Jump to content
Main menu
Main menu
move to sidebar
hide
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Special pages
Niidae Wiki
Search
Search
Appearance
Create account
Log in
Personal tools
Create account
Log in
Pages for logged out editors
learn more
Contributions
Talk
Editing
National Security Agency
(section)
Page
Discussion
English
Read
Edit
View history
Tools
Tools
move to sidebar
hide
Actions
Read
Edit
View history
General
What links here
Related changes
Page information
Appearance
move to sidebar
hide
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
== Organizational structure == [[File:LTG William J. Hartman (2).jpg|thumb|[[William J. Hartman]], the acting director of the NSA]] The NSA is led by the [[Director of the National Security Agency]] (DIRNSA), who also serves as Chief of the [[Central Security Service]] (CHCSS) and Commander of the [[United States Cyber Command]] (USCYBERCOM) and is the highest-ranking military official of these organizations. He is assisted by a [[Deputy Director of the National Security Agency|Deputy Director]], who is the highest-ranking civilian within the NSA/CSS. NSA also has an [[Inspector General]], head of the Office of the Inspector General (OIG);<ref>{{Cite web |url=https://oig.nsa.gov/ |title=National Security Agency Office of the Inspector General |access-date=2024-06-07 |archive-date=2024-06-03 |archive-url=https://web.archive.org/web/20240603195905/https://oig.nsa.gov/ |url-status=live }}</ref> a [[General Counsel]], head of the Office of the General Counsel (OGC); and a Director of Compliance, who is head of the Office of the Director of Compliance (ODOC).<ref>These offices are for example mentioned in a [http://www.dni.gov/files/documents/PrimaryOrder_Collection_215.pdf FISA court order] {{Webarchive|url=https://web.archive.org/web/20240512123342/https://www.dni.gov/files/documents/PrimaryOrder_Collection_215.pdf |date=2024-05-12 }} from 2011.</ref> The [[National Security Agency Office of Inspector General]] has worked on cases in collaboration with the [[United States Department of Justice]] and the [[Central Intelligence Agency Office of Inspector General]].<ref>{{cite web | url=https://www.justice.gov/opa/pr/six-charged-scheme-defraud-federal-government | title=Office of Public Affairs | Six Charged in Scheme to Defraud the Federal Government | United States Department of Justice | date=29 October 2024 }}</ref> Unlike other intelligence organizations such as the [[Central Intelligence Agency|CIA]] or [[Defense Intelligence Agency|DIA]], the NSA has always been particularly reticent concerning its internal organizational structure.{{citation needed|date=May 2024}} As of the mid-1990s, the National Security Agency was organized into five Directorates: * The Operations Directorate, which was responsible for SIGINT collection and processing. * The Technology and Systems Directorate, which develops new technologies for SIGINT collection and processing. * The Information Systems Security Directorate, which was responsible for NSA's communications and [[information security]] missions. * The Plans, Policy, and Programs Directorate, which provided staff support and general direction for the Agency. * The Support Services Directorate, which provided logistical and administrative support activities.<ref>{{cite web |url=https://fas.org/irp/nsa/oldind.html |title=National Security Agency |publisher=fas.org |access-date=October 9, 2013 |archive-date=November 6, 2012 |archive-url=https://web.archive.org/web/20121106042740/https://fas.org/irp/nsa/oldind.html |url-status=live }}</ref> Each of these directorates consisted of several groups or elements, designated by a letter. There were for example the A Group, which was responsible for all SIGINT operations against the Soviet Union and Eastern Europe, and the G Group, which was responsible for SIGINT related to all non-communist countries. These groups were divided into units designated by an additional number, like unit A5 for breaking Soviet codes, and G6, being the office for the Middle East, North Africa, Cuba, and Central and South America.