The National Security Agency (NSA) is a member of the U.S. intelligence community and plays an integral role in safeguarding national interests and achieving military objectives by gathering, analyzing and sharing data and signals intelligence. The NSA is widely acknowledged as the countrys foremost authority on cryptanalysis and its role in preserving national security is twofold. Firstly, NSA analysts gather and decrypt intelligence from electronic communications and sources such as email, videos, photos, stored data, internet phone calls, chat, video conferencing, file transfers, and online social networking accounts. Subsequently, the NSA uses its gathered intelligence to protect the nations classified data and national security systems from unauthorized access and tampering by foreign and internal adversaries. Established by President Harry Truman with the express purpose of coordinating and improving the collection and analysis of intelligence communications, the NSA plays a significant role in protecting both the United States and the world at large; therefore, it is vital for individuals with a strong interest in international relations to gain an understanding of the functions of this critical intelligence agency.
The protection of communications and systems in the United States through the use of cryptology, cipher and other methods can be traced back to the American Revolution with the formation of the Secret Committee of Correspondence; however, it was after World War I with the advent of the radio that national security experienced a pronounced evolution. The Black Chamberor, the Bureau of Cipherwas established after the war and was disguised as a New York commercial code company. The Black Chamber used cryptanalysis to intercept foreign communications, notably monitoring and decoding communications sent to and from Japanese delegates during the Washington Naval Conference which first convened on November of 1921, giving U.S. negotiators a strong advantage. However, the organization was disbanded in 1929, when Secretary of State Henry Stimson famously quipped, gentlemen do not read each others mail.
During World War II, the group OP-20-G played an important role in providing vital intelligence on adversaries, such as the Japanese, thereby surpassing the information-gathering capabilities of all other agencies and allowing the U.S. military to be more effective and precise in its operations. OP-20-G was greatly respected, allowing it to metamorphose into the Army Security Agency (ASA) and later, the Armed Forces Security Agency (AFSA), which united all cryptologic activities of the Army and the Navy. However, the organization faced difficulty in its operations, mainly in centralizing data collection efforts, processing the communications intelligence and coordinating with other agencies. President Truman tasked New York attorney George A. Brownell with forming a committee that included representatives from the Department of State, Department of Defense, and the Central Intelligence Agency in order to find a solution to AFSAs operational woes; upon receiving the committees official recommendations regarding the United States Government Communications Intelligence (COMINT) in a five-part report, Truman established the National Security Agency on November 4, 1952.
Throughout the Cold War, the NSA expanded U.S. surveillance activities and was able to monitor and intercept the communications of various foreigners and U.S. citizens through programs such as Project MINARET. The project notably surveilled Americans traveling to Cuba and participating in the anti-Vietnam War movement, and resulted in thousands of citizens being placed on watch lists. The lack of clear legal constraints resulted in the severe violation of privacy: In 1972, the U.S. Supreme Courts Keith decision noted that, even though the government has the responsibility to protect the American people from disruptive activity, the government cannot use warrantless electronic surveillance devicesespecially for domestic espionage activities. NSAs Operation Shamrock was investigated by the Church Committee and in August of 1975, NSA director Lieutenant general Lew Allen testified to the House of Representatives, disclosing NSAs activities. This lead to the introduction of the Foreign Intelligence Surveillance Act in 1978 by Congress, which helped monitor and regulate the NSA and notably, established the need for acquiring warrants through the United States Foreign Intelligence Surveillance Court (FISC) prior to pursuing any clandestine efforts.
The NSA is known as the premier cryptology organization, and until the end of the Cold War, cryptography in the United States was solely the concern of the NSA (and the organizations that preceded it). The NSA, along with the National Bureau for Standards and IBM, played a significant role in the development of the Data Encryption Standard, an algorithm used in the encryption of data. The development of the DES launched cryptography as an academic discipline.
Operating under the purview of the Department of Defense, the NSA is tasked with two primary responsibilities. The first is producing SIGINT, or signals intelligence, and sharing it with various partiessuch as the military, members of the executive branch, government agencies and foreign allies. Signals intelligence is any information that has the potential to be intercepted and utilized by adversarial groups and is derived from various signals, sources, systems, and satellite communications. SIGINT can be used in a number of ways, including to help secure the nation and its allies; protect troops; prevent domestic and international terrorism, crime and narcotics; and assist with diplomatic negotiations and foreign relations. The NSAs second responsibility is information assurance, or the protection of national security systems crucial to intelligence, military operations and other government activities. The NSA helps prevent the theft of classified information and ensures that these materials are available to policymakers and others in government.
