The IT Law Wiki
No edit summary
 
(15 intermediate revisions by the same user not shown)
Line 1: Line 1:
  +
== Overview ==
The '''[http://www.nsa.gov/ National Security Agency/Central Security Service]''' ('''NSA/CSS''') has provided timely information to U.S. decision makers and military leaders for more than half a century. The Central Security Service was established in 1972 to promote a full partnership between NSA and the [[cryptologic]] elements of the armed forces.
 
   
  +
[[File:1038520-600px_national_security_agency.svg_large.png|thumb]]
NSA/CSS is unique among the U.S. defense agencies because of its government-wide responsibilities. NSA/CSS provides products and services to the [[Department of Defense]], the [[Intelligence Community]], government agencies, industry partners, and select allies and coalition partners. In addition, it delivers critical strategic and tactical information to war planners and war fighters.
 
   
  +
The '''[http://www.nsa.gov/ National Security Agency]''' was created in 1952 as an agency of [[DoD]] by secret Executive Order. For decades its existence was not made public, and the only extensive public description of its operations were provided in the book, ''The Puzzle Palace,''<ref>James Bamford, The Puzzle Palace (1983).</ref> which the agency tried to prevent from being published.
NSA/CSS is a key member of the U.S. [[Intelligence Community]] and, by its very nature, requires a high degree of [[confidentiality]]. Its [[Information Assurance]] mission confronts the formidable challenge of preventing foreign [[adversaries]] from gaining access to [[sensitive]] or [[classified]] [[national security]] information. Its [[signals intelligence|Signals Intelligence]] mission [[collect]]s, processes, and [[disseminate]]s [[intelligence]] information from foreign signals for [[intelligence]] and [[counterintelligence]] purposes and to support military operations. The Agency also enables [[network warfare|Network Warfare]] operations to defeat [[terrorist]]s and their organizations at home and abroad, consistent with U.S. laws and the protection of [[privacy]] and [[civil liberties]].
 
  +
  +
The NSA operates under the [[U.S. Code]]'s Title 50, which governs [[intelligence]] activities, and in a combat support role under Title 10, which governs military activities. It is intricately entwined (and currently shares a dual-hatted leader) with [[U.S. Cyber Command]], which operates under Title 10. While this arrangement increases efficiency by preventing duplication between the two organizations, it poses difficult challenges for effective [[oversight]].
  +
  +
The NSA collects [[Signals intelligence|signals]] and [[communications intelligence]] on foreign targets of concern to the United States. The NSA collects an immense amount of [[traffic]], and one of its key daily tasks is to reduce millions of [[intercept]]s down to a few thousand for analysts to review. [[Computer]]s do this [[filter]]ing using specialized [[software]]. Linguists and analysts with area or subject expertise then review the much smaller set of [[filter]]ed [[intercept]]s to determine their importance. At the end of this daily process, a small number of [[intercept]]s is found to be useful.
  +
  +
The NSA is responsible for developing and prescribing [[cryptographic]] [[standard]]s and principles that are technically [[secure]] and sound; development and executive management of [[DOD]] [[cryptographic]] [[hardware]] and [[software system]]s; and providing specialized support to the President, [[SecDef]], and operating forces (e.g., national [[intelligence]] support teams and other special capabilities).
  +
  +
The NSA prepares processed reports, some of which are available in the routine traffic circulated among agencies. Other, more sensitive reports are closely held and handled in special dissemination channels. On rare occasions, the NSA will also provide raw traffic (for example, translated [[text]] of actual [[intercept]]s) to senior [[policymaker]]s. [[Intelligence analyst]]s at other agencies rely on input from the NSA in developing their own analyses, and the NSA can be tasked by agencies to collect [[intelligence]] on specific problems or to [[search]] [[database]]s. The NSA has finite collection and analytical resources, so high-priority assignments can bump long-term or less-important collection projects. Signals and communications [[intercept]]s provide very valuable [[intelligence]], but sophisticated targets like Al Qaeda use a variety of techniques to evade [[interception]].
  +
  +
NSA material is usually highly [[classified]], not only because of the sensitivity of the material, but also because of the sensitivity of the [[data collection|collection]] techniques. Currently, [[Signals intelligence|signals]] and [[communications intelligence]] is one of the most important sources of [[information]] that the [[Department of Homeland Security]] ([[DHS]]) uses to issue alerts, but the actual [[intelligence]] upon which the alert is based is not shared with local authorities.
  +
  +
== Restrictions ==
  +
  +
[[National Security Decision Directive 145]] ([[NSDD 145]]), the [[Computer Security Act of 1987]], and the mid-1990 revision of [[NSDD 145]] (resulting in [[NSD 42]]) have progressively restricted NSA to an emphasis on defense [[system]]s, leaving civilian (notably civil government) [[system security]] concerns to [[NIST]]. Partly as a result of the changing [[policy]] context, NSA has moved to diminish its interaction with commercial organizations, most notably by scaling back the [[NCSC]].
  +
  +
== References ==
  +
<references />
  +
  +
== Source ==
  +
  +
* "Overview" section: [[Creating a Trusted Network for Homeland Security]], App. B.
  +
  +
== See also ==
  +
  +
* [[National Security Agency/Central Security Service]]
  +
* [[National Security Agency Act of 1959]]
  +
* [[NSA Suite B]]
  +
* [[NSA/CSS Threat Operations Center]]
 
[[Category:Security]]
 
[[Category:Security]]
 
[[Category:Government entity]]
 
[[Category:Government entity]]
  +
[[Category:1952]]

Latest revision as of 05:43, 28 May 2014

Overview[]

1038520-600px national security agency

The National Security Agency was created in 1952 as an agency of DoD by secret Executive Order. For decades its existence was not made public, and the only extensive public description of its operations were provided in the book, The Puzzle Palace,[1] which the agency tried to prevent from being published.

The NSA operates under the U.S. Code's Title 50, which governs intelligence activities, and in a combat support role under Title 10, which governs military activities. It is intricately entwined (and currently shares a dual-hatted leader) with U.S. Cyber Command, which operates under Title 10. While this arrangement increases efficiency by preventing duplication between the two organizations, it poses difficult challenges for effective oversight.

The NSA collects signals and communications intelligence on foreign targets of concern to the United States. The NSA collects an immense amount of traffic, and one of its key daily tasks is to reduce millions of intercepts down to a few thousand for analysts to review. Computers do this filtering using specialized software. Linguists and analysts with area or subject expertise then review the much smaller set of filtered intercepts to determine their importance. At the end of this daily process, a small number of intercepts is found to be useful.

The NSA is responsible for developing and prescribing cryptographic standards and principles that are technically secure and sound; development and executive management of DOD cryptographic hardware and software systems; and providing specialized support to the President, SecDef, and operating forces (e.g., national intelligence support teams and other special capabilities).

The NSA prepares processed reports, some of which are available in the routine traffic circulated among agencies. Other, more sensitive reports are closely held and handled in special dissemination channels. On rare occasions, the NSA will also provide raw traffic (for example, translated text of actual intercepts) to senior policymakers. Intelligence analysts at other agencies rely on input from the NSA in developing their own analyses, and the NSA can be tasked by agencies to collect intelligence on specific problems or to search databases. The NSA has finite collection and analytical resources, so high-priority assignments can bump long-term or less-important collection projects. Signals and communications intercepts provide very valuable intelligence, but sophisticated targets like Al Qaeda use a variety of techniques to evade interception.

NSA material is usually highly classified, not only because of the sensitivity of the material, but also because of the sensitivity of the collection techniques. Currently, signals and communications intelligence is one of the most important sources of information that the Department of Homeland Security (DHS) uses to issue alerts, but the actual intelligence upon which the alert is based is not shared with local authorities.

Restrictions[]

National Security Decision Directive 145 (NSDD 145), the Computer Security Act of 1987, and the mid-1990 revision of NSDD 145 (resulting in NSD 42) have progressively restricted NSA to an emphasis on defense systems, leaving civilian (notably civil government) system security concerns to NIST. Partly as a result of the changing policy context, NSA has moved to diminish its interaction with commercial organizations, most notably by scaling back the NCSC.

References[]

  1. James Bamford, The Puzzle Palace (1983).

Source[]

See also[]