Academic literature on the topic 'National Security Agency (NSA)'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'National Security Agency (NSA).'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "National Security Agency (NSA)"

1

Jean, Guilhem. "NSA. National Security Agency / Claude Delesse, Paris, Tallandier, 2016, 512 p." Revue internationale et stratégique N° 102, no. 2 (2016): V. http://dx.doi.org/10.3917/ris.102.0163e.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Long, Austin. "The Quiet Americans? CIA, NSA, and Counterinsurgency." Journal of Cold War Studies 13, no. 3 (2011): 149–84. http://dx.doi.org/10.1162/jcws_r_00146.

Full text
Abstract:
The contribution of the U.S. intelligence community (IC) to counterinsurgency operations past and present has gone largely underappreciated, in part because of the pervasive secrecy surrounding most of the IC's activities. A review of two recently declassified histories of Central Intelligence Agency (CIA) and National Security Agency (NSA) involvement in Vietnam in the 1960s provides insight into the historical contributions of these agencies to counterinsurgency efforts. This analysis provides a context for understanding available evidence relating to the two agencies' contributions to curre
APA, Harvard, Vancouver, ISO, and other styles
3

문지현. "On the Documents of Record Group 457 U.S. National Archives:U.S. National Security Agency(NSA)/Central Security Serivce(CSS)." EWHA SAHAK YEONGU ll, no. 49 (2014): 297–330. http://dx.doi.org/10.37091/ewhist.2014..49.010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ROADY, PETER. "The Ford Administration, the National Security Agency, and the “Year of Intelligence”: Constructing a New Legal Framework for Intelligence." Journal of Policy History 32, no. 3 (2020): 325–59. http://dx.doi.org/10.1017/s089803062000010x.

Full text
Abstract:
Abstract:In the mid-1970s, Congress and the judiciary moved to regulate the National Security Agency (NSA) at a moment when such regulation might have restricted the growth of electronic surveillance. The Ford administration played a crucial role in preventing that from happening. It did so by controlling the flow of intelligence information to Congress and by establishing a flexible new legal framework for intelligence based on broad executive orders, narrow legislation, and legal opinions written by executive branch lawyers. This framework fostered a perception of legality that headed off ca
APA, Harvard, Vancouver, ISO, and other styles
5

Murakami Wood, David, and Steve Wright. "Before and After Snowden." Surveillance & Society 13, no. 2 (2015): 132–38. http://dx.doi.org/10.24908/ss.v13i2.5710.

Full text
Abstract:
This editorial for the Surveillance and Security Intelligence After Snowden issue provides a very brief history of National Security Agency whistleblowers and investigations before Edward Snowden, and sets the current wave of NSA whistleblowing in the context of a growing demand for openness, transparency and accountability opposing the renewed closures and secrecy of the War on Terror. It also provides some links for further research and reading.
APA, Harvard, Vancouver, ISO, and other styles
6

Munkholm, Johan Lau. "The Pursuit of Full Spectrum Dominance: The Archives of the NSA." Surveillance & Society 18, no. 2 (2020): 244–56. http://dx.doi.org/10.24908/ss.v18i2.13266.

Full text
Abstract:
This article explores the archives of the National Security Agency (NSA) and the inherent logic vested in the agency’s management of them. By drawing on Derrida’s conception of the archive and the compulsion to administer and complete it, this article suggests that the data collection practices, as well as the rhetoric, of the NSA indicate a specific logic of gathering and organizing data that presents a fantasy of perfect surveillance and pre-emptive intervention that stretches into the future to cancel emergent threats. To contextualize an understanding of the archival practices of the NSA w
APA, Harvard, Vancouver, ISO, and other styles
7

Sugiyama, Tara, and Marisa Perry. "The NSA Domestic Surveillance Program: An Analysis of Congressional Oversight During an Era of One-Party Rule." University of Michigan Journal of Law Reform, no. 40.1 (2006): 149. http://dx.doi.org/10.36646/mjlr.40.1.nsa.

