Works matching DE "UNITED States. National Security Agency/Central Security Service"
Results: 63
An Evolutionary Clustering-Based Optimization to Minimize Total Weighted Completion Time Variance in a Multiple Machine Manufacturing System.
- Published in:
- International Journal of Information Technology & Decision Making, 2015, v. 14, n. 5, p. 971, doi. 10.1142/S0219622015500200
- By:
- Publication type:
- Article
Intelligence Organizations and the Organization of Intelligence.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2010, v. 23, n. 4, p. 680, doi. 10.1080/08850601003780987
- By:
- Publication type:
- Article
Secrecy, Security, and Sex: The NSA, Congress, and the Martin-Mitchell Defections.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2009, v. 22, n. 4, p. 699, doi. 10.1080/08850600903143320
- By:
- Publication type:
- Article
Covert Action: A Vital Option in U.S. National Security Policy.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2005, v. 18, n. 2, p. 354, doi. 10.1080/08850600590884810
- By:
- Publication type:
- Article
Ferrets Above: American Signals Intelligence Satellites During the 1960s.
- Published in:
- International Journal of Intelligence & Counterintelligence, 2004, v. 17, n. 3, p. 449, doi. 10.1080/08850600490446835
- By:
- Publication type:
- Article
Snowden and Latin America.
- Published in:
- CounterPunch, 2013, v. 20, n. 8, p. 14
- By:
- Publication type:
- Article
In brief.
- Published in:
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 6, p. 10
- Publication type:
- Article
Desperately Seeking Signals.
- Published in:
- Bulletin of the Atomic Scientists, 2000, v. 56, n. 2, p. 47, doi. 10.1080/00963402.2000.11456943
- By:
- Publication type:
- Article
Spies R Us.
- Published in:
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 3, p. 8
- By:
- Publication type:
- Article
London calling, the NSA listening.
- Published in:
- Bulletin of the Atomic Scientists, 1999, v. 55, n. 2, p. 9
- By:
- Publication type:
- Article
In brief.
- Published in:
- Bulletin of the Atomic Scientists, 1998, v. 54, n. 6, p. 7
- Publication type:
- Article
A little help.
- Published in:
- Bulletin of the Atomic Scientists, 1995, v. 51, n. 6, p. 7
- Publication type:
- Article
Safe snooping.
- Published in:
- Bulletin of the Atomic Scientists, 1990, v. 46, n. 8, p. 5
- Publication type:
- Article
Admiral Inman's tidal wave.
- Published in:
- Bulletin of the Atomic Scientists, 1982, v. 38, n. 3, p. 3, doi. 10.1080/00963402.1982.11455705
- By:
- Publication type:
- Article
DOWN TO THE WIRE: ASSESSING THE CONSTITUTIONALITY OF THE NATIONAL SECURITY AGENCY'S WARRANTLESS WIRETAPPING PROGRAM: EXIT THE RULE OF LAW.
- Published in:
- University of Florida Journal of Law & Public Policy, 2006, v. 17, n. 3, p. 429
- By:
- Publication type:
- Article
AFTER SNOWDEN: REGULATING TECHNOLOGY-AIDED SURVEILLANCE IN THE DIGITAL AGE.
- Published in:
- Capital University Law Review, 2016, v. 44, n. 4, p. 677
- By:
- Publication type:
- Article
ARMED WITH A KEYBOARD: PRESIDENTIAL DIRECTIVE 20, CYBER-WARFARE, AND THE INTERNATIONAL LAWS OF WAR.
- Published in:
- Capital University Law Review, 2015, v. 43, n. 3, p. 679
- By:
- Publication type:
- Article
SECRECY, STANDING, AND EXECUTIVE ORDER 12,333.
- Published in:
- Southern California Law Review, 2016, v. 89, n. 5, p. 1203
- By:
- Publication type:
- Article
Square Legal Pegs in Round Cyber Holes: The NSA, Lawfulness, and the Protection of Privacy Rights and Civil Liberties in Cyberspace.
- Published in:
- Journal of National Security Law & Policy, 2010, v. 4, n. 1, p. 139
- By:
- Publication type:
- Article
Google, Libraries, and Knowledge Management: From the Navajo to the National Security Agency.
- Published in:
- Journal of Library Administration, 2007, v. 46, n. 1, p. 27, doi. 10.1300/J111v46n01_03
- By:
- Publication type:
- Article
Can the U.S. government legally monitor private communications? If so, given the U.S.'s significant protection of privacy rights, what government cannot?
- Published in:
- Journal of Public Affairs (14723891), 2017, v. 17, n. 3, p. n/a, doi. 10.1002/pa.1659
- By:
- Publication type:
- Article
RUBBER-STAMPING: LEGISLATIVE, EXECUTIVE, AND JUDICIAL RESPONSES TO CRITIQUES OF THE FOREIGN INTELLIGENCE SURVEILLANCE COURT ONE YEAR AFTER THE 2013 NSA LEAKS.
- Published in:
- 2014
- By:
- Publication type:
- Opinion
Multi-Institutional Retrospective Analysis Of Carbon Ion Radiotherapy For Prostate Cancer; The Japan Carbon Ion Radiation Oncology Study Group (J-Cros) 1501.
- Published in:
- Journal of Cancer Research & Therapeutics, 2017, v. 13, p. S48
- By:
- Publication type:
- Article
Human Rights Treaties and Foreign Surveillance: Privacy in the Digital Age.