<ref>Matthew M. Aid, The Secret Sentry, New York, 2009, pp. 130, 138, 156β158.</ref><ref>See also the information about the historical structure of NSA that is archived at [https://fas.org/irp/nsa/oldind.html#organizations FAS.org] {{Webarchive|url=https://web.archive.org/web/20121106042740/https://fas.org/irp/nsa/oldind.html#organizations |date=2012-11-06 }}</ref> === Directorates === {{as of|2013}}, NSA has about a dozen directorates, which are designated by a letter, although not all of them are publicly known.<ref>TheWeek.com: [http://theweek.com/article/index/249658/the-nsas-secret-org-chart The NSA's secret org chart] {{Webarchive|url=https://web.archive.org/web/20150111074801/http://theweek.com/article/index/249658/the-nsas-secret-org-chart |date=2015-01-11 }}, September 15, 2013</ref> In the year 2000, a leadership team was formed consisting of the director, the deputy director, and the directors of the Signals Intelligence (SID), the Information Assurance (IAD) and the Technical Directorate (TD). The chiefs of other main NSA divisions became associate directors of the senior leadership team.<ref name=nsa60>[https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf National Security Agency β 60 Years of Defending Our Nation] {{Webarchive|url=https://web.archive.org/web/20180623141614/https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf |date=2018-06-23 }}, Anniversary booklet, 2012, p. 96.</ref> After President George W. Bush initiated the [[President's Surveillance Program]] (PSP) in 2001, the NSA created a 24-hour Metadata Analysis Center (MAC), followed in 2004 by the Advanced Analysis Division (AAD), with the mission of analyzing content, Internet metadata and telephone metadata. Both units were part of the Signals Intelligence Directorate.<ref>Marc Ambinder, [http://theweek.com/article/index/246277/3008-selectors 3008 Selectors] {{Webarchive|url=https://web.archive.org/web/20150111073647/http://theweek.com/article/index/246277/3008-selectors |date=2015-01-11 }}, June 27, 2013.</ref> In 2016, a proposal combined the Signals Intelligence Directorate with the Information Assurance Directorate into a Directorate of Operations.<ref>Ellen Nakashima. [https://www.washingtonpost.com/world/national-security/national-security-agency-plans-major-reorganization/2016/02/02/2a66555e-c960-11e5-a7b2-5a2f824b02c9_story.html National Security Agency plans major reorganization] {{Webarchive|url=https://web.archive.org/web/20230526120632/https://www.washingtonpost.com/world/national-security/national-security-agency-plans-major-reorganization/2016/02/02/2a66555e-c960-11e5-a7b2-5a2f824b02c9_story.html |date=2023-05-26 }}. ''The Washington Post'', 2 Feb 2016.</ref> === NSANet === [[File:Intel GreenDoor.jpg|thumb|''Behind the Green Door'' β Secure communications room with separate computer terminals for access to [[SIPRNet]], GWAN, [[NSANet]], and [[JWICS]]]] NSANet stands for National Security Agency Network and is the official NSA [[intranet]].<ref name=arc_reg>{{cite web|url=https://www.nsaarc.net/docs/arc_registration_guide.pdf|author=National Security Agency|title=ARC Registration|year=2009|access-date=April 13, 2011|publisher=NSA ARC|archive-url=https://web.archive.org/web/20120118224340/https://www.nsaarc.net/docs/arc_registration_guide.pdf|archive-date=January 18, 2012|url-status=dead}}</ref> It is a classified network,<ref name=dni1>{{cite web |url=http://www.dni.gov/reports/IC_Consumers_Guide_2009.pdf|archive-url=https://web.archive.org/web/20120524093812/http://www.dni.gov/reports/IC_Consumers_Guide_2009.pdf|title=2009 National Intelligence Consumer's Guide|author=DNI|year=2009|access-date=April 13, 2011 |archive-date=May 24, 2012|publisher=Director of National Intelligence}}</ref> for information up to the level of [[Classified information|TS]]/[[Sensitive Compartmented Information|SCI]]<ref name=army1>{{cite