-
“[90] Domestic collection[edit] Further information: Mass surveillance in the United States NSA’s mission, as set forth in Executive Order 12333 in 1981, is to collect information
that constitutes “foreign intelligence or counterintelligence” while not “acquiring information concerning the domestic activities of United States persons”. -
Between then and the end of the Cold War, it became the largest of the U.S. intelligence organizations in terms of personnel and budget, but information available as of 2013
indicates that the Central Intelligence Agency (CIA) pulled ahead in this regard, with a budget of $14.7 billion. -
[14][15] The NSA, alongside the CIA, maintains a physical presence in many countries across the globe; the CIA/NSA joint Special Collection Service (a highly classified intelligence
team) inserts eavesdropping devices in high value targets (such as presidential palaces or embassies). -
[59] NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia
(Australian Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group,[60] was reported to be in command of the operation of the so-called ECHELON system. -
[109] According to the Foreign Policy magazine, “… the Office of Tailored Access Operations, or TAO, has successfully penetrated Chinese computer and telecommunications
systems for almost 15 years, generating some of the best and most reliable intelligence information about what is going on inside the People’s Republic of China. -
[48] According to Neal Koblitz and Alfred Menezes, the period when the NSA was a trusted partner with academia and industry in the development of cryptographic standards started
to come to an end when, as part of the change in the NSA in the post-September 11 era, Snow was replaced as Technical Director, Jacobs retired, and IAD could no longer effectively oppose proposed actions by the offensive arm of the NSA. -
[64] NSA’s United States Signals Intelligence Directive 18 (USSID 18) strictly prohibited the interception or collection of information about “… U.S. persons, entities,
corporations or organizations….” without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. borders. -
[56] As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008, by President Bush, the NSA
became the lead agency to monitor and protect all of the federal government’s computer networks from cyber-terrorism. -
[65] Protesters against NSA data mining in Berlin wearing Chelsea Manning and Edward Snowden masks Other SIGINT operations overseas[edit] The NSA was also involved in planning
to blackmail people with “SEXINT”, intelligence gained about a potential target’s sexual activity and preferences. -
[67] The Real Time Regional Gateway is a data collection program introduced in 2005 in Iraq by NSA during the Iraq War that consisted of gathering all electronic communication,
storing it, then searching and otherwise analyzing it. -
[96] On March 11, 2004, President Bush signed a new authorization for mass surveillance of Internet records, in addition to the surveillance of phone records.
-
[29] The actual establishment of the NSA was done by a November 4 memo by Robert A. Lovett, the Secretary of Defense, changing the name of the AFSA to the NSA, and making
the new agency responsible for all communications intelligence. -
[63] On November 3, 1999, the BBC reported that they had confirmation from the Australian Government of the existence of a powerful “global spying network” code-named Echelon,
that could “eavesdrop on every single phone call, fax or e-mail, anywhere on the planet” with Britain and the United States as the chief protagonists. -
Initially, it was reported that some of these data reflected eavesdropping on citizens in countries like Germany, Spain and France,[77] but later on, it became clear that
those data were collected by European agencies during military missions abroad and were subsequently shared with NSA. -
World War I ended on November 11, 1918, and the army cryptographic section of Military Intelligence (MI-8) moved to New York City on May 20, 1919, where it continued intelligence
activities as the Code Compilation Company under the direction of Yardley. -
[57] Operations Operations by the National Security Agency can be divided into three types: • Collection overseas, which falls under the responsibility of the Global Access
Operations (GAO) division. -
[49] War on Terror[edit] In the aftermath of the September 11 attacks, the NSA created new IT systems to deal with the flood of information from new technologies like the
Internet and cellphones. -
Research at the University of Toronto has suggested that approximately 25% of Canadian domestic traffic may be subject to NSA surveillance activities as a result of the boomerang
routing of Canadian Internet service providers. -
[95] The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection
to non-U.S. citizens located outside of U.S. -
[112] Organizational structure The NSA is led by the Director of the National Security Agency (DIRNSA), who also serves as Chief of the Central Security Service (CHCSS) and
Commander of the United States Cyber Command (USCYBERCOM) and is the highest-ranking military official of these organizations. -
To further ensure streamlined communication between the signals intelligence community divisions, the NSA Director simultaneously serves as the Commander of the United States
Cyber Command and as Chief of the Central Security Service. -
[41][42] In 1999, a multi-year investigation by the European Parliament highlighted the NSA’s role in economic espionage in a report entitled ‘Development of Surveillance
Technology and Risk of Abuse of Economic Information’. -
“[55] Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War
II codes and ciphers (see, for instance, Purple, Venona project, and JN-25). -
[52] Global surveillance disclosures[edit] Main article: Global surveillance disclosures (2013–present) The massive extent of the NSA’s spying, both foreign and domestic,
was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013. -
[18] As part of these responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which facilitates cooperation between the NSA and
other U.S. defense cryptanalysis components. -
[95] President’s Surveillance Program[edit] See also: NSA warrantless surveillance (2001–07) George W. Bush, president during the 9/11 terrorist attacks, approved the Patriot
Act shortly after the attacks to take anti-terrorist security measures. -
The Foreign Intelligence Surveillance Court for example held in October 2011, citing multiple Supreme Court precedents, that the Fourth Amendment prohibitions against unreasonable
searches and seizures apply to the contents of all communications, whatever the means, because “a person’s private communications are akin to personal papers. -
[54] According to a 2010 article in The Washington Post, “[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls
and other types of communications. -
[9] A part of NSA’s mission is to serve as a combat support agency for the Department of Defense.
-
[20] It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization.
-
Alleged Echelon-related activities, including its use for motives other than national security, including political and industrial espionage, received criticism from countries
outside the UKUSA alliance. -
[47]: 75 After the terrorist attacks of September 11, 2001, the NSA believed that it had public support for a dramatic expansion of its surveillance activities.
