National Security Agency

From Wikispooks
(Redirected from NSA)
Jump to: navigation, search
Group.png National Security Agency  
(Intelligence agencyHistory Commons Powerbase Sourcewatch
NSA HQ.jpg
Fort Meade, Maryland USA
NSA logo.svg
Motto "Defending Our Nation. Securing The Future."
Predecessor Armed Forces Security Agency
Formation November 4, 1952
Parent organization United States Department of Defense
Headquarters Fort Meade, Maryland
Leader Director of the National Security Agency
MikeRogersNSADirector.png
Incumbent: Michael S. Rogers
Since 3 April 2014
Subgroups National Tactical Integration Office
Staff ?
Website http://www.nsa.gov
Interest of James Bamford
Exposed by James Bamford

The National Security Agency is a notoriously secretive US intelligence agency, nominally responsible for signals intelligence and information assurance. It became infamous in 2013 after the commercially-controlled media gave prominence to Edward Snowden's revelations about its mass data collection programs.[1]

Official Narrative

The NSA promises on its website to "protect national security interests by adhering to the highest standards of behavior".[2]

Problems

The NSA is so shrouded in secrecy that there is no way to know what it is doing, never mind to check its claim to "adhere to the highest standards of behavior". For example, in 1964 the US Congress passed by a great majority a bill giving the Director of the NSA the power to fire at will any employee without due cause - leading the Washington Post to write: "This is the very definition of arbitrariness. It means that an employee could be discharged and disgraced on the basis of anonymous allegations without the slightest opportunity to defend himself."[3]

The NSA appears to be completely controlled by deep state interests. Rather than defending US citizens' data by publicising flaws found in computer code, for example, it has long been using zero day exploits for its own purposes and in 2014 was specifically authorised to do to by Barack Obama.[4] The NSA has denied that it was aware of the Heartbleed bug, but other sources report that the agency used it regularly for years, and decided not to warn anyone else that their data was at risk.[5]

Activities

John Perkins wrote in Confessions Of An Economic Hitman that he was recruited by Einar Greve, NSA liaison. His book was so popular that in 2006 it prompted an official denial by the US State Department, which claimed that Perkins' claim was not credible because "the National Security Agency is a cryptological (codemaking and codebreaking) organization, not an economic organization." Little was known publicly about the NSA's activities at the time of this counterclaim, but subsequently, leaks and whistleblowers have shed more light on them.[6]

"Cyberterrorism"

Full article: “Cyberterrorism”
Tha NSA has contradictory goals - to maximise cyber security and to itself to carry out attacks against cyber security. It has claimed not to be hoarding zero day exploits, but this is belied by the evidence,

The NSA is probably the most advanced and active group worldwide in the area of cyberterrorism. Bruce Schneier observes that "The National Security Agency is lying to us. We know that because data stolen from an NSA server was dumped on the Internet. The agency is hoarding information about security vulnerabilities in the products you use, because it wants to use it to hack others' computers."[7]

Stuxnet

Full article: Stuxnet

Stuxnet was the first piece of malware proven to be an NSA production. The 2016 film Zero Days quotes an anonymous source that this was developed in concert with Unit 8200 and that if it had not been modified by Unit 8200 and released into Iran in this form, it might have never been detected.[8]

Other malware

The NSA created malware, some of which was published by the group Equation Brokers and was compromising security of a lot of Microsoft Windows users.[9]

"Cyberespionage"

Full article: Stub class article Cyberespionage
EquationDrug.jpg

The NSA (or perhaps Unit 8200)[10] is reckoned to be the world's leading developer of cyberespionage tools, a realisation which has gained traction particularly since the Edward Snowden Affair. Documents released by Snowden have pointed the NSA's close collaboration with GCHQ.

In 2015 multiple revelations gaveinsight on the NSA's cyberterrorism capabilities. In March 2015, Kaspersky Lab revealed details of the EquationDrug cyberespionage platform, which resembles a "mini operating system" due to the use of kernel-mode and user-mode components which interact with each other via a custom message-passing interface. Over 100 plugins are suspected and the existence of Windows 9X modules suggests that it may well date back to the 1990s. Its connection to the NSA is currently somewhat tenuous - resting on text strings, timezone and filestamp data, though considering the platform's sophistication, no alternative teams of developers have been suggested.

Surveillance

Full article: Mass Surveillance

During the cold war, the NSA watch list included anti-war activists and civil rights leaders such as Martin Luther King and Whitney Young, as well as Senator Frank Church.[11]

Technological

The NSA's mass surveillance is facilitated by decades of work for using a variety of techniques to insert backdoors and other weaknesses into security products and protocols.

I worked with the National Security Agency on the design of a secured version of the internet but we used classified security technology at the time and I couldn't share that with my colleagues. If I could start over again I would have introduced a lot more strong authentication and cryptography into the system.
Vint Cerf, internet engineer[12]

In 2004, a division of the NSA called the National Tactical Integration Office fitted a 62-foot diameter airship called the Hover Hammer with an eavesdropping device.[13]

Exposure

In 1971, Perry Fellwock, the first NSA whistleblower, stated that "there's a lot of corruption too. Quite a few people in NSA are into illegal activities of one kind or another. It's taken to be one of the fringe benefits of the job. You know, enhancing your pocketbook. Practically everybody is into some kind of smuggling".[14]

Edward Snowden Affair

Full article: Stub class article Edward Snowden Affair

Former NSA contractor Edward Snowden collected a series of documents which revealed wholesale, illegal, data collection by the NSA. Shunning anonymity, stating that he had done nothing wrong, but was acting in the interests of the US people and the NSA, Snowden began to release a long series of tranches of the documents through the commercially-controlled media.

