Badan Keamanan Nasional: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
k bot Menambah: eo:National Security Agency |
k Membatalkan suntingan oleh INTERNASIONAL CYBER CRIME (bicara) ke revisi terakhir oleh Taylorbot: suntingan tidak membangun Tag: Pengembalian SWViewer [1.6] |
||
(51 revisi perantara oleh 32 pengguna tidak ditampilkan) | |||
Baris 1:
{{terjemah|Inggris}}
{{Infobox NSA}}
[[Berkas:Keith Alexander, official military portrait.jpg|
'''
== Organisasi ==
=== Peran ===
[[Berkas:National Security Agency headquarters, Fort Meade, Maryland.jpg|
Kegiatan-kegiatan NSA meliputi [[penyadapan]] dan [[pengamanan]]. Penyadapan NSA meliputi [[telepon]], komunikasi [[
Karena tugasnya mengumpulkan informasi, termasuk informasi rahasia, maka NSA juga terlibat dalam penelitian [[kriptoanalisis]], pemecahan [[Sandi (disambiguasi)|sandi]] dan [[kode (kriptografi)|kode]]. Pendahulu NSA seperti ''[[Purple Code]]'', ''[[Venona]]'', dan ''[[JN-25]]'' sendiri telah berhasil memecahkan [[kriptografi pada Perang Dunia II|banyak sandi]] pada [[Perang Dunia II]].
Markas besar NSA terletak di [[Fort George G. Meade]], [[Maryland]], sekitar 16 km di [[timur laut]] [[Washington, D.C.]]. Anggaran yang digunakan NSA dirahasiakan oleh pemerintah AS,
|url=http://english.people.com.cn/200512/19/print20051219_229129.html
|accessdate=2007-08-30
Baris 19:
|accessdate=2006-08-06
|author=Gorman, Siobhan
|title=NSA risking electrical overload
|archive-date=2006-08-20
NSA juga terlibat dalam industri keamanan komunikasi, diantaranya pembuatan [[perangkat keras]] dan [[software|lunak]] khusus komunikasi aman, pabrik [[semikonduktor]] khusus di Fort Meade, serta penilitian [[kriptografi]] tingkat tinggi. NSA juga memiliki kontrak dengan perusahaan-perusahaan swasta di bidang [[riset]] dan peralatan.<!--▼
|archive-url=https://web.archive.org/web/20060820135709/http://www.baltimoresun.com/news/nationworld/bal-te.nsapower06aug06,0,5137448.story?coll=bal-home-headlines
|dead-url=yes
}}</ref> Selain markas besar di Ft. Meade, NSA juga memiliki fasilitas-fasilitas lain seperti [[Pusat Kriptologi Texas]] di [[San Antonio]], [[Texas]].
▲NSA juga terlibat dalam industri keamanan komunikasi,
====Strategy====
The NSA increased its reliance on American industry for the purposes of domestic spying, through a project code-named Project GROUNDBREAKER.<ref>[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa27.pdf](§27 NSA director Hayden's testimony senate select committee on Intelligence 17 October 2002)</ref> It is linked to the DOD doctrines called "Fight the net" and "Information Operations Roadmap".<ref>CRS Report for Congress: ''Information Operations and Cyberwar:Capabilities and Related Policy Issues'', Clay Wilson, [http://www.au.af.mil/au/awc/awcgate/crs/rl31787.pdf read pdf file]</ref> Ex-director [[Michael Hayden]] has said, "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application".<ref>Remarks by General Michael V.Hayden: ''What American Intelligence and especially the NSA has been doing to defend the nation''; Monday, [[January 23]], [[2006]] [http://www.globalsecurity.org/intell/library/news/2006/intell-060123-dni01.htm]</ref> Two examples of relying on American industry for the purposes of domestic spying are the use of [[Communications Assistance for Law Enforcement Act|CALEA]]<ref>Sec.103: Assistance capability Requirements; [http://www.askcalea.net/calea/103.html AskCALEA]</ref><ref>Sec.106: Co-operation of Equipment Manufacturers and Providers of Telecommunications Support Services; [http://www.askcalea.net/calea/106.html AskCALEA]</ref> on US telecommunication companies, and NarusInsight. Under CALEA, all US telecommunication companies were forced to install hardware capable of monitoring data and voice by May 14, 2007. The act also forced US telecommunication companies to build national technology standards to support CALEA. NarusInsight is one type of spying hardware, capable of monitoring an [[Optical Carrier#OC-192|OC-192 network line]] in real-time, and gives AT&T the power to monitor all 7,432,000 DSL lines it owns. According to [http://narus.com Narus], after data capture its software can replay "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols".
