When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. The Puzzle Palace - Wikipedia

    en.wikipedia.org/wiki/The_Puzzle_Palace

    The Puzzle Palace is a book written by James Bamford and published in 1982. It is the first major, popular work devoted entirely to the history and workings of the National Security Agency (NSA), a United States intelligence organization.

  3. The Shadow Factory - Wikipedia

    en.wikipedia.org/wiki/The_Shadow_Factory

    Kinne contrasts her years of work before 9/11 in SIGINT and the careful attention paid to USSID 18 with her work after 9/11 and the way USSID 18 was essentially ignored. [1] [2] Kinne later became part of Iraq Veterans Against the War. [3] The NSA and US Army Intelligence and Security Command (USAINSCOM) Inspectors General investigated her ...

  4. National Security Archive - Wikipedia

    en.wikipedia.org/wiki/National_Security_Archive

    The National Security Archive is a 501(c)(3) non-governmental, non-profit research and archival institution located on the campus of the George Washington University in Washington, D.C. Founded in 1985 to check rising government secrecy, the National Security Archive is an investigative journalism center, open government advocate, international affairs research institute, and the largest ...

  5. Body of Secrets - Wikipedia

    en.wikipedia.org/wiki/Body_of_Secrets

    Body of Secrets: Anatomy of the Ultra-Secret National Security Agency is a book by James Bamford about the NSA and its operations. It also covers the history of espionage in the United States from uses of the Fulton surface-to-air recovery system to retrieve personnel on Arctic Ocean drift stations to Operation Northwoods, a declassified US military plan that Bamford describes as a "secret and ...

  6. Family Jewels (Central Intelligence Agency) - Wikipedia

    en.wikipedia.org/wiki/Family_jewels_(Central...

    A six-page summary of the reports was made available at the National Security Archive (based at George Washington University), with the following introduction: The Central Intelligence Agency violated its charter for 25 years until revelations of illegal wiretapping , domestic surveillance, assassination plots, and human experimentation led to ...

  7. Tailored Access Operations - Wikipedia

    en.wikipedia.org/wiki/Tailored_Access_Operations

    The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, [1] is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). [2] It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General ...

  8. Martin and Mitchell defection - Wikipedia

    en.wikipedia.org/wiki/Martin_and_Mitchell_defection

    In September 1960, two U.S. National Security Agency (NSA) cryptologists, William Hamilton Martin and Bernon F. Mitchell, defected to the Soviet Union.A secret 1963 NSA study said that: "Beyond any doubt, no other event has had, or is likely to have in the future, a greater impact on the Agency's security program."

  9. U.S. Army and CIA interrogation manuals - Wikipedia

    en.wikipedia.org/wiki/U.S._Army_and_CIA...

    KUBARK was a U.S. Central Intelligence Agency cryptonym for the CIA itself. [10] The cryptonym KUBARK appears in the title of a 1963 CIA document KUBARK Counterintelligence Interrogation which describes interrogation techniques, including, among other things, " coercive counterintelligence interrogation of resistant sources".