The NSA claimed on 2014-01-10 that they could not legally inform congress whether they were collecting data on them, since to do so would violate the law.[15] In February 2014, after legal challenges to their data collection program, the NSA suggested that it might be legally obligated to expand the data collection program to avoid potential charges of destroying evidence.[16]

Mass Surveillance

Full article: Mass surveillance
The 54 NSA events.png

Following James Clapper's flat out lie to the US Congress about data collection, key NSA personnel have repeatedly lied about its mass surveillance programmes, first by denying their existence and later by making wildly exaggerated claims about the effectiveness of such data collection in preventing "terrorism".

In 2014, it was revealed that the NSA collects nearly all the telephone calls made in the Bahamas and Afghanistan.[17]

Brian Patrick O’Callaghan

On Feb 16, 2014, a 36 year old, Brian Patrick O'Callaghan, chief of the NSA's Korea division - whose attorney also said he was involved in the high profile rescue of US Army POW Jessica Lynch - was charged with first degree murder and child abuse.[18]

Relationship with other intelligence agencies

GCHQ

The NSA has long had particularly close links with its British counterpart, GCHQ. In the early 1980s it was suggested that "the relationship between NSA and GCHQ is stronger than any between the NSA and any other American intelligence agency."[19] This relationship does not prevent the NSA spying on the UK. According to Howard Teicher, the former Middle East director of the US National Security Council, the NSA monitored Britain's Al-Yamamah arms deal with Saudi Arabia from its base at Menwith Hill in Yorkshire.[20]

Japan

Japan allowed NSA to maintain at least three bases on its territory and contributed more than half a billion dollars to help finance the NSA’s facilities and operations. In return, NSA has kitted out Japanese spies with powerful surveillance tools and shared intelligence with them, although continuing to spy on Japanese officials itself.[21]  

Related Documents

TitleTypePublication dateAuthor(s)Description
Electronic Espionage - A MemoirinterviewAugust 1972Perry Fellwock
Google and the NSAarticle24 August 2013Julian Assange
NSA GCHQ and the Death of Gareth Williamsarticle14 November 2011Trowbridge FordA speculative article connecting the NSA with the death of Gareth Williams
The Shadow FactoryBook2008James BamfordThe workings and scope of the US Military-Intelligence complex focussing particularly on the NSA.
Introduction.
 

A document sourced from National Security Agency

Use the Up/Dn symbols to sort

TitleTypeSubject(s)Publication dateAuthor(s)
Bitter Roots - The Bases of Present Conflicts in the Middle EastspeechMiddle East
US/Israel lobby
1977J Rives Childs


References

  1. About NSA, Frequently Asked Questions, National Security Agency, accessed 1 September 2009.
  2. http://www.nsa.gov/about/values/index.shtml
  3. David Kahn, The Codebreakers, Scribner Press, 1967, chapter 19, pp. 672–733.
  4. http://www.theregister.co.uk/2014/04/14/obama_allows_nsa_to_exploit_0days_report/
  5. http://www.bloomberg.com/news/2014-04-11/nsa-said-to-have-used-heartbleed-bug-exposing-consumers.html
  6. http://www.unwelcomeguests.net/Category:NSA
  7. https://www.schneier.com/blog/archives/2016/08/the_nsa_is_hoar.html
  8. Zero Days
  9. https://www.theregister.co.uk/2017/04/21/windows_hacked_nsa_shadow_brokers/
  10. http://www.forbes.com/sites/richardbehar/2016/05/11/inside-israels-secret-startup-machine/#4b851243157d
  11. http://leaksource.info/2013/09/28/declassified-documents-reveal-nsa-spied-on-vietnam-war-critics-including-mlk-muhammad-ali-and-senator-frank-church/
  12. Vint Cerf wanted to make internet secure from the start, but secrecy prevented it, The Register, 7 Apr 2014
  13. https://theintercept.com/2017/04/24/nsa-blimp-spied-in-the-united-states/
  14. Document:Electronic Espionage - A Memoir
  15. http://www.huffingtonpost.com/2014/01/14/bernie-sanders-nsa-letter_n_4597978.html
  16. http://thehill.com/blogs/hillicon-valley/technology/198771-nsa-considers-retaining-phone-data-for-lawsuits
  17. http://rt.com/news/160988-wikileaks-nsa-phone-afghanistan
  18. http://www.nbcwashington.com/news/local/Father-Charged-With-Adopted-Sons-Death--245972321.html
  19. Jonathan Bloch and Patrcik Fitzgerald, British Intelligence and Covert Action, Brandon, 1983, p.64.
  20. Michael Smith, The Spying Game, Politico's, 2003, p.429.
  21. https://theintercept.com/2017/04/24/japans-secret-deals-with-the-nsa-that-expand-global-surveillance/