HOME



picture info

Central Security Service
The Central Security Service (CSS) is a combat support agency of the United States Department of Defense which was established in 1972 to integrate the National Security Agency (NSA) and the Service Cryptologic Components (SCC) of the United States Armed Forces in the field of signals intelligence, Cryptography, cryptology, and information assurance at the tactical level.Central Security Service insignia
NSA/CSS website
In 2002, the CSS had approximately 25,000 uniformed members.
FAS.org
It is part of the United States Intelligence Community.


History

After World War II ended, the United States had two military org ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Fort George G
A fortification (also called a fort, fortress, fastness, or stronghold) is a military construction designed for the defense of territories in warfare, and is used to establish rule in a region during peacetime. The term is derived from Latin ("strong") and ("to make"). From very early history to modern times, defensive walls have often been necessary for cities to survive in an ever-changing world of invasion and conquest. Some settlements in the Indus Valley Civilization were the first small cities to be fortified. In ancient Greece, large cyclopean stone walls fitted without mortar had been built in Mycenaean Greece, such as the ancient site of Mycenae. A Greek '' phrourion'' was a fortified collection of buildings used as a military garrison, and is the equivalent of the Roman castellum or fortress. These constructions mainly served the purpose of a watch tower, to guard certain roads, passes, and borders. Though smaller than a real fortress, they acted as a ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Communications Intelligence
Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of ''signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis (to decipher the messages). Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmissions. Since the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




