Advanced search Help
Searching for terms: EXACT: "United States. National Security Agency" in: publisher
Clear all search criteria
Only 2/3! You are seeing results from the Public Collection, not the complete Full Collection. Sign in to search everything (see eligibility).
-
60 Minute Network Security Guide: First Steps Toward a Secure Network Environment (Version 1.0)
"During the last four years the National Security Agency's Systems and Network Attack Center has released Security Guides for operating systems, applications and systems that operate in the larger IT network. These security guides can be found at our web site www.nsa.gov. Many organizations across the Department of Defense have used these documents to develop new networks and to secure existing IT infrastructures. This latest Security Guide addresses security a bit differently. Our goal is to make system owners and operators aware of fixes that become force multipliers in the effort to secure their IT network. Security of the IT infrastructure is a complicated subject, usually addressed by experienced security professionals. However, as more and more commands become 'wired', an increasing number of people need to understand the fundamentals of security in a networked world."
United States. National Security Agency
Systems and Network Attack Center
2001-10-16
-
Next Wave: Open Source (Vol. 18 No. 2, 2009)
This is the 2009 issue of "The Next Wave," titled "Open Source," featuring the following articles: "Taking the Open Source Road"; "Raising the Bar in Operating System Security: SELinux [Security-Enhanced Linux] and OpenSolaris FMAC [Flexible Mandatory Access Control]"; Providing a Secure Foundation for Applications with the Certifiable Linux Intergration Platform"; "Cryptographic Binding of Metadata"; and "Open Source--Setting Software Free."
United States. National Security Agency
2009
-
Next Wave: NSA's Technology Transfer Program (Vol. 19 No. 3, 2012)
This is the 2012 issue of "The Next Wave," titled "NSA's [National Security Agency] Technology Transfer Program," featuring the following articles: "NSA technology transfer: Access to innovation"; "Federal technology transfer legislation highlights"; "Intellectual property: What it is and how it benefits NSA"; "From Fort Meade to the marketplace: Successes in technology transfer"; "Technology transfer with the University of Maryland -regional partner, national implications"; and "Bringing technology inside NSA."
United States. National Security Agency
2012
-
Next Wave: Cloud Computing (Vol. 17 No. 4, 2009)
This is the 2009 issue of "The Next Wave," titled "Cloud Computing," featuring the following articles: "An Overview of Cloud Computing" and "The Future is 'Virtually' Here."
United States. National Security Agency
2009
-
Next Wave: National Program for Cybersecurity Science (Vol. 19 No. 4, 2012)
This is the 2012 issue of "The Next Wave," titled "National Program for Cybersecurity Science," featuring the following articles: "Introducing the federal cybersecurity R&D [research and development] strategic plan"; "NSA [National Security Agency] initiatives in cybersecurity science"; "Barriers to achieving a science of cybersecurity"; "Funding research for a science of cybersecurity: The Air Force makes it a mission"; "Advancing the science of cybersecurity with a virtual organization"; "UK's new Research Institute investigates the science of cybersecurity"; "Securing America's digital infrastructure through education"; and "Toward a secure and trustworthy cyberspace."
United States. National Security Agency
2012
-
Next Wave: Cybersecurity (Vol. 19 No. 2, 2012)
This is the 2012 issue of "The Next Wave," titled "Cybersecurity," featuring the following articles: "Cybersecurity: From engineering to science" by Carl Landwehr; "The evolution of information security" by Adam Shostack; "Making experiments dependable" by Roy Maxion; "On bugs and elephants: Mining for a science of security" by Dusko Pavlovic; "Programming language methods for compositional security" by Anupam Datta and John Mitchell; "Proof-carrying data: Secure computation on untrusted platforms" by Alessandro Chiesa and Eran Tromer; and "Blueprint for a science of cybersecurity" by Fred Schneider.