-->
=== Sejarah ===
Asal mula NSA dapat dirunut sejak pendirian ''Armed Forces Security Agency'' (AFSA, Badan Keamanan Angkatan Bersenjata) pada [[20 Mei]] [[1949]]. Organisasi ini awalnya didirikan
Formalisasi dari pembentukan NSA disahkan oleh surat yang ditulis [[Presiden AS]] [[Harry S. Truman]] pada Juni 1952. NSA didirikan secara resmi melalui revisi ''National Security Council Intelligence Directive'' (NSCID) pada [[24 Oktober]] [[1952]], dan mulai eksis pada [[4 November]] [[1952]]. Surat Truman tersebut nyatanya merupakan informasi rahasia, dan tidak diketahui umum selama bertahun-tahun.
=== Lambang ===
[[Berkas:National Security Agency seal.png|
Lambang NSA terdiri dari [[elang botak]] menghadap ke kanan, lambang [[perdamaian]], mencengkeram sebuah kunci pada kukunya, melambangkan cengkeraman NSA pada sistem keamanan dan misinya membongkar dan melindungi rahasia. Elang tersebut berada pada latar belakang biru, dan dadanya berbentuk perisai biru dengan 13 garis merah dan putih, melambangkan warna-warna [[bendera AS]]. Pada pinggir lambang, terdapat lingkaran putih dengan tulisan "NATIONAL SECURITY AGENCY" dan "UNITED STATES OF AMERICA", dengan dua bintang
<!--
==Involvement with non-government cryptography==
Baris 69 ⟶ 73:
}}</ref>
Technically, almost all modern telephone,
The NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans' [[privacy]].{{Fact|date=August 2007}} However, the NSA's [[United States Signals Intelligence Directive 18]] (USSID 18) strictly prohibits the interception or collection of information about "...US persons, entities, corporations or organizations..." without explicit written legal permission from the [[Attorney General]] of the United States
There have been alleged violations of USSID 18 that occurred in violation of the NSA's strict charter prohibiting such acts.{{Fact|date=February 2007}} In addition, ECHELON is considered with indignation by citizens of countries outside the [[UKUSA]] alliance, with widespread suspicion that the United States government uses it for motives other than its national security, including [[politics|political]] and [[industrial espionage]].[http://www.fas.org/irp/program/process/rapport_echelon_en.pdf] The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations.
Baris 110 ⟶ 114:
==Staff==
<div style="-moz-column-count:2; column-count:2;">
<big>'''Directors'''</big>
{{main|Director of the National Security Agency}}
Baris 126 ⟶ 130:
*1988–1992 [[Vice Admiral|V. Adm.]] [[William O. Studeman]], USN
*1992–1996 [[Vice Admiral|V. Adm.]] [[John M. McConnell]], USN
*1996–1999 [[Lieutenant General (United States)|Lt. Gen.]] [[Kenneth A. Minihan]], USAF
*1999–2005 [[Lieutenant General (United States)|Lt. Gen.]] [[Michael Hayden|Michael V. Hayden]], USAF
*2005–Present [[Lieutenant General (United States)|Lt. Gen.]] [[Keith B. Alexander]], USA
Baris 162 ⟶ 166:
*[[Herbert Yardley]]
</div>
==NSA encryption systems==
{{main|NSA encryption systems}}
[[
NSA is responsible for the encryption-related components in these systems:
Baris 230 ⟶ 234:
-->
==
* [[James Bamford|Bamford, James]], ''[[Body of Secrets: Anatomy of the Ultra-Secret National Security Agency]]'', Doubleday, 2001, ISBN 0-385-49907-8.
