-
Abraham Sinkov
Dr. Abraham Sinkov (1907–1998) was a US cryptanalyst.
http://wn.com/Abraham_Sinkov -
Agnes Meyer Driscoll
Agnes Meyer Driscoll (July 24, 1889 - September 16, 1971) was, known as Miss Aggie or Madame X, an American
http://wn.com/Agnes_Meyer_Driscoll -
Anna Diggs Taylor
Anna Diggs Taylor (born Anna Katherine Johnston in Washington, D.C., 1932) is a United States District Judge for the United States District Court for the Eastern District of Michigan. She graduated from Barnard College in 1954 and Yale Law School in 1957, and worked in the Office of Solicitor for the United States Department of Labor. In 1979, she was appointed to the federal bench by President Jimmy Carter, becoming the first black woman judge appointed to that Eastern District of Michigan.
http://wn.com/Anna_Diggs_Taylor -
Bobby Ray Inman
Bobby R. Inman (born 4 April 1931 in Rhonesboro, Texas) is a retired United States admiral who held several influential positions in the U.S. Intelligence community.
http://wn.com/Bobby_Ray_Inman -
Dana Priest
Dana Priest (born 1957) is an American author and Pulitzer Prize-winning journalist. Priest has worked almost 20 years for The Washington Post. As one of the ''Post's'' specialists on National Security she has written many articles on the United States' "War on terror." In 2006 she won the Pulitzer Prize for Beat Reporting for her reporting on black site prisons and in 2008 The Washington Post was awarded the Pulitzer Prize for Public Service for the reporting of Priest and Anne Hull and photographer Michel du Cille at Walter Reed Army Medical Center.
http://wn.com/Dana_Priest -
Eric Holder
Eric Himpton Holder, Jr. (born January 21, 1951) is the 82nd and current Attorney General of the United States and the first African American to hold the position. He is serving under President Barack Obama.
http://wn.com/Eric_Holder -
Eric Lichtblau
Eric Lichtblau is an American journalist and Washington bureau reporter for The New York Times.
http://wn.com/Eric_Lichtblau -
Fidel Castro
Fidel Alejandro Castro Ruz (born August 13, 1926) is a Cuban politician. One of the primary leaders of the Cuban Revolution, Castro served as the Prime Minister of Cuba from February 1959 to December 1976, and then as the President of the Council of State of Cuba and the President of Council of Ministers of Cuba until his resignation from the office in February 2008. He currently serves as First Secretary of the Communist Party of Cuba, a position he has held since 1965.
http://wn.com/Fidel_Castro -
Frank Church
Frank Forrester Church III (July 25, 1924 – April 7, 1984) was an American lawyer and politician. A member of the Democratic Party, he served as a United States Senator from Idaho from 1957 to 1981.
http://wn.com/Frank_Church -
Frank Rowlett
Frank Byron Rowlett (May 2, 1908 - June 29, 1998) was an American cryptologist.
http://wn.com/Frank_Rowlett -
George W. Bush
George Walker Bush (; born July 6, 1946, in New Haven, Connecticut) was the 43rd President of the United States, serving from 2001 to 2009, and the 46th Governor of Texas, serving from 1995 to 2000.
http://wn.com/George_W_Bush -
Gordon A. Blake
http://wn.com/Gordon_A_Blake -
Harry S Truman
http://wn.com/Harry_S_Truman -
Harry S. Truman
Harry S. Truman (May 8, 1884 – December 26, 1972) was the 33rd President of the United States (1945–1953). As President Franklin D. Roosevelt's third vice-president and the 34th Vice President of the United States, he succeeded to the presidency on April 12, 1945, when President Roosevelt died less than three months after beginning his historic fourth term.
http://wn.com/Harry_S_Truman -
Herbert Yardley
Herbert Osborne Yardley (13 April 1889-7 August 1958) was an American cryptologist best known for his book The American Black Chamber (1931). The title of the book refers to MI-8, the cryptographic organization of which Yardley was the founder and head. Under Yardley, the cryptanalysts of The American Black Chamber, broke Japanese diplomatic codes and were able to furnish American negotiators with significant information during the Washington Naval Conference of 1921-1922. He later helped the Nationalists in China (1938–1940) to break Japanese codes. Following his work in China, Yardley worked briefly for the Canadian government, helping it set up a cryptological section (Examination Unit) of the National Research Council of Canada from June to December 1941. Yardley was let go due to pressure from Washington.
http://wn.com/Herbert_Yardley -
James Risen
James Risen is a Pulitzer Prize-winning American journalist for The New York Times who worked previously for the Los Angeles Times. He has written or co-written many articles concerning U.S. government activities and is the author or co-author of two books about the Central Intelligence Agency (CIA) and a book about the American public debate about abortion.
http://wn.com/James_Risen -
John A. Samford
John Alexander Samford (1905 – December 1, 1968) was a former director of the National Security Agency.
http://wn.com/John_A_Samford -
John Anthony Walker
John Anthony Walker, Jr. (b. 28 July 1937, Washington D.C.) is a retired United States Navy Chief Warrant Officer and communications specialist convicted of spying for the Soviet Union from 1968 to 1985, at the height of the Cold War (1945–91). In late 1985, Walker pleaded guilty in a plea arrangement, whereby he testified against conspirator Jerry Whitworth, gave details of his espionage, and negotiated lenient punishment for his son, Michael Walker. During his time as a Soviet spy, CWO Walker helped the Soviets decipher more than a million encrypted naval messages,
http://wn.com/John_Anthony_Walker -
John C. Inglis
John Chris Inglis is the current Deputy Director of the National Security Agency.
http://wn.com/John_C_Inglis -
John F. Kennedy
John Fitzgerald "Jack" Kennedy (May 29, 1917 – November 22, 1963), often referred to by his initials JFK, was the 35th President of the United States, serving from 1961 until his assassination in 1963.
http://wn.com/John_F_Kennedy -
John M. McConnell
http://wn.com/John_M_McConnell -
Keith B. Alexander
General Keith B. Alexander, USA (born 1952) is the current Director, National Security Agency (DIRNSA), Chief, Central Security Service (CCSS) and Commander, United States Cyber Command. He previously served as Deputy Chief of Staff, G-2, U.S. Army from 2003 to 2005. He assumed the positions of Director, National Security Agency and Chief, Central Security Service on August 1, 2005 and the additional duties as Commander, United States Cyber Command on May 21, 2010.