To protect national security interests, the NSA engages in mass surveillance and the collection of metadata, which includes the gathering and tracking of American and foreign citizens phone calls, text messages, social media posts, emails, internet browser history and more. Mass surveillance by the United States was initially conducted as part of WWI security efforts, such as when the U.S. government monitored telegrams sent to and received by the United States. This surveillance was allowed to continue on into peacetime to help ensure that the U.S. government was kept abreast of pressing domestic and international affairsespecially those related to the expansionist policies of rival nations, like Japan.
By their very nature, the NSAs methods of data collection are shrouded in secrecy. The NSA has been known to install listening posts around the world in order to gather foreign intelligence, thereby creating considerable controversy. To wit, there exists a special division within the NSA named the Special Collection Service; this classified body installs eavesdropping devices in places such as foreign embassies and government buildings and is dubbed the Mission Impossible task force. The NSA was embroiled in significant international controversy when it was exposed as having conducted surveillance on the German government, including monitoring the cell phone of German Chancellor Angela Merkel through an antenna installed on the roof of the U.S. Embassy. The United States justified its actions on the basis that some of the terrorists involved in the planning and execution of the September 11th attacks had operated out of Hamburg, Germany, and the revelation created tension between the U.S. and German governmentswho had long considered one another to be strong allies.
The NSA has also courted controversy with American citizens, coming under fire for the unconstitutionality of its surveillance and data collection activities, which critics argue impinge on privacy laws and violate the Fourth Amendment. The NSA reportedly collaborates with technology and Internet companies to obtain access to phone records, emails, and cloud-stored files, though some of these companies (such as Google and Yahoo) insist that they require a court order before releasing information; however, Sprint, AT&T and others have reportedly handed over millions of records on ordinary citizens not suspected of any wrongdoing, all without a court order. Such records are now housed in the NSA call database in perpetuity. The NSA, for its part, has continuously argued that its surveillance activities are in full compliance with the law; that it takes civil liberties very seriously and only collects critical information necessary for policymakers to ensure the security of the U.S. and its allies.
The NSA is able to conduct its data collection thanks to laws such as the Communications Assistance for Law Enforcement Act, which requires communications companies to make their facilities available to law enforcement agencies or to supply consumer information following a court order. Since the September 11 attacks, provisions in the Patriot Act have allowed the NSA to expand its widespread surveillance of suspected terrorists in an effort to fight domestic and international terror.
One of the undisclosed programs covered under the Patriot Act is Planning Tool for Resource Integration, Synchronization, and Management (PRISM). Operating under the Foreign Intelligence Surveillance Act (FISA), PRISM allows the NSA to solicit technology companies to gain access to phone, email and other records of foreign citizens in the event that certain search terms or phrases trigger red flags. However, information has since come to light indicating that these searches often extend to U.S. citizens and that the NSA paid technology companies millions of dollars for their disclosures. PRISM and other programs were unveiled in a series of revelations by former NSA contractor Edward Snowden in 2013.
Since its inception, the Patriot Act has been criticized by many in government and the public sphere, and programs such as PRISM have faced litigation from the ACLU. Critics believe that these programs have been abused and have rarely succeeded in foiling terrorist plots; such was the case with the Boston Marathon attacks, as the terrorists were found to have visited an Al-Qaeda website. Foreign governments, especially members of the European Union, have expressed outrage at the mass surveillance of their citizens and their Internet activities. The NSA and its proponents (including former President Barack Obama), however, have argued that these surveillance programs are effective, having thwarted a plot against the New York City subway, for instance. They also argue that such programs face rigorous bipartisan Congressional scrutiny and are subject to extensive oversight. The Patriot Act has elicited so much criticism that a compromise was reached in the form of the Freedom Act in 2005, which reinforced certain segments of the Patriot Act while limiting the information the NSA can gather without a warrant.
The National Security Agency plays an important role in ensuring national security; facilitating foreign, military and diplomatic affairs; and fortifying classified information and national security systems. The NSA does not carry out its duty without a significant amount of scrutiny, however, as the constitutionality of its measures is often called into question. Given the important work of the NSA and growing public interest in the agencys sometimes controversial activities, it is essential for individuals studying international relations to fully comprehend its operations and outcomes in order to anticipate and address future challenges.
As the nations oldest private military college, Norwich University has been a leader in innovative education since 1819. Through its online programs, Norwich delivers relevant and applicable curricula that allow its students to make a positive impact on their places of work and their communities.
