
NSA
US National Security Agency; world's largest SIGINT collector, co-signed the 16-agency China-nexus advisory.
Last refreshed: 30 April 2026 · Appears in 1 active topic
If the NSA admits IOCs are useless, what are defenders supposed to do instead?
Timeline for NSA
Mentioned in: FIRESTARTER implant survives every Cisco firewall patch
Cybersecurity: Threats and DefencesSixteen agencies put IOC extinction in print
Cybersecurity: Threats and Defences- What did the NSA say about Chinese cyber operations in April 2026?
- The NSA co-signed a sixteen-agency advisory on 23 April 2026 formally acknowledging that indicators of compromise disappear as fast as analysts can publish them, naming Flax Typhoon and Integrity Technology Group as operators of two Chinese covert networks — Raptor Train (200,000 devices) and KV Botnet.Source: 16-agency advisory, April 2026
- How large is the NSA and what does it actually do?
- The NSA employs an estimated 32,000 people at Fort Meade, Maryland. It has two main missions: collecting foreign signals intelligence and protecting US government information systems. Its public-facing Cybersecurity Collaboration Center shares threat intelligence with defence contractors and critical-infrastructure operators.Source: NSA / Wikipedia
- What is the NSA Cybersecurity Collaboration Center?
- The Cybersecurity Collaboration Center is a programme that allows the NSA to share classified-grade threat intelligence with US defence contractors and critical-infrastructure operators without requiring recipients to hold security clearances, bridging the NSA's intelligence mission and the private sector's defensive needs.Source: NSA
- Is the NSA part of Five Eyes?
- Yes. The NSA co-leads the UKUSA Agreement, the signals intelligence-sharing framework that comprises the Five Eyes: the United States, United Kingdom, Australia, Canada, and New Zealand.Source: NSA / UKUSA Agreement
Background
The National Security Agency (NSA) is the United States' primary signals intelligence and cybersecurity agency, established on 4 November 1952 by President Truman under the Department of Defense. Headquartered at Fort Meade, Maryland, the NSA employs an estimated 32,000 people across intelligence, cryptanalysis, and cybersecurity functions, making it the largest single-site employer in Maryland and one of the world's largest intelligence employers. Its twin mandates — collecting signals intelligence on foreign targets and protecting US government information systems — place it at the intersection of offensive and defensive cyber operations.
The NSA's public cybersecurity presence is anchored by the Cybersecurity Collaboration Center, a programme that shares threat intelligence with US defence contractors and critical-infrastructure operators, and the Cybersecurity Directorate, established in 2019 to consolidate the NSA's defensive mission. Both are primary channels through which NSA analysis reaches the private sector without formal classification barriers. The NSA co-leads the UKUSA Agreement intelligence-sharing framework (Five Eyes) and maintains bilateral SIGINT partnerships with the UK, Australia, Canada, and New Zealand.
Across Lowdown topics, the NSA is a recurring anchor: in Russia-Ukraine-war-2026 as the source of SIGINT underpinning Western attribution; in Iran-conflict-2026 as a co-author of attribution advisories; in european-tech-sovereignty as the US agency whose CLOUD Act authorities create European sovereignty concerns; and in us-midterms-2026 as a domestic surveillance actor subject to ongoing Congressional oversight.
The NSA was a key signatory of the sixteen-agency joint advisory on China-nexus covert networks published on 23 April 2026, which formally acknowledged that indicators of compromise now vanish faster than defenders can act on them. The advisory named Flax Typhoon and Integrity Technology Group as operators of the Raptor Train botnet (200,000 compromised devices) and the KV Botnet used by Volt Typhoon. The NSA's participation at the advisory's lead tier — alongside CISA, FBI, and GCHQ — signals that the US intelligence community has moved the China-nexus botnet assessment from classified internal consensus to public attribution-grade disclosure, a step with direct policy implications for sanctions and export controls. This follows the NSA's earlier role in the APT28 attribution advisory and its long-running tracking of Salt Typhoon through the telecoms compromise.