Revision as of 21:46, 12 June 2006 editNautilator (talk | contribs)Extended confirmed users561 editsm →Domestic Activity← Previous edit |
Revision as of 03:58, 16 June 2006 edit undoMr-ed (talk | contribs)8 editsNo edit summaryNext edit → |
Line 1: |
Line 1: |
|
|
Mr. Ed was here.] |
|
{{redirect|NSA}} |
|
|
|
|
|
] |
|
|
The '''National Security Agency / ] (NSA/CSS)''' is believed to be the largest ] ] ]{{Citation needed}}. It is responsible for the collection and analysis of foreign ]s and for the security of U.S. government communications against similar agencies elsewhere. Officially established on November 4, 1952, the NSA is a component of the ] and has always been directed by a three-star ] or ] officer. NSA is a key component of the ] headed by the ]. |
|
|
|
|
|
Its ] mission includes ] ], both from various organizations and individuals, the ], telephone calls, and other intercepted forms of communication. Its secure communications mission includes ], ], and all other sensitive, confidential or secret government communications. Despite having been described as the world's largest single employer of ]s <ref>, NSA. Retrieved 15 May 2006.</ref>, the owner of the single largest group of ]s, it has had a remarkably low profile until the break of the ]. For a long time its existence was not even acknowledged by the U.S. government. It was often said, half-jokingly, that "NSA" stood for "No Such Agency". |
|
|
|
|
|
Because of its listening task, the NSA/] has been heavily involved in ] research, continuing the work of its predecessor agencies which had been responsible for breaking many ] ]s and ]s (see, for instance, ], ], and ]). |
|
|
|
|
|
Headquarters for the National Security Agency is at ], ], approximately ten miles (16 km) northeast of ]. NSA has its off the ] labeled "NSA Employees Only" which is usually guarded by two ] State Police vehicles. The scale of the operations at the NSA is hard to determine from unclassified data, but one clue is the ] usage of NSA's headquarters. NSA's budget for electricity exceeds US$21 million per year {{citation needed}}, making it the second largest electricity consumer in the entire state of Maryland. Photos have shown there to be 18,000 parking spaces at the site, although most guesses {{citation needed}} have put the NSA's total workforce at around double the number cited worldwide. |
|
|
|
|
|
Its secure government communications work has involved NSA in numerous technology areas including the design of specialized communications hardware and software, production of dedicated ]s (there is a chip fabrication plant at ]), and advanced ] research. The agency contracts with the private sector in the fields of research and equipment. |
|
|
|
|
|
==Agency history== |
|
|
The origins of the National Security Agency can be traced to an organization originally established within the ], under the command of the ] as the Armed Forces Security Agency ('''AFSA'''), on ], ]. The AFSA was to be responsible for directing the communications and electronic intelligence activities of the military intelligence units - the ], ] and the ]. However, the agency had little power and lacked a centralized coordination mechanism. The creation of NSA resulted from a ], ], memo sent by ] Director ] to James B. Lay, Executive Secretary of the ]. The memo observed that "control over, and coordination of, the collection and processing of Communications Intelligence had proved ineffective" and recommended a survey of communications intelligence activities. The proposal was approved on ], ], and the study authorized on ], ]. The report was completed by ], ]. Generally known as the "Brownell Committee Report," after committee chairman ], it surveyed the history of U.S. communications intelligence activities and suggested the need for a much greater degree of coordination and direction at the national level. As the change in the security agency's name indicated, the role of the NSA was extended beyond the armed forces. |
|
|
|
|
|