-
[86][87] Boomerang routing[edit] While it is assumed that foreign transmissions terminating in the U.S. (such as a non-U.S. citizen accessing a U.S. website) subject non-U.S.
citizens to NSA surveillance, recent research into boomerang routing has raised new concerns about the NSA’s ability to surveil the domestic Internet traffic of foreign countries. -
[32] A secret operation, code-named “MINARET”, was set up by the NSA to monitor the phone communications of Senators Frank Church and Howard Baker, as well as key leaders
of the civil rights movement, including Martin Luther King Jr., and prominent U.S. journalists and athletes who criticized the Vietnam War. -
[19] Hardware implanting[edit] Intercepted packages are opened carefully by NSA employees A “load station” implanting a beacon A document included in NSA files released with
Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) and other NSA units gain access to hardware. -
According to the leaked documents, the NSA intercepts and stores the communications of over a billion people worldwide, including United States citizens.
-
Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications.
-
[30] Since President Truman’s memo was a classified document,[29] the existence of the NSA was not known to the public at that time.
-
NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities
within the United States to the embassies and missions of foreign nations. -
Bypassing encryption[edit] In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that
contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology (NIST), and the International Organization for Standardization (aka ISO). -
In addition to this, President Bush also signed that the measures of mass surveillance were also retroactively in place.
-
[27] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.
-
[53] Mission NSA’s eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted
forms of communication. -
[62] Investigative journalist Duncan Campbell reported in 1988 on the “ECHELON” surveillance program, an extension of the UKUSA Agreement on global signals intelligence SIGINT,
and detailed how the eavesdropping operations worked. -
This allowed the president to be able to override laws such as the Foreign Intelligence Surveillance Act, which protected civilians from mass surveillance.
-
[27] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department
of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI). -
[58] Today it is a legacy system, and several NSA stations are closing.
-
This strengthened the protection for users of Notes outside the US against private-sector industrial espionage, but not against spying by the US government.
-
The Black Chamber successfully persuaded Western Union, the largest U.S. telegram company at the time, as well as several other communications companies to illegally give
the Black Chamber access to cable traffic of foreign embassies and consulates. -
[33] The NSA mounted a major effort to secure tactical communications among U.S. forces during the war with mixed success.
-
-
[97][98] One such surveillance program, authorized by the U.S.
-
[23] Jointly funded by the Army and the State Department, the Cipher Bureau was disguised as a New York City commercial code company; it actually produced and sold such codes
for business use. -
[19] History Formation[edit] The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany
in World War I. -
(Some incoming traffic was also directed instead to Britain’s GCHQ for the time being.)
-
This was described by an NSA manager as “some of the most productive operations in TAO because they preposition access points into hard target networks around the world.
-
Due to its ultra-secrecy the U.S. intelligence community referred to the NSA as “No Such Agency”.
-
NSA relayed telephone (including cell phone) conversations obtained from ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers,
including the 201st Military Intelligence Battalion. -
[6][12] The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.
-
[34] : Vol I, p.79 Church Committee hearings[edit] Further information: Watergate scandal and Church Committee In the aftermath of the Watergate scandal, a congressional
hearing in 1975 led by Senator Frank Church[35] revealed that the NSA, in collaboration with Britain’s SIGINT intelligence agency Government Communications Headquarters (GCHQ), had routinely intercepted the international communications of
prominent anti-Vietnam war leaders such as Jane Fonda and Dr. Benjamin Spock. -
Its true mission, however, was to break the communications (chiefly diplomatic) of other nations.
-
This was designed to limit the practice of mass surveillance in the United States.
-
In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand the NSA Centers of Academic Excellence
in Information Assurance Education Program. -
[16][17] Unlike the CIA and the Defense Intelligence Agency (DIA), both of which specialize primarily in foreign human espionage, the NSA does not publicly conduct human-source
intelligence gathering. -
The NSA’s actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and the agency’s participation in economic
espionage. -
[33] However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was “disreputable if not outright illegal”.
Works Cited
[‘Burns, Thomas L. (1990). “The Origins of the National Security Agency” (PDF). United States Cryptologic History. National Security Agency. p. 97. Archived from the original (PDF) on March 22, 2016.
2. ^ Jump up to:a b “60 Years of Defending Our Nation”
(PDF). National Security Agency. 2012. p. 3. Archived from the original (PDF) on 2013-06-14. Retrieved July 6, 2013. On November 4, 2012, the National Security Agency (NSA) celebrates its 60th anniversary of providing critical information to U.S.
decision makers and Armed Forces personnel in defense of our Nation. NSA has evolved from a staff of approximately 7,600 military and civilian employees housed in 1952 in a vacated school in Arlington, VA, into a workforce of more than 30,000 demographically
diverse men and women located at NSA headquarters in Ft. Meade, MD, in four national Cryptologic Centers, and at sites throughout the world.
3. ^ Priest, Dana (July 21, 2013). “NSA growth fueled by need to target terrorists”. The Washington Post.
Retrieved July 22, 2013. Since the attacks of Sept. 11, 2001, its civilian and military workforce has grown by one-third, to about 33,000, according to the NSA. Its budget has roughly doubled.
4. ^ Jump up to:a b c d “Introverted? Then NSA wants
you.” Florida Championship Wrestling. April 2012. Retrieved July 1, 2013.
5. ^ Jump up to:a b Rosenbach, Marcel; Stark, Holger; Stock, Jonathan (June 10, 2013). “Prism Exposed: Data Surveillance with Global Implications”. Spiegel Online. Spiegel
Online International. p. 2. “How can an intelligence agency, even one as large and well-staffed as the NSA with its 40,000 employees, work meaningfully with such a flood of information?”