Full text
Abstract:
On December 16, 2005, the New York Times sounded a fire alarm when it revealed that, in response to the September 11, 2001 attacks, President George W Bush had issued a secret executive order permitting the National Security Agency (NSA) to conduct warrantless surveillance on individuals to unearth nascent terrorist activity. Congress responded to the disclosure of the NSA domestic surveillance program largely by shirking its oversight duties. This Note argues that when a single party controls both the executive and the legislative branches, the fire-alarm model fails to provide sufficient con
APA, Harvard, Vancouver, ISO, and other styles
8

Khan, Zmarak. "The National Security Agency (NSA) eavesdropping on Americans A programme that is neither legal nor necessary." Utrecht Law Review 2, no. 2 (2006): 61. http://dx.doi.org/10.18352/ulr.26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Dawson, Maurice, Robert Bacius, Luis Borges Gouveia, and Andreas Vassilakos. "Understanding the Challenge of Cybersecurity in Critical Infrastructure Sectors." Land Forces Academy Review 26, no. 1 (2021): 69–75. http://dx.doi.org/10.2478/raft-2021-0011.

Full text
Abstract:
Abstract The cybersecurity of critical infrastructures is an essential topic within national and international security as 16 critical infrastructure sectors touch various aspects of American society. Because the failure to provide adequate cybersecurity controls within the critical infrastructure sectors renders the country open to an attack that could have a debilitating effect on security, national public health, safety, and economic security, this matter is so vital that there is the Presidential Policy Directive (PPD) 21 Critical Infrastructure Security and Resilience advances a national
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.

Full text
Abstract:
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national stand
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "National Security Agency (NSA)"

1

Shackelford, Philip Clayton. "Fighting for Air: Cold War Reorganization and the U.S. Air Force Security Service, 1945-1952." Kent State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=kent1461432022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shackelford, Philip Clayton. "On the Wings of the Wind: The United States Air Force Security Service and Its Impact on Signals Intelligence in the Cold War." Kent State University Honors College / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=ksuhonors1399284818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Olson, Allen S. "Classifying PSTN switching stations : a national security agency application /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA354471.

Full text
Abstract:
Thesis (M.S. in Operations Research) Naval Postgraduate School, September 1998.<br>"September 1998." Thesis advisor(s): R. Kevin Wood, Gerald G. Brown and Norman D. Curet. Includes bibliographical references (p. 89). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Hlavsa, Gary L. "Implementation of the National Security Personnel System at the U.S. Army Chemical Materials Agency." Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FHlavsa%5FJAP.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Science in Program Management from the Naval Postgraduate School, June 2008."<br>Advisor(s): Naegle, Brad R. ; Thomas, Gail Fann. "March 2008." "Joint applied project"--Cover. Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 107-108). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
5

Frazão, Pedro Henrique Oliveira. "Um big brother global? os programas de vigilância da NSA à luz da securitização dos espaços sociotecnológicos." Universidade Estadual da Paraíba, 2016. http://tede.bc.uepb.edu.br/tede/jspui/handle/tede/2679.

Full text
Abstract:
Submitted by Elesbão Santiago Neto (neto10uepb@cche.uepb.edu.br) on 2016-11-28T19:41:12Z No. of bitstreams: 1 PDF - Pedro Henrique Oliveira Frazão.pdf: 4658431 bytes, checksum: 260a8a4c2c26522f583a576972d4ce10 (MD5)<br>Made available in DSpace on 2016-11-28T19:41:12Z (GMT). No. of bitstreams: 1 PDF - Pedro Henrique Oliveira Frazão.pdf: 4658431 bytes, checksum: 260a8a4c2c26522f583a576972d4ce10 (MD5) Previous issue date: 2016-05-19<br>CAPES<br>The increasing use of cyberspace in International Relations is providing a new scenario for world politics. The evolution of digital media has provided
APA, Harvard, Vancouver, ISO, and other styles
6

Bernhardt, Wilhelm. "A qualitative conceptual framework for conducting risk- and threat assessment in the South African domestic intelligence environment." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-05052005-162339/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sanders, Michael. "The USA PATRIOT Act and Punctuated Equilibrium." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2759.

Full text
Abstract:
Currently, Title II of the Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT Act) Act of 2001 appears to be stalled as a result of controversy over the intent and meaning of the law. Proponents of the title advocate the necessity of the act to combat modern terrorism, whereas opponents warn of circumventions of the Fourth Amendment of the U.S. Constitution. Using punctuated equilibrium as the theoretical foundation, the purpose of this case study was to explore the dialogue and legal exchanges between the American Civil L
APA, Harvard, Vancouver, ISO, and other styles
8

Karlsson, Rikard. "Samverkan och sekretess : en rättsvetenskaplig studie av myndigheters informationsutbyte vid olyckor och extraordinära händelser." Doctoral thesis, Umeå universitet, Juridiska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-111204.

Full text
Abstract:
Cooperation between authorities is of great importance for effective crisis management. A new crisis management system was introduced in Sweden in 2002 to enhance the ability of public authorities to manage accidents and extraordinary events. It expects authorities to cooperate with each other both before and while dealing with such situations. An important aspect of this cooperation is the exchange of information, which is hampered when authorities are obliged to observe secrecy rules even if this limits their ability to manage accidents and extraordinary events. It may be said, therefore, th
APA, Harvard, Vancouver, ISO, and other styles
9

Le, Voguer Gildas. "Secret et démocratie dans l'Amérique de l'après-guerre : le contrôle parlementaire de l'activité des services de renseignement, 1947-1987." Orléans, 1992. http://www.theses.fr/1995ORLE1012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Smith, Christopher S. "Exploring the plausibility of a national multi-agency communications system for the Homeland Security Community a Southeast Ohio half-duplex voice over IP case study /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FSmith%5FC.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2009.<br>Thesis Advisor(s): Bergin, Richard. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Voice Over IP (VoIP), Interoperable, Communications, Megacommunity, Interagency, and Multidiscipline. Includes bibliographical references (p. 73-76). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "National Security Agency (NSA)"

1

United States. National Security Agency/Central Security Service. Center for Cryptologic History, ed. Electronic intelligence (ELINT) at NSA. Center for Cryptologic History, National Security Agency, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Streissguth, Thomas. America's security agencies: The Department of Homeland Security, FBI, NSA, and CIA. MyReportLinks.com Books, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Johnson, Thomas R. NSA and the Cuban Missile Crisis. Center for Cryptologic History, National Security Agency, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Glenn, Greenwald. No place to hide: Edward Snowden, the NSA and the surveillance state. Metropolitan Books, Henry Holt and Company, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Glenn, Greenwald. No place to hide: Edward Snowden, the NSA, and the U.S. surveillance state. Signal, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Office, General Accounting. Intelligence agencies: Personnel practices at CIA, NSA, and DIA compared with those of other agencies. The Office, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Glenn, Greenwald. De afluisterstaat: Edward Snowden, de NSA en de Amerikaanse spionage- en afluisterdiensten. Lebowski Publishers, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Crowbar, Comet. Cryptocunt and the Eco-Sexuals: The Very Queer Story of the NSA Headquarters in Berlin. Raumschiff Distribution & Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bamford, James. The shadow factory: The ultra-secret NSA from 9/11 to the eavesdropping on America. Doubleday, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

1970-, Stark Holger, ed. Der NSA-Komplex: Edward Snowden und der Weg in die totale Überwachung. Deutsche Verlags-Anstalt, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "National Security Agency (NSA)"

1

Tewksbury, Doug. "National Security Agency (NSA)." In Encyclopedia of Big Data. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-319-32010-6_143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Tewksbury, Doug. "National Security Agency (NSA)." In Encyclopedia of Big Data. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-32001-4_143-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ashur, Tomer, and Atul Luykx. "An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families." In Security of Ubiquitous Computing Systems. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-10591-4_4.

