Archive for the ‘NSA’ Category

National Security Agency – Wikipedia, the free encyclopedia

The National Security Agency (NSA) is a U.S. intelligence agency responsible for global monitoring, collection, decoding, translation and analysis of information and data for foreign intelligence and counterintelligence purposes - a discipline known as Signals intelligence. NSA is also charged with protection of U.S. government communications and information systems against penetration and network warfare.[8][9] The agency is authorized to accomplish its mission through clandestine means,[10] among which are bugging electronic systems[11] and allegedly engaging in sabotage through subversive software.[12][13]

Originating as a unit to decipher coded communications in World War II, it was officially formed as the NSA by Harry S. Truman in 1952. Since then, it has become one of the largest of U.S. intelligence organizations in terms of personnel and budget,[6][14] operating as part of the Department of Defense and simultaneously reporting to the Director of National Intelligence.

Unlike the Defense Intelligence Agency (DIA) and the Central Intelligence Agency (CIA), both of which specialize primarily in foreign human espionage, the NSA has no authority to conduct human-source intelligence gathering, although it is often portrayed doing so in popular culture. Instead, the NSA is entrusted with coordination and deconfliction of SIGINT components of otherwise non-SIGINT government organizations, which are prevented by law from engaging in such activities without the approval of the NSA via the Defense Secretary.[15] As part of these streamlining responsibilities, the agency has a co-located organization called the Central Security Service (CSS), which was created to facilitate cooperation between NSA and other U.S. military cryptanalysis components. Additionally, the NSA Director simultaneously serves as the Commander of the United States Cyber Command and as Chief of the Central Security Service.

NSA surveillance has been a matter of political controversy on several occasions, such as its spying on prominent anti-Vietnam war leaders or economic espionage. In 2013, the extent of the NSA's secret surveillance programs was revealed to the public by Edward Snowden. According to the leaked documents, the NSA intercepts the communications of over a billion people worldwide and tracks the movement of hundreds of millions of people using cellphones. It has also created or maintained security vulnerabilities in most software and encryption, leaving the majority of the Internet susceptible to cyber attacks from the NSA and other parties. Domestically, it contributes to mass surveillance in the United States by collecting and storing all phone records of all American citizens. Internationally, in addition to the various data sharing concerns that persist, research has pointed to the NSA's ability to surveil the domestic internet traffic of foreign countries through "boomerang routing".[16]

The origins of the National Security Agency can be traced back to April 28, 1917, three weeks after the U.S. Congress declared war on Germany in World War I. A code and cipher decryption unit was established as the Cable and Telegraph Section which was also known as the Cipher Bureau and Military Intelligence Branch, Section 8 (MI-8). It was headquartered in Washington, D.C. and was part of the war effort under the executive branch without direct Congressional authorization. During the course of the war it was relocated in the army's organizational chart several times. On July 5, 1917, Herbert O. Yardley was assigned to head the unit. At that point, the unit consisted of Yardley and two civilian clerks. It absorbed the navy's cryptoanalysis functions in July 1918. World War I ended on November 11, 1918, and MI-8 moved to New York City on May 20, 1919, where it continued intelligence activities as the Code Compilation Company under the direction of Yardley.[17][18]

MI-8 also operated the so-called "Black Chamber".[20] The Black Chamber was located on East 37th Street in Manhattan. Its purpose was to crack the communications codes of foreign governments. Jointly supported by the State Department and the War Department, the chamber persuaded Western Union, the largest U.S. telegram company, to allow government officials to monitor private communications passing through the companys wires.[21]

Other "Black Chambers" were also found in Europe. They were established by the French and British governments to read the letters of targeted individuals, employing a variety of techniques to surreptitiously open, copy, and reseal correspondence before forwarding it to unsuspecting recipients.[22]

Despite the American Black Chamber's initial successes, it was shut down in 1929 by U.S. Secretary of State Henry L. Stimson, who defended his decision by stating: "Gentlemen do not read each other's mail".[19]

During World War II, the Signal Security Agency (SSA) was created to intercept and decipher the communications of the Axis powers.[23] When the war ended, the SSA was reorganized as the Army Security Agency (ASA), and it was placed under the leadership of the Director of Military Intelligence.[23]