Our online Master of Arts in International Relations program offers a curriculum that evolves with current events to help you face the future of international affairs. Norwich Universitys masters degree in international relations covers many subjects to give you a look at the internal workings of international players, examine the role of state and non-state actors on the global stage, and explore different schools of thought. You can further strengthen your knowledge by choosing one of five concentrations in International Security, National Security, International Development, Cyber Diplomacy, or Regions of the World.
Recommended Readings: Isolationism & U.S. Foreign Policy After World War I7 Components of Liberalism
Sources:
Communications Assistance for Law Enforcement Act, Federal Communications Commission
NSAs Role in the Development of DES, RSA Conference
A Brief History of Cryptography Policy, The National Academies of Sciences Engineering Medicine
National Cryptologic Museum, National Security Agency
NSA Timeline 1791 2015, Electronic Frontier Foundation
Spies, Wiretaps, and Secret Operations: An Encyclopedia of American Espionage, Google Books
Trove of Stolen NSA Data Is Devastating Loss for Intelligence Community, Foreign Policy
PRISM is Legal, The Verge
NSA Scandal: What data is being monitored and how does it work?, The Guardian
Secret Committee of Correspondence / Committee for Foreign Affairs, 1775-1777, Office of the Historian, Bureau of Public Affairs
Foreign Relations of the United States 1950-1955, The Intelligence Community 1950-1955, Office of the Historian, Bureau of Public Affairs
Context of 1967-1975: Project MINARET Illegally Monitors American Subversives, Creative Commons
The Foreign Intelligence Surveillance Act of 1978 U.S. Department of Justice, Office of Justice Programs
NSA Tapped German Chancellery for Decades, The Guardian
Original post:
What is the National Security Agency? - Norwich University
- NSA fears quantum computing surprise: 'If this black swan event happens, then we're really screwed' - Washington Times - March 27th, 2024 [March 27th, 2024]
- The NSA Warns That US Adversaries Free to Mine Private Data May Have an AI Edge - WIRED - March 27th, 2024 [March 27th, 2024]
- Five ways to implement zero-trust based on NSA's latest guidance - SC Media - March 27th, 2024 [March 27th, 2024]
- Intel analyst shared classified information on Discord, investigators say - The Washington Post - March 27th, 2024 [March 27th, 2024]
- Water Systems Vulnerable To Cyber Attacks, NSA And EPA Warn Governors - Forbes - March 27th, 2024 [March 27th, 2024]
- Amritpal Singhs mother, kin of other NSA detainees go on hunger strike, want them to be shifted to Punjab jail - The Tribune India - February 24th, 2024 [February 24th, 2024]
- Rob Joyce leaving NSA at the end of March - CyberScoop - February 24th, 2024 [February 24th, 2024]
- NSA cyber director to step down after 34 years of service - Nextgov/FCW - February 24th, 2024 [February 24th, 2024]
- Behind Khattar govts U-turn on NSA against farm leaders, fear of rural blowback, Congress gain - The Indian Express - February 24th, 2024 [February 24th, 2024]
- Payday dispute prompts maintenance worker walkout at NSA Naples - Stars and Stripes - February 24th, 2024 [February 24th, 2024]
- CISA, NSA, and FBI Warn of Chinese Cyber Hacking Army The Presidential Prayer Team - The Presidential Prayer Team - February 24th, 2024 [February 24th, 2024]
- Cyber Security Headlines: Microsoft takes another hit, Energy giant hit by ransomware, the NSA is secretly buying your ... - CISO Series - January 30th, 2024 [January 30th, 2024]
- India now cooperating with Nijjar probe: Canada's NSA - IndiaTimes - January 30th, 2024 [January 30th, 2024]
- Google, WhiteSnake, Outlook, NSA, Juniper, Jason Wood, and More SWN #358 - SC Media - January 30th, 2024 [January 30th, 2024]
- Readout of NSA Jake Sullivan's Meetings with PM Srettha and DPM/FM Parnpree - US Embassy in Thailand - USEmbassy.gov - January 30th, 2024 [January 30th, 2024]
- NSA Admits Secretly Buying Your Internet Browsing Data without Warrants - The Hacker News - January 30th, 2024 [January 30th, 2024]