http://wn.com/Keith_B_Alexander -
Kenneth A. Minihan
http://wn.com/Kenneth_A_Minihan -
Laurence H. Frost
http://wn.com/Laurence_H_Frost -
Lew Allen, Jr.
http://wn.com/Lew_Allen_Jr -
Lincoln D. Faurer
Lieutenant General Lincoln D. Faurer was director of the National Security Agency and chief of the Central Security Service from 1981 to 1985.
http://wn.com/Lincoln_D_Faurer -
Louis W. Tordella
Louis W. Tordella (May 1, 1911–January 10, 1996) was the longest serving deputy director of the NSA.
http://wn.com/Louis_W_Tordella -
Mark Klein
Mark Klein is a former AT&T; technician who leaked knowledge of his company's cooperation with the United States National Security Agency in installing network hardware to monitor and process American telecommunications. The subsequent media coverage became a major story in May 2006.
http://wn.com/Mark_Klein -
Noel A. M. Gaylor
http://wn.com/Noel_A_M_Gaylor -
Ralph J. Canine
http://wn.com/Ralph_J_Canine -
Richard Nixon
Richard Milhous Nixon (January 9, 1913 – April 22, 1994) was the 37th President of the United States from 1969 to 1974, having formerly been the 36th Vice President of the United States from 1953 to 1961. A member of the Republican Party, he was the only President to resign the office as well as the only person to be elected twice to both the Presidency and the Vice Presidency.
http://wn.com/Richard_Nixon -
Ronald Pelton
Ronald William Pelton (born in 1942) was an NSA spy who was convicted in 1986 of spying for and selling secrets to the Soviet Union. He reportedly has a photographic memory as he passed no documents to the Soviets. One operation he compromised was Operation Ivy Bells.
http://wn.com/Ronald_Pelton -
Samuel A. Adams
Samuel A. Adams (June 14, 1934 – October 10, 1988) was an analyst for the Central Intelligence Agency who is best known for discovering underestimated Vietcong and North Vietnamese Army troop numbers during the Vietnam War. He eventually retired from the CIA after claiming there was a conspiracy among officials within U.S. Headquarters in Saigon.
http://wn.com/Samuel_A_Adams -
Samuel C. Phillips
General Samuel Cochran Phillips (February 19, 1921–January 31, 1990) was a United States Air Force four star general who served as Director of NASA's Apollo Manned Lunar Landing Program from 1964 to 1969, the seventh Director of the National Security Agency from 1972 to 1973, and as Commander, Air Force Systems Command (COMAFSC) from 1973 to 1975.
http://wn.com/Samuel_C_Phillips -
Sherman Kent
Sherman Kent, (December 6, 1903 - March 11, 1986), was a Yale University history professor who during World War II, and through 17 years of Cold War-era service in the Central Intelligence Agency pioneered many of the methods of intelligence analysis. He is often described as "the father of intelligence analysis".
http://wn.com/Sherman_Kent -
Solomon Kullback
Solomon Kullback (b. 1907 - d. 1994) was a US cryptanalyst and mathematician.
http://wn.com/Solomon_Kullback -
Thomas Andrews Drake
Thomas Andrews Drake (born 1957) is a former senior official of the U.S. National Security Agency (NSA), computer software expert, and a management and leadership specialist who became the fourth person in U.S. history to be indicted under the Espionage Act of 1917 for whistleblowing.
http://wn.com/Thomas_Andrews_Drake -
Walter Bedell Smith
Walter Bedell "Beetle" Smith (5 October 1895 – 9 August 1961) was a senior United States Army General who served as General Dwight D. Eisenhower's Chief of Staff at Allied Forces Headquarters during the Tunisia Campaign and the Allied invasion of Italy. Later he was Eisenhower's Chief of Staff at SHAEF from 1944 to 1945.
http://wn.com/Walter_Bedell_Smith -
Walter Laqueur
Walter Zeev Laqueur (born 26 May 1921) is an American historian and political commentator.
http://wn.com/Walter_Laqueur -
William Arkin
William M. Arkin (born 1956) is an American political commentator, activist, journalist, blogger, and former United States Army soldier.
http://wn.com/William_Arkin -
William E. Odom
http://wn.com/William_E_Odom
-
{{Infobox country
http://wn.com/Australia -
Baltimore () is the largest independent city in the United States and the largest city and cultural center of the U.S. state of Maryland. The city is located in central Maryland along the tidal portion of the Patapsco River, an arm of the Chesapeake Bay. Baltimore is sometimes referred to as Baltimore City in order to distinguish it from surrounding Baltimore County. Founded in 1729, Baltimore is a major U.S. seaport and is situated closer to major Midwestern markets than any other major seaport on the East Coast. Baltimore's Inner Harbor was once the second leading port of entry for immigrants to the United States and a major manufacturing center. The harbor is now home to Harborplace, a shopping, entertainment, and tourist center, and the National Aquarium in Baltimore. After a decline in manufacturing, Baltimore shifted to a service-oriented economy. Johns Hopkins University and Johns Hopkins Hospital are now the city's largest employers.
http://wn.com/Baltimore -
Camp W. G. Williams, also known as Army Garrison Camp Williams, is a National Guard training site operated by the Utah National Guard. It is located south of Bluffdale, west of Lehi, and north of Saratoga Springs and Cedar Fort, approximately south of Salt Lake City, straddling the border between Salt Lake County and Utah County in the western portion of the Traverse Mountains. Camp Williams is also home to the National Guard Basic Non Commissioned Officer Course Phase 1 (BNCOC) which is 2 weeks in duration.
http://wn.com/Camp_W_G_Williams -
Canada () is a country in North America, extending from the Atlantic Ocean in the east to the Pacific Ocean in the west and northward into the Arctic Ocean. It is the world's second largest country by total area. Canada's common border with the United States to the south and northwest is the longest in the world.
http://wn.com/Canada -
Fort George G. Meade, located adjacent to Odenton, Maryland, in Anne Arundel County, is an active U.S. Army installation. The fort, established in 1917, is named for General George Gordon Meade, a Union Army general in the American Civil War. It covers in Anne Arundel County, Maryland.
