미국 국가안보국

수학노트
Pythagoras0 (토론 | 기여)님의 2021년 2월 17일 (수) 01:12 판
(차이) ← 이전 판 | 최신판 (차이) | 다음 판 → (차이)
둘러보기로 가기 검색하러 가기

노트

위키데이터

말뭉치

  1. Thank you for your interest in a career with NSA.[1]
  2. Thank you again for your interest in NSA.[1]
  3. The NSA grew out of the communications intelligence activities of U.S. military units during World War II.[2]
  4. In 1972 a joint organization, the Central Security Service (CSS), was created to coordinate the intelligence efforts of the NSA with the U.S. military.[2]
  5. While less known to the American public than the Central Intelligence Agency, the NSA is believed to be far larger in size in terms of workforce and budget.[2]
  6. According to Michael Hayden, a former director (1999–2005) of the NSA, it is also the world’s largest collector of foreign signals intelligence.[2]
  7. For more than 65 years, NSA’s signals intelligence and cybersecurity missions have given the U.S. a strategic advantage over adversaries as a combat support agency.[3]
  8. Thank you for your interest in NSA.[4]
  9. Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by President Harry S. Truman in 1952.[5]
  10. Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage, the NSA does not publicly conduct human-source intelligence gathering.[5]
  11. The NSA's actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and the agency's participation in economic espionage.[5]
  12. In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor.[5]
  13. Founded in 1952, NSA is part of the Department of Defense and a member of the U.S. Intelligence Community.[6]
  14. The Central Security Service (CSS), part of NSA, provides timely and accurate cryptologic support, knowledge, and assistance to the military cryptologic community.[7]
  15. CSS coordinates and develops policy and guidance on the SIGINT and IA missions of NSA/CSS to ensure military integration.[7]
  16. Though not incorporated as the National Security Agency we know today until 1952, the NSA/CSS traces its roots back to the days immediately prior to United States' entry into World War 1.[8]
  17. The National Security Agency offers a host of career options, with opportunities available for a variety of interests.[8]
  18. For most jobs, you must be at least 18 years old to be hired for work at the NSA, though the agency offers a high school work program for qualified students who are aged 16 or older.[8]
  19. To search for and apply for jobs, visit the NSA's job portal.[8]
  20. Shortly after the 9/11 attacks, President George W. Bush secretly authorized the NSA to begin collecting communications data from sources in touch with U.S.-based individuals.[9]
  21. President Bush has argued that the communications that were intercepted by the NSA were “foreign intelligence,” not domestic in nature.[9]
  22. A group of constitutional scholars and former government officials wrote a letter to Congress outlining their concerns over the administration’s justification for the NSA surveillance program.[9]
  23. The Agency is committed to ensuring that all NSA personnel are respected, valued and included for their diverse backgrounds, experiences, skills and contributions to our mission and culture.[10]
  24. In one instance, the NSA decided that it need not report the unintended surveillance of Americans.[11]
  25. In another case, the Foreign Intelligence Surveillance Court, which has authority over some NSA operations, did not learn about a new collection method until it had been in operation for many months.[11]
  26. The Obama administration has provided almost no public information about the NSA’s compliance record.[11]
  27. The causes and severity of NSA infractions vary widely.[11]
  28. The umbrella CRADA and the collaborations it has facilitated also resulted in significant workforce benefits for NSA and the cybersecurity sector.[12]
  29. Together, these efforts have helped the Agency and its federal and private sector partners "tackle some of America’s toughest problems," said NSA Texas Commander Col. Gregory J. Gagnon.[12]
  30. Snowden's data suggested that German Chancellor Angela Merkel, and her predecessor Gerhard Schröder, were targets of NSA surveillance.[13]
  31. DW most recent content pertaining to the NSA and Edward Snowden appears below on this page.[13]
  32. This paper examines public opinion on National Security Agency (NSA) mass surveillance programs of Americans.[14]
  33. The findings of both analyses provide evidence that citizens hold strong views toward NSA surveillance programs.[14]
  34. Government defends surveillance programs: NSA director, General Keith Alexander, tells Congress that "over 50" terrorist plots were stopped by surveillance efforts since 9/11.[15]
  35. PRISM is a tool used by the US National Security Agency (NSA) to collect private electronic data belonging to users of major internet services like Gmail, Facebook, Outlook, and others.[15]
  36. Classified presentation slides detailing aspects of PRISM were leaked by a former NSA contractor.[15]
  37. On June 6th, The Guardian and The Washington Post published reports based on the leaked slides, which state that the NSA has "direct access" to the servers of Google, Facebook, and others.[15]
  38. The National Security Agency announced the official launch of the Center for Cybersecurity Standards (CCSS) in the Cybersecurity Directorate.[16]
  39. The National Security Agency (NSA) announced their Hawaii cybersecurity scholarship/internship programs.[17]
  40. The director of the NSA/CSS, in accordance with a Department of Defense directive, must be a high-ranking -- at least three stars -- commissioned officer of the military services.[18]
  41. The NSA denies reports claiming that it has an unlimited black budget -- undisclosed even to other government agencies.[18]
  42. NSA programs NSA surveillance operations, which intensified after the Sept. 11, 2001, attacks on U.S. soil, have come under scrutiny.[18]
  43. The unauthorized leaks also provided information on the NSA's Tailored Access Operations program, an elite offensive hacking unit created in 1998 that conducts technical surveillance.[18]

소스

메타데이터

위키데이터

Spacy 패턴 목록

  • [{'LOWER': 'national'}, {'LOWER': 'security'}, {'LEMMA': 'Agency'}]
  • [{'LEMMA': 'NSA'}]
  • [{'LEMMA': 'N.S.A.'}]
  • [{'LOWER': 'united'}, {'LOWER': 'states'}, {'LOWER': 'national'}, {'LOWER': 'security'}, {'LEMMA': 'Agency'}]
  • [{'LOWER': 'national'}, {'LOWER': 'security'}, {'LOWER': 'agency'}, {'OP': '*'}, {'LEMMA': 'NSA'}]