United States. National Security Agency
2012
-
Next Wave: High Confidence Software and Systems (HCSS) (Vol. 19 No. 1, 2011)
This is the 2011 issue of "The Next Wave," titled "High Confidence Software and Systems (HCSS)," featuring the following articles: "A Letter from Sir Tony Hoare"; "Empowering the Experts: High-Assurance, High-Performance, High-Level Design with Cryptol"; "A High-Assurance Methodology for the Development of Security Software"; "Correct by Construction: Advanced Software Engineering"; "Verified Software in the World"; "Software for Dependable Systems: Sufficient Evidence?"; "Critical Code: Software Producibility for Defense"; and "50 Cyber-Physical Systems."
United States. National Security Agency
2011
-
Next Wave: Center for Advanced Study of Language (CASL) (Vol. 18 No. 1, 2009)
This is the 2009 issue of "The Next Wave," titled "Center for Advanced Study of Language (CASL)," featuring the following articles: "The Mind of the Language Analyst: A Peek Inside the Black Box"; "A Working Memory Workout for Language Practitioners"; "'Thinking Out of the Box' Through Cognitive Neuroscience"; "For a Better Dictionary, Build a Better Parser"; "A Talent for Language"; and "What's the Bottom Line?"
United States. National Security Agency
2009
-
Next Wave: Network Tomography (Vol. 18 No. 3, 2010)
This is the 2010 issue of "The Next Wave," titled "Network Tomography," featuring the following articles: "Mapping Out Faster, Safer Networks"; "How Akamai Maps the Net: 'An Industry Perspective'"; "Compressed Sensing and Network Monitoring"; "Revealing Social Networks of Spammers"; "Challenges in Internet Geolocation, or 'Where's Waldo Online?'"; and "Clumps, Hoops, and Bubbles--Moving Beyond Clustering in the Analysis of Data."
United States. National Security Agency
2010
-
Next Wave: Technology Forecasting (Vol. 18 No. 4, 2011)
This is the 2011 issue of "The Next Wave," titled "Technology Forecasting," featuring the following articles: "The Art of Forecasting and Futures Planning"; "Will Carbon Be the New Silicon?"; "The Security Impact of System Virtualization"; and "Thin Film/Miniature Power Sources."
United States. National Security Agency
2011
-
Next Wave: Security & Change (Vol. 17 No. 1, 2008)
This is the 2008 issue of "The Next Wave," titled "Security & Change," featuring the following articles: "Veiled Biometrics"; "Telephone Security"; "February 17, 2009: A Second Date That Will Live in Infamy?"; "For the Record: How Format Wars Have Shaped Recording History"; and "Cognitive Radio: Tuning In The Future."
United States. National Security Agency
2008
-
Next Wave: Revolutionary Technologies (Vol. 17 No. 3, 2008)
This is the 2008 issue of "The Next Wave," titled "Revolutionary Technologies," featuring the following articles: "The Myth of Revolutionary Technologies"; "NetTop Eight Years Later"; "Text Extraction from Color Images"; and "Web 3.0 -- 'Are We There Yet?'"
United States. National Security Agency
2008
-
Next Wave: Information Visualization (Vol. 17 No. 2, 2008)
This is the 2008 issue of "The Next Wave," titled "Information Visualization," featuring the following articles: "An Information Visualization Primer and Field Trip"; "Visual Analytics: Adventures in Exploring Information"; "Do You Know What's Happening - Just Beyond Your View?"; "Knowledge Visualization with
Concept Mapping Tool"; and "Visualizing Data in the Metaverse."
United States. National Security Agency
2008
-
Next Wave: 20th Anniversary Issue of The Next Wave (TNW) (Vol. 20 No. 1, 2013)
This is the 2013 issue of "The Next Wave," titled "20th Anniversary Issue of The Next Wave (TNW)," featuring the following articles: "Twenty years of technology: What's changed, what hasn't?"; "The next user interface"; "Forecasting single-photon detector technology"; and "Radio noise: Global economic and political impact."