6. ^ Jump up to:a b Gellman, Barton; Greg Miller (August 29,
2013). “U.S. spy network’s successes, failures and objectives detailed in ‘black budget’ summary”. The Washington Post. p. 3. Retrieved August 29, 2013.
7. ^ Shane, Scott (August 29, 2013). “New Leaked Document Outlines U.S. Spending on Intelligence
Agencies”. The New York Times. Retrieved August 29, 2013.
8. ^ “About NSA: Mission”. National Security Agency. Retrieved September 14, 2014.
9. ^ Jump up to:a b Ellen Nakashima (January 26, 2008). “Bush Order Expands Network Monitoring: Intelligence
Agencies to Track Intrusions”. The Washington Post. Retrieved February 9, 2008.
10. ^ Executive Order 13470 – 2008 Amendments to Executive Order 12333, United States Intelligence Activities, July 30, 2008 (PDF)
11. ^ Schorr, Daniel (January 29,
2006). “A Brief History of the NSA”. NPR. Retrieved September 15, 2021.
12. ^ Bamford, James. Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, Random House Digital, Inc., December 18, 2007
13. ^ Malkin, Bonnie. “NSA surveillance:
US bugged EU offices”. The Daily Telegraph, June 30, 2013.
14. ^ Ngak, Chenda. “NSA leaker Snowden claimed U.S. and Israel co-wrote Stuxnet virus”, CBS, July 9, 2013
15. ^ Bamford, James (June 12, 2013). “The Secret War”. Wired. Archived from
the original on January 25, 2014.
16. ^ Ann Curry (anchor), John Pike (guest), Pete Williams (guest) and James Bamford (guest) (February 27, 2001). “Congress to Hold Closed Hearings on Accused Spy Robert Hanssen Later This Week”. Today. NBC.
17. ^
Lichtblau, Eric (February 28, 2001). “Spy Suspect May Have Revealed U.S. Bugging; Espionage: Hanssen left signs that he told Russia where top-secret overseas eavesdropping devices are placed, officials say”. Los Angeles Times. p. A1. Archived from
the original on April 17, 2001.
18. ^ Executive Order 13470 – 2008 Amendments to Executive Order 12333, United States Intelligence Activities, Section C.2, July 30, 2008
19. ^ Jump up to:a b c Obar, Jonathan A.; Clement, Andrew (July 1, 2013)
[June 5–7, 2012]. Ross, P.; Shtern, J. (eds.). Internet Surveillance and Boomerang Routing: A Call for Canadian Network Sovereignty. TEM 2013: Proceedings of the Technology & Emerging Media Track – Annual Conference of the Canadian Communication Association.
Victoria, British Columbia. doi:10.2139/ssrn.2311792. SSRN 2311792.
20. ^ “The Black Chamber – Pearl Harbor Review”. nsa.gov. Retrieved 23 February 2018.
21. ^ “The National Archives, Records of the National Security Agency”. Retrieved November
22, 2013.
22. ^ “The Many Lives of Herbert O. Yardley” (PDF). Retrieved May 26, 2016.
23. ^ Yardley, Herbert O. (1931). The American black chamber. Annapolis, MD: Naval Institute Press. ISBN 978-1-59114-989-7.
24. ^ James Bamford. “Building
America’s secret surveillance state”. Reuters. Archived from the original on June 13, 2013. Retrieved November 9, 2013.
25. ^ Hastedt, Glenn P.; Guerrier, Steven W. (2009). Spies, wiretaps, and secret operations: An encyclopedia of American espionage.
ABC-CLIO. p. 32. ISBN 978-1-85109-807-1.
26. ^ Jump up to:a b c USAICoE History Office. “Army Security Agency Established, 15 September 1945”. army.mil. United States Army. Archived from the original on July 16, 2020. Retrieved November 9, 2013.
27. ^
Jump up to:a b c Burns, Thomas L. “The Origins of the National Security Agency 1940–1952 (U)” (PDF). gwu.edu. National Security Agency. p. 60. Archived (PDF) from the original on November 29, 2020. Retrieved November 28, 2020.
28. ^ “The Creation
of NSA – Part 2 of 3: The Brownell Committee” (PDF). nsa.gov. National Security Agency. Archived from the original (PDF) on September 18, 2013. Retrieved July 2, 2013.
29. ^ Jump up to:a b Truman, Harry S. (October 24, 1952). “Memorandum” (PDF).
nsa.gov. National Security Agency. Archived from the original (PDF) on August 21, 2013. Retrieved July 2, 2013.
30. ^ Burns, Thomas L. (1990). “The Origins of the National Security Agency” (PDF). United States Cryptologic History. National Security
Agency. pp. 107–08. Archived from the original (PDF) on March 22, 2016.
31. ^ Anne Gearan (June 7, 2013). “‘No Such Agency’ spies on the communications of the world”. The Washington Post. Retrieved November 9, 2013.
32. ^ Shane, Scott (October
31, 2005). “Vietnam Study, Casting Doubts, Remains Secret”. The New York Times. The National Security Agency has kept secret since 2001 a finding by an agency historian that during the Tonkin Gulf episode, which helped precipitate the Vietnam War
33. ^
Jump up to:a b “Declassified NSA Files Show Agency Spied on Muhammad Ali and MLK Operation Minaret Set Up in the 1960s to Monitor Anti-Vietnam Critics, Branded ‘Disreputable If Not Outright Illegal’ by NSA Itself” The Guardian, September 26, 2013
34. ^
Boak, David G. (July 1973) [1966]. A History of U.S. Communications Security; the David G. Boak Lectures, Vol. 1 (PDF) (2015 partial declassification ed.). Ft. George G. Meade, MD: U.S. National Security Agency. Retrieved 2017-04-23.