- Published in:
- Harvard International Law Journal, 2015, v. 56, n. 1, p. 81
- By:
- Publication type:
- Article
SECTION 702 AND THE COLLECTION OF INTERNATIONAL TELEPHONE AND INTERNET CONTENT.
- Published in:
- Harvard Journal of Law & Public Policy, 2015, v. 38, n. 1, p. 117
- By:
- Publication type:
- Article
WHY THE NSA DATA SEIZURES ARE UNCONSTITUTIONAL.
- Published in:
- 2015
- By:
- Publication type:
- Essay
France and the NSA: The Tolerable Deception.
- Published in:
- International Policy Digest, 2015, v. 2, n. 6, p. 22
- By:
- Publication type:
- Article
Warrantless Wiretapping, FISA Reform, and the Lessons of Public Liberty: A Comment on Holmes's Jorde Lecture.
- Published in:
- 2009
- By:
- Publication type:
- Essay
FISA and NSA Spying: Are There Constitutional Implications?
- Published in:
- Homeland Security Review, 2009, v. 3, n. 2, p. 125
- By:
- Publication type:
- Article
The Right to Privacy in Light of Presidents' Programs: What Project MINARET's Admissions Reveal about Modern Surveillance of Americans.
- Published in:
- Texas Law Review, 2010, v. 88, n. 7, p. 1855
- By:
- Publication type:
- Article
The David Kahn Collection at NSA's National Cryptologic Museum.
- Published in:
- Cryptologia, 2011, v. 35, n. 2, p. 110, doi. 10.1080/01611194.2011.558980
- By:
- Publication type:
- Article
Review of The Secret Sentry: The Untold Story of the National Security Agency by Matthew M. Aid.
- Published in:
- 2010
- By:
- Publication type:
- Book Review
Review of The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America by James Bamford.
- Published in:
- 2009
- By:
- Publication type:
- Book Review
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher.
- Published in:
- Cryptologia, 2009, v. 33, n. 3, p. 246, doi. 10.1080/01611190802653228
- By:
- Publication type:
- Article
The Future of the Past - Questions in Cryptologic History.
- Published in:
- Cryptologia, 2008, v. 32, n. 1, p. 56, doi. 10.1080/01611190701752915
- By:
- Publication type:
- Article
Harris Radio Simplifies Interoperable Tactical Communications.
- Published in:
- Microwave Journal, 2009, v. 52, n. 10, p. 43
- Publication type:
- Article
Network of concern.
- Published in:
- Nature, 2006, v. 439, n. 7077, p. 633, doi. 10.1038/439633b
- Publication type:
- Article
Gimme Shelter: International Political Asylum in the Information Age.
- Published in:
- Vanderbilt Journal of Transnational Law, 2014, v. 47, n. 4, p. 1167
- By:
- Publication type:
- Article
The Contemporary Presidency Constraining Executive Power: George W. Bush and the Constitution.
- Published in:
- Presidential Studies Quarterly, 2008, v. 38, n. 1, p. 123, doi. 10.1111/j.1741-5705.2007.02632.x
- By:
- Publication type:
- Article
An INS Special Forum: Implications of the Snowden Leaks.
- Published in:
- Intelligence & National Security, 2014, v. 29, n. 6, p. 793, doi. 10.1080/02684527.2014.946242
- By:
- Publication type:
- Article
'US Intelligence and Vietnam': The Official Version(s).
- Published in:
- Intelligence & National Security, 2010, v. 25, n. 5, p. 611, doi. 10.1080/02684527.2010.537119
- By:
- Publication type:
- Article
Operation 'Piet': The Joseph Sidney Petersen Jr. Spy Case, a Dutch 'Mole' Inside the National Security Agency.
- Published in:
- Intelligence & National Security, 2008, v. 23, n. 4, p. 488, doi. 10.1080/02684520802293098
- By:
- Publication type:
- Article
Prometheus embattled: A post-9/11 report card on the National Security Agency.
- Published in:
- Intelligence & National Security, 2006, v. 21, n. 6, p. 980, doi. 10.1080/02684520601046317
- By:
- Publication type:
- Article
All Glory is Fleeting: Sigint and the Fight Against International Terrorism.
- Published in:
- Intelligence & National Security, 2003, v. 18, n. 4, p. 72, doi. 10.1080/02684520310001688880
- By:
- Publication type:
- Article
The National Security Agency and the Cold War.
- Published in:
- Intelligence & National Security, 2001, v. 16, n. 1, p. 27, doi. 10.1080/02684520412331306200a
- By:
- Publication type:
- Article
The Time of Troubles: The US National Security Agency in the Twenty-First Century.
- Published in:
- Intelligence & National Security, 2000, v. 15, n. 3, p. 1, doi. 10.1080/02684520008432615
- By:
- Publication type:
- Article
American Signals Intelligence and the Cuban Missile Crisis.
- Published in:
- Intelligence & National Security, 2000, v. 15, n. 1, p. 169, doi. 10.1080/02684520008432591
- By:
- Publication type:
- Article
TORT LAW VS. PRIVACY.
- Published in:
- Columbia Law Review, 2014, v. 114, n. 4, p. 879
- By:
- Publication type:
- Article
Shining a Light on Cyber An Interview with John C. "Chris" Inglis Former Deputy Director, National Security Agency Member, Cyberspace Solarium Commission.
- Published in:
- 2020
- Publication type:
- Interview
Legal Responses and Countermeasures to National Security Letters.
- Published in:
- Washington University Journal of Law & Policy, 2015, v. 47, p. 217
- By:
- Publication type:
- Article