- Readout of NSA Jake Sullivan's Meeting with CCP Politburo Member, Director of the Office of the Foreign Affairs ... - US Embassy & Consulates in... - January 30th, 2024 [January 30th, 2024]
- Former NSA Saint has a chance to become repeat Super Bowl champion - The Suffolk News-Herald - Suffolk News-Herald - January 30th, 2024 [January 30th, 2024]
- NSA is buying Americans internet browsing records without a warrant - TechCrunch - January 30th, 2024 [January 30th, 2024]
- As NSA buys up Americans' browser records, Uncle Sam is asked to simply knock it off - The Register - January 30th, 2024 [January 30th, 2024]
- NSA buys sensitive data on Americans without any court order - KJZZ - January 30th, 2024 [January 30th, 2024]
- NSA Veteran Teresa Shea Joins Board of Directors of Two Six Technologies - ExecutiveBiz - January 30th, 2024 [January 30th, 2024]
- How the FBI, NSA are preparing for deepfakes and misinformation issue ahead of 2024 elections - CNBC - January 14th, 2024 [January 14th, 2024]
- AI is helping US spies catch stealthy Chinese hacking ops, NSA official says - CyberScoop - January 14th, 2024 [January 14th, 2024]
- AI aids nation-state hackers but also helps US spies to find them, says NSA cyber director - TechCrunch - January 14th, 2024 [January 14th, 2024]
- NSA Director Paul Nakasone to Step Down in Early February - Bloomberg - January 14th, 2024 [January 14th, 2024]
- NSA says cybersecurity will gain many benefits with generative AI - ReadWrite - January 14th, 2024 [January 14th, 2024]
- FBI and NSA directors discuss their concerns about AI - WCBE 90.5 FM - January 14th, 2024 [January 14th, 2024]
- Looking back at 2023 with the NSA's Rob Joyce and Morgan Adamski - CyberScoop - January 14th, 2024 [January 14th, 2024]
- NSA: Benefits of generative AI in cyber security will outweigh the bad - ITPro - January 14th, 2024 [January 14th, 2024]
- AI Identified as Emerging Threat in Cyber Crime by NSA Director - CoinGape - January 14th, 2024 [January 14th, 2024]
- AI is helping China-backed hackers but it's also helping to hunt them down, NSA says - TechRadar - January 14th, 2024 [January 14th, 2024]
- Top 10 misconfigurations: An NSA checklist for CISOs - The Stack - October 20th, 2023 [October 20th, 2023]
- CISA and NSA Issues New Identity and Access Management Guidance for Vendors - TechRepublic - October 20th, 2023 [October 20th, 2023]
- How to Protect Against Evolving Phishing Attacks - National Security Agency - October 20th, 2023 [October 20th, 2023]
- NSA Shares Recommendations to Advance Device Security Within ... - National Security Agency - October 20th, 2023 [October 20th, 2023]
- Nansemond-Suffolk tennis falls to Norfolk Academy Thursday - The ... - Suffolk News-Herald - October 20th, 2023 [October 20th, 2023]
- NSA calls for a 'root and branch' review of Red Tractor - Farmers Guardian - October 20th, 2023 [October 20th, 2023]
- Israel's NSA warns of US intervention as Gaza conflict escalates - IndiaTimes - October 20th, 2023 [October 20th, 2023]
- The U.S. government is still in its Tumblr era. - Slate - October 20th, 2023 [October 20th, 2023]
- Biden's Cyber Command and NSA nominee seen as a pick for continuity - The Record from Recorded Future News - July 17th, 2023 [July 17th, 2023]
- 5 Reasons to Work for the NSA - ClearanceJobs - ClearanceJobs - July 17th, 2023 [July 17th, 2023]
- I will do my best as NSA: Ribadu promises - FRCN HQ - Federal Radio Corporation of Nigeria - July 17th, 2023 [July 17th, 2023]
- Plateau killings: Reps ask NSA to declare national emergency - TheCable - July 17th, 2023 [July 17th, 2023]
- 7th Deputy NSA Meeting of Colombo Security Conclave held in ... - ANI News - July 17th, 2023 [July 17th, 2023]
- Young shepherd from region wins NSA North Sheep trophy ... - Darlington and Stockton Times - July 17th, 2023 [July 17th, 2023]
- HBO film based on NSA leaker Reality Winner slated for May 29 ... - Military Times - May 18th, 2023 [May 18th, 2023]
- Tina Satter on why her NSA whistleblower film Reality is stranger than fiction - Financial Times - May 18th, 2023 [May 18th, 2023]
- Gen. Paul Nakasone Plans to Step Down as NSA Director ... - Executive Gov - May 18th, 2023 [May 18th, 2023]