35. ^ “Pre-Emption
– The Nsa And The Telecoms – Spying On The Home Front – FRONTLINE – PBS”. pbs.org.
36. ^ Cohen, Martin (2006). No Holiday: 80 Places You Don’t Want to Visit. New York: Disinformation Company Ltd. ISBN 978-1-932857-29-0. Retrieved March 14, 2014.
37. ^
William Burr, ed. (September 25, 2017). “National Security Agency Tracking of U.S. Citizens – “Questionable Practices” from 1960s & 1970s”. National Security Archive. Retrieved August 2, 2018.
38. ^ Jump up to:a b c Bill Moyers Journal (October
26, 2007). “The Church Committee and FISA”. Public Affairs Television. Retrieved June 28, 2013.
39. ^ “Book IV, Supplementary Detailed Staff Reports on Foreign and Military Intelligence (94th Congress, Senate report 94-755)” (PDF). United States
Senate Select Committee on Intelligence. April 23, 1976. p. 67 (72). Archived from the original (PDF) on September 22, 2013. Retrieved June 28, 2013.
40. ^ “Book II, Intelligence Activities and the Rights of Americans (94th Congress, Senate report
94-755)” (PDF). United States Senate Select Committee on Intelligence. April 26, 1976. p. 124 (108). Archived from the original (PDF) on May 21, 2013. Retrieved June 28, 2013.
41. ^ Seymour M. Hersh (February 22, 1987). “Target Qaddafi”. The New
York Times. Retrieved January 12, 2014.
42. ^ David Wise (May 18, 1986). “Espionage Case Pits CIA Against News Media”. The Los Angeles Times. Retrieved January 12, 2014. the President took an unprecedented step in discussing the content of the Libyan
cables. He was, by implication, revealing that NSA had broken the Libyan code.
43. ^ Peggy Becker (October 1999). Development of Surveillance Technology and Risk of Abuse of Economic Information (Report). STOA, European Parliament. p. 12. Archived
from the original on January 25, 2014. Retrieved November 3, 2013.
44. ^ Jump up to:a b c Staff (June 13, 2003). “NSA honors 4 in the science of codes”. The Baltimore Sun. Tribune Company. Archived from the original on June 14, 2013. Retrieved June
11, 2013.
45. ^ James Bamford (2007). Body of Secrets: Anatomy of the Ultra-Secret National Security Agency. Knopf Doubleday Publishing Group. p. 454. ISBN 978-0-307-42505-8.
46. ^ Koblitz, Neal (2008). Random Curves: Journeys of a Mathematician.
Springer-Verlag. p. 312. ISBN 9783540740773.
47. ^ Landau, Susan (2015), “NSA and Dual EC_DRBG: Déjà Vu All Over Again?”, The Mathematical Intelligencer, 37 (4): 72–83, doi:10.1007/s00283-015-9543-z, S2CID 124392006
48. ^ Curtis, Sophie (13 November
2014). “Ex-NSA technical chief: How 9/11 created the surveillance state”. The Daily Telegraph. Archived from the original on 2022-01-11.
49. ^ “In 2002 Brian Snow was moved from the technical directorship of IAD to a different position within the
NSA that had high status but little influence, particularly with regard to actions that were being proposed by SIGINT; Mike Jacobs retired from the NSA the same year.” Koblitz, Neal; Menezes, Alfred J. (2016), “A riddle wrapped in an enigma”, IEEE
Security & Privacy, 14 (6): 34–42, doi:10.1109/MSP.2016.120, S2CID 2310733 Footnote 9 in the full version, see “A riddle wrapped in an enigma” (PDF). Retrieved 12 April 2018.
50. ^ Gorman, Siobhan (May 17, 2006). “NSA killed system that sifted phone
data legally”. Baltimore Sun. Tribune Company (Chicago, IL). Archived from the original on September 27, 2007. Retrieved March 7, 2008. The privacy protections offered by ThinThread were also abandoned in the post–September 11 push by the president
for a faster response to terrorism.
51. ^ Bamford, Shadow Factory, pp. 325–340.
52. ^ Baltimore Sun (May 6, 2007). “Management shortcomings seen at NSA”. baltimoresun.com.
53. ^ Jump up to:a b “NSA surveillance exposed by Snowden ruled unlawful”.
BBC News. 3 September 2020. Retrieved 4 September 2020.
54. ^ Bamford, James (December 25, 2005). “The Agency That Could Be Big Brother”. The New York Times. Retrieved September 11, 2005.
55. ^ Dana Priest, William Arkin (July 19, 2010). “A hidden
world, growing beyond control”. The Washington Post. Archived from the original on May 15, 2013. Retrieved April 12, 2015.
56. ^ “National Security Agency and the U.S. Department of Homeland Security Form New Partnership to Increase National Focus
on Cyber Security Education” (Press release). NSA Public and Media Affairs. April 22, 2004. Archived from the original on 2009-01-17. Retrieved July 4, 2008.
57. ^ “Mission & Combat Support”. www.nsa.gov. Retrieved 2022-01-21.
58. ^ Hager, Nicky
(1996). Secret Power: New Zealand’s Role in the International Spy Network. Craig Potton Publishing. p. 55. ISBN 978-0-908802-35-7.
59. ^ Jump up to:a b c “It’s kind of a legacy system, this whole idea, the Echelon,” Bamford said. “Communications
have changed a great deal since they built it.” in Muir, Pat (May 27, 2013). “Secret Yakima facility may be outdated, expert says”. Yakima Herald-Republic. Seattle Times. Archived from the original on June 16, 2013. Retrieved June 15, 2013.