United States. National Security Agency
2013
-
Issues in British and American Signals Intelligence, 1919-1932
From the Summary: "The best-known element of signals intelligence during the First World War is work against the operational traffic of armies and navies, centering on cryptanalysis and traffic analysis; however, overwhelmingly its largest form, and the area where it was most frequently used, lay in blockade and economic warfare. This paper will center on Britain's role in this area, but British efforts were simply the main element of an allied system. From the start of the war, France pursued independent, essential, and parallel actions; Italy and Japan were less cooperative and important. When the United States entered the war, it worked with the existing system, and left management of the blockade and censorship of maritime cables to Britain and France."
United States. National Security Agency
Ferris, John Robert, 1956-
2015
-
Next Wave: Internet of Things: It's a Wonderfully Integrated Life (Vol. 21 No. 2, 2016)
This is the 2016 issue of "The Next Wave," titled "Internet of Things: It's a Wonderfully Integrated Life," featuring the following articles: "The Internet of Things: It's a wonderfully integrated life"; "Privacy in the Internet of Things" by Roy Dong and Lillian J. Ratliff; "Security and the Internet of Things: When your refrigerator steals your identity"; "Simon and Speck: Agile block ciphers for the Internet of Things" by Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers; "Smart Cities"; and "NSA's [National Security Agency] NiFi [Niagrafiles] available via open source, improves flow of Big Data."
United States. National Security Agency
2016
-
American Cryptology during the Cold War, 1945-1989: Book II: Centralization Wins, 1960-1972 [Part 1, excised]
This is the first section of book two in Thomas Johnson's history of the National Security Agency (NSA) during the Cold War. It contains pages 289-494, which encompasses three chapters, entitled: The Kennedy Years; Post-Cuban Missile Crisis Reforms; and SIGINT [Signals Intelligence] in Crisis, 1967-1969. Subtopics include McNamara as Secretary of Defense, the Cryptologic Map in the mid-1960's, the SIGINT Effort in the Cuban Missile Crisis, the installation of Marshall Carter as the new director, NSA's Community Relationships, the Advent of the Command Center, Mechanization of the SIGINT Process, and SIGINT's role in the Second Arab-Israeli War, the Pueblo, the Prague Spring, the Shoot-down of the EC-121, Security and the Work Force in the 1960's, and the Status of American Cryptology at the end of the sixties.
United States. National Security Agency
Johnson, Thomas R.
1995
-
American Cryptology during the Cold War, 1945-1989: Book II: Centralization Wins, 1960-1972 [Part 2, excised]
This is the second section of book two in Thomas Johnson's history of the National Security Agency (NSA) during the Cold War. It contains pages 495-652, which encompasses three chapters on Vietnam, entitled: NSA in Vietnam: Building the Effort - The Early Years; From Tonkin to Tet - The Heart of the War; and the Withdrawal. This section also contains a glossary of abbreviations used throughout the book, a list of sources, and an index.
United States. National Security Agency
Johnson, Thomas R.
1995
-
American Cryptology during the Cold War, 1945-1989: Book III: American Cryptology during the Cold War, 1972-1980 [Part 1, excised]
This is the first section of book three in Thomas Johnson's history of the National Security Agency (NSA) during the Cold War. It contains pages pp. i-ix, and 1-116, which encompasses the foreward, preface, and three chapters, entitled: Cryptologic Retreat from Southeast Asia; Downsizing; and Cryptology and the Watergate Era. Subtopics include the fall of Saigon; the Mayaguez; reorganization efforts, including the Fitzhugh Panel, Schlesinger Study, Murphy Commission, Hermann Study, and the Ursano Study; NSA and clandestine activities; and the impact of Watergate.
United States. National Security Agency
Johnson, Thomas R.
1998
-
American Cryptology during the Cold War, 1945-1989: Book III: American Cryptology during the Cold War, 1972-1980 [Part 2, excised]
This is the second section of book three in Thomas Johnson's history of the National Security Agency (NSA) during the Cold War. It contains pages 117-262, which encompasses four chapters, entitled: New Targets and Techniques, the Middle East and the Yom Kippur War, the Rebirth of Intelligence during the Carter Administration, and the Foreign Policy Crises of the Carter years. Subtopics covered include the Strategic Arms Limitation Talks (SALT), NSA Computers, NSA's foreign collaboration, the Carter white House, Panama, SALT II, the Situation in the Third World, the Iranian Revolution, the Soviet Invasion of Afghanistan, the Sino-Vietnamese Dispute, and the Soviet Brigade in Cuba.
