Help


[permalink] [id link]
+
Page "The Puzzle Palace" ¶ 12
from Wikipedia
Edit
Promote Demote Fragment Fix

Some Related Sentences

NSA and with
In 1976, after consultation with the National Security Agency ( NSA ), the NBS eventually selected a slightly modified version, which was published as an official Federal Information Processing Standard ( FIPS ) for the United States in 1977.
Accordingly, on 15 May 1973, after consulting with the NSA, NBS solicited proposals for a cipher that would meet rigorous design criteria.
IBM kept some secrets, as Coppersmith explains: " After discussions with NSA, it was decided that disclosure of the design considerations would reveal the technique of differential cryptanalysis, a powerful technique that could be used against many ciphers.
For the GCHQ this means that it shares information with, and gets information from, the National Security Agency ( NSA ) in the US.
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.
The NSA established the EKMS program to supply electronic key to COMSEC devices in securely and timely manner, and to provide COMSEC managers with an automated system capable of ordering, generation, production, distribution, storage, security accounting, and access control.
The Assistant to the President for National Security Affairs, commonly referred to as the National Security Advisor ( abbreviated NSA, or sometimes APNSA or ANSA to avoid confusion with the abbreviation of the National Security Agency ), is a senior official in the Executive Office of the President who serves as the chief advisor, stationed in the White House, to the President of the United States on national security issues.
NSA has been trying to replace this method with a more secure electronic key management system ( EKMS ), but paper tape is apparently still being employed.
The OPEN LOOK version of the FrameMaker desktop publishing program, developed by Frame Technology Corp with funding mainly from Sun Microsystems and NSA, was one of the few commercial products that ran on NeWS.
* ZR: Intelligence intercept program of CIA Staff D ops, the group that worked directly with the NSA ( National Security Agency ).
President Carter chose Zbigniew Brzezinski for the position of National Security Adviser ( NSA ) because he wanted an assertive intellectual at his side to provide him with day-to-day advice and guidance on foreign policy decisions.
This account, however, has come into sharp dispute with an internal NSA historical study which stated on page 17:
In July 1995 the U. S. 5th Fleet was established in the Persian Gulf with its headquarters at NSA Bahrain in Manama.
* Interviewing with an Intelligence Agency First person account of NSA interview ( including polygraph )
Re-enfranchisement of intelligence officers since World War II to minimize national security concerns has been major source of Executive Branch support for moving intelligence agency headquarters such as the CIA, NSA, NRO, CSS, and NIMA headquarters to neighboring counties with voting rights.
Under an agreement with the US government, Lotus was allowed to start exporting 64 bit keys, so long as 24 bits of each key were recoverable using a special key issued by Lotus to the NSA.
( US export regulations were changed in 2001, so current versions of Lotus products are able to use longer keys and they no longer provide NSA with access to any key bits.
Some government agencies ( e. g., NSA ) require that all disk drives be physically pulverized when they are discarded, and in some cases, chemically treated with corrosives before or after.
Wayne Madsen, who was a communications security analyst with the NSA in the 1980s, believes the memo is authentic and believes the memo was aimed at other nations who are part of the ECHELON intelligence network, namely Australia, New Zealand, Canada and the UK.
IBM 701 competed with Remington Rand's ERA 1103 in the scientific computation market, which had been developed for the NSA, so held secret until permission to market it was obtained in 1953.
Wayne Madsen, who had been a communications security analyst with the NSA in the mid-1980s, has been quoted as saying that he believes the memo is authentic.
* Scott Shane and Tom Bowman with contribution from Laura Sullivan, " New book on NSA sheds light on secrets: U. S. terror plan was Cuba invasion pretext ," Baltimore Sun, 24 April 2001.
" BellSouth, which announced its merger with AT & T on March 5, denies releasing any records to the NSA and requested the newspaper retract claims in its story asserting BellSouth " provided phone records of its customers to NSA.
In April 2010, Thomas Andrews Drake, an official with the National Security Agency ( NSA ), was indicted under the Act for alleged willful retention of national defense information.