60. ^
Richelson, Jeffrey T.; Ball, Desmond (1985). The Ties That Bind: Intelligence Cooperation Between the UKUSA Countries. London: Allen & Unwin. ISBN 0-04-327092-1
61. ^ Patrick S. Poole, Echelon: America’s Secret Global Surveillance Network (Washington,
D.C.: Free Congress Foundation, October 1998)
62. ^ Echelon”, 60 Minutes, February 27, 2000
63. ^ Campbell, Duncan (August 12, 1988). “They’ve Got It Taped” (PDF). New Statesman via duncancampbell.org. Archived from the original (PDF) on June
14, 2013. Retrieved June 19, 2007.
64. ^ Bomford, Andrew (November 3, 1999). “Echelon spy network revealed”. BBC. Retrieved June 7, 2013.
65. ^ “European Parliament Report on Echelon” (PDF). July 2001. Retrieved July 4, 2008.
66. ^ Glenn Greenwald
(November 26, 2013). “Top-Secret Documents Reveal NSA Spied on Porn Habits as Part of Plan to Discredit ‘Radicalizers'”. The Huffington Post. London. Retrieved May 6, 2014.
67. ^ James Risen; Laura Poitras (May 31, 2014). “N.S.A. Collecting Millions
of Faces From Web Images”. The New York Times. Retrieved June 1, 2014.
68. ^ Ellen Nakashima; Joby Warrick (July 14, 2013). “For NSA chief, terrorist threat drives passion to ‘collect it all,’ observers say”. The Washington Post. Retrieved July
15, 2013. Collect it all, tag it, store it. . . . And whatever it is you want, you go searching for it.
69. ^ Glenn Greenwald (July 15, 2013). “The crux of the NSA story in one phrase: ‘collect it all’: The actual story that matters
is not hard to see: the NSA is attempting to collect, monitor and store all forms of human communication”. The Guardian. Retrieved July 16, 2013.
70. ^ Greg Miller and Julie Tate, October 17, 2013, “Documents reveal NSA’s extensive involvement
in targeted killing program”, The Washington Post. Retrieved October 18, 2013.
71. ^ Laura Poitras, Marcel Rosenbach, Fidelius Schmid und Holger Stark. “Geheimdokumente: NSA horcht EU-Vertretungen mit Wanzen aus”. Der Spiegel (in German). Retrieved
June 29, 2013.
72. ^ “US-Geheimdienst hörte Zentrale der Vereinten Nationen ab”. Der Spiegel (in German). Retrieved August 25, 2013.
73. ^ Spiegel.de: Wikileaks-Enthüllung, NSA soll auch französische Wirtschaft bespizelt haben (German), June 2015
74. ^
“Wikileaks: Und täglich grüßt die NSA”. Handelsblatt.com. July 9, 2015.
75. ^ Schultz, Tanjev. “US-Spionage ist eine Demütigung für Deutschland”. Süddeutsche.de. Retrieved 23 February 2022.
76. ^ “NSA tapped German Chancellery for decades, WikiLeaks
claims”. The Guardian. Reuters. 8 July 2015.
77. ^ France in the NSA’s crosshair : phone networks under surveillance Le Monde October 21, 2013
78. ^ Perlroth, Nicole (September 10, 2013). “Government Announces Steps to Restore Confidence on Encryption
Standards”. The New York Times (Bits blog).
79. ^ Jump up to:a b Perlroth, Nicole, Larson, Jeff, and Shane, Scott (September 5, 2013). “The NSA’s Secret Campaign to Crack, Undermine Internet Security”. ProPublica. This story has been reported in
partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian. For the Guardian: James Ball, Julian Borger, Glenn Greenwald; For the New York Times: Nicole Perlroth, Scott Shane; For ProPublica: Jeff
Larson
80. ^ “Schneier on Security: The Strange Story of Dual_EC_DRBG”. Schneier.com. November 15, 2007. Retrieved October 9, 2013.
81. ^ J. Appelbaum; A. Gibson; J. Goetz; V. Kabisch; L. Kampf; L. Ryge (July 3, 2014). “NSA targets the privacy-conscious”.
Panorama. Norddeutscher Rundfunk. Retrieved July 4, 2014.
82. ^ Lena Kampf, Jacob Appelbaum & John Goetz, Norddeutscher Rundfunk (July 3, 2014). “Deutsche im Visier des US-Geheimdienstes: Von der NSA als Extremist gebrandmarkt” (in German). ARD.
83. ^
“TechWeekEurope: Linus Torvalds Jokes The NSA Wanted A Backdoor In Linux”. linuxfoundation.org. Archived from the original on 2015-09-16.
84. ^ “NSA Asked Linus Torvalds To Install Backdoors Into GNU/Linux”. falkvinge.net.
85. ^ “Civil Liberties,
Justice and Home Affairs – Hearings”. europa.eu.
86. ^ “The Swedes discover Lotus Notes has key escrow!” The Risks Digest, Volume 19, Issue 52, December 24, 1997
87. ^ Only NSA can listen, so that’s OK Heise, 1999.
88. ^ Gallagher, Sean (May
14, 2014). “Photos of an NSA “upgrade” factory show Cisco router getting implant”. Ars Technica.
89. ^ Whitwam, Ryan (December 30, 2013). “The NSA regularly intercepts laptop shipments to implant malware report says”. extremetech.com.
90. ^ “Archived
copy”. Archived from the original on 2015-03-10. Retrieved 2015-03-10.
91. ^ nsa.gov: The NSA story Archived 2014-12-09 at the Wayback Machine, retrieved January 19, 2015 – Page 3: ‘NSA … will work with the FBI and other agencies to connect the
dots between foreign-based actors and their activities in the U.S.’
92. ^ Domestic Surveillance Directorate website, Nsa.gov1.info, retrieved January 19, 2015
93. ^ The Definitive NSA Parody Site Is Actually Informative, Forbes.com, retrieved
January 19, 2015
94. ^ John D Bates (October 3, 2011). “[redacted]” (PDF). pp. 73–74.