The creation of the NSA was authorized in a letter written by President ] in June of 1952. The agency was formally established through a revision of National Security Council Intelligence Directive (NSCID) 9 on October 24, 1952, and officially came into existence on November 4, 1952. President Truman's letter was itself ] and remained unknown to the public for more than a generation. |
|
|
|
|
|
==Involvement with non-government cryptography== |
|
|
NSA has been involved in debates about public policy, both as a behind-the-scenes adviser to other departments, and directly during and after ]'s directorship. |
|
|
|
|
|
The NSA was embroiled in controversy concerning its involvement in the creation of the ] (DES), a standard and public ] used by the US government. During development by ] in the 1970s, the NSA recommended changes to the algorithm. There was suspicion the agency had deliberately weakened the algorithm sufficiently to enable it to eavesdrop if required. The suspicions were that a critical component — the so-called ]es — had been altered to insert a "backdoor"; and that the key length had been reduced, making it easier for the NSA to discover the key using massive computing power. |
|
|
|
|
|
However, the public reinvention of the technique known as ] suggested that one of the changes (to the ]es) had actually been suggested to harden the algorithm against this -- then publicly unknown -- method of attack; differential cryptanalysis remained publicly unknown until it was independently reinvented and published some decades later. On the other hand the shortening of the ] from 128 bits, as recommended in IBM submission, to an effective key of only 56 bits in length, can only be interpreted as an intentional weakening of the algorithm by the NSA, making possible an ] for the key by those with sufficient computer power and funding. |
|
|
|
|
|
Possibly because of previous controversy, the involvement of NSA in the selection of a successor to DES, the ] (AES), was limited to ] performance testing (see ]). |
|
|
|
|
|
NSA was a major player in the debates of the mid to late 1990s regarding the ]. Cryptographic software and hardware had long been classed with ]s, ]s, ]s, and ]s as controllable ]. |
|
|
|
|
|
The NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the ] block ciphers. |
|
|
|
|
|
==Patents== |
|
|
The NSA has the ability to file for a ] from the ] under ]. Unlike a normal patent, the NSA's is never revealed to the public and never expires. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal the NSA's patent and officially grant it to the NSA for the full term on that date.{{citation needed}} |
|
|
|
|
|
==Domestic Activity== |
|
|
|
|
|
The NSA's charter, executive order , authorizes it to collect information that constitutes "foreign intelligence or counterintelligence" while prohibiting "acquiring information concerning the domestic activities of United States persons". Traditionally the NSA has declared that it relies on the FBI, who are responsible for domestic intelligence, to collect information on foreign intelligence activities that occur within the borders of the USA while confining its own activities within the USA to the embassies and missions of foreign nations. |
|
|
|
|
|
The activities described below, especially the publicly acknowledged Domestic Phone tapping and Domestic Call Database programs, have caused widespread privacy concerns and worries about the extent of the NSA's powers. |
|
|
|
|
|
===ECHELON=== |
|
|
{{main|ECHELON}} |
|
|
|
|
|
] |
|
|
|
|
|
NSA/CSS, in combination with the equivalent agencies in the ] ''(])'', ] ''(]),'' ] ''(])'', and ] ''(])'', and otherwise known as the ] group, is believed to be responsible for, among other things, the operation of the ] system. Its capabilities are suspected to include the ability to monitor a large proportion of the world's transmitted civilian ], ] and data traffic. The system has as one of its most important bases at the nominally ]-run station at ] {{coor d|54.0162|N|1.6826|W|type:landmark}} near ], ]. Another site, at ] {{coor d|38.514997|N|79.28421|W|type:landmark}}, intercepts all international communications entering the eastern U.S., while a site near ], ] {{coor d|46.681965|N|120.357810|W|type:landmark}} intercepts traffic in the western U.S., according to a ], ] article in the '']''. |
