NSA News & Highlights

Aug. 17, 2022

National Cryptologic Museum Rediscovering Artifacts Hidden Away in NSA Warehouse

The machine is strikingly taller and wider than nearly all of the other National Cryptologic Museum (NCM) artifacts stored inside NSA’s 281,000-square-foot storage facility, which is located just a few miles from NSA headquarters.

Aug. 12, 2022

Illuminating the Future of Cybersecurity: Women From Across the Nation Visit NSA for First-of-Its-Kind Event

Surrounded by the bright aura of the National Security Agency's (NSA) cutting-edge Cybersecurity Collaboration Center (CCC), women from across the Nation recently joined leaders from USCYBERCOM and NSA to learn about the Agency’s mission and shine a light on the future of cybersecurity.

Aug. 8, 2022

NSA Launches New Codebreaker Challenge for 2022

Today, National Security Agency kicks off the 2022 NSA Codebreaker Challenge which gives participants an opportunity to sharpen their technical skills through, mission-centric scenarios, similar to the type of work NSA does everyday. Students who think they have what it takes, or who want develop their technical skills, can sign-up at nsa-codebreaker.org.

July 21, 2022

National Cryptologic Museum Crypto Conversations: Jon Darby

From the Cold War to the hunt for Osama Bin Laden, the National Security Agency (NSA) has a lot of thrilling history to share — Hear from Jon Darby, Director of Operations, as he recounts stories from his nearly 40-year career at NSA.

July 14, 2022

NSA Publishes Guidance on Characterizing Threats, Risks to DoD Microelectronics

The National Security Agency’s (NSA) Joint Federation Assurance Center Hardware Assurance Lab published a report on “DoD Microelectronics: Levels of Assurance Definitions and Applications” today to characterize the threats and risks to custom microelectronic components used in Department of Defense (DoD) systems. The Cybersecurity Technical Report includes definitions and guidance on applying three levels of hardware assurance to protect applicable DoD systems.

July 6, 2022

Double Take: Identical Twins Spend Year Honing Skills at NSA

FORT MEADE, Md. — Every day SSgt Abigail Fisher and SSgt Hannah Fisher get stopped in the halls of the National Security Agency (NSA).

June 30, 2022

2022 IC Pride Summit Embraces Bringing Authenticity to the Workplace

FORT MEADE, Md. — For the first time in nearly a decade, the Intelligence Community (IC) Pride Summit returned to the National Security Agency (NSA) — spotlighting the theme "Authent(ic)" to show how IC agencies should strive to constantly create spaces where employees are not afraid to be themselves, regardless of their identity.

June 22, 2022

NSA, Partners Recommend Properly Configuring, Monitoring PowerShell in New Report

The National Security Agency (NSA) and partner cybersecurity authorities released a Cybersecurity Information Sheet today recommending that Microsoft Windows® operators and administrators properly configure and monitor PowerShell to prevent and detect abuse by malicious actors.

June 16, 2022

Cybersecurity Speaker Series: Defense Industrial Base

The National Security Agency (NSA) Cybersecurity Collaboration Center released the latest video in its Cybersecurity Speaker Series today, focusing on the Defense Industrial Base (DIB). The DIB consists of hundreds of thousands of technology, manufacturing, and service companies around the world that design, develop, and produce the Department of Defense’s critical systems, platforms and technologies required to defend the nation.

June 7, 2022

NSA, CISA, and FBI Expose PRC State-Sponsored Exploitation of Network Providers, Devices

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory (CSA) today, “People’s Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devices.” The advisory highlights how People’s Republic of China (PRC) actors have targeted and compromised major telecommunications companies and network service providers primarily by exploiting publicly known vulnerabilities. Networks affected have ranged from small office/home office (SOHO) routers to medium and large enterprise networks.