95. ^ Jump up to:a b David Alan Jordan. Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted
Voice over Internet Protocol Archived 2007-10-30 at the Wayback Machine. Boston College Law Review. May 2006. Last access date January 23, 2007
96. ^ Provost, Colin (2009). President George W. Bush’s Influence Over Bureaucracy and Policy. Palgrave
Macmillan. pp. 94–99. ISBN 978-0-230-60954-9.
97. ^ Charlie Savage (2015-09-20). “George W. Bush Made Retroactive N.S.A. ‘Fix’ After Hospital Room Showdown”. The New York Times.
98. ^ Jump up to:a b James Risen & Eric Lichtblau (December 16,
2005), Bush Lets U.S. Spy on Callers Without Courts, The New York Times
99. ^ “Gwu.edu”. Gwu.edu. Retrieved October 9, 2013.
100. ^ “Hamdan v. Rumsfeld, Secretary of Defense, Et Al. Certiorari to the United States Court of Appeals for the District
of Columbia Circuit” (PDF). Supreme Court of the United States.
101. ^ Gellman, Barton; Poitras, Laura (June 7, 2013). “U.S. intelligence mining data from nine U.S. Internet companies in broad secret program”. The Washington Post. Retrieved June
6, 2013.
102. ^ Greenwald, Glenn (June 6, 2013). “NSA taps in to internet giants’ systems to mine user data, secret files reveal”. The Guardian. London. Retrieved June 6, 2013.
103. ^ “Microsoft handed the NSA access to encrypted messages”. The
Guardian. July 12, 2013. Retrieved September 7, 2013.
104. ^ Angwin, Julia (2014). Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance. Times Books / Henry Holt and Company. p. 47. ISBN 978-0-8050-9807-5.
105. ^
“Elliott, Justin and Meyer, Theodoric ProPublica. Retrieved October 7, 2016”.
106. ^ “Goldman, Adam and Apuzzo, Matt Associated Press. Retrieved October 7, 2016”. Archived from the original on July 3, 2015. Retrieved October 7, 2016.
107. ^ “NSA
program stopped no terror attacks, says White House panel member”. NBC News.
108. ^ Masnick, Mike (December 23, 2013). “Judge And Intelligence Task Force Both Seem Stunned By Lack Of Evidence That Bulk Phone Collection Program Stops Terrorists”.
Techdirt. Archived from the original on October 10, 2016. Retrieved 2017-10-10.
109. ^ Aid, Matthew M. (10 June 2013). “Inside the NSA’s Ultra-Secret China Hacking Group”. Foreign Policy. Retrieved 11 June 2013.
110. ^ “U.S. NSA Unit ‘TAO’
Hacking China For Years”. Business Insider. June 11, 2013
111. ^ “Secret NSA hackers from TAO Office have been pwning China for nearly 15 years”. Computerworld. June 11, 2013.
112. ^ “Flubbed NSA Hack Caused Massive 2012 Syrian Internet Blackout,
Snowden Says”. International Business Times. August 13, 2013.
113. ^ These offices are for example mentioned in a FISA court order from 2011.
114. ^ “National Security Agency”. fas.org. Retrieved October 9, 2013.
115. ^ Matthew M. Aid, The Secret
Sentry, New York, 2009, pp. 130, 138, 156–158.
116. ^ See also the information about the historical structure of NSA that is archived at FAS.org
117. ^ TheWeek.com: The NSA’s secret org chart, September 15, 2013
118. ^ National Security Agency
– 60 Years of Defending Our Nation Archived 2018-06-23 at the Wayback Machine, Anniversary booklet, 2012, p. 96.
119. ^ Marc Ambinder, 3008 Selectors, June 27, 2013.
120. ^ Ellen Nakashima. National Security Agency plans major reorganization.
The Washington Post, Feb 2016.
121. ^ National Security Agency (2009). “ARC Registration” (PDF). NSA ARC. Archived from the original (PDF) on January 18, 2012. Retrieved April 13, 2011.
122. ^ DNI (2009). “2009 National Intelligence Consumer’s
Guide” (PDF). Director of National Intelligence. Archived from the original (PDF) on May 24, 2012. Retrieved April 13, 2011.
123. ^ US Army. “Theater Army Operations, Field Manual No. 3-93 (100–7)” (PDF). Archived from the original (PDF) on August
24, 2011. Retrieved April 13, 2011.
124. ^ Lackland Security Hill Enterprise Infrastructure and Computer Systems Management Archived 2014-02-04 at the Wayback Machine, October 1, 2010, p. 2.
125. ^ Marc Ambinder, How a single IT tech could spy
on the world, June 10, 2013.
126. ^ Misiewicz (September 1998). “Thesis; Modeling and Simulation of a Global Reachback Architecture …” (PDF). Archived from the original (PDF) on August 12, 2011. Retrieved April 13, 2011.
127. ^ Joe Jarzombek
(2004). “Systems, Network, and Information Integration Context for Software Assurance” (PDF). Carnegie Mellon University. Retrieved April 13, 2011.
128. ^ Christopher Griffin (2010). “Dealing with Sensitive Data at Penn State’s Applied Research
Laboratory: Approach and Examples” (PDF). msu.edu. Retrieved April 13, 2011.[dead link]
129. ^ NPR.org: Officials: Edward Snowden’s Leaks Were Masked By Job Duties, September 18, 2013.
130. ^ National Security Agency – 60 Years of Defending Our
Nation Archived 2018-06-23 at the Wayback Machine, Anniversary booklet, 2012, p. 102.
131. ^ “Making a Difference over 30 Years with the NSA Police > National Security Agency Central Security Service > Article View”. Archived from the original on
2021-06-24. Retrieved 2021-06-18.
