- 346 bytes (43 words) - 17:44, 3 September 2008
- 170 bytes (17 words) - 15:36, 27 May 2008
- {{r|Director, National Security Agency}} {{r|National Security Agency and Southeast Asia, 1954-1961}}1 KB (161 words) - 08:37, 4 May 2024
- Auto-populated based on [[Special:WhatLinksHere/Director, National Security Agency]]. Needs checking by a human. {{r|National Security Agency}}525 bytes (67 words) - 15:59, 11 January 2010
- {{main|National Security Agency}} Declassified [[National Security Agency]] historical documents, prepared by NSA historian Robert Hanyok, give a new11 KB (1,683 words) - 05:35, 31 May 2009
- #REDIRECT [[National Security Agency and Southeast Asia, 1954-1961]]68 bytes (8 words) - 23:56, 23 August 2008
- 140 bytes (16 words) - 09:49, 24 August 2008
- {{r|National Security Agency}}317 bytes (42 words) - 10:04, 24 August 2008
Page text matches
- * [[Army Security Agency]], a fore-runner of the [[National Security Agency]]393 bytes (46 words) - 12:54, 31 May 2009
- #REDIRECT [[National Security Agency]]38 bytes (4 words) - 00:09, 27 May 2008
- #REDIRECT [[Director, National Security Agency]]48 bytes (5 words) - 20:05, 27 May 2008
- #REDIRECT [[Director, National Security Agency]]48 bytes (5 words) - 20:06, 27 May 2008
- ...communications security (COMSEC) equipment under the control of the U.S. [[National Security Agency]] (NSA)183 bytes (23 words) - 13:03, 23 March 2009
- *Consolidated Cryptologic Program of the [[National Security Agency]] (NSA)628 bytes (72 words) - 09:54, 1 October 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:14, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:14, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:15, 10 March 2009
- #REDIRECT [[National Security Agency#1950s programs]]53 bytes (6 words) - 11:15, 10 March 2009
- ...licy]]; [[lieutenant general]], [[U.S. Army]], retired; former Director, [[National Security Agency]]; critic of [[George W. Bush Administration]] defense policies240 bytes (28 words) - 13:32, 14 September 2009
- #REDIRECT [[National Security Agency and Southeast Asia, 1954-1961]]68 bytes (8 words) - 23:56, 23 August 2008
- {{r|Director, National Security Agency}} {{r|National Security Agency and Southeast Asia, 1954-1961}}1 KB (161 words) - 08:37, 4 May 2024
- {{r|National Security Agency}}506 bytes (66 words) - 09:46, 31 July 2010
- A [[National Security Agency]] link and packet encryption device for two 100 Mbps serial interfaces135 bytes (17 words) - 23:56, 9 April 2009
- {{r|National Security Agency}}3 KB (358 words) - 11:35, 13 February 2009
- Auto-populated based on [[Special:WhatLinksHere/Director, National Security Agency]]. Needs checking by a human. {{r|National Security Agency}}525 bytes (67 words) - 15:59, 11 January 2010
- {{r|National Security Agency}}379 bytes (41 words) - 18:24, 31 January 2009
- {{r|National Security Agency}}844 bytes (96 words) - 14:48, 4 April 2024
- {{r|National Security Agency}}451 bytes (50 words) - 16:59, 22 August 2009
- ...-vintage [[bulk encryption]] device, a [[key generator]] designed by the [[National Security Agency]], for low-speed data streams; codenamed PONTUS154 bytes (20 words) - 09:32, 23 March 2009
- {{r|National Security Agency}}1 KB (177 words) - 08:37, 4 May 2024
- [[Canada]]'s '''Communications Security Establishment''' has, like the U.S. [[National Security Agency]] (NSA), a dual mission of [[signals intelligence]] and [[communications se ...s. Staff were trained through an exchange program with the [[American]] [[National Security Agency]].2 KB (206 words) - 05:48, 8 April 2024