On May 20, 1949, all cryptologic activities were centralized under a national organization called the Armed Forces Security Agency (AFSA).[23] This organization was originally established within the U.S. Department of Defense under the command of the Joint Chiefs of Staff.[24] The AFSA was tasked to direct Department of Defense communications and electronic intelligence activities, except those of U.S. military intelligence units.[24] However, the AFSA was unable to centralize communications intelligence and failed to coordinate with civilian agencies that shared its interests such as the Department of State, Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI).[24] In December 1951, President Harry S. Truman ordered a panel to investigate how AFSA had failed to achieve its goals. The results of the investigation led to improvements and its redesignation as the National Security Agency.[25]

Here is the original post:

National Security Agency - Wikipedia, the free encyclopedia

National Speakers Association New Jersey Chapter NSA

Ed Rigsbee, CSP, will teach you how to sell to trade associations and professional societies by going after their soft underbelly -- publication editors.

It's all about relationships!

Ed Rigsbee will show you how to get paid association bookings through writing articles, even in difficult times. You will find out how to first build a relationship bridge with the association's editor by offering articles adapted from your books, keynotes or seminars.

As a strategic alliance practitioner and consultant, Ed will help you develop and implement effective and profitable strategic alliances for your continued business growth. You'll learn how to:

Why focus on Associations and Societies?

The market: 7,500 national and international associations and societies and many have local, state, and regional affiliated associations/societies; delivering a total of about 90,000 organizations holding over 280,000 meetings yearly.

Learn Ed's article distribution methods! For the speaker who hates cold calls!

Ed's Four-Step Association Business Development System 1. Write articles based on your expertise that association editors will want to share with their readers. 2. Make your Relationship Bank Deposits; contact association publication editors and make available your articles. 3. Use your newly developed relationship to connect (warm call) with the association's meeting planner. 4. Start selling!

About Ed Rigsbee, CSP Certified Speaking Professional, CAE Certified Association Executive:

Ed Rigsbee, CSP Certified Speaking Professional, CAE Certified Association Executive, is one of America 's most prolific authors on the subject of Business Growth through Strategic Alliances, he is a consultant and advisor to world class clients such as DHL, Toyota, 3M, Dun & Bradstreet, Spirit Aerospace, BE Aerospace, George Fischer Signet, Mead, Siemens, Roland, Best Buy, and others. Located in the greater Los Angeles area, Ed travels internationally to instruct and assist organizations in the art and science of building strategic alliances to improve their total effectiveness and profitability. Through his extensive personal experience in retail, sales, and distribution, his training as full-day seminar leader for the Dun & Bradstreet Foundation (learning 8 full-day seminars), his service as an adjunct business school professor, and his experience serving as a professional speaker for over two decades, and as founder and executive director of a public non-profit 501 (c)(3) charity -- Ed delivers exciting, inspirational and informative keynotes, seminars and workshops for any occasion.

Original post:

National Speakers Association New Jersey Chapter NSA

NSA: Pictures, Videos, Breaking News – The Huffington Post

There is no doubt that the Visa Waiver Program merits a national discussion free from partisan politics. Terrorists have already used the VWP to gain access to soft targets. Whether additional security measures would have prevented their entry is the $64 million question.

Recent U.S. history paints a clear picture of abuses by law enforcement and intelligence agencies, often with the approval of politicians. Despite paternalistic assurances that Americans have no reason to fear their own government, caution is warranted.

T.A. Ridout

Global Politics, Economics, and Society from an American Perspective

In his latest article for The Intercept, Glenn Greenwald takes a highly critical look at a story by NPR's counterterrorism correspondent, Dina Temple-Raston, which aired on Morning Edition earlier this month.

Democracy Now!

Independent, weekday news hour, anchored by award-winning journalists Amy Goodman and Juan Gonzlez

co-authored by Tom Malatesta, CEO, Ziklag Systems For those focused on the subject matter, yesterday's Tweet fest from TeamAndIRC and Blackphone was ...

Follow this link:

NSA: Pictures, Videos, Breaking News - The Huffington Post

Judges raise privacy concerns about NSA tactics

A panel of federal judges voiced significant concerns Tuesday about the privacy implications of NSA surveillance tactics during a wide-ranging hearing on a legal challenge brought by the ACLU.