Full text
Abstract:
AbstractSimon and Speck are two block cipher families published in 2013 by the US National Security Agency (NSA). These block ciphers, targeting lightweight applications, were suggested in 2015 to be included in ISO/IEC 29192-2 Information technology—Security techniques—Lightweight cryptography—Part 2: Block ciphers. Following 3.5 years of deliberations within ISO/IEC JTC 1 they were rejected in April 2018. This chapter provides an account of the ISO/IEC standardization process for Simon and Speck.
APA, Harvard, Vancouver, ISO, and other styles
4

Cheney-Lippold, John. "Jus Algoritmi. Wie die National Security Agency die Staatsangehörigkeit neu erfand." In Staat, Internet und digitale Gouvernementalität. Springer Fachmedien Wiesbaden, 2017. http://dx.doi.org/10.1007/978-3-658-18271-7_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Polkowska, Małgorzata. "Space Security and Cybersecurity in Poland." In Cybersecurity in Poland. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78551-2_12.

Full text
Abstract:
AbstractThis article refers to the definitions of: “space security” and “cybersecurity”. Both terms are strictly connected to the national defense and can be part of international law and national law of security. It seems that those two aspects of security are well regulated in Europe and Poland. Making such a regulation on international level is still a challenge. Poland is more active in space and legislation since the Polish Space Agency was created. The Security in Space began the very important factor for the national defense. Polish entrepreneurs involved in space business should be awa
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Nan. "Major Implications for China’s National Security, Civil-Military Cooperation, and Inter-Agency Policy Coordination." In Civil-Military Relations in Post-Deng China. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6442-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Haysom, Gareth, and Jane Battersby. "Urban Food Security and Resilience." In Resilience and Food Security in a Food Systems Context. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-23535-1_11.

Full text
Abstract:
AbstractThe concept of resilience within urban food systems has gained significant academic and policy focus in recent years. This aligns with the increased global awareness of the problem of urban food insecurity, and increased focus on sub-national policies for sustainable development. COVID-19 demonstrated a series of vulnerabilities in the food system and the urban system. Academic work on urban food system resilience is wide ranging, however particular areas of focus dominate, focusing on urban agriculture, localized food systems, resilient city region food systems and the water-energy-fo
APA, Harvard, Vancouver, ISO, and other styles
8

Finlan, Alastair. "A Fertile Soil for AI? Defense AI in Sweden." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_5.

Full text
Abstract:
AbstractSweden is well positioned to develop AI for civil and military applications because of bold strategic initiatives by the government and private foundations. The fertility of the Swedish AI soil for defense applications is though dependent on what is nurtured now in the face of competing priorities including the revitalization of its armed forces, looming NATO membership and the resurrection of the total defense concept. Sweden’s long intellectual interest in AI makes this high-tech Nordic nation with a flair for engineering achievements very suited for Fourth Industrial Revolution deve
APA, Harvard, Vancouver, ISO, and other styles
9

Martin, Kévin, and Lucie Liversain. "A Winding Road Before Scaling-Up? Defense AI in France." In Contributions to Security and Defence Studies. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-58649-1_11.

Full text
Abstract:
AbstractFrance recognized the importance of AI in 2017 when it launched a national strategy to become a world leader in AI. The French Ministry of the Armed Forces published the strategy “AI in service of defense” in 2019, outlining ethical frameworks, infrastructure development, research priorities, and international collaboration. This strategy aimed to create trustworthy AI for defense applications while also embracing dual-use advances on AI in the commercial sector. If AI governance has taken shape, the French MoD’s action can appear very fragmented for the defense ecosystem considering t
APA, Harvard, Vancouver, ISO, and other styles
10

Mrabit, Khammar. "Building the Nuclear and Radiological Safety and Security Authority in the Kingdom of Morocco: Sharing Experience and Lessons Learned." In Nuclear Law. T.M.C. Asser Press, 2022. http://dx.doi.org/10.1007/978-94-6265-495-2_15.

