Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: National Security Agency (Bahrain) (view), National Security Agency (Egypt) (view), National Security Agency (Liberia) (view), National Security Agency (Montenegro) (view), National Security Agency (disambiguation) (view), National Security Agency academic publications (view), National Security Agency in popular culture (view), National Security Agency of El Salvador (view), Director of the National Security Agency (view), American Civil Liberties Union v. National Security Agency (view), Deputy Director of the National Security Agency (view), 2014 National Security Agency illegal seizure (view)

searching for National Security Agency 51 found (2751 total)

alternate case: national Security Agency

KY-57 (219 words) [view diff] no match in snippet view article find links to article

The Speech Security Equipment (VINSON), TSEC/KY-57, is a portable, tactical cryptographic device in the VINSON family, designed to provide voice encryption
KY-58 (121 words) [view diff] no match in snippet view article find links to article
The VINSON KY-58 is a secure voice module primarily used to encrypt radio communication to and from military aircraft and other tactical vehicles. It is
WARRIOR PRIDE (373 words) [view diff] no match in snippet view article find links to article
WARRIOR PRIDE is the GCHQ and NSA code name for a pair of spyware kits that can be installed on the iPhone and Android-based smartphones. Information about
KL-43 (213 words) [view diff] no match in snippet view article find links to article
The KL-43 is a portable, electronic cipher device used by the United States and the NATO from the early 1980s. The machine, manufactured by TRW, is an
KY-68 (208 words) [view diff] no match in snippet view article find links to article
TSEC/KY-68 DSVT, commonly known as Digital Subscriber Voice Terminal, is a US military ruggedized, full- or half-duplex tactical telephone system with
DRYAD (646 words) [view diff] no match in snippet view article find links to article
The DRYAD Numeral Cipher/Authentication System (KTC 1400 D) is a simple, paper cryptographic system employed by the U.S. military for authentication and
Villa Marista (141 words) [view diff] case mismatch in snippet view article find links to article
notorious for its detention of political prisoners by the Cuban national security agency. Its prisoners have included dissident Vladimiro Roca and politician
James Hall III (1,536 words) [view diff] no match in snippet view article find links to article
James W. Hall III (born 1958) is a former United States Army warrant officer and signals intelligence analyst in Germany who sold eavesdropping and code
General Dynamics Mission Systems (1,164 words) [view diff] no match in snippet view article find links to article
General Dynamics Mission Systems is a business unit of American defense and aerospace company General Dynamics. General Dynamics Mission Systems integrates
General Dynamics Mission Systems (1,164 words) [view diff] no match in snippet view article find links to article
General Dynamics Mission Systems is a business unit of American defense and aerospace company General Dynamics. General Dynamics Mission Systems integrates
Eric Lichtblau (1,480 words) [view diff] exact match in snippet view article find links to article
York Times for his reporting on warrantless wiretapping by the National Security Agency. He also was part of the New York Times team that won the Pulitzer
Operation Olympic Games (801 words) [view diff] no match in snippet view article find links to article
Operation Olympic Games was a covert and still unacknowledged campaign of sabotage by means of cyber disruption, directed at Iranian nuclear facilities
Zoutkamp (168 words) [view diff] exact match in snippet view article find links to article
which intercepted satellite communications much like the U.S. National Security Agency. ZK 14 – Sailing ship from Zoutkamp, bought by German bard and
Title 50 of the United States Code (450 words) [view diff] exact match in snippet view article find links to article
Authorities Chapter 46: Central Intelligence Agency Chapter 47: National Security Agency Chapter 48: Department of Defense Cooperative Threat Reduction
Zoutkamp (168 words) [view diff] exact match in snippet view article find links to article
which intercepted satellite communications much like the U.S. National Security Agency. ZK 14 – Sailing ship from Zoutkamp, bought by German bard and
NSA Suite A Cryptography (107 words) [view diff] no match in snippet view article find links to article
NSA Suite A Cryptography is NSA cryptography which "contains classified algorithms that will not be released." "Suite A will be used for the protection
Estonian Border Guard (1,040 words) [view diff] case mismatch in snippet view article find links to article
The Estonian Border Guard (Estonian: Eesti Piirivalve) was the national security agency responsible for the border security of Estonia. It was subordinate