|
|
|
|
|
Technically, almost all modern telephone, internet, fax & satellite communications are exploitable due to recent advances in technology and the 'open air' nature of much of the radio communications around the world. |
|
|
The NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans' ]. However, the NSA's ] (USSID 18) strictly prohibits the interception or collection of information about "...US persons, entities, corporations or organizations..." without explicit written legal permission from the ] of the United States. The ] has ruled that intelligence agencies cannot conduct surveillance against American citizens. There are of course a few extreme circumstances where collecting on a US entity would be allowed without a USSID 18 waiver, such as with civilian distress signals, or sudden emergencies (such as 9/11; however, the ] has significantly changed privacy legality). |
|
|
|
|
|
In the past, {{citation needed}} there have been alleged instances of improper violations of USSID 18 that occurred in violation of the NSA's strict charter prohibiting such acts. In addition, ECHELON is considered with indignation by citizens of countries outside the UKUSA alliance, with widespread suspicion that the United States government uses it for motives other than its national security, including ] and ].{{citation needed}} The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations. |
|
|
|
|
|
===ThinThread=== |
|
|
{{main|ThinThread}} |
|
|
A wiretapping program named ] was tested in the late ], according to information obtained by the '']'' in ]. This program may have contributed to the underlying technology used in later systems, but its safeguards on privacy were abandoned after the 9/11 attacks.<ref name="Sun"> {{cite web |
|
|
| title =NSA killed system that sifted phone data legally |
|
|
| work =baltimoresun.com |
|
|
| url=http://www.baltimoresun.com/news/nationworld/bal-nsa517,0,5970724.story?page=1&coll=bal-home-headlines |
|
|
| accessdate=2006-05-18 |
|
|
| date=] |
|
|
}}</ref> |
|
|
|
|
|
===Phone taps=== |
|
|
{{Wikinews|Bush secretly authorized NSA domestic eavesdrop of international conversations without court warrants}} |
|
|
{{main|NSA warrantless surveillance controversy}} |
|
|
|
|
|
On ], ], the '']'' printed a story asserting that, under ] pressure and with an ] from President ], the National Security Agency, in an attempt to thwart ], had been conducting warrantless ] on individuals in the U.S. calling persons outside the country. <ref>] & ] (December 16, 2005), , '']''</ref> According to the Times: |
|
|
:''The White House asked The New York Times not to publish this article, arguing that it could jeopardize continuing investigations and alert would-be terrorists that they might be under scrutiny. After meeting with senior administration officials to hear their concerns, the newspaper delayed publication for a year to conduct additional reporting. Some information that administration officials argued could be useful to terrorists has been omitted.'' |
|
|
|
|
|
News of tapping sparked an outcry from members of Congress and organizations which regard such actions as a violation of the law and an abuse of]. ] ] (]-]), the chairman of the ], said that "there is no doubt this is inappropriate" and "clearly and categorically wrong" and that he would hold hearings into the matter early in 2006. His call for investigations was echoed by ] ] (R-]), the chairman of the ] Intelligence Subcommittee. "Was the eavesdropping narrowly designed to go after possible terrorist threats in the United States or was it much, much more?" he asked in a statement. Like ECHELON (see above), some feel that the White House policy contradicts ] which states: ''Communications from, to, or about a U.S. person may not be intentionally collected without further authorities''. Surveillance to prevent terrorism is covered in ] of the ]. |