NSA and Bamford
* Bamford, James ; The Shadow Factory: The Ultra-Secret NSA from 9 / 11 to the Eavesdropping on America, Doubleday, ISBN 0-385-52132-4 ; 2008
According to James Bamford, the NSA had picked up communications of al-Mihdhar and al-Hazmi back in 1999, but had been hampered by internal bureaucratic conflicts between itself and the CIA, and did not do a full analysis of the information it passed on to the agency.
* Bruce Schneier, "' Body of Secrets ' by James Bamford: The author of a pioneering work on the NSA delivers a new book of revelations about the mysterious agency's coverups, eavesdropping and secret missions ," Salon. com, 25 April 2001.
The book was to include information on the NSA, and according to author James Bamford writing in 1982, the agency attempted to stop its publication, and considered various options, including writing a negative review of Kahn's work to be published in the press to discredit him.
The book was to include information on the National Security Agency ( NSA ), and according to the author James Bamford writing in 1982, the agency attempted to stop its publication, and considered various options, including publishing a negative review of Kahn's work in the press to discredit him.
According to James Bamford, NSA / CSS was initially conceived as a separate " fourth service " beside the three U. S. armed services.
The history begins by describing how Bamford approached Houghton-Mifflin with a proposal to write a book on the NSA.
" Bamford eventually discovered " the Mother Lode ," a collection of documents deposited at the Virginia Military Institute's George Marshall Library by former NSA chief cryptologist William Friedman.
" The FOIA requests gave Bamford access to an only lightly redacted set of documents, and a former NSA employee later gave Bamford access to an almost complete collection.
Bamford submitted a FOIA request for resulting documents, and received most of their report on the NSA.
Bamford also interviewed retired NSA senior officials, including former director Marshall Carter, with whom he talked for a day and a half.
None of the discussed subject matter was classified, but, according to the NSA, " it helped Bamford to complete his mosaic.
" The NSA account also describes how Bamford drove through the NSA parking lot, recording diplomatic license plates and cross-checking them against known lists to determine which countries maintained representatives at Fort Meade.
" In the years between the book's publication and 9 / 11, the relationship between Bamford and the NSA grew less adversarial.
Bamford was critical of NSA actions in the years following 9 / 11, and the relationship between the two once again cooled.

NSA and on
The operation of a cipher usually depends on a piece of auxiliary information, called a key ( or, in traditional NSA parlance, a cryptovariable ).
In contrast, a declassified NSA book on cryptologic history states:
In 1968, just before he published the first volume, Knuth accepted a job working on problems for the National Security Agency ( NSA ) through their FFRDC the Institute for Defense Analyses ( IDA ) Communications Research Division situated at the time on the Princeton campus in the Von Neumann building as stated in his cumulae vitae.
According to author Steven Levy, IBM had discovered differential cryptanalysis on its own, and the NSA was apparently well aware of the technique.
According to its website, the US National Security Agency ( NSA ) is " a high technology organization ... on the frontiers of communications and data processing ".
Former NSA employee Margaret Newsham claims that she worked on the configuration and installation of software that makes up the ECHELON system while employed at Lockheed Martin, for whom she worked from 1974 to 1984 in Sunnyvale, California, US, and in Menwith Hill, England, UK.
According to the article cited, the still classified NSA report is incorrect based on the CIA documents that were declassified which show that Powers ' account of being shot down at altitude was accurate.
Based on information uncovered by the FBI in the 1998 United States embassy bombings case, the National Security Agency ( NSA ) began tracking the communications of Hada, Mihdhar's father-in-law.
Based on information uncovered by the FBI in the 1998 United States embassy bombings case, the National Security Agency ( NSA ) began tracking the communications of Mihdhar's father-in-law Ahmad Muhammad Ali al-Hada, who was facilitating al-Qaeda communications, in 1999.
He had not been placed on terrorist watch lists, nor did the CIA or NSA alert the FBI, Customs and Immigration, or local police and enforcement agencies.
relies on the similar and related high level of difficulty of the discrete logarithm problem, as does the closely related DSA, which was developed at the US National Security Agency ( NSA ) and published by NIST as a proposed standard.
" Systematic targeting of the leadership of the Bahá ' í community by killing or disappearing was focused on the Bahá ' í National Spiritual Assembly ( NSA ) and Local Spiritual Assemblies ( LSAs ).
For instance, programs such as Carnivore and NarusInsight have been used by the FBI and NSA to eavesdrop on the systems of internet service providers.
The United States National Security Agency ( NSA ), the original primary developer of SELinux, released the first version to the open source development community under the GNU GPL on December 22, 2000.
Carter believed that by making the NSA chairman of only one of the two committees, he would prevent the NSC from being the overwhelming influence on foreign policy decisions it had been under Kissinger's chairmanship during the Nixon administration.
In October, 2005 the New York Times reported that Robert J. Hanyok, a historian for the U. S. National Security Agency, had concluded that the NSA deliberately distorted the intelligence reports that it had passed on to policy-makers regarding the August 4, 1964 incident.
Reviewing the NSA's archives, Mr. Hanyok concluded that the NSA had initially misinterpreted North Vietnamese intercepts, believing there was an attack on August 4.

0.210 seconds.