Search Details

Word: nsa (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

...start of his espionage trial in a Baltimore courthouse. For 14 years, Pelton worked in a low-level computer job at the top secret National Security Agency. He had a knowledge of Russian, access to sensitive intelligence data and, in later years, money troubles. After Pelton left the NSA in 1979, according to federal authorities, he started selling information to the Soviets. Accused spies like Pelton have been a cause of growing concern to the U.S. intelligence community. Lately, however, they have begun raising problems for the press as well. In covering spy cases, the media face a delicate dilemma...

Author: /time Magazine | Title: Press: Questions of National Security | 6/2/1986 | See Source »

...first report to rouse Casey's ire came on Monday's edition of NBC's Today show. Giving a preview of the Pelton trial, Correspondent James Polk reported that the accused spy "apparently gave away one of the NSA's most sensitive secrets--a project with the code name Ivy Bells, believed to be a top-secret underwater eavesdropping operation by American submarines inside Russian harbors...

Author: /time Magazine | Title: Press: Questions of National Security | 6/2/1986 | See Source »

...search for only those acoustic features that are universal in certain words, no matter who speaks them. Advanced word-recognition systems using this technique are already in the hands of the National Security Agency, the top-secret Government bureau that monitors global communications networks. Eavesdropping on overseas telephone calls, NSA's supercomputers can pick out key words from among millions of simultaneous phone conversations, then isolate and tape-record any suspicious call for further investigation by human analysts...

Author: /time Magazine | Title: Computers: His Master's (Digital) Voice | 4/1/1985 | See Source »

Deeley predicts that production of the new generation of secure phones will begin within two years. By the end of the decade, NSA officials plan to install half a million of them: 200,000 in Government offices and an additional 300,000 in private companies that have access to classified or sensitive Government information. Within ten years they expect the total number of secure telephones in the U.S. to reach 2 million, or about one out of every 120 of the nation's horns. "Communication security is not like guns, ships or bullets," says Deeley. "It's sort...

Author: /time Magazine | Title: Is It Safe to Use the Phone? | 10/29/1984 | See Source »

...atmospheric transmission are easily interceptible on Soviet listening equipment that is doubtless installed in the U.S.S.R.'s diplomatic properties in the U.S. and elsewhere. The Kremlin's listening post in Cuba, for example, can pick up virtually all traffic from U.S. domestic communication satellites. Says an NSA official: "They just sit down there with their huge vacuum cleaner and suck everything up." In recent years the Soviets have developed computers that can cull such intelligence with much more sophistication than earlier models, and not just in search of defense secrets. "A computer can put together those bits...

Author: /time Magazine | Title: Is It Safe to Use the Phone? | 10/29/1984 | See Source »

Previous | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 | 42 | 43 | 44 | 45 | 46 | 47 | 48 | 49 | 50 | 51 | 52 | Next