http://wn.com/Fort_George_G_Meade -
Fort Gordon is a United States Army installation and the current home of the United States Army Signal Corps and Signal Center and was once the home of "The Provost Marshal General School" (Military Police). The fort is located in Richmond, Jefferson, McDuffie, and Columbia counties, Georgia. The main component of the post is the Advanced Individual Training for Signal Corps military occupational specialities. In 1966–68 the Army's Signal Officer Candidate School (located at Fort Monmouth during World War II and the Korean conflict) graduated over 2,200 Signal officers.
http://wn.com/Fort_Gordon -
Fort Meade is a census-designated place (CDP) in Anne Arundel County, Maryland, United States. The population was 9,882 at the 2000 census. It is the home to the National Security Agency, which is located on the US Army post Fort George G. Meade.
http://wn.com/Fort_Meade_Maryland -
FROSTBURG was a Connection Machine 5 (CM-5) supercomputer used by the US National Security Agency (NSA) to perform higher-level mathematical calculations. The CM-5 was built by the Thinking Machines Corporation, based in Cambridge, Massachusetts. The system was installed at the NSA in 1991, and operated until 1997. It was the first massively parallel processing computer bought by the NSA, originally containing 256 processing nodes. The system was upgraded in 1993 with an additional 256 nodes, for a total of 512 nodes. The system had a total of 500 billion 32-bit words of memory (~2 terabytes), and could perform at 65.5 gigaflops. The operating system was based on UNIX, but optimized for parallel processing.
http://wn.com/FROSTBURG -
Georgia () is a state located in the southeastern United States. Georgia was established in 1732, the last of the original Thirteen Colonies. Georgia was the fourth state to ratify the United States Constitution, on January 2, 1788. It declared its secession from the Union on January 21, 1861, and was one of the original seven Confederate states. It was the last state to be restored to the Union, on July 15, 1870 and the only among the 13 that is explicitly named after a monarch; King George II of England.
http://wn.com/Georgia_(US_state) -
Lernout & Hauspie Speech Products, or L&H;, was a leading Belgium-based speech recognition technology company, founded by Jo Lernout and Pol Hauspie, that went bankrupt in 2001. The company was based in Ieper, Flanders, in what was then called the Flanders Language Valley (mimicking the Silicon Valley).
http://wn.com/Lernout_&_Hauspie -
Maryland () is an American state located in the Mid Atlantic region of the United States, bordering Virginia, West Virginia and the District of Columbia to its south and west; Pennsylvania to its north; and Delaware to its east. According to the U.S. Census Bureau, Maryland has the highest median household income of any state, with a median income of $70,545. Maryland was the seventh state to ratify the United States Constitution, and three nicknames for it, the Old Line State, the Free State, and the Chesapeake Bay State are occasionally used.
http://wn.com/Maryland -
{{Infobox Country
http://wn.com/New_Zealand -
http://wn.com/NSA -
Salt Lake City is the capital and the most populous city of the U.S. state of Utah. The name of the city is often shortened to Salt Lake or SLC. With an estimated population of 183,171, the city lies in the Salt Lake City metropolitan area, which has a total estimated population of 1,130,293. Salt Lake City is further situated in a larger urban area known as the Wasatch Front, which has an estimated population of 2,298,915.
http://wn.com/Salt_Lake_City -
http://wn.com/San_Antonio_Texas -
The Kingdom of Saudi Arabia (), commonly known as Saudi Arabia, occasionally spelled '''Sa'udi Arabia''', is the largest Arab country of the Middle East. It is bordered by Jordan and Iraq on the north and northeast, Kuwait, Qatar, Bahrain and the United Arab Emirates on the east, Oman on the southeast, and Yemen on the south. The Persian Gulf lies to the northeast and the Red Sea to its west. It has an estimated population of 28 million, and its size is approximately . The kingdom is sometimes called "The Land of the Two Holy Mosques" in reference to Mecca and Medina, the two holiest places in Islam. The two mosques are Masjid al-Haram (in Mecca) and Masjid Al-Nabawi (in Medina). The current kingdom was founded by Abdul-Aziz bin Saud, whose efforts began in 1902 when he captured the Al-Saud’s ancestral home of Riyadh, and culminated in 1932 with the proclamation and recognition of the Kingdom of Saudi Arabia, though its national origins go back as far as 1744 with the establishment of the First Saudi State. Saudi Arabia's government takes the form of an Islamic absolute monarchy. Human rights groups such as Amnesty International and Human Rights Watch have repeatedly expressed concern about the state of human rights in Saudi Arabia.
http://wn.com/Saudi_Arabia -
The Union of Soviet Socialist Republics (USSR, , abbreviated СССР, SSSR), informally known as the Soviet Union () or Soviet Russia, was a constitutionally socialist state that existed on the territory of most of the former Russian Empire in Eurasia between 1922 and 1991.
http://wn.com/Soviet_Union -
The United Kingdom of Great Britain and Northern Ireland (commonly known as the United Kingdom, the UK, or Britain) is a country and sovereign state located off the northwestern coast of continental Europe. It is an island nation, spanning an archipelago including Great Britain, the northeastern part of the island of Ireland, and many smaller islands. Northern Ireland is the only part of the UK with a land border with another sovereign state, sharing it with the Republic of Ireland. Apart from this land border, the UK is surrounded by the Atlantic Ocean, the North Sea, the English Channel and the Irish Sea. Great Britain is linked to continental Europe by the Channel Tunnel.
http://wn.com/United_Kingdom -
The United States of America (also referred to as the United States, the U.S., the USA, or America) is a federal constitutional republic comprising fifty states and a federal district. The country is situated mostly in central North America, where its forty-eight contiguous states and Washington, D.C., the capital district, lie between the Pacific and Atlantic Oceans, bordered by Canada to the north and Mexico to the south. The state of Alaska is in the northwest of the continent, with Canada to the east and Russia to the west across the Bering Strait. The state of Hawaii is an archipelago in the mid-Pacific. The country also possesses several territories in the Caribbean and Pacific.
http://wn.com/United_States -
http://wn.com/USPTO -
The 'USS Liberty incident' was an attack on a United States Navy technical research ship, , by Israeli Air Force jet fighter aircraft and motor torpedo boats of the Israeli Navy, on June 8, 1967, during the Six-Day War. The combined air and sea attack killed 34 crew members (naval officers, seamen, two Marines, and one civilian), wounded 170 crew members, and severely damaged the ship. At the time, the ship was in international waters north of the Sinai Peninsula, about northwest from the Egyptian city of Arish.
