The largest and most secret of the intelligence agencies of the U.S. government, the National Security Agency (NSA), with headquarters at Fort Meade, Maryland, has two main functions: to protect U.S. government communications and to intercept foreign communications.
|
A Review of the National Security Agency |
by Sara D. Berman |
| In 1991, the Inspector General, Department of Defense, conducted the first comprehensive inspection of the NSA. The goal of the inspection was to evaluate the processes the NSA uses to measure achievement of its mission and to manage its functions and organizational elements. |
|
A Short History of the NSA |
| The largest and most secret of the
intelligence agencies of the U.S.
government, the National Security
Agency (NSA), with headquarters at Fort
Meade, Maryland, has two main
functions... |
|
CIA and NSA Running Anonymous Remailers? |
by Viktor Mayer-Schoenberger |
| CIA and similar government agencies are involved in running anonymous remailers as this would be a perfect target to scan possibly illegal messages. |
|
Charter of the National Security Agency |
by Harry S. Truman |
| Classified top secret and stamped with a code word that was itself
classified, the order directed the establishment of an agency to
be known as the National Security Agency. |
|
Decrypting the Puzzle Palace |
by John Perry Barlow |
| It is legally constrained from domestic surveillance, but precious few people are in a good position to watch what, how, or whom the NSA watches. Those who are tend to be temperamentally sympathetic to its objectives and methods. They like power, and power understands the importance of keeping it own secrets and learning everyone else's. |
|
Exposing The Global Surveillance System |
by Nicky Hager |
| For 40 years, New Zealand's largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation's equivalent of the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region, without the knowledge of the New Zealand public or many of its highest elected officials. |
|
How NSA Access Was Built Into Windows |
by Mortose-Mortland |
| The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.
|
|
ICML Common Object Element Types |
by IC Sub-Working Group |
| The column headings of this table have the following meanings: Name: The identifier of a specific element type. Must be unique within the class of documents defined by a DTD or schema. It is the tag name.
|
|
ICML Technical Addendum |
by IC Metadata Sub-Working Group |
| This Technical Addendum is provided to supplement the evaluators of ICML v0.5 during their evaluation. It covers some background material and documents some of the research and perspectives that affected key decisions made in the ICML development. This addendum along with the release notes will be expanded in the future to become formal ICML documentation. |
|
Intelligence Community Markup Language (ICML) Release Notes |
by IC Metadata Sub-Working Group |
| The first focus of ICML is to aid finished intelligence production. Since a majority of the intelligence content being produced within the IC takes the form of documents, it was felt by the MSWG that limiting the scope of the initial ICML release to this type of intelligence content would yield the most benefits in the shortest period of time. The ICML standard as written is incorporates key writing styles, metadata, and structure requirements of typical IC products. |
|
Interception Capabilities 2000 |
by Duncan Campbell |
| This study considers the state of the art in Communications intelligence (Comint) of automated processing for intelligence purposes of intercepted broadband multi-language leased or common carrier systems, and its applicability to Comint targeting and selection, including speech recognition. |
|
Interviewing with the NSA |
by Ralph J. Perro |
| A first-person account of applying for employment at the National Security Agency, from the initial interview to the psychological exam to the background investigation and the polygraph test. |
|
Is the NSA Sniffing Your Email? |
| Puzzle Palace coauthor Wayne Madsen wrote that "according to well-placed sources
within the Federal Government and the Internet service provider industry, the National Security Agency (NSA) is actively sniffing several key Internet router and gateway hosts."
|
|
NSA Chief: News Leaks Harmful |
by Norman Black Washington |
| NSA Chief: News Leaks Harmful (1987) |
|
NSA Covert Mind Control Operations |
by John St Clair Akwei |
| NSA Signals Intelligence uses EMF Brain Stimulation for Remote
Neural Monitoring (RNM) and Electronic Brain Link (EBL). |
|
NSA Memo on UN Spying |
| The United States is conducting a secret 'dirty tricks' campaign against UN Security Council delegations in New York as part of its battle to win votes in favour of war against Iraq. This memo, writting by a member of the National Security Agency and originally published in The Observer of London, details targeting of UN sources in a quest to undermine the Security Council process. |
|
NSA's Subliminal Posthypnotic Scripts |
| Subliminal implanted posthypnotic suggestions and scripts using acoustically delivered and phonetically accelerated posthypnotic commands without somnambulistic preparation in the subject for intelligence and counterintelligence applications by the United States National Security Agency. |
|
New Employee's Security Handbook for the National Security Agency |
| This handbook is designed to introduce you to some of the basic
security principles and procedures with which all NSA employees must comply.
It highlights some of your security responsibilities, and provides guidelines
for answering questions you may be asked concerning your association with this
Agency. |
|
Revelations of a Former NSA Insider |
by Bruce Brill |
| Yet, over the course of my years at NSA -- or "The
Agency," as we spooks called it-- I was privy to some sensitive and
disturbing intelligence. But, first some background. |
|
Signal Intelligence - An Overview |
by NSA |
| The NSA's description of its SIGINT unit, along with a nice load of propaganda. |
|
Statement by Daniel Wolf, National Security Agency |
| When I began working at NSA some 33 years ago, the security business we were in was called Communications Security, or COMSEC. It dealt almost exclusively with providing protection for classified information against disclosure to unauthorized parties when that information was being transmitted or broadcasted from point to point. We accomplished this by building the most secure black boxes that could be made, employing high-grade encryption to protect the information. |
|
Statements by the DCI and the NSA Director on Economic Spying |
by George J. Tenet and Michael V. Hayden |
| I am here today to discuss allegations about SIGINT activities and the so-called Echelon program of the National Security Agency with a very specific objective: To assure this Committee, the Congress, and the American public that the Intelligence Community is unequivocally committed to conducting its activities in accordance with US law and due regard for the rights of Americans. |
|
The Lying Game: National Security and the Test for Espionage and Sabotage |
by George W. Maschke |
| The game is the "Test for Espionage and Sabotage" (TES), a variety of what is known in the polygraph trade as a "directed-lie control test" (DLCT).3 Before our government plays this high-stakes game with you, you would do well to know the unspoken rules. Your polygraph examiner will under no circumstances give you an honest explanation of the game he is playing with you. |
|
The National Guards |
by Donald Goldberg |
| Under a 1984 law the military has been given a say in what cameras can be licensed to be used on American satellites; and officials have already announced they plan to limit the quality and resolution of photos made
available. The National Security Agency (NSA) has defeated a move to keep it away from civilian and commercial computers and databases.
|
|
The National Security Agency |
by Duncan Campbell |
| In the booming surveillance industry, they spy on whom they wish, when they wish, protected by barriers of secrecy, fortified by billions of pounds worth of high, high-tech technology. Duncan Campbell reports from the United States on the secret Anglo-American plan for a global electronic spy system for the 21st century capable of listening in to most of us most of the time. |
|
The National Security Agency: The Secret Unveiled |
by meta4 |
| Have you ever wondered why the National Security Agency (NSA) is considered the most secretive of the United States intelligence agencies? When and was it created? How did it obtain its power? What were the various operations under its control in the past as well as those currently under its jurisdiction? Armed with mountains of information from a wide range of sources, I hope to inform you of the practices of the NSA, both past and present. |
|
What is a Security Clearance |
| Certain federal employees and certain employees in the private sector are required to have security clearances because their job requires them to have access to classified documents. The occupant of any such job is said to hold a "sensitive" position, defined as "any position, by virtue of its nature, could bring about a material adverse effect on national security". |