web|url=http://portal.dean.usma.edu/departments/se/nrcd/PDFs/FM%203-93%20(Final%20Draft,%20Jul%2010).pdf|title=Theater Army Operations, Field Manual No. 3-93 (100β7)|author=US Army|access-date=April 13, 2011|url-status=dead|archive-url=https://web.archive.org/web/20110824235523/http://portal.dean.usma.edu/departments/se/nrcd/PDFs/FM%203-93%20(Final%20Draft,%20Jul%2010).pdf|archive-date=August 24, 2011}}</ref> to support the use and sharing of intelligence data between NSA and the signals intelligence agencies of the four other nations of the [[Five Eyes]] partnership. The management of NSANet has been delegated to the [[Central Security Service]] Texas (CSSTEXAS).<ref>[http://static.e-publishing.af.mil/production/1/67nww/publication/67nwwi33-1160/67nwwi33-1160.pdf Lackland Security Hill Enterprise Infrastructure and Computer Systems Management] {{webarchive|url=https://web.archive.org/web/20140204013239/http://static.e-publishing.af.mil/production/1/67nww/publication/67nwwi33-1160/67nwwi33-1160.pdf |date=2014-02-04 }}, October 1, 2010, p. 2.</ref> NSANet is a highly secured computer network consisting of fiber-optic and satellite communication channels that are almost completely separated from the public Internet. The network allows NSA personnel and civilian and military intelligence analysts anywhere in the world to have access to the agency's systems and databases. This access is tightly controlled and monitored. For example, every keystroke is logged, activities are audited at random, and downloading and printing of documents from NSANet are recorded.<ref>Marc Ambinder, [http://theweek.com/article/index/245408/how-a-single-it-tech-could-spy-on-the-world How a single IT tech could spy on the world] {{Webarchive|url=https://web.archive.org/web/20150111073523/http://theweek.com/article/index/245408/how-a-single-it-tech-could-spy-on-the-world |date=2015-01-11 }}, June 10, 2013.</ref> In 1998, NSANet, along with [[NIPRNet]] and [[SIPRNet]], had "significant problems with poor search capabilities, unorganized data, and old information".<ref name=nps2>{{cite web |url=http://edocs.nps.edu/npspubs/scholarly/theses/1998/Sep/98Sep_Misiewicz.pdf |title=Thesis; Modeling and Simulation of a Global Reachback Architecture ... |date=September 1998 |access-date=April 13, 2011 |author=Misiewicz |url-status=dead |archive-url=https://web.archive.org/web/20110812153842/http://edocs.nps.edu/npspubs/scholarly/theses/1998/Sep/98Sep_Misiewicz.pdf |archive-date=August 12, 2011 }}</ref> In 2004, the network was reported to have used over twenty [[commercial off-the-shelf]] operating systems.<ref name=cmu1>{{cite web|url=http://www.sei.cmu.edu/library/assets/jarzombek.pdf|title=Systems, Network, and Information Integration Context for Software Assurance|author=Joe Jarzombek|year=2004|access-date=April 13, 2011|publisher=Carnegie Mellon University|archive-date=October 28, 2011|archive-url=https://web.archive.org/web/20111028095526/http://www.sei.cmu.edu/library/assets/jarzombek.pdf|url-status=live}}</ref> Some universities that do highly sensitive research are allowed to connect to it.<ref name=ps>{{cite web|url=http://www.exportcontrols.msu.edu/FBI_2010/Dr_Christopher_Griffin_Applied_Research_Laboratories_Penn_State_University_10_20_2010.pdf|title=Dealing with Sensitive Data at Penn State's Applied Research Laboratory: Approach and Examples|author= Christopher Griffin|year=2010|access-date=April 13, 2011|publisher=msu.edu}}{{dead link|date=March 2015}}</ref> The thousands of Top Secret internal NSA documents that were taken by [[Edward Snowden]] in 2013 were stored in "a file-sharing location on the NSA's intranet site"; so, they could easily be read online by NSA personnel. Everyone with a TS/SCI clearance had access to these documents. As a system administrator, Snowden was responsible for moving accidentally misplaced highly sensitive documents to safer storage locations.