http://wn.com/USS_Liberty_incident -
'USS Pueblo' may refer to:
http://wn.com/USS_Pueblo -
{|
http://wn.com/USS_Pueblo_(AGER-2) -
Utah ( or ) is a western state of the United States. It was the 45th state admitted to the Union, on January 4, 1896. Approximately 80% of Utah's 2,784,572 people live along the Wasatch Front, centering on Salt Lake City. This leaves vast expanses of the state nearly uninhabited, making the population the sixth most urbanized in the U.S. The name "Utah" is derived from the name of the Ute tribe and means "people of the mountains" in the Ute language. Utah is bordered by Arizona on the south, Colorado on the east, Wyoming on the northeast, Idaho on the north and Nevada on the west. It also touches a corner of New Mexico.
http://wn.com/Utah -
The White House is the official residence and principal workplace of the President of the United States. Located at 1600 Pennsylvania Avenue NW in Washington, D.C., the house was designed by Irish-born James Hoban, and built between 1792 and 1800 of white-painted Aquia sandstone in the Neoclassical style. It has been the residence of every U.S. President since John Adams. When Thomas Jefferson moved into the house in 1801, he (with architect Benjamin Henry Latrobe) expanded the building outward, creating two colonnades that were meant to conceal stables and storage.
http://wn.com/White_House
- ACLU
- ACLU v. NSA
- Agnes Meyer Driscoll
- Airbus
- algorithm
- Andrew Tully
- Anna Diggs Taylor
- Army Security Agency
- AT&T;
- Australia
- Backdoor (computing)
- bald eagle
- Baltimore
- Baltimore Sun
- Biometric Consortium
- block cipher
- Bobby Ray Inman
- Boeing
- broadcasting
- Camp W. G. Williams
- Canada
- CCR v. Bush
- Church Committee
- cipher
- citizen
- Clipper chip
- code (cryptography)
- Common Criteria
- cryptanalysis
- cryptography
- Cryptology
- CSC
- cyber-terrorism
- Dana Priest
- data mining
- David Kahn (writer)
- digital signature
- diplomacy
- Dual EC DRBG
- eavesdropping
- ECHELON
- EKMS
- Enercon
- Eric Holder
- Eric Lichtblau
- Espionage
- Espionage Act
- fax
- Fidel Castro
- FNBDT
- Fort George G. Meade
- Fort Gordon
- Fort Meade, Maryland
- Fortezza
- Frank Church
- Frank Rowlett
- FROSTBURG
- gag order
- geolocation
- George W. Bush
- Georgia (U.S. state)
- Gordon A. Blake
- GWAN
- Hamdan v. Rumsfeld
- hardware
- Harry S Truman
- Harry S. Truman
- Hepting v. AT&T;
- heraldic
- Herbert Brownell
- Herbert Yardley
- IBM
- IBM 7950 Harvest
- IEEE
- industrial espionage
- information systems
- Inspectors General
- Internet
- Izvestia
- James Bamford
- James Risen
- JN-25
- John A. Samford
- John Anthony Walker
- John C. Inglis
- John F. Kennedy
- John M. McConnell
- John Prados
- John Wiley & Sons
- JWICS
- Keith B. Alexander
- Kenneth A. Minihan
- key escrow
- KG-84
- Khufu and Khafre
- KL-7
- KUOW-FM
- KW-26
- KW-37
- KY-57
- lag
- Laurence H. Frost
- Lernout & Hauspie
- Lew Allen, Jr.
- Lincoln D. Faurer
- Litton Industries
- Louis W. Tordella
- malware
- Mark Klein
- Marshall Carter
- Marshall S. Carter
- Maryland
- mathematician
- Matthew Aid
- military
- Narus (company)
- Naval Security Group
- New York Times
- New Zealand
- NIPRNET
- Noel A. M. Gaylor
- NOW (TV series)
- NSA
- NSA Hall of Honor
- NSANET
- Operation Ivy Bells
- patent
- Patrick Radden Keefe
- PC Card
- politics
- PR Newswire
- privacy
- Project SHAMROCK
- radio
- Rainbow Series
- Ralph J. Canine
- Richard Nixon
- Robert A. Liston
- Ronald Pelton
- SAIC
- Salt Lake City
- Samuel A. Adams
- Samuel C. Phillips
- San Antonio, Texas
- Saudi Arabia
- semiconductor
- SHA-0
- SHA-1
- SHA-2
- Shadow Factory
- Sherman Kent
- signals intelligence
- SINCGARS
- SIPRNET
- Skipjack (cipher)
- Solomon Kullback
- Soviet Union
- Steven Levy
- STU-III
- Substitution box
- supercomputer
- TACLANE
- TCSEC
- telephone
- Telephone tapping
- TEMPEST
- terrorism
- The Atlantic
- The Codebreakers
- The Jurist
- The Secret Sentry
- ThinThread
- Thomas Andrews Drake
- Trailblazer
- Trailblazer Project
- Tribune Company
- Turbulence (NSA)
- Type 1 product
- U.S. District Court
- U.S. government
- U.S. territory
- UKUSA
- United Kingdom
- United States
- United States Army
- United States dollar
- United States entity
- United States Navy
- USA PATRIOT Act
- USPTO
- USS Liberty incident
- USS Pueblo
- USS Pueblo (AGER-2)
- Utah
- Venona project
- Vice Admiral
- Walter Bedell Smith
- Walter Laqueur
- warrant (law)
- Washington Post
- whistleblower
- White House
- William Arkin
- William E. Odom
- William F. Friedman
- William O. Studeman
- wind turbine
- World War II
- Order: Reorder
- Duration: 4:01
- Published: 03 Dec 2009
- Uploaded: 01 Dec 2011
- Author: RussiaToday
- Order: Reorder
- Duration: 9:47
- Published: 06 May 2009
- Uploaded: 28 Nov 2011
- Author: ClearanceJobs
- Order: Reorder
- Duration: 1:52
- Published: 28 Dec 2006
- Uploaded: 29 Nov 2011
- Author: Jimanjee21
- Order: Reorder
- Duration: 4:38
- Published: 05 Feb 2010
- Uploaded: 04 Dec 2011
- Author: RussiaToday
- Order: Reorder
- Duration: 10:15
- Published: 03 Oct 2010
- Uploaded: 03 Dec 2011
- Author: vincedelgato
- Order: Reorder
- Duration: 9:00
- Published: 20 Jul 2010
- Uploaded: 02 Nov 2011
- Author: TheAlexJonesChannel
- Order: Reorder
- Duration: 7:01
- Published: 14 Nov 2010
- Uploaded: 02 Dec 2011
- Author: aReaganDesignee
- Order: Reorder
- Duration: 2:58
- Published: 19 May 2011
- Uploaded: 29 Nov 2011
- Author: wearechange
- Order: Reorder
- Duration: 9:16
- Published: 12 Jan 2008
- Uploaded: 31 Oct 2011
- Author: weneedhelp
- Order: Reorder
- Duration: 2:50
- Published: 02 Jan 2010
- Uploaded: 03 Dec 2011