Ty Bomba (122 words) [view diff] exact match in snippet view article find links to article
Arabic and Russian linguist for the US Air Force, US Army, and the National Security Agency. In 1988, he was elected to the Charles Roberts Awards Hall of
Finnish Border Guard (1,476 words) [view diff] case mismatch in snippet view article find links to article
(Finnish: Rajavartiolaitos; Swedish: Gränsbevakningsväsendet) is the national security agency responsible for enforcing the security of Finland's borders. It
Over-the-air rekeying (1,198 words) [view diff] exact match in snippet view article find links to article
1981-1999, by Thomas R. Johnson, Center For Cryptologic History, National Security Agency, pp 40-41. Sandy Clark; Travis Goodspeed; Perry Metzger; Zachary
Maureen Baginski (557 words) [view diff] exact match in snippet view article find links to article
Baginski is a former Signals Intelligence (SIGINT) director at the National Security Agency (NSA), and Executive Assistant Director of Intelligence at the
Big Sha (698 words) [view diff] case mismatch in snippet view article find links to article
media tycoon known for his links to organized crime as head of the national security agency sparked nationwide protests against the Oresharski cabinet. He
ANDVT (327 words) [view diff] no match in snippet view article find links to article
The Advanced Narrowband Digital Voice Terminal (ANDVT) is a secure voice terminal for low bandwidth secure voice communications throughout the U.S. Department
USS Georgetown (AG-165) (669 words) [view diff] exact match in snippet view article
a seaborne platform for global eavesdropping on behalf of the National Security Agency. Her designation as a "technical research" ship was her cover story
Director-General of Security (257 words) [view diff] case mismatch in snippet view article find links to article
Australian Security Intelligence Organisation (ASIO), Australia's national security agency. The Director-General, through ASIO, has overall responsibility
Mary D'Imperio (548 words) [view diff] exact match in snippet view article find links to article
Manuscript: An Elegant Enigma (PDF). Fort George G. Meade, MD: National Security Agency/Central Security Service. OCLC 50929259. Archived from the original
Operation Northwoods (2,621 words) [view diff] exact match in snippet view article find links to article
Chapter 4: "Fists" of Body of Secrets: Anatomy of the Ultra-Secret National Security Agency From the Cold War Through the Dawn of a New Century (New York:
Uzhhorod Orthodox Cathedral (160 words) [view diff] case mismatch in snippet view article find links to article
Russian Orthodox Church. In 2008 the building was raided by the national security agency on suspicion of separatist activities. Eparchy of Mukačevo and
Jeffrey Carney (1,372 words) [view diff] no match in snippet view article find links to article
Jeffrey Martin Carney is a former United States Air Force intelligence specialist convicted of spying for East German Ministry for State Security (MfS
James Lovell (politician) (1,019 words) [view diff] exact match in snippet view article
States Cryptogologic History 7 National Security Agency (2003). The Amecrican Revolution's One-Man National Security Agency N.S.A. McCullough, David (2002)
Spy ship (1,375 words) [view diff] exact match in snippet view article find links to article
Naval Institute Proceedings. pp. 68–69. Retrieved 24 May 2012. National Security Agency - Naval Security Agency Report (1986). "The Origination and Evolution
Military Security Command of the Korean People's Army (776 words) [view diff] exact match in snippet view article find links to article
the safety agency became independent of the National Security Agency (now the National Security Agency) and became a political security agency that independently
Barton Gellman (3,613 words) [view diff] exact match in snippet view article find links to article
in June 2013 he led The Washington Post's coverage of the U.S. National Security Agency, based on top secret documents provided to him by ex-NSA contractor
Mike Machat (729 words) [view diff] no match in snippet view article find links to article
Michael Machat is an American artist, author, and aviator. He specializes in aviation art and was a frequent collaborator of R.E.G. Davies on the book
José Alberto Medrano (90 words) [view diff] exact match in snippet view article find links to article
Agencia Nacional de Servicios Especiales (ANSESAL, the Salvadoran National Security Agency) and Organización Democrática Nacionalista (ORDEN, the Democratic
Border guard (3,815 words) [view diff] case mismatch in snippet view article find links to article
A border guard of a country is a national security agency that performs border security. Some of the national border guard agencies also perform coast
KY-7 (25 words) [view diff] no match in snippet view article find links to article
The KY-7 is a cryptographic device which is no longer in use. It was phased out of service prior to the 1990 Gulf War.
