Skip to main content icon/video/no-internet

The National Security Agency (NSA) was established by a secret memorandum, National Security Council Intelligence Directive (NSCID) No. 9, signed by President Harry S. Truman on October 24, 1952. A separate and extremely secretive agency within the Department of Defense, headquartered at Fort George G. Meade, Maryland, the NSA is a cryptologic organization, arguably the world's best at making and breaking codes and ciphers, as well as one of the leading centers of foreign-language analysis within the U.S. government. Neither the number of employees nor the agency's budget can be publicly disclosed, but some analysts estimate that its yearly budget is as high as $10 billion. NSA does not disclose sources or methods of intelligence and never comments on media speculations about actual or possible intelligence issues. Many Washingtonians jokingly claim that “NSA” stands for “No Such Agency.”

The NSA works closely with the Central Security Service (CSS), the umbrella organization for the codemaking and codebreaking units of the U.S. Army, Navy, Air Force, Marine Corps, and Coast Guard. The CSS was established by presidential directive in 1972, and the NSA director is also the chief of the CSS. NSA staff and CSS personnel work closely together in facilities around the world to maintain a smooth, integrated information flow to relevant policymakers.

The NSA's civilian and military employees include physicists, engineers, mathematicians, analysts, computer scientists, and linguists. They are charged with two sensitive activities within the U.S. intelligence community: signals intelligence (SIGINT), or gathering information that foreign adversaries prefer to remain confidential, and information assurance, or protecting U.S. information from interception or tampering. The SIGINT and information assurance missions combine to facilitate Network Warfare, a military function. The NSA uses bomber planes, sea vessels, submarines, and satellites to gather information, operating a global network of ground stations to intercept diplomatic, military, scientific, and commercial satellite communications.

Signals Intelligence

SIGINT is collected from many sources, such as communications, radar, and other electronic systems. SIGINT protocols are used to encrypt U.S. transmissions and decode intercepted enemy communications. The data are used to protect troops and assist allies, as well as for counterintelligence, including the detection of espionage, sabotage, terrorism, and related hostile activities of foreign powers. NSA supplies SIGINT to the White House, U.S. military commands, government officials, allies, and government contractors.

The United States has a long history of successfully using SIGINT. Both sides used SIGINT in the Civil War, and SIGNIT-captured information played a critical role in the U.S. decision to participate in World War I. During World War II, the Marine Corps and Army used Native Americans to create a code based on the Navajo language. Neither Germany nor Japan were able to decipher transmissions by the Navajo “code talkers.” One of the most successful NSA operations was the VENONA Project, which collected and decrypted Soviet KGB and GRU messages during the 1940s. This project provided extraordinary insight into Soviet attempts to infiltrate the highest levels of the U.S. government. During the Cuban Missile Crisis in 1962, SIGINT provided the only in-depth information about the Cuban military build-up to senior policymakers and military officials. The NSA had Osama bin Laden's electronic communications under constant surveillance starting in 1995.

...

  • Loading...
locked icon

Sign in to access this content

Get a 30 day FREE TRIAL

  • Watch videos from a variety of sources bringing classroom topics to life
  • Read modern, diverse business cases
  • Explore hundreds of books and reference titles

Sage Recommends

We found other relevant content for you on other Sage platforms.

Loading