- Author: ScenesMustafaFavs
- Order: Reorder
- Duration: 97:41
- Published: 18 Sep 2009
- Uploaded: 08 Oct 2011
- Author: caseschooloflaw
- Order: Reorder
- Duration: 57:50
- Published: 25 Feb 2007
- Uploaded: 02 Dec 2011
- Author: talkingsticktv
- Order: Reorder
- Duration: 9:57
- Published: 04 Jan 2009
- Uploaded: 02 Dec 2011
- Author: reprehensor
- Order: Reorder
- Duration: 8:39
- Published: 03 Nov 2006
- Uploaded: 15 Nov 2011
- Author: marsboy683
- Order: Reorder
- Duration: 10:55
- Published: 20 Jul 2010
- Uploaded: 09 Sep 2011
- Author: TheAlexJonesChannel
-
Iran files complaint over purported US drone
Al Jazeera
-
Euro crisis summit: The night Europe changed
BBC News
-
Before Voting, If Only Death Had Been Before Their Own Eyes
WorldNews.com
-
Israeli airstrikes hit Gaza civilians
Sydney Morning Herald
-
Italian police arrest alleged Mafia boss hiding in bunker
CNN
- Abraham Sinkov
- ACLU
- ACLU v. NSA
- Agnes Meyer Driscoll
- Airbus
- algorithm
- Andrew Tully
- Anna Diggs Taylor
- Army Security Agency
- AT&T;
- Australia
- Backdoor (computing)
- bald eagle
- Baltimore
- Baltimore Sun
- Biometric Consortium
- block cipher
- Bobby Ray Inman
- Boeing
- broadcasting
- Camp W. G. Williams
- Canada
- CCR v. Bush
- Church Committee
- cipher
- citizen
- Clipper chip
- code (cryptography)
- Common Criteria
- cryptanalysis
- cryptography
- Cryptology
- CSC
- cyber-terrorism
- Dana Priest
- data mining
- David Kahn (writer)
- digital signature
- diplomacy
- Dual EC DRBG
- eavesdropping
- ECHELON
- EKMS
- Enercon
- Eric Holder
- Eric Lichtblau
- Espionage
- Espionage Act
- fax
- Fidel Castro
- FNBDT
- Fort George G. Meade
- Fort Gordon
- Fort Meade, Maryland
- Fortezza
- Frank Church
- Frank Rowlett
- FROSTBURG
- gag order
- geolocation
size: 2.4Kb
size: 6.0Kb
size: 1.1Kb
size: 1.3Kb
size: 17.2Kb
size: 1.7Kb
size: 3.0Kb
size: 2.8Kb
Agency name | National Security Agency |
---|---|
Seal | National Security Agency.svg |
Seal width | 200px |
Formed | November 4, 1952 |
Preceding1 | Armed Forces Security Agency |
Jurisdiction | United States |
Headquarters | Fort Meade, Maryland |
Employees | Classified |
Budget | Classified |
Chief1 name | General Keith B. Alexander, USA |
Chief1 position | Director |
Chief2 name | John C. Inglis |
Chief2 position | Deputy Director |
Parent agency | United States Department of Defense |
Website | www.nsa.gov }} |
The National Security Agency/Central Security Service (NSA/CSS) is a cryptologic intelligence agency of the United States Department of Defense responsible for the collection and analysis of foreign communications and foreign signals intelligence, as well as protecting U.S. government communications and information systems, which involves cryptanalysis and cryptography.
The NSA is directed by at least a lieutenant general or vice admiral. NSA is a key component of the U.S. Intelligence Community, which is headed by the Director of National Intelligence. The Central Security Service is a co-located agency created to coordinate intelligence activities and co-operation between NSA and other U.S. military cryptanalysis agencies. The Director of the National Security Agency serves as the Commander of the United States Cyber Command and Chief of the Central Security Service.
By law, NSA's intelligence gathering is limited to foreign communications, although domestic incidents such as the NSA warrantless surveillance controversy have occurred.
Organization
The National Security Agency is divided into two major missions: the Signals Intelligence Directorate (SID), which produces foreign signals intelligence information, and the Information Assurance Directorate (IAD), which protects U.S. information systems.
Role
NSA's eavesdropping mission includes radio broadcasting, both from various organizations and individuals, the Internet, telephone calls, and other intercepted forms of communication. Its secure communications mission includes military, diplomatic, and all other sensitive, confidential or secret government communications. It has been described as the world's largest single employer of mathematicians, and the owner of the single largest group of supercomputers, but it has tried to keep a low profile. For many years, its existence was not acknowledged by the U.S. government, earning it the nickname, "No Such Agency" (NSA). Because the agency rarely makes any public remarks, it has been quipped that their motto is "Never Say Anything"..
According to the Washington Post, "[e]very day, collection systems at the National Security Agency intercept and store 1.7 billion e-mails, phone calls and other types of communications. The NSA sorts a fraction of those into 70 separate databases."
Because of its listening task, NSA/CSS has been heavily involved in cryptanalytic research, continuing the work of predecessor agencies which had broken many World War II codes and ciphers (see, for instance, Purple, Venona project, and JN-25).
In 2004, NSA Central Security Service and the National Cyber Security Division of the Department of Homeland Security (DHS) agreed to expand NSA Centers of Academic Excellence in Information Assurance Education Program.
As part of the National Security Presidential Directive 54/Homeland Security Presidential Directive 23 (NSPD 54), signed on January 8, 2008 by President Bush, the NSA became the lead agency to monitor and protect all of the federal government's computer networks from cyber-terrorism. In 2010, Robert Gates called for DHS to have a "cell" that would be able to apply the full surveillance powers of NSA for domestic cyber security.