132. ^ “NSA Police K-9 Unit Celebrates 140 Dog Years! > National Security Agency Central Security Service > Article View”. Archived from the original on 2021-06-24. Retrieved 2021-06-18.
133. ^ “Photographic image
of vehicle” (JPG). Washington.cbslocal.com. Retrieved 2022-02-23.
134. ^ Matthew M. Aid, The Secret Sentry, New York, 2009, pp. 128, 148, 190 and 198.
135. ^ Harvey A. Davis (March 12, 2002). Statement for the Record (Speech). 342 Dirksen Senate
Office Building, Washington, D.C. Archived from the original on June 19, 2009. Retrieved November 24, 2009.
136. ^ Jump up to:a b Drew, Christopher & Somini Sengupta (June 24, 2013). “N.S.A. Leak Puts Focus on System Administrators”. The New York
Times. Retrieved June 25, 2013.
137. ^ Jump up to:a b c David Kahn, The Codebreakers, Scribner Press, 1967, chapter 19, pp. 672–733.
138. ^ Barton Gellman (December 25, 2013). “Edward Snowden, after months of NSA revelations, says his mission’s
accomplished”. The Washington Post.
139. ^ Jump up to:a b c Bauer, Craig P. (2013). Secret History: The Story of Cryptology. CRC Press. p. 359. ISBN 978-1-4665-6186-1.
140. ^ Jump up to:a b Bamford (18 December 2007). “page 538”. Body of Secrets.
ISBN 9780307425058.
141. ^ “Your Polygraph Examination: An Important Appointment to Keep” (PDF). National Security Agency. Archived from the original (PDF) on 2013-09-03. Retrieved June 17, 2013.
142. ^ McCarthy, Susan. “The truth about the polygraph”.
Salon. Retrieved July 5, 2013.
143. ^ Jump up to:a b Nagesh, Gautham (June 14, 2010). “NSA video tries to dispel fear about polygraph use during job interviews”. The Hill. Retrieved June 15, 2013.
144. ^ Jump up to:a b Stein, Jeff. “NSA lie detectors
no sweat, video says.” The Washington Post. June 14, 2010. Retrieved July 5, 2013.
145. ^ Maschke, George (13 June 2010). “The Truth About the Polygraph (According to the NSA)”. Youtube. Archived from the original on 2021-12-11. Retrieved 15 July
2020.
146. ^ Drezner, Daniel. “Tone-Deaf at the Listening Post.” Foreign Policy. December 16, 2013. Retrieved March 1, 2014. “Snowden has also changed the way the NSA is doing business. Analysts have gone from being polygraphed once every five years
to once every quarter.”
147. ^ https://dc-newhire.com/faqs#faq:4 “Is anyone exempt from this law?” District of Columbia New Hire Registry FAQ (Retrieved 18 November 2021).
148. ^ “60 Years of Defending Our Nation” (PDF). National Security Agency.
2012. p. 15. Archived from the original (PDF) on 2013-06-14. Retrieved July 6, 2013.
149. ^ Jump up to:a b c “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 10. Archived from the original (PDF) on 2013-06-14. Retrieved
July 6, 2013.
150. ^ “60 Years of Defending Our Nation” (PDF). National Security Agency. 2012. p. 23. Archived from the original (PDF) on 2013-06-14. Retrieved July 6, 2013.
151. ^ Jump up to:a b c “60 Years of Defending Our Nation” (PDF). National
Security Agency. 2012. p. 39. Archived from the original (PDF) on 2013-06-14. Retrieved July 6, 2013.
152. ^ “Marine Cryptologic Support Battalion: Intelligence Department: Fort Meade, MD: New Joins”. United States Marine Corps. Retrieved June 11,
2013.
153. ^ Jump up to:a b “Just off the Baltimore-Washington Parkway, about 25 miles northeast of Washington, is a secret city. Fort Meade, in suburban Maryland, is home to the National Security Agency – the NSA, sometimes wryly referred to as
No Such Agency or Never Say Anything.” and “It contains almost 70 miles of roads, 1,300 buildings, each identified by a number, and 18,000 parking spaces as well as a shopping centre, golf courses, chain restaurants and every other accoutrement of
Anywhere, USA.” in “Free introduction to: Who’s reading your emails?”. The Sunday Times. June 9, 2013. Archived from the original on June 14, 2013. Retrieved June 11, 2013.(subscription required)
154. ^ Sernovitz, Daniel J. “NSA opens doors for
local businesses.” Baltimore Business Journal. August 26, 2010. Updated August 27, 2010. Retrieved June 11, 2013. “But for many more, the event was the first time attendees got the chance to take the “NSA Employees Only” exit off the Baltimore-Washington
Parkway beyond the restricted gates of the agency’s headquarters.”
155. ^ Weiland and Wilsey, p. 208. “[…]housing integration has invalidated Montpelier’s Ivory Pass and the National Security Agency has posted an exit ramp off the Baltimore-Washington
Parkway that reads NSA.”
156. ^ Grier, Peter and Harry Bruinius. “In the end, NSA might not need to snoop so secretly.” The Christian Science Monitor. June 18, 2013. Retrieved July 1, 2013.
157. ^ Jump up to:a b c Barnett, Mark L. (April 26, 2011).
“Small Business Brief” (PDF). Office of Small Business Programs, NSA, via The Greater Baltimore Committee. p. 3. Archived from the original (PDF) on June 17, 2013. Retrieved June 11, 2013.
158. ^ Gorman, Siobhan (August 6, 2006). “NSA risking electrical
overload”. The Baltimore Sun. Tribune Company. Archived from the original on June 14, 2013. Retrieved June 10, 2013.
159. ^ Dozier, Kimberly (June 9, 2013). “NSA claims know-how to ensure no illegal spying”. Associated Press. Archived from the original
on June 14, 2013. Retrieved June 12, 2013.