AFISRA
The Air Force Intelligence, Surveillance and Reconnaissance Agency (Air Force ISR Agency or AFISRA) was until 29 September 2014 a field operating agency of the United States Air Force headquartered at Lackland Air Force Base, Texas. On that date it was redesignated Twenty-Fifth Air Force and aligned as a numbered air force (NAF) of the Air Combat Command.McCullough, Amy, "ISR Agency Becomes 25th Air Force", ''Air Force Magazine: Journal of the Air Force Association'', November 2014, Volume 97 No. 11, p. 22 Its primary mission was to provide intelligence, surveillance and reconnaissance (ISR) products, applications, capabilities and resources, to include cyber and geospatial forces and expertise. Additionally, it was the service cryptologic component (SCC) responsible to the National Security Agency and Central Security Service for Air Force cryptographic activities. Originally called the United States Air Force Security Service, the Air Force ISR Agency was activated on 20 O ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Twenty-Fifth Air Force
Twenty-Fifth Air Force (25 AF), was a numbered air force (NAF) within the United States Air Force (USAF), and served as the Air Force's premier military intelligence organization. 25 AF was established on 29 September 2014McCullough, Amy, "ISR Agency Becomes 25th Air Force", ''Air Force Magazine: Journal of the Air Force Association'', November 2014, Volume 97 No. 11, p. 22 by redesignating the Air Force Intelligence, Surveillance and Reconnaissance Agency (a field operating agency) under Headquarters, United States Air Force, to a numbered air force aligned under Air Combat Command. The USAF also realigned the 9th Reconnaissance Wing and the 55th Wing under the new NAF. It was headquartered at Lackland Air Force Base, Texas. Its primary mission was to provide intelligence, surveillance and reconnaissance (ISR) products, applications, capabilities and resources, to include cyber and geospatial forces and expertise. Additionally, it is the service cryptologic component (SCC) ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Sixteenth Air Force
The Sixteenth Air Force (Air Forces Cyber) (16 AF) is a United States Air Force (USAF) organization responsible for information warfare, which encompasses intelligence gathering and analysis, surveillance, reconnaissance, cyber warfare and electronic warfare operations. Its headquarters is at Joint Base San Antonio-Lackland in Texas. The organization was the first newly established Numbered Air Force (NAF) by the USAF after World War II. It was activated in 1954 as a Joint Military Group to provide command and control of USAF activities in Spain, being designated a NAF in 1956. In 1957, 16 AF was realigned under Strategic Air Command (SAC) to provide command and control of SAC bases and B-47 Stratojet rotational units assigned and deployed to Spain and Morocco. In 1966, after SAC withdrew its forces from Europe, 16 AF became part of the United States Air Forces in Europe, providing command and control of USAFE forces initially in Spain and North Africa, and later in Italy an ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Naval Security Group
The Naval Security Group (NAVSECGRU) was an organization within the United States Navy, tasked with intelligence gathering and denial of intelligence to adversaries. A large part of this is signals intelligence gathering, cryptology and information assurance. The NAVSECGRU organization was active from March 1935 to September 2005. In addition to being part of the Navy, NAVSECGRU was also part of the National Security Agency's Central Security Service. The NAVSECGRU organization was transferred to the Naval Network Warfare Command The Naval Network Warfare Command (NAVNETWARCOM) is the United States Navy's information operations, intelligence, networks, and space unit. Naval Network Warfare Command's mission is to execute, under Commander United States Tenth Fleet, TENT ... (NETWARCOM) where its former assets made up the Information Operations Directorate. The service cryptologic commander role was transferred to United States Tenth Fleet 29 January 2010. References ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Marine Cryptologic Support Battalion
The Marine Cryptologic Support Battalion (MCSB) is a Marine Corps Intelligence battalion of the United States Marine Corps. The battalion headquarters are located in Fort George G. Meade, Maryland. Mission The battalion's stated purpose is "to enable and execute Signals Intelligence, Information Assurance and National-Tactical Integration activities in order to satisfy NSA/ CSS, Marine Air-Ground Task Force and joint force intelligence requirements." Organization The Marine Cryptologic Support Battalion headquarters are located in Fort Meade, Maryland. The MCSB has seven companies, five of which are based in the contiguous United States, one in Hawaii, and one in England. * Company A, Aurora, Colorado * Company B, Fort Meade, Maryland * Company D, Fort Eisenhower, Georgia * Company G, RAF Menwith Hill, England (Company was shut down in Dec. 2013) * Company H, San Antonio, Texas * Company I, Schofield Barracks, Hawaii. Company I was established as "Company I, Marine Support B ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Army Intelligence And Security Command
The United States Army Intelligence and Security Command (INSCOM) is a direct reporting unit that conducts intelligence, security, and information operations for United States Army commanders, partners in the Intelligence Community, and national decision-makers. INSCOM is headquartered at Fort Belvoir, Virginia. INSCOM contributes units to the National Security Agency, the United States's unified signals intelligence (SIGINT) organization. Within the NSA, INSCOM and its counterparts in the Navy, Air Force, Space Force, Coast Guard, and Marine Corps comprise the Central Security Service. INSCOM's budget has been estimated to be approximately $6 billion. As a direct reporting unit, INSCOM reports directly to the chief of staff of the Army. Mission INSCOM collects intelligence information in all intelligence disciplines to provide unit commanders with intelligence for the battlefield and the focus of combat power. The organization also conducts intelligence production acti ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Cyber Command
United States Cyber Command (USCYBERCOM) is one of the eleven unified combatant commands of the United States Department of Defense (DoD). It unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise which focus on securing cyberspace. USCYBERCOM was established as a Sub-Unified command under U.S. Strategic Command at the direction of Secretary of Defense Robert Gates on 23 June 2009 at the National Security Agency (NSA) headquarters in Fort George G. Meade, Maryland. It cooperates with NSA networks and has been concurrently headed by the director of the National Security Agency since its inception. While originally created with a defensive mission in mind, it has increasingly been viewed as an offensive force. On 18 August 2017, it was announced that USCYBERCOM would be elevated to the status of a full and independent unified combatant command. On 23 May 2023, it was announced that Presiden ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Director Of The National Security Agency
The director of the National Security Agency (DIRNSA) is the highest-ranking official of the National Security Agency, which is a defense agency within the United States Department of Defense, U.S. Department of Defense. The director of the NSA also concurrently serves as the chief of the Central Security Service (CHCSS) and as the commander of United States Cyber Command, U.S. Cyber Command (USCYBERCOM). As the director of the NSA and the chief of the CSC, the officeholder reports to the Under Secretary of Defense for Intelligence, under secretary of defense for intelligence, and as the commander of U.S. Cyber Command, the officeholder reports directly to the United States Secretary of Defense, secretary of defense. According to of the United States Code, the director of the NSA is recommended by the secretary of defense and nominated for appointment by the President of the United States, president. The nominee must be confirmed via majority vote by the United States Senate, Se ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Presidential Directive
In the United States, a presidential directive, or executive action, is a written or oral instruction or declaration issued by the president of the United States, which may draw upon the powers vested in the president by the Constitution of the United States, statutory law, or, in certain cases, congressional and judicial acquiescence. Such directives, which have been issued since the earliest days of the federal government, have become known by various names, and some have prescribed forms and purposes. Presidential directives remain in effect until they are revoked, which the president is free to do. The classification of presidential directives is not easily done, as the distinction between the types can be quite arbitrary, arising from convenience and bureaucratic evolution, and none are defined in the Constitution. The different types may overlap. As one legal scholar put it, "it is a bit misleading to overclassify presidential directives as comprising separate and distinct ' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


James Bamford
James Bamford (born September 15, 1946) is an American author, journalist and documentary producer noted for his writing about United States intelligence agencies, especially the National Security Agency (NSA). ''The New York Times'' has called him "the nation's premier journalist on the subject of the National Security Agency" and ''The New Yorker'' named him "the NSA's chief chronicler." In 2006, he won the National Magazine Award for Reporting for his writing on the war in Iraq published in ''Rolling Stone''. In 2015 he became the national security columnist for ''Foreign Policy'' magazine and he also writes for ''The New Republic.'' His book, '' The Shadow Factory: The Ultra-Secret NSA From 9/11 to the Eavesdropping on America'', became a ''New York Times'' bestseller and was named by ''The Washington Post'' as one of "The Best Books of the Year." Early life Bamford was born on September 15, 1946, in Atlantic City, New Jersey and raised in Natick, Massachusetts. Durin ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]