- ...[[TSEC-|TSEC/]]KG-175, of [[bulk encryption]] devices specified by the [[National Security Agency]], which work with high-speed [[IEEE 802.3]]/Ethernet interfaces184 bytes (23 words) - 15:39, 22 March 2009
- A block cipher developed by the U.S. National Security Agency (NSA); initially classified, it was originally intended for use in the cont197 bytes (28 words) - 07:02, 1 October 2009
- A family of U.S. [[National Security Agency]] approved encryption devices for [[Asynchronous Transfer Mode]] (ATM), [[S256 bytes (30 words) - 16:55, 25 March 2009
- ...overnment Communications Security Bureau]] (GCSB), and the United States [[National Security Agency]] (NSA), but operated the government communications networks.2 KB (317 words) - 23:12, 8 August 2010
- ...ard Kennedy School of Government; headed the [[Barack Obama]] Transitions National Security Agency Review; [[Deputy Assistant Secretary of Defense for Peacekeeping and Humani748 bytes (100 words) - 20:07, 28 July 2009
- {{r|National Security Agency}}814 bytes (103 words) - 15:32, 7 September 2009
- {{r|National Security Agency}}762 bytes (99 words) - 12:01, 19 March 2024
- {{r|National Security Agency}}790 bytes (109 words) - 20:56, 4 December 2010
- {{r|National Security Agency}}1 KB (145 words) - 12:48, 2 April 2024
- {{r|National Security Agency}}603 bytes (78 words) - 09:30, 3 May 2024
- ...ronautics and Space Administration. One of its major centers supportes the National Security Agency. It does no work for private industry.810 bytes (113 words) - 18:47, 3 April 2024
- ...'''DIRNSA''', the '''Director, National Security Agency''' commands the [[National Security Agency]], and is a serving military officer, normally of three-star rank (lieutena2 KB (249 words) - 05:48, 8 April 2024
- {{r|National Security Agency}}3 KB (429 words) - 07:33, 18 March 2024
- {{r|National Security Agency}}457 bytes (59 words) - 09:08, 21 June 2008
- ...nce]]: Chairman,[[Subcommittee on Technical and Tactical Intelligence]] ([[National Security Agency]] is in his district), [[Subcommittee on Terrorism, Human Intelligence, Ana758 bytes (83 words) - 09:40, 29 June 2023
- * Bamford, James. (1983) ''The Puzzle Palace: Inside the National Security Agency, America's Most Secret Intelligence Organization''. Informative, but Bamfor * Bamford, James. (2002) ''Body of Secrets: Anatomy of the Ultra-Secret National Security Agency''1 KB (159 words) - 15:30, 27 May 2008
- ...more highly classified, and only now available in heavily censored form, [[National Security Agency]] analysis of how the Communists were getting their information, which has | author = Center for Cryptologic History, [[National Security Agency]]3 KB (424 words) - 08:11, 4 May 2024
- ...to persons aware of the context, such as the nondescript name of the U.S. National Security Agency.784 bytes (127 words) - 16:45, 25 March 2024
- {{r|National Security Agency}}1 KB (133 words) - 21:04, 11 January 2010
- {{r|National Security Agency}}576 bytes (82 words) - 13:15, 2 February 2023
- {{r|National Security Agency}}880 bytes (115 words) - 15:55, 11 January 2010
- ...ed by the National Geospatial-Intelligence Agency, and their SIGINT by the National Security Agency.1 KB (208 words) - 07:29, 18 March 2024
- ...the key, or even help him attack the cipher. However, a law enforcement or national security agency can obtain a warrant, present it to both escrow agencies, get both the secr2 KB (334 words) - 05:49, 8 April 2024
- {{r|National Security Agency}}317 bytes (42 words) - 10:04, 24 August 2008
- ...[[Deputy Director of Central Intelligence]](1992-1995); former Director, [[National Security Agency]]; [[vice admiral]], retired, [[United States Navy]]467 bytes (54 words) - 16:56, 29 March 2024
