

This requires the approval of UEE High-Command. Once relying on the UEE-Navy’s support, the ISA is now fully autonomous and can field its own Naval Strike Group with multiple Capital and Sub-Capital ships with a very capable Support-Fleet to back it up.įurther records between the First Tevarin War and Today, will be released to the public as soon as they are censored and ready to be declassified. Over the course of the next centuries, the Agency started to procure many ships greatly varying in size and focus. Those informations would not be allowed to be passed on during the entire Messer-Era. Besides the ISA was tasked by Ivar Messer himself to perform Anti-Piracy and Counter-Intelligence operations against the remaining Tevarin’s that required the Agency to more often than not, operate at the fringes of the law. He highly favored the Agency and supported its activities since its success in the First Tevarin War. High-Command proposed an investigation but this undertaken quickly grinded to a halt because of the intervention of Imperator Messer. This obviously raised some questions about the ISA’s loyalty to the UEE. The next step was making a wide array of services accessible to the public. To combat this the ISA formed multiple new departments for Mining, Hauling, and other Business sectors. The ISA feared that with Ivar Messer’s potential removal from power or death, they would cease to receive financial resources from the Government which would cripple the Agency.
#Intelligence support activity free
From 2555 to the beginning of the Second Tevarin War in 2603 the ISA remained largely under the radar and built the foundation for a self-sufficient Organization to break free of the dependence of UEE-Funding. In 2554 the ISA already had an adequately sized Fleet of Combat and Support-Vessel’s.


This allowed the ISA to procure the necessary equipment to raise its effectiveness in combat. 2549 a few years after the Human victory over the Tevarin the newly formed UEE under the lead of a young Ivar Messer, heavily invested in the Intelligence Agency. However, the ISA found itself outgunned by the Tevarin Forces and lacked substantial firepower. At this time the Service was mainly comprised of Elite Special Operations Personnel recruited from all Military-Branches. Shortly after its creation, the ISA played a decisive role in winning the Battle of Idris IV, delivering a devastating blow to the Tavarin Forces that upon this point were advancing deeper into Human Territory as anticipated. Interoperability is a key to successful joint operations and exercises.The ISA was founded during the First-Contact War with the Tevarin (2541-2546) after the UPE felt the need of having a Combat capable frontline Intelligence Service. Our cybersecurity mission also produces and packages the codes that secure our nation's weapons systems.Īdditionally, we set common protocols and standards so that our military can securely share information with our allies, NATO and coalition forces around the world. We provide wireless and wired secure communications to our warfighters and others in uniform no matter where they are, whether traveling through Afghanistan in a Humvee, diving beneath the sea, or flying into outer space. We provide intelligence support to military operations through our signals intelligence activities, while our cybersecurity personnel, products and services ensure that military communications and data remain secure, and out of the hands of our adversaries. NSA analysts, linguists, engineers and other personnel deploy to Afghanistan and other hostile areas to provide actionable SIGINT and cybersecurity support to warfighters on the front lines. Supporting our military service members around the world is one of the most important things that we do. Department of Defense serving as a combat support agency. Government in cryptology that encompasses both signals intelligence (SIGINT) insights and cybersecurity products and services, and enables computer network operations to gain a decisive advantage for the nation and our allies. Throughout the site, NSA/CSS will be referred to collectively as NSA. The National Security Agency/Central Security Service (NSA/CSS) leads the U.S.