United States. National Security Agency
Johnson, Thomas R.
1998
-
American Cryptology during the Cold War, 1945-1989: Book I: The Struggle for Centralization 1945-1960 [Part 1, excised]
This section of Thomas Johnson's history of the National Security Agency (NSA) during the Cold War contains pages i-xvii and 1-155 of Book 1. This encompasses the first three chapters, titled 'Cryptologic Triumph and Reorganization, 1941-1949,' 'AFSA (Armed Forces Security Agency),' and 'Cryptology under New Management.' Throughout Book 1, Johnson "explains how cryptology responded to the landmark events and challenges of the post-World War II era. He next provides profound analysis of how events and personalities affected the development of cryptology institutionally and professionally. Finally, and even better, Dr. Johnson spins a fascinating tale of the success or failure of cryptologic operations in the various crises that have challenged the SIGINT system."
United States. National Security Agency
Johnson, Thomas R.
1995
-
American Cryptology during the Cold War, 1945-1989: Book I: The Struggle for Centralization 1945-1960 [Part 2, excised]
This section of Thomas Johnson's history of the National Security Agency (NSA) during the Cold War contains pages 157-287 of Book 1. This encompasses the first one chapter, titled 'The Soviet Problem.' Throughout Book 1, Johnson "explains how cryptology responded to the landmark events and challenges of the post-World War II era. He next provides profound analysis of how events and personalities affected the development of cryptology institutionally and professionally. Finally, and even better, Dr. Johnson spins a fascinating tale of the success or failure of cryptologic operations in the various crises that have challenged the SIGINT system."
United States. National Security Agency
Johnson, Thomas R.
1995
-
NSA/CSS Strategic Plan 2001-2006
Intelligence and information systems security complement each other. Intelligence gives the Nation an information advantage over its adversaries. Information systems security prevents others from gaining advantage over the Nation. Together the two functions promote a single goal: information superiority for America and its allies. NSA/CSS used technology to help win the Cold War, building a stable, well-funded, focused organization that provided a unique product to decision makers. As the preeminent information organization in the Industrial Age, they provided and protected the Nation's secrets. But the proliferation of information technologies and the emergence of the global network have begun to transform the world, altering fundamental ways of thinking and communicating. Old patterns are giving way to agile and collaborative processes and technologies. Old methods of behavior and communication still exist, but the future is clear. If NSA/CSS is to continue to serve the Nation by providing and protecting vital information, they must embrace change and resume our place on the forward edge of technology. NSA/CSS must master and operate in the global net of tomorrow. This plan outlines the goals of the NSA/CSS up to the year 2006.
United States. National Security Agency
-
National Security Agency (NSA) [website]
The National Security Agency is the Nation's cryptologic organization. It coordinates, directs, and performs highly specialized activities to protect U.S. information systems and produce foreign intelligence information. A high technology organization, NSA is on the frontiers of communications and data processing. It is also one of the most important centers of foreign language analysis and research within the Government. The NSA collects and processes foreign signals intelligence information for our Nation's leaders and warfighters, and protects critical US information security systems from compromise.
United States. National Security Agency
-
Next Wave: Technology Forecasting (Vol. 20 No. 3, 2014)
This is the 2014 issue of "The Next Wave," titled "Technology Forecasting," featuring the following articles: "Forecasting superconductive electronics technology"; "Plasmonics: A promising path for future interconnects"; Innovation in materials science: Electromagnetic metamaterials" by Jane E. Heyes, Nathaniel K. Grady, Diego A. R. Dalvit, and Antionette J. Taylor; "Securing the cloud with homomorphic encryption"; "Today's Tiny Transistors"; and "Searching the future enterprise."