Van Eck phreaking (1,378 words) [view diff] exact match in snippet view article find links to article
the NSA published Tempest Fundamentals, NSA-82-89, NACSIM 5000, National Security Agency (Classified) on February 1, 1982. Also, the van Eck technique was
Laura Holmes (111 words) [view diff] no match in snippet view article find links to article
Laura Holmes (1932–2016) was a noted cryptanalyst and 2011 Inductee into the NSA Hall of Honor. During the 1980s, Laura Holmes served as a career cryptanalyst
Kelli Arena (288 words) [view diff] exact match in snippet view article find links to article
She is currently the chief of strategic communications for the National Security Agency. Arena was formerly the Executive Director of the Global Center
SINCGARS (1,892 words) [view diff] no match in snippet view article find links to article
Single Channel Ground and Airborne Radio System (SINCGARS) is a Combat Net Radio (CNR) currently used by U.S. and allied military forces. The CNR network
KG-13 (1,022 words) [view diff] exact match in snippet view article find links to article
Boak Lectures, Vol. I (pdf) (2015 declassification review ed.). Ft. George G. Meade, MD: U.S. National Security Agency. pp. 53–56. Retrieved 2017-04-23.
Law enforcement in Chad (76 words) [view diff] exact match in snippet view article find links to article
Documentation and Security) Agence nationale de sécurité (ANS) (National Security Agency) World Police Encyclopedia, ed. by Dilip K. Das & Michael Palmiotto
Summer Worden (665 words) [view diff] no match in snippet view article find links to article
Summer Worden (born 1975) is a former intelligence officer for the United States Air Force and Intelligence Community. She is the founder of a technology
John J. Herrick (326 words) [view diff] exact match in snippet view article find links to article
on three Viet Cong patrol boats. However, In 2005, an internal National Security Agency historical study was declassified; it concluded that Maddox had
S. Brent Morris (261 words) [view diff] exact match in snippet view article find links to article
served as Executive of the Cryptologic Mathematician Program at the National Security Agency and as U.S. representative to the International Organization for
Protection Profile (598 words) [view diff] exact match in snippet view article find links to article
National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) have agreed to cooperate on the development of validated
CONDOR secure cell phone (90 words) [view diff] no match in snippet view article find links to article
Qualcomm built several prototype secure CDMA phones for NSA under a contract project called "Condor". The NSA insisted on hardware encryption, which Qualcomm
Walden University (2,580 words) [view diff] exact match in snippet view article find links to article
Center of Academic Excellence in Cyber Defense Education by the National Security Agency and the Department of Homeland Security. Walden University's PhD
National Information Assurance Training and Education Center (188 words) [view diff] exact match in snippet view article find links to article
Infrastructure. NIATEC is associated with Idaho State University, a National Security Agency Center of Academic Excellence in Information Assurance Education
Sa'ad Khair (462 words) [view diff] exact match in snippet view article find links to article
Sa'ad Khair served as the head of the newly formed Jordanian National Security Agency (NSA). He gained the rank of Field Marshal after more than four