160. ^ “Geeks ‘R’ us”. The Baltimore Sun. Tribune Company. January 13, 2010. Archived from the original on June 14, 2013. Retrieved June 11, 2013.
161. ^ Jump up to:a b c d Bamford, Body of Secrets:
Anatomy of the Ultra-Secret National Security Agency, p. 488. “At the heart of the invisible city is NSA’s massive Headquarters/Operations Building. With more than sixty-eight acres of floor space,[…]” and “Entrance is first made through the two-story
Visitor Control Center, one[…]”
162. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 488–489. “[…]one of more than 100 fixed watch posts within the secret city manned by the armed NSA police. It is here that
clearances are checked and visitor badges are issued.”
163. ^ Jump up to:a b c Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 490. “And then there is the red badge—[…]and is normally worn by people working in
the “Red Corridor”—the drugstore and other concession areas[…]Those with a red badge are forbidden to go anywhere near classified information and are restricted to a few corridors and administrative areas—the bank, the barbershop, the cafeteria,
the credit union, the airline and entertainment ticket counters.” and “Once inside the white, pentagonal Visitor Control Center, employees are greeted by a six-foot painting of the NSA seal[…]”
164. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret
National Security Agency, p. 489. “It is here that clearances are checked and visitor badges are issued.”
165. ^ Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, p. 491. “From the Visitor Control Center one enters
the eleven-story, million OPS2A, the tallest building in the City. Shaped like a dark glass Rubik’s Cube, the building houses much of NSA’s Operations Directorate, which is responsible for processing the ocean of intercepts and prying open the complex
cipher systems.”
166. ^ Jump up to:a b c d e f Bamford, James (June 12, 2013). “The Secret War”. Wired. Retrieved June 12, 2013.
167. ^ “Career Fields/Other Opportunities/NSA Police Officers section of the NSA website”. Nsa.gov. Retrieved October
9, 2013.
168. ^ T.C. Carrington; Debra L.Z. Potts (September 1999). “National Security Agency Newsletter, Protective Services-More Than Meets the Eye. An Overview of NSA’s Protective Services volume XLVII, No. 9” (PDF). nsa.gov. pp. 8–10. Archived
from the original (PDF) on 2016-03-18.
169. ^ Jump up to:a b “Explore NSA.” (Archive) National Security Agency. Retrieved June 12, 2013. “Other Locations” and “Our employees live along the Colonial-era streets of Annapolis and Georgetown; in the
suburban surroundings of Columbia; near the excitement of Baltimore’s Inner Harbor; along rolling hills adjacent to working farms; near the shores of the Chesapeake Bay; and amid the monumental history of Washington, DC.”
170. ^ McCombs, Alan J.
(2009-02-23). “Fort Meade launches commuter shuttle service”. United States Army. Retrieved 2017-06-25.
171. ^ Jump up to:a b Sabar, Ariel (January 2, 2003). “NSA still subject to electronic failure”. Archived from the original on 2013-06-14. Retrieved
2013-06-11. and “Agency officials anticipated the problem nearly a decade ago as they looked ahead at the technology needs of the agency, sources said, but it was never made a priority, and now the agency’s ability to keep its operations going is
threatened.” and “The NSA is Baltimore Gas & Electric’s largest customer, using as much electricity as the city of Annapolis, according to James Bamford….” in Gorman, Siobhan (August 6, 2006). “NSA risking electrical overload”. Archived from the
original on 2013-06-14. Retrieved 2013-06-11. and Gorman, Siobhan (January 26, 2007). “NSA electricity crisis gets Senate scrutiny”. Archived from the original on 2013-06-14. Retrieved 2013-06-11. and Gorman, Siobhan (June 24, 2007). “Power supply
still a vexation for the NSA”. The Baltimore Sun. Tribune Company. Archived from the original on June 14, 2013. Retrieved June 11, 2013.
172. ^ GORMAN, SIOBHAN. “NSA risking electrical overload”. baltimoresun.com. Archived from the original on 2020-08-13.
Retrieved 2018-12-23.
173. ^ “The NSA uses about 65 to 75 megawatt-hours of electricity, The Sun reported last week. Its needs are projected to grow by 10 to 15 megawatt-hours by next fall.” in Staff (January 26, 2007). “NSA electricity crisis gets
Senate scrutiny”. The Baltimore Sun. Tribune Company. Archived from the original on June 14, 2013. Retrieved June 11, 2013.
174. ^ Jump up to:a b c d e f Bamford, James (March 15, 2012). “The NSA Is Building the Country’s Biggest Spy Center (Watch
What You Say)”. Wired. Condé Nast. Retrieved February 26, 2013.
175. ^ Scott Shane and Tom Bowman (December 10, 1995). “No Such Agency Part Four – Rigging the Game”. The Baltimore Sun. Archived from the original on August 27, 2011. Retrieved October
3, 2015.
176. ^ Brown, Matthew Hay (May 6, 2013). “NSA plans new computing center for cyber threats”. The Baltimore Sun. Tribune Company. Archived from the original on June 14, 2013. Retrieved June 11, 2013.
177. ^ “National Security Agency: FY
2014 Military Construction, Defense-Wide” (PDF). Office of the Under Secretary of Defense (Comptroller), USA.gov. pp. 3–4. Archived from the original (PDF) on January 25, 2014. Retrieved June 13, 2013.
178. ^ “The DoD Computer Security Center (DoDCSC)
was established in January 1981…” and “In 1985, DoDCSC’s name was changed to the National Computer Security Center…” and “its responsibility for computer security throughout the federal government…” in “A Guide to Understanding Audit in Trusted
Systems”. Nat Photo credit: https://www.flickr.com/photos/39908901@N06/8908062479/’]