Facilities
Headquarters for the National Security Agency is at Fort George G. Meade, Maryland, about southwest of Baltimore. The NSA has its own exit off Maryland Route 295 South labeled "NSA Employees Only." The scale of the operations at the NSA is hard to determine from unclassified data; some 18,000 parking spaces are visible in photos of the site. In 2006, the Baltimore Sun reported that the NSA was at risk of electrical overload because of insufficient internal electrical infrastructure at Fort Meade to support the amount of equipment being installed. This problem was apparently recognized in the 1990s but not made a priority, and "now the agency's ability to keep its operations going is threatened." Its secure government communications work has involved the NSA in numerous technology areas, including the design of specialized communications hardware and software, production of dedicated semiconductors (at the Ft. Meade chip fabrication plant), and advanced cryptography research. The agency contracts with the private sector in the fields of research and equipment.
In addition to its Ft. Meade headquarters, the NSA has facilities at the Texas Cryptology Center in San Antonio, Texas; at Fort Gordon, Georgia, and elsewhere.
On January 6, 2011 a groundbreaking ceremony was held to begin construction on the NSA's first Comprehensive National Cyber-security Initiative (CNCI) Data Center; the "Utah Data Center" for short. The USD $1.5 billion data center is being built at Camp Williams, Utah, located miles south of Salt Lake City. The data center will help support the agency's National Cyber-security Initiative.
National Computer Security Center
The National Computer Security Center, once part of the National Security Agency, was established in 1981 and was responsible for testing and evaluating computer equipment for use in high security and/or confidential applications. NCSC was also responsible for publishing the Orange Book and Trusted Network Interpretation (Red Book) detailing trusted computing and network platform specifications. The two works are more formally known as the Trusted Computing System Evaluation Criteria and Trusted Network Interpretation, part of the Rainbow Series, however, they have largely been replaced by the Common Criteria.
History
The National Security Agency's predecessor was the Armed Forces Security Agency (AFSA), created on May 20, 1949. This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff. The AFSA was to direct the communications and electronic intelligence activities of the U.S. military intelligence units: the Army Security Agency, the Naval Security Group, and the Air Force Security Service. However, that agency had little power and lacked a centralized coordination mechanism. The creation of NSA resulted from a December 10, 1951, memo sent by CIA Director Walter Bedell Smith to James S. Lay, Executive Secretary of the National Security Council. The memo observed that "control over, and coordination of, the collection and processing of Communications Intelligence had proved ineffective" and recommended a survey of communications intelligence activities. The proposal was approved on December 13, 1951, and the study authorized on December 28, 1951. The report was completed by June 13, 1952. Generally known as the "Brownell Committee Report," after committee chairman Herbert Brownell, it surveyed the history of U.S. communications intelligence activities and suggested the need for a much greater degree of coordination and direction at the national level. As the change in the security agency's name indicated, the role of NSA was extended beyond the armed forces.The creation of NSA was authorized in a letter written by President Harry S. Truman in June 1952. The agency was formally established through a revision of National Security Council Intelligence Directive (NSCID) 9 on October 24, 1952, and officially came into existence on November 4, 1952. President Truman's letter was itself classified and remained unknown to the public for more than a generation. A brief but vague reference to the NSA first appeared in the United States Government Organization Manual from 1957, which described it as "a separately organized agency within the Department of Defense under the direction, authority, and control of the Secretary of Defense [...] for the performance of highly specialized technical functions in support of the intelligence activities of the United States."
;National Cryptologic Memorial
Crews associated with NSA missions have been involved in a number of dangerous and deadly situations. The well known USS Liberty incident in 1967 and USS Pueblo incident in 1968 are a small sample of the losses endured during the Cold War.
The National Security Agency/Central Security Service Cryptologic Memorial honors and remembers the fallen personnel, both military and civilian, of these intelligence missions. It is made of black granite, and has 163 names (as of 2011) carved into it. It is located at NSA headquarters. A tradition of declassifying the stories of the fallen was begun in 2001.
Insignia
The heraldic insignia of NSA consists of a bald eagle facing its right, grasping a key in its talons, representing NSA's clutch on security as well as the mission to protect and gain access to secrets. The eagle is set on a background of blue and its breast features a blue shield supported by 13 bands of red and white. The surrounding white circular border features "National Security Agency" around the top and "United States of America" underneath, with two five-pointed silver stars between the two phrases. The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S. Carter (USA) ordered the creation of a device to represent the Agency.
Effect on non-governmental cryptography
NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman's directorship. NSA was a major player in the debates of the 1990s regarding the export of cryptography. Restrictions on export were reduced but not eliminated in 1996.
Data Encryption Standard (DES)
NSA was embroiled in some minor controversy concerning its involvement in the creation of the Data Encryption Standard (DES), a standard and public block cipher algorithm used by the U.S. government and banking community. During the development of DES by IBM in the 1970s, NSA recommended changes to some details of the design. There was suspicion that these changes had weakened the algorithm sufficiently to enable the agency to eavesdrop if required, including speculation that a critical component—the so-called S-boxes—had been altered to insert a "backdoor" and that the reduction in key length might have made it feasible for NSA to discover DES keys using massive computing power. It has since been observed that the S-boxes in DES are particularly resilient against differential cryptanalysis, a technique which was not publicly discovered until the late 1980s, but which was known to the IBM DES team. The United States Senate Select Committee on Intelligence reviewed NSA's involvement, and concluded that while the agency had provided some assistance, it had not tampered with the design. In late 2009 NSA declassified information stating that "NSA worked closely with IBM to strengthen the algorithm against all except brute force attacks and to strengthen substitution tables, called S-boxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56-bit key."
Clipper chip
Because of concerns that widespread use of strong cryptography would hamper government use of wiretaps, NSA proposed the concept of key escrow in 1993 and introduced the Clipper chip that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials. The proposal was strongly opposed and key escrow requirements ultimately went nowhere. However, NSA's Fortezza hardware-based encryption cards, created for the Clipper project, are still used within government, and NSA ultimately published the design of the SKIPJACK cipher (but not the key exchange protocol) used on the cards.
Advanced Encryption Standard (AES)
Possibly because of previous controversy, the involvement of NSA in the selection of a successor to DES, the Advanced Encryption Standard (AES), was initially limited to hardware performance testing (see AES competition). NSA has subsequently certified AES for protection of classified information (for at most two levels, e.g. SECRET information in an unclassified environment) when used in NSA-approved systems.