In an oral argument that was set for less than 30 minutes and lasted nearly two hours, three judges on a panel hearing the case at the Second U.S. Circuit Court of Appeals in Manhattan probed claims by the ACLU that the federal government's collection of data relating to "every phone call made or received by residents of the United States" is illegal and unconstitutional.

The ACLU appeal challenged a lower courts decision to uphold the NSA's mass bulk data collection of phone records.

Judges Gerard Lynch and Vernon Broderick were appointed by President Obama. Judge Robert Sack was appointed by President Clinton. At some point, each expressed significant concern about the privacy implications of allowing the federal government broad access to a wide range of information without any specific suspicion of wrongdoing.

Assistant Attorney General Stuart Delery first argued that federal courts do not have jurisdiction to review disputes regarding the NSA program. In addition, Delery argued the program is constitutional and has been repeatedly renewed by Congress.

Lynch asked how well briefed members of Congress were before voting, and questioned how much they understood about the program. At one point, Sack chimed in, "We don't know what we don't know"about NSA operations.

Lynch and Broderick both questioned why the government's justification for the bulk phone data collection program would not also extend to bank records, credit card transactions and other personal data. Lynch asked if the government's argument would not also entitle it to access "every American's everything."

Both sides acknowledged that President Obama has publicly stated that there are other ways to get the relevant intelligence, short of the sweeping NSA bulk data collection program that now exists.

That prompted Lynch to ask, if that was the case, why government attorneys were there to argue otherwise.

The panel also discussed the need for federal agencies such as the FBI and NSA to be able to move quickly when connecting dots on the intelligence landscape, acknowledging that having bulk data already at its disposal would speed the process.

Follow this link:

Judges raise privacy concerns about NSA tactics

Nude photos, phone records, NSA data offer essential lessons for admins

Simon Phipps | Sept. 8, 2014

Whether via Apple's iCloud, the DEA, or the NSA, data is leaking everywhere -- can anyone avoid exposure?

As you've heard many times by now, someone with no life or ethics appears to have hacked into numerous celebrity accounts on Apple's iCloud service and copied private photographs wholesale. At least a few of those photographs are intimate and revealing. As if that juvenile intrusion on adult privacy wasn't enough, they've then posted them in the Internet's frat houses for the world's sexually frustrated imbeciles to ogle.

This case raises questions about the very act of putting data online. There may be primary benefits for doing so, but as technology decision makers, we need to raise questions about secondary costs. Let's consider additional data points.

We also learned this week thatthe DEA has been using phone call data going back decades-- stored by AT&T for any call in which it participated, not just for its customers -- as a covert source in the agency's investigations. Unlike the NSA data, this is not merely material relating to foreigners -- this iseveryone'sdata, going back as far as 1987. It can be accessed by officials by filling out a form -- called an "administrative subpoena" but not involving any judicial review. As the New York Times says:

The Hemisphere Project, a partnership between federal and local drug officials and AT&T that has not previously been reported, involves an extremely close association between the government and the telecommunications giant.

Was this usage what the developers or executives had in mind a quarter of a century ago as they started logging the data? Or has it been stored "just in case" because it existed and seemed valuable and over time has found more and more users? There must be an enormous database -- the epitome of big data -- and it's probably used for multiple purposes.

As to that NSA data, a great deal of confusion about "surveillance" seems to be floating around. In the United Kingdom, questions are being asked about all the data-gathering by the British equivalent of the NSA, GCHQ. In response, Secretary of State Theresa Mayhas respondedthat "there is no programme of mass surveillance and there is no surveillance state" and labels claims that GCHQ engages in unlawful hacking as "nonsense." Yet clearly, a lot of data is being gathered.

GCHQ, the NSA, and probably every other intelligence agency worth the name is actively gathering data from the Internet. Everything on the Internet is transient, with different decay periods, so gathering information is a constant process. They believe everything that can be gathered without illegal action is fair game, so they gather anything and everything they can, storing it just in case.

They are without doubt capturing and recording all and any email, instant messages, Web pages, social media traffic, and so on. Recent disclosures reveal thatthe NSA collects"nearly everything a user does on the Internet," then offers analysts tools to search that data. The NSA has a variety of explanations why it's all legally gathered.

Read this article:

Nude photos, phone records, NSA data offer essential lessons for admins