|
|
|
|
|
White House press secretary ] refused to comment on the story on December 16, claiming "there’s a reason why we don’t get into discussing ongoing intelligence activities, because it could compromise our efforts to prevent attacks from happening." <ref>, December 16, 2005, Whitehouse Press Briefing.</ref> The next morning, ], the President gave an 8-minute live TV address instead of his normal weekly radio address and confirmed that he had authorized the warrantless searches and phone taps. Visibly angry, he defended his actions as "crucial to our national security" and that the American people expected him to "do everything in my power, under our laws and Constitution, to protect them and their civil liberties" as long as there was a "continuing threat" from ]. The President also had harsh words for those who broke the story, saying they acted illegally. "The unauthorized disclosure of this effort damages our national security and puts our citizens at risk," he said. <ref> (December 18, 2005), '']''</ref> |
|
|
|
|
|
Senator ] (]-]) called the president's remarks "breathtaking in how extreme they were" in a telephone interview with the ]. He added, "If that's true, he doesn't need the Patriot Act because he can just make it up as he goes along. I tell you, he's President George Bush, not King George Bush. This is not the system of government we have and that we fought for." Feingold was just as harsh in an interview with ]. "We have a president, not a king," he said. <ref> (December 18, 2005), '']''</ref> Senator ] (D-]), the ranking Democrat on the Judiciary Committee, added later, "The Bush administration seems to believe it is above the law." |
|
|
|
|
|
Critics of the NYT disclosure claim that the President has the authority to order such action by virtue of ] signed by ] in 1981. |
|
|
|
|
|
The United States Department of Justice opened an investigation in late December 2005 to try to determine the source of the leak to the New York Times. |
|
|
|
|
|
===Call Database=== |
|
|
{{main|NSA call database}} |
|
|
On ], ], '']'' reported that the NSA is operating "the largest database ever assembled in the world", containing ]s of all calls (domestic and international) placed through ], ] and ]. After admitting to the incident the Administration now claims no personal names, addresses or other personal information was being collected. Like other major phone companies, ] has been asked to provide customer records but refused on legal grounds, citing the need for a ]. |
|
|
|
|
|
===Previous NSA tapping of US citizens=== |
|
|
In the years after ] resigned, there were several investigations of suspected misuse of ] and NSA facilities. Senator ] headed a Senate investigating committee which uncovered a good bit of previously unknown activity. CIA plotting to assassinate ] was an example for the CIA. And for NSA, there was phone activity tapping of American citizens, prohibited by its charter, suspected of protest activity. Both CIA and NSA pledged to take steps to ensure these things did not happen again. |
|
|
|
|
|
==Staff== |
|
|
===Directors=== |
|
|
{{main|Director of the National Security Agency}} |
|
|
], 16<sup>th</sup> and current director of the NSA (2005–).]] |
|
|
*1952–1956 ] ], USA |
|
|
*1956–1960 ] ], USAF |
|
|
*1960–1962 ] ], USN |
|
|
*1962–1965 ] ], USAF |
|
|
*1965–1969 ] ], USA |
|
|
*1969–1972 ] ], USN |
|
|
*1972–1973 ] ], USAF |
|
|
*1973–1977 ] ], USAF |
|
|
*1977–1981 ] ], USN |
|
|
*1981–1985 ] ], USAF |
|
|
*1985–1988 ] ], USA |
|
|
*1988–1992 ] ], USN |
|
|
*1992–1996 ] ], USN |
|
|
*1996–1999 ] ], USAF |
|
|
*1999–2005 ] ], USAF |
|
|
*2005–Present ] ], USA |
|
|
|
|
|
<small>''USA'', ''USAF'', and ''USN'' are the United States Army, United States Air Force, and United States Navy, respectively.</small> |
|
|
|
|
|
===Deputy Directors=== |
|
|
|
|
|
*Dec. 1952–Nov. 1953 ] ], USN |
|
|
*Nov. 1953–June 1956 ] ], USAF |
|
|
*June 1956–Aug. 1956 ] ], USAF |