SHA
The widely-used SHA-1 and SHA-2 hash functions were designed by NSA. SHA-1 is a slight modification of the weaker SHA-0 algorithm, also designed by NSA in 1993. This small modification was suggested by NSA two years later, with no justification other than the fact that it provides additional security. An attack for SHA-0 that does not apply to the revised algorithm was indeed found between 1998 and 2005 by academic cryptographers. Because of weaknesses and key length restrictions in SHA-1, NIST deprecates its use for digital signatures, and approves only the newer SHA-2 algorithms for such applications from 2013 on.A new hash standard, SHA-3, is currently under development. An ongoing competition, closely resembling the successful AES process, will select the function used by the standard and is scheduled to end in 2012.
Dual EC DRBG random number generator
NSA promoted the inclusion of a random number generator called Dual EC DRBG in the U.S. National Institute of Standards and Technology's 2007 guidelines. This led to speculation of a backdoor which would allow NSA access to data encrypted by systems using that random number generator.
Academic research
NSA has invested many millions of dollars in academic research under grant code prefix MDA904, resulting in over 3,000 papers (as of 2007-10-11). NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the Khufu and Khafre block ciphers were voluntarily withheld in response to an NSA request to do so.
NSANet
NSANet is the official National Security Agency intranet. It is a classified internal network, and TS/SCI. In 2004 it was reported to have used over 20 commercial off-the-shelf operating systems. Some universities that do highly-sensitive research are allowed to connect to it. In 1998 it, along with NIPRNET and SIPRNET, had "significant problems with poor search capabilities, unorganized data and old information". In 2001 it was reported on the PR Newswire that NSA bought Auto-Trol's product KONFIG® NM to help "document and manage" NSANet.
Patents
NSA has the ability to file for a patent from the U.S. Patent and Trademark Office under gag order. Unlike normal patents, these are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal NSA's patent and officially grant it to NSA for the full term on that date.One of NSA's published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.
NSA programs
ECHELON
NSA/CSS, in combination with the equivalent agencies in the United Kingdom (Government Communications Headquarters), Canada (Communications Security Establishment), Australia (Defence Signals Directorate), and New Zealand (Government Communications Security Bureau), otherwise known as the UKUSA group, is widely reported to be in command of the operation of the so-called ECHELON system. Its capabilities are suspected to include the ability to monitor a large proportion of the world's transmitted civilian telephone, fax and data traffic, according to a December 16, 2005 article in the New York Times.
Technically, almost all modern telephone, internet, fax and satellite communications are exploitable due to recent advances in technology and the 'open air' nature of much of the radio communications around the world. NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that NSA/CSS represents an infringement of Americans' privacy. However, NSA's United States Signals Intelligence Directive 18 (USSID 18) strictly prohibits the interception or collection of information about "...U.S. persons, entities, corporations or organizations..." without explicit written legal permission from the United States Attorney General when the subject is located abroad, or the Foreign Intelligence Surveillance Court when within U.S. Borders. The U.S. Supreme Court has ruled that intelligence agencies cannot conduct surveillance against American citizens. There are a few extreme circumstances where collecting on a U.S. entity is allowed without a USSID 18 waiver, such as with civilian distress signals, or sudden emergencies such as the September 11, 2001 attacks; however, the USA PATRIOT Act has significantly changed privacy legality.
There have been alleged violations of USSID 18 that occurred in violation of NSA's strict charter prohibiting such acts. In addition, ECHELON is considered with indignation by citizens of countries outside the UKUSA alliance, with numerous allegations that the United States government uses it for motives other than its national security, including political and industrial espionage. Examples include the gear-less wind turbine technology designed by the German firm Enercon and the speech technology developed by the Belgian firm Lernout & Hauspie. An article in the Baltimore Sun reported in 1995 that aerospace company Airbus lost a $6 billion contract with Saudi Arabia in 1994 after NSA reported that Airbus officials had been bribing Saudi officials to secure the contract.
Domestic activity
NSA's mission, as set forth in Executive Order 12333, is to collect information that constitutes "foreign intelligence or counterintelligence" while not "acquiring information concerning the domestic activities of United States persons". NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the USA, while confining its own activities within the USA to the embassies and missions of foreign nations.NSA's domestic surveillance activities are limited by the requirements imposed by the Fourth Amendment to the U.S. Constitution; however, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA's foreign surveillance efforts are subject to far fewer limitations under U.S. law. The specific requirements for domestic surveillance operations are contained in the Foreign Intelligence Surveillance Act of 1978 (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.
These activities, especially the publicly acknowledged domestic telephone tapping and call database programs, have prompted questions about the extent of the NSA's activities and concerns about threats to privacy and the rule of law.
Wiretapping programs
Domestic wiretapping under Richard Nixon
In the years after President Richard Nixon resigned, there were several investigations of suspected misuse of Central Intelligence Agency (CIA) and NSA facilities. Senator Frank Church headed a Senate investigating committee (the Church Committee) which uncovered previously unknown activity, such as a CIA plot (ordered by President John F. Kennedy) to assassinate Fidel Castro. The investigation also uncovered NSA's wiretaps on targeted American citizens. After the Church Committee hearings, the Foreign Intelligence Surveillance Act of 1978 became law, limiting circumstances under which domestic surveillance was allowed.
IT projects: ThinThread, Trailblazer, Turbulence
NSA created new IT systems to deal with the flood of information from new technologies like the internet and cellphones.ThinThread contained advanced data mining capabilities. It also had a 'privacy mechanism'; surveillance was stored encrypted; decryption required a warrant. The research done under this program may have contributed to the technology used in later systems. Thinthread was cancelled when Michael Hayden chose Trailblazer, which did not include Thinthread's privacy system.
Trailblazer Project ramped up circa 2000. SAIC, Boeing, CSC, IBM, and Litton worked on it. Some NSA whistleblowers complained internally about major problems surrounding Trailblazer. This led to investigations by Congress and the NSA and DoD Inspectors General. The project was cancelled circa 2003-4; it was late, overbudget, and didn't do what it was supposed to do. The Baltimore Sun ran articles about this in 2006-07. The government then raided the whistleblower's houses. One of them, Thomas Drake, was charged with in 2010, part of Obama's unusual use of espionage law against leakers and whistleblowers.