Full text
Abstract:
AbstractFollowing the example of several countries, the Kingdom of Morocco adopted, in the middle of the twentieth century, nuclear techniques in the medical and industrial fields, which have experienced a greater and sustained growth following its membership of the IAEA in 1957. This chapter presents the evolution of the nuclear and radiological infrastructure in Morocco over the last 60 years and the prospects for its future development. The chapter outlines the continuous efforts made by public authorities to upgrade the national nuclear and radiological regulatory framework in compliance w
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "National Security Agency (NSA)"

1

Hartanto, Muji, Muchammad Yusuf, Irvan Sanjaya, and Sunardi. "UX Evaluation of National Social Security Agency for Employment Using User Experience Questionnaire and Heuristic Evaluation." In 2024 9th International Conference on Business and Industrial Research (ICBIR). IEEE, 2024. https://doi.org/10.1109/icbir61386.2024.10875720.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loomer, Scott A. "Academic research opportunities at the National Geospatial-Intelligence Agency(NGA)." In Defense and Security Symposium, edited by Sylvia S. Shen and Paul E. Lewis. SPIE, 2006. http://dx.doi.org/10.1117/12.673224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pereira, Fábio Dacêncio, and Edward David Moreno. "Otimização em VHDL e Desempenho em FPGAs do Algoritmo de Criptografia DES." In Workshop em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2003. http://dx.doi.org/10.5753/wscad.2003.19106.

Full text
Abstract:
A segurança nas transmissões de informações torna-se cada vez mais importante, exigindo que novas técnicas e algoritmos de criptografia de informações sejam desenvolvidos para promover um ambiente de transmissão seguro. Para muitas aplicações não só a segurança é prioridade no fundamento do algoritmo utilizado, mas também a velocidade do processo de cifragem e decifragem. Este artigo destaca o algoritmo de criptografia DES e sua descrição em VHDL. O Data EnCryption Standard (DES) - é um padrão criptográfico criado em 1977 através de uma licitação aberta pela antiga Agência Nacional de Seguranç
APA, Harvard, Vancouver, ISO, and other styles
4

Chrane, Colton, and Sathish Kumar. "An Examination of Tor Technology Based Anonymous Internet." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2190.

Full text
Abstract:
The concept of Anonymous Internet is getting traction in the wake of recent privacy related NSA (National Security Agency) privacy allegations. Based on our initial findings, Tor appears to be a solution for this and taking control of the Internet and the User’s privacy. Our study reveals that Tor’s power and future ability to thrive revolves around its expansion. Tor needs to grow in size specifically in nodes as well as in software (Torrenting). With the increase in servers and relays in the system as well as few tweaks including a constant shuffling of servers, the more protected a user wou
APA, Harvard, Vancouver, ISO, and other styles
5

Kawasaki, Charlie. "SECURE WIRELESS ARCHITECTURE FOR GROUND VEHICLES." In 2024 NDIA Michigan Chapter Ground Vehicle Systems Engineering and Technology Symposium. National Defense Industrial Association, 2024. http://dx.doi.org/10.4271/2024-01-3680.

Full text
Abstract:
&lt;title&gt;ABSTRACT&lt;/title&gt; &lt;p&gt;US Army and Marine Corps tactical networking and command post programs have a widely-acknowledged critical need to improve mobility, including the objective of moving to mobile, vehicle-mounted command posts that can move hourly. The current state of the art for tent-based command posts requires hours of setup, which includes thousands of feet of copper wiring that delay network availability. To enable mobility for warfighting, the National Security Agency (NSA) established a program (with a set of guidelines) called “Commercial Solutions for Classi
APA, Harvard, Vancouver, ISO, and other styles
6

Pope, Ronald B., and Richard R. Rawl. "Security in the Transport of Radioactive Materials." In ASME 2009 Pressure Vessels and Piping Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/pvp2009-77089.

