skip to content

United States National Security Agency/Central Security Service

Overview
Works: 77 works in 111 publications in 2 languages and 5,369 library holdings
Genres: History  Sources  Conference proceedings  Criticism, interpretation, etc 
Classifications: JK468.I6, 353.172380973
Publication Timeline
Key
Publications about United States
Publications by United States
Most widely held works about United States
 
moreShow More Titles
fewerShow Fewer Titles
Most widely held works by United States
A delicate balance portfolio analysis and management for intelligence information dissemination programs by Eric Landree( file )
1 edition published in 2009 in English and held by 1,067 libraries worldwide
This publication describes the application of the RAND Corporation's Portfolio Analysis and Management Method (PortMan) to the evaluation of the National Security Agency's (NSA) information dissemination program portfolio, which is managed by the NSA Information Sharing Services (ISS) division. RAND's PortMan method enables the data-driven analysis of project portfolios and provides a means to monitor the progress of potentially high-value projects. It also allows portfolio managers to monitor the impact of any mitigation strategies they undertake, ensuring that the portfolio's highest potential value is achieved. For this project, RAND researchers first employed the Delphi method, a process for eliciting group opinion by a series of questionnaires with selective feedback from earlier responses, to collect expert opinion from the ISS Senior Leadership Group. This allowed for an estimation of value and risk for each project. RAND then used these estimates, together with cost information provided by ISS, to develop project rankings and to estimate the expected value-to-cost ratio for each project. RAND selected portfolios of projects that maximized the total expected value for the available program budget using a linear programming method and compared these results to ISS management's funding priorities
Information operations warfare and the hard reality of soft power by Leigh Armistead( file )
3 editions published in 2004 in English and held by 845 libraries worldwide
Fourteen American and Australian educators and practitioners--most associated with the Joint Forces Staff College, others with various branches of the U.S. or Australian national security communities--contribute six chapters on information operations (IO)--the use of modern technology to deliver critical information and influential content in an effort to shape perceptions, manage opinions, and control behavior in national security affairs. Originally conceived as a textbook for Joint Forces Staff College students, the text traces the history of IO from a doctrinal standpoint and with regard to organizational changes and educational efforts, and covers the capabilities and related activities of information warfare
The Voynich manuscript an elegant enigma by M. E D'Imperio( Book )
2 editions published in 1978 in English and held by 258 libraries worldwide
In spite of all the papers that others have written about the manuscript, there is no complete survey of all the approaches, ideas, background information and analytic studies that have accumulated over the nearly fifty-five years since the manuscript was discovered by Wilfrid M. Voynich in 1912. This report pulls together all the information the author could obtain from all the sources she has examined, and to present it in an orderly fashion. The resulting survey will provide a firm basis upon which other students may build their work, whether they seek to decipher the text or simply to learn more about the problem
American signal intelligence in Northwest Africa and Western Europe by George F Howe( file )
4 editions published between 1980 and 2010 in English and held by 235 libraries worldwide
Unclassified report on the President's Surveillance Program ( Computer File )
2 editions published in 2009 in English and held by 215 libraries worldwide
Securing record communications the TSEC/KW-26 by Melville Klein( file )
1 edition published in 2003 in English and held by 209 libraries worldwide
Space surveillance SIGINT Program (C) [strikethrough] by H. D Wagoner( file )
1 edition published in 1980 in English and held by 157 libraries worldwide
Attack on the U.S.S. Liberty by William D Gerhard( Book )
2 editions published between 1981 and 1985 in English and held by 19 libraries worldwide
Venona release ( serial )
in English and held by 11 libraries worldwide
Consists of declassified transcripts of U.S. Army's Signal Intelligence Service cryptanalysis project code-named VENONA, partially deciphered intercepts of Soviet KGB and GRU transmissions to Moscow from the U.S. and elsewhere during the period 1941-1946, notably on atomic espionage
UFO Documents Index ( file )
in English and held by 7 libraries worldwide
The documents listed on this page were located in response to the numerous requests received by NSA on the subject of Unidentified Flying Objects (UFO). In 1980, NSA was involved in Civil Action No. 80-1562, "Citizens Against Unidentified Flying Objects Secrecy v. National Security Agency."
National cryptologic strategy for the 21st century ( Book )
2 editions published in 1996 in English and held by 5 libraries worldwide
Venona historical monograph ( Book )
in English and held by 4 libraries worldwide
Third Venona Release ( Book )
1 edition published in 1996 in English and held by 4 libraries worldwide
First Venona Release ( Book )
1 edition published in 1995 in English and held by 4 libraries worldwide
Information operations warfare and the hard reality of soft power ( file )
1 edition published in 2004 in English and held by 3 libraries worldwide
New Security Paradigms Workshop 2004 proceedings, September 20-23, 2004, Nova Scotia, Canada by ACM SIGSAC New Security Paradigms Workshop( file )
1 edition published in 2004 in English and held by 3 libraries worldwide
Second Venona Release ( Book )
1 edition published in 1995 in English and held by 3 libraries worldwide
JFK documents index ( Computer File )
in English and held by 3 libraries worldwide
"Under the President John F. Kennedy Assassination Records Collection Act of 1992 (Public Law 102-526), NSA is required to review all records relating to the assassination and provide copies to the Assassination Records Review Board (ARRB). The Board, in turn, provides copies to the National Archives and Records Administration (NARA). NARA has over 170,000 records relating to the J.F.K. assassination of which only a small number originated with NSA. The documents listed are the ones released by NSA to date."
Cuban missile crisis release by United States( Book )
1 edition published in 1998 in English and held by 3 libraries worldwide
Gulf of Tonkin - 11/30/2005 and 05/30/2006 ( Computer File )
in English and held by 2 libraries worldwide
On 30 November 2005, the National Security Agency (NSA) released the first installment of previously classified information regarding the Vietnam era, specifically the Gulf of Tonkin incident. This release includes a variety of articles, chronologies of events, oral history interviews, signals intelligence (SIGINT) reports and translations, and other related memoranda. On 30 May 2006, NSA released the second and final installment of Gulf of Tonkin materials. This final release includes additional articles, chronologies of events, oral history interviews, and other related memoranda. The opinions expressed within the documents in both releases are those of the authors and individuals interviewed. They do not necessarily represent the official views of the National Security Agency. The Gulf of Tonkin incident, like others in our nation's history, has become the center of considerable controversy and debate. It is not NSA's intention to prove or disprove any one set of conclusions, many of which can be drawn from a thorough review of this material. Instead, through these public releases, we intend to make as much information as possible available for the many scholars, historians, academia, and members of the general public who find interest in analyzing the information and forming their own conclusions. The site includes: Chronologies of Events; Miscellaneous Memoranda and Notes; Material relating to proposed "History of Southeast Asia" article by NSA Historian William Gerhard, circa 1972; Articles; Oral History Interviews; Signals Intelligence (SIGINT) Reports (R) and Translations (T) Mar 64 - Oct 64 ; Related Command and Technical Messages from 02 Aug 64 to 26 Aug 64
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names

controlled identity United States. Department of Defense

controlled identity United States. National Security Agency

Maryland Procurement Office
N.S.A./C.S.S.
National Security Agency/Central Security Service (U.S.)
NSA
NSA/CSS
United States. Central Security Service
United States. Department of Defense. National Security Agency/Central Security Service
United States. Dept. of Defense. National Security Agency/Central Security Service
United States. National Security Agency (1972- )
United States National Security Agency/Central Security Service
Languages
English (69)
Chinese (4)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.