Turbulence started circa 2005. It was developed in small, inexpensive 'test' pieces rather than one grand plan like Trailblazer. It also included offensive cyber-warfare capabilities, like injecting malware into remote computers. Congress criticized Turbulence in 2007 for having similar bureaucratic problems as Trailblazer.
Warrantless wiretaps under George W. Bush
On December 16, 2005, the New York Times reported that, under White House pressure and with an executive order from President George W. Bush, the National Security Agency, in an attempt to thwart terrorism, had been tapping the telephones of select individuals in the U.S. calling persons outside the country, without obtaining warrants from the United States Foreign Intelligence Surveillance Court, a secret court created for that purpose under the Foreign Intelligence Surveillance Act (FISA).
One such surveillance program, authorized by the U.S. Signals Intelligence Directive 18 of President George Bush, was the Highlander Project undertaken for the National Security Agency by the U. S. Army 513th Military Intelligence Brigade. NSA relayed telephone (including cell phone) conversations obtained from both ground, airborne, and satellite monitoring stations to various U.S. Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion. Conversations of citizens of the U.S. were intercepted, along with those of other nations.
Proponents of the surveillance program claim that the President has executive authority to order such action, arguing that laws such as FISA are overridden by the President's Constitutional powers. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the Authorization for Use of Military Force, although the Supreme Court's ruling in Hamdan v. Rumsfeld deprecates this view. In the August 2006 case ACLU v. NSA, U.S. District Court Judge Anna Diggs Taylor concluded that NSA's warrantless surveillance program was both illegal and unconstitutional. On July 6, 2007 the 6th Circuit Court of Appeals overturned Judge Taylor's ruling, reversing her findings.
AT&T; Internet monitoring
In May 2006, Mark Klein, a former AT&T; employee, alleged that his company had cooperated with NSA in installing hardware to monitor network communications including traffic between American citizens.
Wiretapping under Barack Obama
The New York Times reported in 2009 that the NSA is intercepting communications of American citizens including a Congressman, although the Justice Department believed that the NSA had corrected its errors. United States Attorney General Eric Holder resumed the wiretapping according to his understanding of the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008 which Congress passed in July 2008 but without explaining what had occurred.
Transaction data mining
NSA is reported to use its computing capability to analyze "transactional" data that it regularly acquires from other government agencies, which gather it under their own jurisdictional authorities. As part of this effort, NSA now monitors huge volumes of records of domestic emails and Internet searches as well as bank transfers, credit-card transactions and travel and telephone records, according to current and former intelligence officials interviewed by the Wall Street Journal.
Criticisms
The NSA received criticism early on in 1960 after two agents had defected to the Soviet Union. Investigations by the House Un-American Activities Committee and a special subcommittee of the House Armed Services Committee revealed severe cases of ignorance in personnel security regulations, prompting the former personnel director and the director of security to step down and leading to the adoption of stricter security practices. Nonetheless, security breaches reoccurred only a year later when in an issue of Izvestia of July 23, 1963, a former NSA employee published several cryptologic secrets. The very same day, an NSA clerk-messenger committed suicide as ongoing investigations disclosed that he had sold secret information to the Soviets on a regular basis. The reluctance of Congressional houses to look into these affairs had prompted a journalist to write "If a similar series of tragic blunders occurred in any ordinary agency of Government an aroused public would insist that those responsible be officially censured, demoted, or fired." David Kahn criticized the NSA's tactics of concealing its doings as smug and the Congress' blind faith in the agency's right-doing as shortsighted, and pointed out the necessity of surveillance by the Congress to prevent abuse of power.The number of exemptions from legal requirements has also been criticized. When in 1964 the Congress was hearing a bill giving the director of the NSA the power to fire at will any employee, the Washington Post wrote: "This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself." Yet, the bill was accepted with overwhelming majority.
On January 17, 2006, the Center for Constitutional Rights filed a lawsuit, CCR v. Bush, against the Bush Presidency. The lawsuit challenged the National Security Agency's (NSA's) surveillance of people within the U.S., including the interception of CCR emails without securing a warrant first.
In fiction
Since the existence of the NSA has become more widely known in the past few decades, and particularly since the 1990s, the agency has regularly been portrayed in spy fiction. Many such portrayals grossly exaggerate the organization's involvement in the more sensational activities of intelligence agencies. The agency now plays a role in numerous books, films, television shows, and video games.
Staff
Directors
Notable cryptanalysts
NSA encryption systems
NSA is responsible for the encryption-related components in these systems:
NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.
Some past NSA SIGINT activities
See also
NSA computers
References
Further reading
External links
Category:Computer security organizations Category:Government agencies established in 1949 Category:Mass surveillance Category:Signals intelligence agencies Category:Supercomputer sites Category:United States Department of Defense agencies Category:United States government secrecy
ar:وكالة الأمن القومي br:NSA ca:Agència de Seguretat Nacional cs:Národní bezpečnostní agentura da:NSA de:National Security Agency et:NSA el:NSA es:Agencia de Seguridad Nacional eo:National Security Agency fa:آژانس امنیت ملی ایالات متحده آمریکا fr:National Security Agency gl:National Security Agency ko:미국 국가안보국 hi:नेशनल सेक्यूरिटी एजेंसी hr:National Security Agency id:Badan Keamanan Nasional it:National Security Agency he:הסוכנות לביטחון לאומי kn:ರಾಷ್ಟ್ರೀಯ ಭದ್ರತಾ ಸಂಸ್ಥೆ lt:Nacionalinio saugumo agentūra hu:National Security Agency ms:Agensi Keselamatan Negara nl:National Security Agency ja:アメリカ国家安全保障局 no:National Security Agency pl:National Security Agency pt:Agência de Segurança Nacional ro:National Security Agency ru:Агентство национальной безопасности sq:Agjencia e Sigurimit Kombëtar Amerikan scn:NSA simple:National Security Agency sk:National Security Agency sr:НСА fi:NSA sv:National Security Agency th:สภาความมั่นคงแห่งชาติสหรัฐอเมริกา tr:Ulusal Güvenlik Teşkilatı uk:Агентство національної безпеки vi:Cơ quan An ninh Quốc gia Hoa Kỳ yi:NSA zh:美国国家安全局This text is licensed under the Creative Commons CC-BY-SA License. This text was originally published on Wikipedia and was developed by the Wikipedia community.