وكالة الأمن القومي
استعراض الوكالة | |
---|---|
تشكلت | 4 نوفمبر، 1952 |
agency السابقة | |
الاختصاص | الولايات المتحدة |
المقر الرئيسي | فورت ميد، ماريلاند |
الموظفون | التصنيف |
الميزانية السنوية | التصنيف |
تنفيذي الوكالةs | |
الوكالة الأم | United States Department of Defense |
وكالة الأمن القومي/خدمة الأمن المركزي (NSA/CSS)، هي وكالة أمريكية فيدرالية مختصة بشؤون جمع المعلومات المرسلة عن طريق أنظمة الاتصالات المختلفة، وتحليلها بواسطة تقنية متقدمة. أنشأت في 4 نوفمبر، 1954 بغرض جمع المعلومات عن الاتصالات الدولية وتحليلها. ومقرها الرئيسي في فورت ميادي بولاية ماريلاند الأمريكية.
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
التنظيم
الدور
المرافق
مركز أمن الحاسوب القومي
التاريخ
الشارات
التأثير على ترميز المنظمات غير الحكومية
Data Encryption Standard (DES)
Clipper chip
Advanced Encryption Standard (AES)
Dual EC DRBG random number generator
البحث الأكاديمي
Patents
برامج وكالة الأمن القومي
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
إتشـِلون
- مقالة مفصلة: إتشـِلون
Domestic activity
Wiretapping programs
Domestic wiretapping under Richard Nixon
ThinThread wiretapping and data mining
Warrantless wiretaps under George W. Bush
AT&T Internet monitoring
Wiretapping under Barack Obama
Transaction data mining
Criticisms
In fiction
المديرون
|
مشاهير محللو الشفرات
|
نظام تحليل الشفرات في وكالة الأمن القومي
NSA is responsible for the encryption-related components in these systems:
- EKMS Electronic Key Management System
- FNBDT Future Narrow Band Digital Terminal
- Fortezza encryption based on portable crypto token in PC Card format
- KL-7 ADONIS off-line rotor encryption machine (post-WW II to 1980s)
- KW-26 ROMULUS electronic in-line teletype encryptor (1960s-1980s)
- KW-37 JASON fleet broadcast encryptor (1960s-1990s)
- KY-57 VINSON tactical radio voice encryptor
- KG-84 Dedicated Data Encryption/Decryption
- SINCGARS tactical radio with cryptographically controlled frequency hopping
- STE secure terminal equipment
- STU-III secure telephone unit, currently being phased out by the STE
- TACLANE product line by General Dynamics C4 Systems
NSA has specified Suite A and Suite B cryptographic algorithms to be used in U.S. government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.
Some past NSA SIGINT activities
- Gulf of Tonkin Incident
- Korean Air Lines Flight 007[1]
- Operation Ivy Bells
- USS Liberty incident
- USS Pueblo (AGER-2)
- VENONA project
انظر أيضا
- جيمس بامفورد
- Biometric Consortium
- مكتب المخابرات والبحث
- وكالة الاستخبارات المركزية
- خدمة الأمن المركزي
- Counterintelligence Field Activity
- Defence Signals Directorate
- Defense Intelligence Agency
- Diplomatic Security Service
- Espionage
- Federal Bureau of Investigation
- Federal law enforcement in the United States
- Government Communications Headquarters
- Martin and Mitchell Defection
- Narus
- National Geospatial-Intelligence Agency
- National Reconnaissance Office
- National Security Whistleblowers Coalition
- NSA Hall of Honor
- Ronald Pelton
- Project SHAMROCK
- Q Group
- Security-Enhanced Linux
- Signals intelligence
- Skipjack (cipher)
- TEMPEST
- Type 1 product
- United States Department of Homeland Security
- John Anthony Walker
حواسب الوكالة
المصادر
قراءات إضافية
- Bamford, James, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, Doubleday, 2001, ISBN 0-385-49907-8.
- Bamford, James, The Puzzle Palace, Penguin Books, ISBN 0-14-006748-5.
- Hanyok, Robert J. (2002). Spartans in Darkness: American SIGINT and the Indochina War, 1945-1975. National Security Agency. Retrieved 2008-11-16.
- Johnson, Thomas R. (2008). American Cryptology during the Cold War. National Security Agency: Center for Cryptological History. Retrieved 2008-11-16.
- Levy, Steven, Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age– discussion of the development of non-government cryptography, including many accounts of tussles with the NSA.
- Radden Keefe, Patrick, Chatter: Dispatches from the Secret World of Global Eavesdropping, Random House, ISBN 1-4000-6034-6.
- Liston, Robert A., The Pueblo Surrender: a Covert Action by the National Security Agency, ISBN 0-87131-554-8.
- Kahn, David, The Codebreakers, 1181 pp., ISBN 0-684-83130-9. Look for the 1967 rather than the 1996 edition.
- Tully, Andrew, The Super Spies: More Secret, More Powerful than the CIA, 1969, LC 71080912.
- Bamford, James, New York Times, December 25, 2005; The Agency That Could Be Big Brother. Nytimes.com
- Sam Adams, War of Numbers: An Intelligence Memoir Steerforth; New Ed edition (June 1, 1998)
- John Prados, The Soviet estimate: U.S. intelligence analysis & Russian military strength, hardcover, 367 pages, ISBN 0-385-27211-1, Dial Press (1982).
- Walter Laqueur, A World of secrets
- Sherman Kent, Strategic Intelligence for American Public Policy
- Matthew Aid, The Secret Sentry: The Untold History of the National Security Agency, 432 pages, ISBN 978-1596915152, Bloomsbury Press (June 9, 2009)
وصلات خارجية
- NSA official site
- Records of the National Security Agency/Central Security Service
- History of NSA
- The NSA charter
- "The Origins of the National Security Agency, 1940-1952" —newly declassified book-length report provided by The Memory Hole.
- The National Security Archive at George Washington University
- "United States Intelligence Community: Who We Are / NSA section". Archived from the original on 2006-09-25.
- First person account of NSA interview and clearance January 2004
- James Bamford Big Brother Is Listening The Atlantic, April 2006
- James Bamford Inside the National Security Agency (Lecture) ACLU, KUOW-FM, PRX, NPR, February 24, 2007 (53: minutes)
- The Center for Intelligence and Security Studies trains new analysts in Intelligence Analysis
- Pages using gadget WikiMiniAtlas
- Articles with hatnote templates targeting a nonexistent page
- Coordinates not on Wikidata
- وكالة الأمن القومي
- وكالات وزارة الدفاع الأمريكية
- وكالات مخابرات فردية
- مراقبة الجمهور
- United States government secrecy
- وكالات حكومية تأسست في 1949
- Supercomputer sites
- Computer security organizations