- Readout of NSA Jake Sullivan's Meeting with CCP Politburo ... - US Embassy & Consulates in China - May 18th, 2023 [May 18th, 2023]
- Young sheep farmers to be given genetic boost by new NSA giveaway - The Scottish Farmer - May 18th, 2023 [May 18th, 2023]
- Sydney Sweeney wanted to be challenged by Reality: Its a different muscle playing someone who is real [Exclusive Video Interview] - Yahoo... - May 18th, 2023 [May 18th, 2023]
- Intercepted: The Biggest Whodunnit of the Century - The Intercept - May 18th, 2023 [May 18th, 2023]
- Personal injury + the No Surprises Act - Chiropractic Economics - May 18th, 2023 [May 18th, 2023]
- PM Narendra Modi e-inaugurating new office complexes of CBI at Shilong, Pune and Nagpur, commemorating the CBI diamond jubilee on Monday. Also seen... - April 4th, 2023 [April 4th, 2023]
- Special Collection Service - Wikipedia - March 31st, 2023 [March 31st, 2023]
- What is the NSA and how does it work? - SearchSecurity - February 5th, 2023 [February 5th, 2023]
- Watch: NSA Ajit Doval is Ambitious, Very Good at Sniffing Power and Being on the Right Side of itAS Dulat - The Wire - December 21st, 2022 [December 21st, 2022]
- Shockwaves win another championship, this time at the NSA Fresno Pilgrimfest - Lompoc Record - December 12th, 2022 [December 12th, 2022]
- EFCC secures forfeiture of N755m, luxury assets from ex-AGF, former aide to NSA The Nation Newspaper - The Nation Newspaper - November 23rd, 2022 [November 23rd, 2022]
- Cyber Security Today, Oct. 19, 2022 A warning from the NSA about nation-state attacks, and more - IT World Canada - October 21st, 2022 [October 21st, 2022]
- In the Alphabet Soup of Regulations, the NSA, GFE and AEOB Have Yet to Coalesce - RACmonitor - October 6th, 2022 [October 6th, 2022]
- Do not ignore any communication shared by NSCS, NSA: PM Modi to ministers - The Hindu - October 6th, 2022 [October 6th, 2022]
- NSA Announces Date of the National Cryptologic Museum Grand Opening - National Security Agency - October 2nd, 2022 [October 2nd, 2022]
- NSA and ACLU may face off in the Supreme Court over Wikipedia - Grid - October 2nd, 2022 [October 2nd, 2022]
- The NSA is Here to Help | Decipher - Duo Security - September 27th, 2022 [September 27th, 2022]
- Hollen, Raskin Join with NSA Bethesda Fire Fighters, IAFF Leaders to Highlight Progress on Efforts to Improve Base Conditions, Build New Facility |... - September 27th, 2022 [September 27th, 2022]
- CISA, FBI, NSA, Treasury, Cyber Command, and International Partners Release Advisory on Malicious Cyber Actors Affiliated with Iranian Government... - September 20th, 2022 [September 20th, 2022]
- NATFORCE: Buhari Finally Disbands Security Outfit After Senate Ignored NSA To Recognize Body The Whistler Newspaper - The Whistler Nigeria - September 20th, 2022 [September 20th, 2022]
- China Accuses NSA of Hacking Its Military Research University - VICE - September 9th, 2022 [September 9th, 2022]
- Behind the Toque: An Interview with NSA Noodle Bar Executive Chef Brooke Apfelbaum - greenpointers.com - September 9th, 2022 [September 9th, 2022]
- In the Garden: Tour gives Omahans a chance to see how a 'Bloom Box' works - Omaha World-Herald - September 9th, 2022 [September 9th, 2022]
- Three area teams pickup wins to start football season - The Suffolk News-Herald - Suffolk News-Herald - September 9th, 2022 [September 9th, 2022]
- NSA to reveal identities of big men behind oil theft in Nigeria Presidency - Daily Post Nigeria - August 22nd, 2022 [August 22nd, 2022]
- Former US Cyber Command and NSA chief makes the case for a cyber competition strategy | The Strategist - The Strategist - August 22nd, 2022 [August 22nd, 2022]
- Inaugural India-Central Asia NSA meeting to be held in December - WION - August 22nd, 2022 [August 22nd, 2022]
- Home | Open Source @ NSA - August 8th, 2022 [August 8th, 2022]
- Kennesaw State named top institution for cybersecurity outreach - Kennesaw State University - August 8th, 2022 [August 8th, 2022]
- US city of Boston to mark 75th anniversary of India's Independence with two-day extravaganza - NewsDrum - August 8th, 2022 [August 8th, 2022]
- Pakistan's top probe agency to trace those behind online campaign against Army over Balochistan copter crash - ThePrint - August 8th, 2022 [August 8th, 2022]