|
|
*Aug. 1956–Sep. 1957 Mr. ] |
|
|
*Oct. 1957–Jul 1958 Dr. ] |
|
|
*Aug. 1958–Apr. 1974 Dr. ], USN |
|
|
*Apr. 1974–May 1978 Mr. ] |
|
|
*May 1978–Apr. 1980 Mr. ] |
|
|
*Apr. 1980–July 1982 Ms. ] |
|
|
*July 1982–June 1985 Mr. ] |
|
|
*June 1985–Mar. 1988 Mr. ] |
|
|
*Mar. 1988–July 1990 Mr. ] |
|
|
*July 1990–Feb. 1994 Mr. ] |
|
|
*Feb. 1994–Oct. 1997 Mr. ] |
|
|
*Oct. 1997–June 2000 Ms. ] |
|
|
*June 2000–present Mr. ] |
|
|
|
|
|
===Notable cryptanalysts=== |
|
|
*] |
|
|
*] |
|
|
*] |
|
|
*] |
|
|
*] |
|
|
*] |
|
|
*] |
|
|
|
|
|
==NSA encryption systems== |
|
|
:''Main article: ]'' |
|
|
|
|
|
NSA is responsible for the encryption-related components in these systems: |
|
|
*] Electronic Key Management System |
|
|
*] Future Narrow Band Digital Terminal |
|
|
*] encryption based on portable crypto token in ] format |
|
|
*] ADONIS off-line rotor encryption machine (post-WW II to 1980s) |
|
|
*] ROMULUS electronic in-line teletype encryptor (1960s–1980s) |
|
|
*] JASON fleet broadcast encryptor (1960s–1990s) |
|
|
*] VINSON tactical radio voice encryptor |
|
|
*] tactical radio with cryptographically controlled frequency hopping |
|
|
*] secure telephone equipment |
|
|
*] older secure telephone unit |
|
|
|
|
|
==Past and present SIGINT activities== |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
|
|
|
==In fiction== |
|
|
:''Main article: ]'' |
|
|
|
|
|
Since the existence of the NSA has become more widely known in the last few decades, and particularly since the 1990s, the agency has regularly been portrayed in spy fiction. Most such portrayals probably grossly exaggerate the organization's involvement in the more sensational activities of intelligence agencies. An indication of the agency's increased "fame" is its named appearance in the Bond franchise in 2002's '']''; a ] portrayed by ] worked for them. The NSA has been featured in many other films, television shows, books, and video games. |
|
|
|
|
|
==Notes== |
|
|
<!-- Dead note "NSACreated": (October 24, 1952) --> |
|
|
<div class="references-small"> |
|
|
<references /> |
|
|
</div> |
|
|
|
|
|
==See also== |
|
|
* ] |
|
|
* ] |
|
|
* ] (DoD - CIFA) |
|
|
* ] (DSD) of Australia |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] (GCHQ) of the UK |
|
|
* ] ST-6400 and NarusInsight by Narus Ltd. |
|
|
* ] |
|
|
* ] |
|
|
* ] |
|
|
* ] (and COMINT) |
|
|
* ] |
|
|
* ] prevention of compromising emanations |
|
|
* ] |
|
|
===NSA computers=== |
|
|
* ] |
|
|
* ] |
|
|
|
|
|
== Further reading == |
|
|
* ], '']'', Doubleday, 2001, ISBN 0-385-49907-8. |
|
|
* ], '']'', Penguin Books, ISBN 0-14006-7485. |
|
|
* ], '']'' — discussion of the development of non-government cryptography, including many accounts of tussles with the NSA. |
|
|
* ], '']'', Random House, ISBN 1400060346. |
|
|
* ], '']'', ISBN 0871315548. |
|
|
* ], '']'', 1181 pp., ISBN 0-684-83130-9. Look for the 1967 rather than the 1996 edition. |
|
|
* ], '']'', 1969, LC 71080912. |
|
|
* ], ], December 25, 2005; The Agency That Could Be Big Brother. |
|
|
|
|
|
== External links == |
|
|
* |
|
|
* |
|
|
* —newly declassified book-length report provided by ''''. |
|
|
* |
|
|
* |
|
|
* |
|
|
* —The ACLU's page on domestic spying activities of the NSA. Features a white paper: "What Can the NSA Do?" and a map of how "the NSA Octopus" ensnares the nation. |
|
|
* |
|
|
* |
|
|
* |
|
|
* |
|
|
* |
|
|
* |
|
|
* |
|
|
* Kurt Nimmo. , ''Another Day in the Empire'', December 24, 2005. |
|
|
* : Dec. 25, 2005 New York Times article by James Bamford, on NSA's Sugar Grove, WV monitoring site |
|
|
* Kevin Zeese. , ''Raw Story'', January 10, 2006. |
|
|
* http://www.fas.org/irp/eprint/nsa-interview.pdf First person account of NSA interview and clearance |
|
|
|
|
|
<!-- {{Mapit-US-buildingscale|31.9108651|-77.607884}} Unless someone has the CORRECT location, this is useless. Right now it points to the Atlantic. --> |
|
|
|
|
|
{{Signals agency}} |
|
|
|
|
|
] |
|
|
] |
|
|
] |
|
|
|
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
|
] |
|
Mr. Ed was here.