- :#National Security Agency/Central Security Service6 KB (811 words) - 07:37, 18 March 2024
- {{r|National Security Agency}}455 bytes (59 words) - 17:44, 3 September 2008
- ...ligence Agency]] (NGA); [[National Reconnaissance Office]] (NRO) and the [[National Security Agency]] (NSA).2 KB (285 words) - 01:51, 23 September 2013
- ...ance]] organization. Its functions are very similar to those of the U.S. [[National Security Agency]], with which it works closely. ...overnment Communications Security Bureau]] (GCSB), and the United States [[National Security Agency]] (NSA). There may be another information-sharing agreement called [[ECHELO3 KB (353 words) - 05:48, 8 April 2024
- {{r|National Security Agency}}732 bytes (93 words) - 06:10, 10 March 2024
- {{r|National Security Agency}}1 KB (173 words) - 14:49, 4 April 2024
- {{r|National Security Agency}}715 bytes (92 words) - 10:33, 23 March 2024
- {{r|National Security Agency}}888 bytes (121 words) - 11:11, 4 April 2024
- ...overnment Communications Headquarters]], the U.K. equivalent of the U.S. [[National Security Agency]].531 bytes (78 words) - 21:47, 12 July 2008
- * National Security Agency2 KB (275 words) - 16:22, 30 March 2024
- {{r|National Security Agency}}2 KB (194 words) - 14:48, 4 April 2024
- {{r|National Security Agency}}932 bytes (128 words) - 17:34, 14 March 2024
- {{r|National Security Agency}}469 bytes (59 words) - 21:37, 11 January 2010
- ...the ODNI left the Department of Defense in charge of the budget for the [[National Security Agency]], the [[National Reconnaissance Office]], and the [[National Geospatial-In3 KB (499 words) - 18:05, 21 April 2024
- {{r|National Security Agency}}2 KB (230 words) - 09:34, 29 June 2023
- {{r|National Security Agency}}712 bytes (96 words) - 14:31, 22 March 2024
- {{r|National Security Agency}}1 KB (183 words) - 09:11, 22 April 2024
- {{r|National Security Agency}}784 bytes (100 words) - 14:41, 18 March 2024
- {{r|National Security Agency}}764 bytes (100 words) - 16:05, 11 January 2010
- The '''Communications Security Establishment''' has, like the U.S. [[National Security Agency]] (NSA), a dual mission of [[signals intelligence]] and [[communications se ...s. Staff were trained through an exchange program with the [[American]] [[National Security Agency]].8 KB (1,088 words) - 08:11, 4 May 2024
- {{r|National Security Agency}}1 KB (192 words) - 11:11, 4 April 2024
- ...ve TELINT intercept stations in specific geographic locations. While the [[National Security Agency]] was usually responsible for the actual interception, the [[Central Intell2 KB (296 words) - 18:41, 3 March 2024
- {{r|National Security Agency}}973 bytes (125 words) - 14:41, 18 March 2024
- {{r|National Security Agency}}1 KB (132 words) - 14:31, 22 March 2024
- ...e Director of the Joint Staff, a major agency head such as Director of the National Security Agency, or a Deputy Chief of Staff of a service (e.g., U.S. Army Deputy Chief of S3 KB (464 words) - 07:33, 18 March 2024
- '''TSEC/KIV-7''' devices are cryptographic devices developed by the [[National Security Agency]], with two [[full-duplex]] channels operating as fast as 100 Mbps. Differe1 KB (139 words) - 15:21, 3 December 2009
- ..., supervision of Department of Defense intelligence agencies such as the [[National Security Agency]], military support to the [[Central Intelligence Agency]], support of the4 KB (646 words) - 08:34, 31 March 2024
- ...long as an Army computer has proper cryptographic keying provided by the [[National Security Agency]], it should be able to access a Navy computer. Accessing that computer, ho3 KB (397 words) - 20:52, 4 November 2008
