National Security Agency

From SI410
Revision as of 23:13, 19 March 2017 by Kenkauf (Talk | contribs)

Jump to: navigation, search
Back • ↑Topics • ↑Categories

Nsa.png

The National Security Agency/Central Security Service (NSA/CSS) is a collaborative sector of the United States defense agencies, created in 1952. It presides over the creation and breaking of codes in accordance with the increasing necessity for cryptology in the armed forces and foreign affairs, as well as managing the communication and information systems of the United States. It provides services to the US Department of Defense, the Intelligence Community, government agencies, industry partners, select allies and coalition partners, and war planners and fighters. The NSA has two main missions: the Information Assurance mission prevents foreign adversaries from gaining access to sensitive, classified national security information; the Signals Intelligence mission "collects, processes, and disseminates intelligence information from foreign signals for intelligence and counterintelligence purposes and to support military operations." The NSA also is entrusted with the Network Warfare operations "to defeat terrorists and their organizations at home and abroad, consistent with U.S. laws and the protection of privacy and civil liberties." Keith B. Alexander is the Director of NSA and Chief of CSS. John C. Inglis is the Deputy Director of the NSA.[1][2]

History

The history of the agency can be traced back to July 1917 during the creation of the United States Cipher Bureau of Military Intelligence during WWI. The Bureau had been established for the purposes of code breaking following the British interception of the Zimmerman Telegram, which aimed to incite war between Mexico and the United States[3].

In 1919, the Cipher Bureau relocated to New York City and shifted its objectives towards Diplomatic intelligence. In 1922, surveillance of Japanese telegrams helped American diplomats negotiate naval arms limitations in the Washington Naval Conference[4].

During WWII, intelligence gathered by the bureau helped American fighter planes intercept and shoot down the plane of Japanese Admiral Yamamoto.

Following the conclusion of WWII, President Truman reorganized American signals intelligence into the National Security Agency in 1952. By 1969, the NSA grew to employ over 90,000 individuals making it world's largest intelligence organization. The agency played a key role in major Cold War events such as the Cuban Missile Crisis and the building of the Berlin Wall[5].

In the 21st Century, the NSA's role shifted to data mining and domestic security following the September 11th attacks. President George W. Bush authorized the NSA to monitor the phone calls and emails of American citizens without the need for a court warrant[6].

While the wiretap program was ended in 2007, later revelations made in 2013 by Edward Snowden revealed that the agency had be covertly gathering communications metadata from millions of Americans and foreign diplomats.

Careers

NSA in Popular Media

Vault 7 On March 7, 2017, WikiLeaks released 8,761 documents regarding the NSA. "Year Zero" is regarded as the first of other security leaks. In the time of the leak, it was regarded the largest release of confidential documents in agency history. [7] explains the content, "'Year Zero' introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of 'zero day' weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones." Upon release, major discussions sparked around the White House's power and scope of cyber security. Documents also revealed close cooperation with British Intelligence agency, M15.

One notable finding released in the documents explains funding and acquisition of employees under a newly constructed CIA branch, the Center for Cyber Intelligence, or CCI[8]. This branch mimics powers of the NSA, but with less oversight and public attention.

Ethical Concerns

The NSA's involvement with covert spying throughout the Cold War and in the modern War on Terror has put the agency at the forefront of ethical issues concerning privacy and fourth amendment rights.

In the 1970s U.S. intelligence agencies including the NSA fell under public scrutiny in aftermath of the Watergate Hotel Scandal. An investigation conducted by the U.S. Senate Church committee revealed that the NSA had been spying on all telegrams entering and leaving the country dating back since 1945. [9] The agency had also been spying on the communications of civil rights leaders and protesters of the Vietnam War. Despite the 1978 passing of the Foreign Intelligence Surveillance Act (FISA), which required the agency to obtain warrants from a special court, later revelations revealed that the agency had covertly constructed a large and complex domestic spying program.

Since 2001, the NSA has cooperated with the US government in illegal surveillance of domestic communications and communication records. In 2013, NSA contractor Edward Snowden partnered with Guardian Journalist Glenn Greenwald to publish what would be the first of many revelations on the agency's massive domestic spying program. In June, 2013 information was leaked to media outlets that American telecom provided Verizon had been cooperation with the NSA to hand over subscriber information in compliance with a secret court order. It was soon revealed that nearly every other telephone company in the country was also cooperating with the NSA.

It is known that major telecommunications carriers like AT&T also cooperate in handing over the requested documents and tapping customer telecommunications. The fact was first revealed in news in December 2005, then in May 2006, the USA Today wrote a story on the statements of several Congress members, who revealed that the NSA is also receiving copies of millions of civilian telecommunications records. All the activities are in violation of the privacy regulations established by Congress and the US Constitution.

AT&T is also fully involved with the organization, as it also installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco, copying all emails, web browsing, and other forms of telecommunications to and from AT&T customers, providing the copies to the NSA.[10]

In the next set of revelations released by Edward Snowden included information of the agency's PRISM program. PRISM allowed the NSA to directly access the servers of major technology company's such as Google, Facebook, Microsoft, Apple and many others.

Further revelations revealed that the NSA was spying on numerous foreign leaders and governments including German Chancellor Angela Merkel.

Additionally, the Snowden documents revealed that the agency wasn't only targeting specific individuals or specific types of communication. Snowden revealed the agency's XKeyscore tool, which allows the NSA to search for nearly everything a user communicates through the internet. Finally, the NSA has also collected vast sums of cellphone and email metadata indiscriminately. While the agency states that it doesn't collect the content of calls or email communication, an article by the Verge states that if the British Empire had access to such information gathering tools in 1775, it would be likely that American revolutionary Paul Revere famous night ride would have been predicted and intercepted.[11]

The indiscriminate and warrant-less collection of data has been a concern for privacy advocates throughout both the United States and the world. U.S. Congress Woman Zoe Lofgren has stated that the program is a direct violation of Fourth Amendment Rights. Though the NSA's stance on the program has been that individuals with nothing to hide should be unconcerned with the program, vast amounts of metadata collected means that anyone with three degrees of relations to suspected terrorists can be targeted by the dragnet. [12]

In addition, it was revealed that the agency was taking active steps to circumvent internet security and device encryption. These initiatives went as far as implanting malware into the BIOS of consumer computers on the manufacturing side, ensuring that the agency had god-like control over targeted machines. [13]

References

  1. http://www.nsa.gov/about/index.shtml
  2. http://www.nsa.gov/about/leadership/index.shtml
  3. http://www.saturdayeveningpost.com/2014/04/17/culture/politics/a-brief-history-of-the-nsa.html
  4. http://www.saturdayeveningpost.com/2014/04/17/culture/politics/a-brief-history-of-the-nsa.html
  5. http://www.saturdayeveningpost.com/2014/04/17/culture/politics/a-brief-history-of-the-nsa.html
  6. http://www.saturdayeveningpost.com/2014/04/17/culture/politics/a-brief-history-of-the-nsa.html
  7. https://wikileaks.org/ciav7p1/#PRESS WikiLeaks official release statement
  8. http://www.businessinsider.com/ap-wikileaks-publish-1000s-of-what-it-says-are-cia-documents-2017-3
  9. http://www.saturdayeveningpost.com/2014/04/17/culture/politics/a-brief-history-of-the-nsa.html
  10. https://www.eff.org/nsa-spying
  11. http://www.theverge.com/2014/1/17/5319534/paul-revere
  12. http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded#section/1
  13. http://resources.infosecinstitute.com/nsa-bios-backdoor-god-mode-malware-deitybounce/