TITLE

General Dynamics in the FastLane

PUB. DATE
August 2005
SOURCE
Armada International;Aug/Sep2005, Vol. 29 Issue 4, p85
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Reports that the U.S. National Security Agency has certified the OC-192 version of the Fastlane Asynchronous Transfer Module Encryptor in August 2005.
ACCESSION #
18129392

 

Related Articles

  • Trade secrets. Kleiner, Kurt // Mother Jones;Nov/Dec99, Vol. 24 Issue 6, p20 

    Reports on the allegations that the United States is using electronic spying techniques to gather economic intelligence about its allies. Report written for the European Parliament regarding allegations that the US National Security Agency's use of the surveillance system called Echelon for...

  • MISSI not ready for action. Von Schweber, Erick // PC Week;05/04/98, Vol. 15 Issue 18, p132 

    Discusses the Multilevel Information Systems Security Initiative (MISSI), a computer network security initiative developed by the United States National Security Agency (NSA) to support national defense operations. Potential commercial uses of MISSI; Questions about the support that the NSA...

  • Geeks Versus Spies. SHACHTMAN, NOAH // Wired;Apr2010, Vol. 18 Issue 4, p21 

    The article focuses on the selection of the U.S. National Security Agency (NSA) by Google, after it became a victim of an infiltration of international computer networks. The NSA includes the signals-intelligence directorate and the information-assurance directorate, the latter responsible for...

  • The Exaggerated Cyber-War Threat (Ctd.). Windish, Joe // Moderate Voice;10/29/2010, p19 

    The article reports on the drop of networks in 2010 despite cyber-war threat on pentagon attacks in the U.S. The figures compiled by the U.S.-China Economic and Security Review Commission state that about 30,000 happened in the first six months of 2010. The U.S. National Security Agency/Central...

  • London calling, the NSA listening. Mathews, Brendan // Bulletin of the Atomic Scientists;Mar/Apr1999, Vol. 55 Issue 2, p9 

    Reports on the debate at the European Union Parliament concerning a report that the United States National Security Agency (NSA) had the capacity to intercept and analyze all electronic communications in Europe. Code-name of the program of the NSA; Speculation of press on the program.

  • Why ECC Is The Wave Of The Future. Vanstone, S. A. // Wireless Week;3/15/2004, Vol. 10 Issue 6, p45 

    Comments on the use of Elliptic Curve Cryptography (ECC) in building security into public key systems in the U.S. Importance of ECC to wireless devices; Benefits of ECC to corporations; Use of ECC in the U.S. National Security Agency.

  • Lightening War. Fulghum, David A. // Aviation Week & Space Technology;3/22/2010, Vol. 172 Issue 12, p28 

    This article discusses the difficulty that the U.S. Pentagon and other intelligence agencies are having in determining the rules of engagement for airborne cyber-attacks. The difficulty comes when making a determination between tactical and strategic cyber-attacks. The National Security Agency...

  • FRANCE:. Investor's Business Daily // Investors Business Daily;12/9/2014, pA02 

    FRANCE: A top EU official said NSA surveillance is a "trade barrier" for European Internet firms providing services in the U.S., implying that Americans using a European service lack legal protections since communication outside the U.S. may be intercepted.

  • Safe snooping.  // Bulletin of the Atomic Scientists;Oct1990, Vol. 46 Issue 8, p5 

    Discusses why the National Security Agency (NSA) blocked a standard technology that would keep snoops, hackers and viruses out of systems. Why NSA should adopt it and what the effects would be on the economy.

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics