Special Security Office
The Special Security Office (SSO) is a function within multiple arms of the United States federal government and armed forces with the mission to provide a reliable and secure means to receive and disseminate Sensitive Compartmented Information (SCI) and Special Access Programs (SAP) to authorized recipients in the United States government and military organizations. In the military, they are administered by the National Security Agency or Defense Intelligence Agency depending on the command's mission. Systematic handling of compartmented information probably is most associated with the Special Liaison Units (SLU) originally for the distribution of British Ultra adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park ... COMINT. Cleared personnel in these units and the equivalent US Special ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States
The United States of America (U.S.A. or USA), commonly known as the United States (U.S. or US) or America, is a country primarily located in North America. It consists of 50 U.S. state, states, a Washington, D.C., federal district, five major unincorporated territories, nine United States Minor Outlying Islands, Minor Outlying Islands, and 326 Indian reservations. The United States is also in Compact of Free Association, free association with three Oceania, Pacific Island Sovereign state, sovereign states: the Federated States of Micronesia, the Marshall Islands, and the Palau, Republic of Palau. It is the world's List of countries and dependencies by area, third-largest country by both land and total area. It shares land borders Canada–United States border, with Canada to its north and Mexico–United States border, with Mexico to its south and has maritime borders with the Bahamas, Cuba, Russia, and other nations. With a population of over 333 million, it is the List of ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Classified Information In The United States
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments. The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
National Security Agency
The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the Information assurance, protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine operations, clandestine. The existence of the NSA was not revealed until 1975. The NSA has roughly 32,000 employees. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952. Between then and the end of the Cold War, it became the largest of the U.S. ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Ultra (cryptography)
adopted by British military intelligence in June 1941 for wartime signals intelligence obtained by breaking high-level encrypted enemy radio and teleprinter communications at the Government Code and Cypher School (GC&CS) at Bletchley Park. ''Ultra'' eventually became the standard designation among the western Allies for all such intelligence. The name arose because the intelligence obtained was considered more important than that designated by the highest British security classification then used (''Most Secret'') and so was regarded as being ''Ultra Secret''. Several other cryptonyms had been used for such intelligence. The code name ''Boniface'' was used as a cover name for ''Ultra''. In order to ensure that the successful code-breaking did not become apparent to the Germans, British intelligence created a fictional MI6 master spy, Boniface, who controlled a fictional series of agents throughout Germany. Information obtained through code-breaking was often attributed to t ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
COMINT
Signals intelligence (SIGINT) is intelligence-gathering by interception of '' signals'', whether communications between people (communications intelligence—abbreviated to COMINT) or from electronic signals not directly used in communication (electronic intelligence—abbreviated to ELINT). Signals intelligence is a subset of intelligence collection management. As classified and sensitive information is usually encrypted, signals intelligence in turn involves the use of cryptanalysis to decipher the messages. Traffic analysis—the study of who is signaling whom and in what quantity—is also used to integrate information again. History Origins Electronic interceptions appeared as early as 1900, during the Boer War of 1899–1902. The British Royal Navy had installed wireless sets produced by Marconi on board their ships in the late 1890s, and the British Army used some limited wireless signalling. The Boers captured some wireless sets and used them to make vital transmis ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
AFI 14-302
AFI may refer to: * ''Address-family identifier'', a 16 bit field of the Routing Information Protocol * Ashton Fletcher Irwin, an Australian drummer * AFI (band), an American rock band ** AFI (2004 album), ''AFI'' (2004 album), a retrospective album by AFI released in 2004 ** AFI (2017 album), ''AFI'' (2017 album), the tenth studio album by AFI * Afi, Iran, a village in East Azerbaijan Province, Iran * (Federal Investigations Agency), a Mexican agency * Air Force Instruction, documented instructions for members of the United States Air Force * Akrukay language * Alliance for Financial Inclusion, an organization of central bank regulators from the developing world * American Film Institute, an independent non-profit film organization * American Football Israel, a nonprofit sports organization * Amniotic fluid index, a measure of the amount of amniotic fluid of a fetus * Aniridia Foundation International, a support organization for people with Aniridia and family members * ''Appli ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Joint Worldwide Intelligence Communications System
The Joint Worldwide Intelligence Communication System (JWICS, ) is the United States Department of Defense's secure intranet system that houses top secret and sensitive compartmented information. JWICS superseded the earlier DSNET2 and DSNET3, the Top Secret and SCI levels of the Defense Data Network based on ARPANET technology.MARCORSYSCOM – Website Temporarily Suspended . Marcorsyscom.usmc.mil. Retrieved on 2014-04-12. . Fas.org. Retrieved on 2014-04-12. The system deals primarily with intelligence information and was one of the networks accessed by [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
OPTEVFOR
The Operational Test and Evaluation Force (OPTEVFOR) serves as an independent and objective agency within the United States Navy for the operational testing and evaluation (OT&E) of naval aviation, surface warfare, submarine warfare, C4I, cryptologic, and space systems in support Navy and U.S. Department of Defense acquisition programs. History OPTEVFOR traces its origins to the final months of World War II when the need arose for an effective means to combat Japanese kamikaze attacks. On 2 July 1945, the Composite Task Force, U.S. Atlantic Fleet, was formed to develop tactics and evaluate equipment to counter the Kamikazes. This force was commanded by Vice Admiral Willis A. Lee, USN, and consisted of miscellaneous types of combatant ships and drone aircraft. Following the end of World War II, the Composite Task Force was consolidated with other fleet units doing development work and in December 1947, was re-designated as the Operational Development Force (OPDEVFOR), with the f ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Classified Information
Classified information is material that a government body deems to be sensitive information that must be protected. Access is restricted by law or regulation to particular groups of people with the necessary security clearance and need to know, and mishandling of the material can incur criminal penalties. A formal security clearance is required to view or handle classified material. The clearance process requires a satisfactory background investigation. Documents and other information must be properly marked "by the author" with one of several (hierarchical) levels of sensitivity—e.g. restricted, confidential, secret, and top secret. The choice of level is based on an impact assessment; governments have their own criteria, including how to determine the classification of an information asset and rules on how to protect information classified at each level. This process often includes security clearances for personnel handling the information. Some corporations and non-go ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
United States Government Secrecy
The United States government classification system is established under Executive Order 13526, the latest in a long series of executive orders on the topic beginning in 1951. Issued by President Barack Obama in 2009, Executive Order 13526 replaced earlier executive orders on the topic and modified the regulations codified to 32 C.F.R. 2001. It lays out the system of classification, declassification, and handling of national security information generated by the U.S. government and its employees and contractors, as well as information received from other governments. The desired degree of secrecy about such information is known as its sensitivity. Sensitivity is based upon a calculation of the damage to national security that the release of the information would cause. The United States has three levels of classification: Confidential, Secret, and Top Secret. Each level of classification indicates an increasing degree of sensitivity. Thus, if one holds a Top Secret security clear ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |