NSAHobbit

1256 pts · March 30, 2016


The National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances. What and why we do, what we do The United States today faces very real, very grave national security threats. Extremism and international terrorism flourish in too many areas of the world, threatening our warfighters, our allies and our homeland. Regional conflicts can have serious effects on U.S. national interests. Hostile foreign governments and terrorists trade in, or seek to acquire, weapons of mass destruction and/or the materials to produce them. Tons of illegal drugs are smuggled into our country each year. The newest threats we face, and perhaps the fastest growing, are those in cyberspace. Cyber threats to U.S. national and economic security increase each year in frequency, scope and severity of impact. Cyber criminals, hackers and foreign adversaries are becoming more sophisticated and capable every day in their ability to use the Internet for nefarious purposes. As a nation, we are dependent on the Internet – we use it for everything. We communicate online, bank and shop online, and store much of our personal information there. In business, education and government, we all count on having ready access to the Internet and its many capabilities as we go about our daily routines. The Internet opens up new worlds to users. But while cyberspace offers great opportunities, it also comes with vulnerabilities. Our information networks and technology are constantly at risk from a variety of bad actors using a multitude of techniques – remote hacking intrusions, the placement of malware, spearphishing and other means of gaining access to networks and information. Some of these bad actors are criminals motivated by profit, particularly in the areas of identity theft and other forms of financial cybercrime. The cost of cybercrime – already in the billions of dollars – rises each year. But cyber threats also come from nation states and other actors who seek to exploit information to gain an advantage over the United States. They might seek an economic advantage, or to gain insight into our military or foreign policy. Denial of service attacks disrupt business and undermine confidence. Terrorists and extremist groups today use the power of the Internet, especially social media, to spread their messages of hate and intolerance, and to recruit new members, often targeting vulnerable young people. The global reach of cyberspace and the complexity of its networks provide bad actors ample places to hide, safe from the reach of international law. To meet these threats, our national leaders, military leaders, policy makers and law enforcement personnel must understand who our adversaries are, where they are, and what their capabilities, plans and intentions are. At the same time, we must ensure that we protect our own national security information from those who would do us harm. These are the capabilities that the National Security Agency provides to our nation, to our leaders and to our fellow Americans – 24 hours a day, seven days a week. The way people communicate today is very different from the way they communicated in the past, and it presents a whole new set of challenges. Our adversaries were once defined by national boundaries. They relied on phones, radios, and faxes to communicate over their own discrete networks and national infrastructure. Today, these boundaries are gone. The U.S. and our allies now operate on the same global network as our adversaries. We rely on the same information technology they do. Cyber threats have amplified with the globalization of digital communications, increased reliance on computer networks, and convergence of technology. Cyber threats have also evolved. It is important to note that the risk is not just from sophisticated nation states, but also from hackers, criminals, and terrorists. Every day, our adversaries become more refined, more skilled, more motivated – and we must be prepared! Ultimately, theft of intellectual property can result in economic and social costs that are broader than profit losses to a single company or sector, threatening to weaken the foundations of a free and competitive market. Once this data is acquired, it can be used to skip generations of research and development (R&D) efforts, greatly accelerating an ability to develop at least the same, if not more impressive, capabilities that permanently eliminate the competitive advantage unique to the victim from which it is acquired. These network intrusions force companies to spend significant amounts of money to repair damage done to their networks, and the victims may incur additional costs beyond these actions. To maintain its competitive edge in the world market, companies need to aggressively protect their intellectual property from all types of exploitive activities and techniques used to illegally acquire and use it. This protection needs to come from innovative solutions created by increased government and commercial partnerships and programs aligned to protect sensitive commercial information and intellectual property. Otherwise, our competitive economic advantage in the global economy, achieved through the innovation, creativity and integrity of its people, is threatened. And because we all--friend and foe alike--use the same networks, we have never been more vulnerable to attack. NSA's SIGINT and Information Assurance missions come together to detect and prevent threats to official U.S. government networks. SIGINT and IA analysts work together around the clock to assess foreign threats to networks. They also enable the U.S. military and our allies to carry out integrated computer network operations. How we help the military We provide intelligence support to military operations through our signals intelligence activities, while our information assurance personnel, products and services ensure that military communications and data remain secure, and out of the hands of our adversaries. We provide wireless and wired secure communications to our warfighters and others in uniform no matter where they are, whether traveling through Afghanistan in a Humvee, diving beneath the sea, or flying into outer space. Our information assurance mission also produces and packages the codes that secure our nation's weapons systems. Additionally, we set common protocols and standards so that our military can securely share information with our allies, NATO and coalition forces around the world. Interoperability is a key to successful joint operations and exercises. To support our military customers, NSA has deployed personnel to all of the major military commands and to locations around the globe where there is a U.S. military presence. NSA analysts, linguists, engineers and other personnel deploy to Afghanistan and other hostile areas to provide actionable SIGINT and information assurance support to warfighters on the front lines. Many of our deployed personnel serve in Cryptologic Services Groups, providing dedicated support at the Combatant Command or headquarters level. Since the mid-2000s, however, NSA personnel have also been serving on Cryptologic Support Teams, which are assigned to support smaller units such as Brigade Combat Teams to ensure they are receiving the intelligence and information assurance products and services they need to accomplish their specific missions. These teams have enabled NSA to push the full capabilities of our global cryptologic enterprise as far forward as possible Core Values Honesty We recognize that national leaders and the American people at large have placed great trust in us, and we strive at all times to be deserving of that trust. We will be truthful with each other, and honor the public's need for openness, balanced against national security interests. Respect for the Law Everything that we undertake in our missions in grounded in our adherence to the U.S. Constitution and compliance with U.S. laws and regulations that govern our activities. Integrity We recognize that national leaders and the American people at large have placed great trust in us, and we strive at all times to be deserving of that trust. We will behave honorably and apply good judgment as we would if our activities were under intense public scrutiny. Transparency We embrace transparency to the fullest extent possible. We never forget that we, too, are Americans and that every activity we engage in is aimed at ensuring the safety, security, and liberty of our fellow citizens. TL;DR The National Security Agency is part of the U.S. Department of Defense, serving as a combat support agency. Supporting our military service members around the world is one of the most important things that we do. http://i.imgur.com/yqmbb6f.gifv

Enough is enough

Points -1
Comments 4
Views 0

101 GIF's of a dog on a skateboard

Points 4
Comments 3
Views 35

Cute little 11 day old puppy

Points 19
Comments 3
Views 453

Shitpost Title

Points 6
Comments 0
Views 324

90 % of stackoverflow answers

Points 10
Comments 3
Views 479

Worm crushed by venus flytrap

Points 15
Comments 8
Views 1211

It's the 29th. Dogs on a skateboard for everyone

Points 19
Comments 0
Views 108
Next page