Full text
Abstract:
The United States Department of Energy National Nuclear Security Administration’s (DOE/NNSA) Global Threat Reduction Initiative (GTRI), the International Atomic Energy Agency (IAEA) and active IAEA Donor States are working together to strengthen the security of nuclear and radioactive materials during transport to mitigate the risks of theft, diversion, or sabotage. International activities have included preparing and publishing the new IAEA guidance document Security in the Transport of Radioactive Material while ensuring that security recommendations do not conflict with requirements for saf
APA, Harvard, Vancouver, ISO, and other styles
7

Kimminau, Pamela S., and Russell J. Graves. "Promoting Ada at the National Security Agency." In the conference. ACM Press, 1991. http://dx.doi.org/10.1145/126551.126572.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tarmizi, Achmad, Ika Chandra Hapsari, Achmad Nizar Hidayanto, Adhi Yuniarto L.Y., and Herkules. "Information Security Awareness National Nuclear Energy Agency of Indonesia (BATAN)." In 2018 International Conference on Computing, Engineering, and Design (ICCED). IEEE, 2018. http://dx.doi.org/10.1109/icced.2018.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tatum, Paul, James Linford, Jeremy Grabowsky, Lonzell McKenzie, Paul Con Cline, and William Craft. "Multidisciplinary Topics in Senior Capstone Design Courses: Radio Astronomy." In ASME 2006 International Mechanical Engineering Congress and Exposition. ASMEDC, 2006. http://dx.doi.org/10.1115/imece2006-13358.

Full text
Abstract:
The exciting contributions to science and education made by radio astronomy over the last three decades would not have been possible without the development of radio telescopes of increasing sensitivity and power. The Pisgah Astronomical Research Institute (PARI) is located near Brevard, North Carolina. It was built in 1962 and was a facility for tracking the spacecraft of the NASA Mercury and Gemini missions. In the late 1970's it was used by the National Security Agency for monitoring Soviet satellite activity and was decommissioned in 1992. It was later purchased by PARI and is now used for
APA, Harvard, Vancouver, ISO, and other styles
10

Diana, Nirva, Andi Thahir, Tin Amalia Fitri, and Erike Anggraeni. "Social Security System Through National Zakat Agency in Southeast Asian Muslim Countries." In 1st Raden Intan International Conference on Muslim Societies and Social Sciences (RIICMuSSS 2019). Atlantis Press, 2020. http://dx.doi.org/10.2991/assehr.k.201113.033.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "National Security Agency (NSA)"

1

Conner, James. United States Department of Energy / National Nuclear Security Administration (DOE/NNSA) and Japan Atomic Energy Agency (JAEA) Outline for Feasibility Study on a Nuclear Material Accounting and Control System for Measurement of High-Activity Waste at Tokai Reprocessing Plant during Decommissioning. Office of Scientific and Technical Information (OSTI), 2023. http://dx.doi.org/10.2172/1962763.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hlavsa, Gary L. Implementation of the National Security Personnel System at the U.S. Army Chemical Materials Agency. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada483331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Harrison, W., and G. M. Miller. Argonne's performance assessment of major facility systems to support semiconductor manufacturing by the National Security Agency/R Group, Ft. Meade, Maryland. Office of Scientific and Technical Information (OSTI), 1990. http://dx.doi.org/10.2172/6330109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Schilling, Bradley. Joint Comments from the Department of Energy, National Nuclear Security Administration (DOE NNSA) Los Alamos Field Office and Triad National Security, LLC on the U.S. Environmental Protection Agency’s New Mexico State-Wide Municipal Separate Storm Sewer System Strawman General Permit. Office of Scientific and Technical Information (OSTI), 2024. http://dx.doi.org/10.2172/2342043.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fedchenko, Vitaly. Nuclear Security During Armed Conflict: Lessons From Ukraine. Stockholm International Peace Research Institute, 2023. http://dx.doi.org/10.55163/zzsp5617.

Full text
Abstract:
The attacks on nuclear installations in Ukraine by the Russian military in 2022 were unprecedented. Nuclear security aims at prevention, detection and response to malicious or unauthorized acts by non-state actors, not the armed forces of a state. However, an international armed conflict creates new circumstances in which a national nuclear security regime must operate. In March 2022 the director general of the International Atomic Energy Agency (IAEA) highlighted ‘seven indispensable pillars of nuclear safety and security’ in extraordinary circumstances. There are three further areas in which
APA, Harvard, Vancouver, ISO, and other styles
6

Mäkelä, Antti, Tapio Tourula, Heikki Tuomenvirta, et al. Climate change impacts to the security of supply. Finnish Meteorological Institute, 2023. http://dx.doi.org/10.35614/isbn.9789523361645.

Full text
Abstract:
Serious disruptions and exceptional circumstances for society, that the society tries to prepare for and act in them are at the center of security of supply. Current examples are the COVID pandemic and the ongoing energy crisis for which Finland's security of supply has also been strongly highlighted. Disturbances can also be caused by weather phenomena: in Finland, such examples are windstorms, severe thunderstorms, floods, and droughts, which can, at least in principle, paralyze the society. It is possible to prepare for the impacts of weather phenomena, but the ongoing rapid climate change
APA, Harvard, Vancouver, ISO, and other styles
7

Koslosky, Luke, Ali Crawford, and Sara Abdulla. Building the Cybersecurity Workforce Pipeline. Center for Security and Emerging Technology, 2023. http://dx.doi.org/10.51593/20220005.

Full text
Abstract:
Creating adequate talent pipelines for the cybersecurity workforce is an ongoing priority for the federal government. Understanding the effectiveness of current education initiatives will help policymakers make informed decisions. This report analyzes the National Centers of Academic Excellence in Cyber (NCAE-C), a consortium of institutions designated as centers of excellence by the National Security Agency. It aims to determine how NCAE-C designated institutions fare compared to other schools in graduating students with cyber-related degrees and credentials.
APA, Harvard, Vancouver, ISO, and other styles
8

Ehlschlaeger, Charles, Jeffrey Burkhalter, Imes Chiu, et al. Resilience modeling for civil military operations with the framework incorporating complex uncertainty systems. Engineer Research and Development Center (U.S.), 2023. http://dx.doi.org/10.21079/11681/47562.

Full text
Abstract:
Framework Incorporating Complex Uncertain Systems (FICUS) provides geographic risk analysis capabilities that will dramatically improve military intelligence in locations with the Engineer Research and Development’s (ERDC) demographic and infrastructure models built and calibrated. When completed, FICUS would improve intelligence products by incorporating existing tools from the National Geospatial Intelligence Agency, ERDC, and FICUS prototype models, even in places without demographic or infrastructure capabilities. FICUS would support higher-fidelity intelligence analysis of population, env
APA, Harvard, Vancouver, ISO, and other styles
9

Lieberman, Robert J. Statement of Robert J. Lieberman Deputy Inspector General Department of Defense to the Senate Subcommittee on Oversight of Government Management, Restructuring and The District of Columbia and the House Subcommittee on Civil Service and Agency Organization on National Security Implications of the Human Capital Crisis. Defense Technical Information Center, 2001. http://dx.doi.org/10.21236/ada385239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Öjendal, Joakim, Monin Nong, Chanmony Sean, Zoe Sidana Bunnath, and Chanrith Ngin. The Political Economy of Land-Water Resource Governance in the Context of Food Security in Cambodia. Cambodia Development Resource Institute, 2023. https://doi.org/10.64202/wp.142.202311.

Full text
Abstract:
Water is central for a variety of livelihoods, development, economic growth, and food production. It is also very important in the large deltas of South and Southeast Asia. Yet, water is turning into a scare resource and global climate change is making its availability more unpredictable. Commercial interests and infrastructure development are also competing for water resources, sometimes at the expense of local smallholders. This report, which is a desk study combined with stakeholder interviews, aims to map out the issues and the previously unknown challenges to efficient water and land mana
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!