Snowden Archive
——
The SIDtoday
Files
Browse the Archive

The New Meade Operations Center

SUMMARY

The National SIGINT Collection Center is transitioning into the newly created Meade Operations Center. Vision for MOC is “a capabilities-based, collection-focused element with specific responsibility for exploiting midpoint access, both RF and cable.”

DOCUMENT’S DATE

Jul 22, 2003

PUBLICLY AVAILABLE

Mar 12, 2018

1/1
Download
Page 1 from The New Meade Operations Center
DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL (U//FOUO) The New Meade Operations Center FROM: Deputy Director for Data Acquisition Run Date: 07/22/2003 (S//SI) "The times, they are a changin'..." Over the past 5 months, a major effort on the part of SID, Extended Enterprise Management, and the Service Cryptologic Elements (SCEs) has laid the groundwork and started the transition of the National SIGINT Collection Center (NSCC) into the Meade Operations Center (MOC). The driving forces behind this transformation were the fragmentation over time of the tasks performed in the NSCC, to the extent that it had lost its identity; the lack of a clearly identified strategy on the NSCC's role and position in the SIGINT Enterprise, and plans by the SCEs to reallocate personnel resources from the NSCC into Transformation areas. (S//SI) The Director's vision of the MOC is a capabilities-based, collection-focused element with specific responsibility for exploiting midpoint access, both RF and cable. The MOC has ceased collection of many legacy targets determined at a corporate level to be either of little value, or duplicated elsewhere. This has allowed the MOC to devote its remaining personnel and resources to new SIGINT Development tasks with a trans-national emphasis. (U//FOUO) To find out more about these tasks and how the MOC is set up to accomplish them, click HERE . SERIES: (U//FOUO) Data Acquisition 1. Welcome to SID's Data Acquisition Directorate 2. The Collection Strategies and Requirements Center 3. Digital Network Exploitation (DNE), Digital Network Intelligence (DNI) and Computer Network Exploitation (CNE) 4. The Evolution of HF 5. The New Meade Operations Center "(U//FOUO) SIDtoday articles may not be republished or reposted outside NSANet without the consent of S0121 (DL sid comms)." DYNAMIC PAGE -- HIGHEST POSSIBLE CLASSIFICATION IS TOP SECRET // SI / TK // REL TO USA AUS CAN GBR NZL DERIVED FROM: NSA/CSSM 1-52, DATED 08 JAN 2007 DECLASSIFY ON: 20320108