United States. National Security Agency
2014
-
Next Wave: High Performance Computing (HPC) (Vol. 20 No. 2, 2013)
This is the 2013 issue of "The Next Wave," titled "High Performance Computing (HPC)," featuring the following articles: "Defining the future with modeling, simulation, and emulation" by Benjamin Payne and Noel Wheeler; "Predicting the performance of extreme-scale supercomputer networks" by Scott Pakin, Xin Yuan, and Michael Lang; "Doing more with less: Cooling computers with oil pays off" by David Prucnal; "Energy-efficient superconducting computing coming up to speed" by Marc A. Manheimer; and "Beyond digital: A brief introduction to quantum computing" by Paul Lopata.
United States. National Security Agency
2013
-
Next Wave: Big Data (Vol. 20 No. 4, 2014)
This is the 2014 issue of "The Next Wave," titled "Big Data," featuring the following articles: "An Overview of Big Data" and "Big Graphs" by Paul Burkhardt; "Visual analytics for Big Data" by Randall Rohrer, Celeste Lyn Paul, and Bohdan Nebesh; "The Graph500 top 11 supercomputers"; "NSA [National Security Agency] nurtures growth of a science of security community"; and "Finding and correcting errors in Big Data."
United States. National Security Agency
2014
-
Electronic Intelligence (ELINT) at NSA
"What is Electronic Intelligence (ELINT)? ELINT is information derived primarily from electronic signals that do not contain speech or text (which are considered COMINT)[Communications Intelligence]. It is divided into major branches. One branch is Technical ELINT (TechELINT), which describes the signal structure, emission characteristics, modes of operation, emitter functions, and weapons systems associations of such emitters as radars, beacons, jammers, and navigational signals. A main purpose of TechELINT is to obtain signal parameters which can define the capabilities and the role that the emitter plays in the larger system, such as a ground radar locating aircraft, and thus lead to the design of radar detection, countermeasure, or counterweapons equipment. The overall process, including operation of the countermeasures, is part of electronic warfare. Another major branch is Operational ELINT (OpELINT), which concentrates on locating specific ELINT targets and determining the operational patterns of the systems. These results are commonly called Electronic Order of Battle (EOB). OpELINT also provides threat assessments, often referred to as 'tactical ELINT.' OpELINT intelligence products support military operational planners and tactical military commanders on the battlefield. A former third major branch of ELINT is the collection, processing, and reporting of foreign telemetry signals intelligence (TELINT). TELINT is technical and intelligence information derived from the intercept, processing, and analysis of foreign telemetry. At one time Telemetry Intelligence was considered a branch of ELINT since TELINT (later to be called FISINT - Foreign Instrumentation Signals Intelligence) activities are closely related to TechELINT procedures and were conducted by all of the Department of Defense (DoD) military departments. TELINT is a critical source of performance information on foreign missiles and space vehicles while they are being developed and tested. TELINT can also provide much operational information on foreign satellites and space vehicles."
United States. National Security Agency
Bernard, Richard L.
2009
-
Best Practices for Keeping Your Home Network Secure
"The cyber threat is no longer limited to your office network and work persona. Adversaries realize that targets are typically more vulnerable when operating from their home network since there is less rigor associated with the protection, monitoring, and maintenance of most home networks. Home users need to maintain a basic level of network defense and hygiene for both themselves and their family members when accessing the Internet."
United States. National Security Agency
2011-04
-
Instruction for National Security Systems Public Key Infrastructure X.509 Certificate Policy Under CNSS Policy No.25 [Version 1.1]
"The Committee on National Security Systems Instruction (CNSSI) No. 1300, 'Instruction for National Security Systems (NSS) Public Key Infrastructure (PKI) X.509 Certificate Policy, Under CNSS Policy No. 25,' provides a secure, interoperable electronic environment that closes the gap between the classified Federal PKI, managed by the Federal PKI Policy Authority, and the highly classified Intelligence Community PKI, managed by the Office of the Director for National Intelligence (ODNI)."
United States. National Security Agency
2011-06