- {{r|National Security Agency and Southeast Asia, 1954-1961}}3 KB (480 words) - 11:00, 4 April 2024
- ...encryption|bulk encryption of packet stream]] devices specified by the [[National Security Agency]] and manufactured by General Dynamics. The device interfaces to [[Asynchro1 KB (179 words) - 17:16, 25 March 2009
- It is equipped with [[National Security Agency]] Type II encryption, which is not intended for classified traffic, but als2 KB (271 words) - 12:12, 1 May 2024
- | publisher = Center for Cryptologic History, National Security Agency1 KB (185 words) - 19:09, 30 August 2009
- ...l Deputy Director of National Intelligence (2005-2006) and director of the National Security Agency (NSA) (1999-2005).4 KB (599 words) - 07:33, 18 March 2024
- ...tial part is that the cryptographic keys are provided, or approved, by the National Security Agency. Typical encryption devices include the TSEC/KG-194 and TSEC/KIV-7 link enc2 KB (302 words) - 16:24, 30 March 2024
- {{r|National Security Agency}}1 KB (186 words) - 12:50, 18 February 2011
- ...encryption|bulk encryption of packet stream]] devices specified by the [[National Security Agency]] and manufactured by General Dynamics. The family, all intended for high-s1 KB (199 words) - 05:49, 8 April 2024
- ...not an abbreviation. The designation system is under the control of the [[National Security Agency]] (NSA). It complements the AN/ system used for general military electronic3 KB (414 words) - 05:48, 8 April 2024
- {{r|Director, National Security Agency}}1 KB (214 words) - 05:16, 31 March 2024
- *[[Deputy Director, National Security Agency]]36 KB (4,569 words) - 07:53, 29 May 2023
- ...frequency agility. For more serious security, many units can connect to a National Security Agency approved encryption device.3 KB (476 words) - 16:23, 30 March 2024
- {{r|National Security Agency and Southeast Asia, 1954-1961}}2 KB (275 words) - 16:00, 1 April 2024
- {{main|National Security Agency}} Declassified [[National Security Agency]] historical documents, prepared by NSA historian Robert Hanyok, give a new11 KB (1,683 words) - 05:35, 31 May 2009
- | publisher = [[National Security Agency]]3 KB (493 words) - 19:46, 29 August 2010
- {{r|National Security Agency and Southeast Asia, 1954-1961}}4 KB (592 words) - 11:11, 4 April 2024
- ...uban Missile Crisis]] came from [[signals intelligence]] provided by the [[National Security Agency]] and [[imagery intelligence]] from military units. | author = National Security Agency12 KB (1,829 words) - 12:13, 13 March 2024
- ...model, the Network Warfare component is built around capabilities of the *National Security Agency Fort Meade, Maryland6 KB (893 words) - 16:23, 30 March 2024
- ...ides data exchange between selected TROJAN sites requiring access to the [[National Security Agency]] network, which is separate from JWICS7 KB (978 words) - 05:49, 8 April 2024
- | publisher = Center for Cryptologic History, National Security Agency3 KB (433 words) - 00:10, 17 December 2008
- Not only Layton, but the [[National Security Agency]] history of communications intelligence in this period points out conflict | publisher = [[National Security Agency]]5 KB (781 words) - 15:42, 8 April 2024
- {{r|National Security Agency and Southeast Asia, 1954-1961}}4 KB (676 words) - 14:14, 6 April 2024
- *[[Signals intelligence]]: [[National Security Agency]] *Program C: Navy [[electronic intelligence]], with analysis by the [[National Security Agency]]16 KB (2,303 words) - 06:04, 8 April 2024
- * National Security Agency9 KB (1,378 words) - 07:35, 18 March 2024