<ref>NPR.org: [https://www.npr.org/2013/09/18/223523622/officials-edward-snowdens-leaks-were-masked-by-job-duties Officials: Edward Snowden's Leaks Were Masked By Job Duties] {{Webarchive|url=https://web.archive.org/web/20240512123903/https://www.npr.org/2013/09/18/223523622/officials-edward-snowdens-leaks-were-masked-by-job-duties |date=2024-05-12 }}, September 18, 2013.</ref> === Watch centers === The NSA maintains at least two watch centers: * [[National Security Operations Center]] (NSOC), which is the NSA's current operations center and focal point for time-sensitive SIGINT reporting for the United States SIGINT System (USSS). This center was established in 1968 as the National SIGINT Watch Center (NSWC) and was renamed into National SIGINT Operations Center (NSOC) in 1973. This "nerve center of the NSA" got its current name in 1996.{{citation needed|date=June 2022}} * NSA/CSS Threat Operations Center (NTOC), which is the primary NSA/CSS partner for [[Department of Homeland Security]] response to cyber incidents. The NTOC establishes real-time network awareness and threat characterization capabilities to forecast, alert, and attribute malicious activity and enable the coordination of Computer Network Operations. The NTOC was established in 2004 as a joint Information Assurance and Signals Intelligence project.<ref name=autogenerated1>[https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf National Security Agency β 60 Years of Defending Our Nation] {{Webarchive|url=https://web.archive.org/web/20180623141614/https://www.nsa.gov/about/cryptologic_heritage/60th/book/NSA_60th_Anniversary.pdf |date=2018-06-23}}, Anniversary booklet, 2012, p. 102.</ref> ===NSA Police=== The NSA has its law enforcement team, known as the ''NSA Police'' (and formerly as ''NSA Security Protective Force'') which provides law enforcement services, emergency response, and physical security to its officials and properties.<ref>{{cite web |url=https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2604199/making-a-difference-over-30-years-with-the-nsa-police/ |title=Making a Difference over 30 Years with the NSA Police > National Security Agency Central Security Service > Article View |access-date=2021-06-18 |archive-date=2021-06-24 |archive-url=https://web.archive.org/web/20210624201455/https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/2604199/making-a-difference-over-30-years-with-the-nsa-police/ |url-status=dead }}</ref> NSA Police are armed federal officers. NSA Police has a K9 division, which generally conducts explosive detection screening of mail, vehicles, and cargo entering NSA grounds.<ref>{{cite web |url=https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/1581793/nsa-police-k-9-unit-celebrates-140-dog-years/ |title=NSA Police K-9 Unit Celebrates 140 Dog Years! > National Security Agency Central Security Service > Article View |access-date=2021-06-18 |archive-date=2021-06-24 |archive-url=https://web.archive.org/web/20210624200154/https://www.nsa.gov/News-Features/Feature-Stories/Article-View/Article/1581793/nsa-police-k-9-unit-celebrates-140-dog-years/ |url-status=dead }}</ref> They use marked vehicles to carry out patrols.<ref> {{cite web|url=https://washington.cbslocal.com/wp-content/uploads/sites/15909891/2015/06/gettyimages-76864184-e1435148637500.jpg?w=1024&h=576&crop=1|format=JPG|title=Photographic image of vehicle|website=Washington.cbslocal.com|access-date=2022-02-23|archive-date=2021-06-24|archive-url=https://web.archive.org/web/20210624200950/https://washington.cbslocal.com/wp-content/uploads/sites/15909891/2015/06/gettyimages-76864184-e1435148637500.jpg?w=1024&h=576&crop=1|url-status=live}}</ref>
Summary:
Please note that all contributions to Niidae Wiki may be edited, altered, or removed by other contributors. If you do not want your writing to be edited mercilessly, then do not submit it here.
You are also promising us that you wrote this yourself, or copied it from a public domain or similar free resource (see
Encyclopedia:Copyrights
for details).
Do not submit copyrighted work without permission!
Cancel
Editing help
(opens in new window)
Search
Search
Editing
National Security Agency
(section)
Add topic