* [[James Bamford|Bamford, James]], ''[[The Puzzle Palace (book)|The Puzzle Palace]]'', Penguin Books, ISBN 0-14-006748-5.
Baris 236 ⟶ 240:
* [[Patrick Radden Keefe|Radden Keefe, Patrick]], ''[[Chatter: Dispatches from the Secret World of Global Eavesdropping]]'', Random House, ISBN 1-4000-6034-6.
* [[Robert A. Liston|Liston, Robert A.]], ''[[The Pueblo Surrender: a Covert Action by the National Security Agency]]'', ISBN 0-87131-554-8.
* [[David Kahn|Kahn, David]], ''[[The Codebreakers]]'', 1181 pp., ISBN 0-684-83130-9.
* [[Andrew Tully|Tully, Andrew]], ''[[The Super Spies: More Secret, More Powerful than the CIA]]'', 1969, LC 71080912.
* [[James Bamford|Bamford, James]], [[New York Times]], December 25, 2005; The Agency That Could Be Big Brother.
Baris 244 ⟶ 248:
* [[Sherman Kent]], ''Strategic Intelligence for American Public Policy''
== Pranala
{{commons |Category: NSA images}}
<div class="references-small" {{#if: {{{colwidth|}}}| style="-moz-column-width:{{{colwidth}}}; column-width:{{{colwidth}}};" | {{#if: {{{1|}}}| style="-moz-column-count:{{{1}}}; column-count:{{{1}}} }}};" |}}>
* [http://www.nsa.gov/ NSA official site]
* [http://www.archives.gov/research/guide-fed-records/groups/457.html Records of the National Security Agency/Central Security Service]
* [http://www.darkgovernment.com/nsa.html Overview of the NSA and their Major Programs] {{Webarchive|url=https://web.archive.org/web/20081120090234/http://www.darkgovernment.com/nsa.html |date=2008-11-20 }}
* [http://history.sandiego.edu/gen/20th/nsa.html History of NSA] {{Webarchive|url=https://web.archive.org/web/20080515111519/http://history.sandiego.edu/gen/20th/nsa.html |date=2008-05-15 }}
* [http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html The NSA charter] {{Webarchive|url=https://web.archive.org/web/20080720172513/http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html |date=2008-07-20 }}
* [http://www.thememoryhole.org/nsa/origins_of_nsa.htm "The Origins of the National Security Agency, 1940-1952"] {{Webarchive|url=https://web.archive.org/web/20080103233603/http://www.thememoryhole.org/nsa/origins_of_nsa.htm |date=2008-01-03 }} —newly declassified book-length report provided by ''[http://www.thememoryhole.org/ The Memory Hole]''.
* [http://montages.blogspot.com/2005/01/outsourcing-intelligence.html "Outsourcing Intelligence"]
* [http://www.gwu.edu/~nsarchiv/ The National Security Archive at George Washington University]
* [http://cryptome.org/ Cryptome]
* [http://web.archive.org/web/20011007015616/http://cryptome.org/nsa-ussid18.htm CRYPTOME.org - USSID 18 DECLASSIFIED]
* [http://www.fas.org/ Federation of American Scientist]
* David Alan Jordan, [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol] {{Webarchive|url=https://web.archive.org/web/20071030095250/http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf |date=2007-10-30 }} - Boston College Law Review, Vol. 47, 2006
* [http://maps.google.com/maps?ll=39.108735,-76.771098&spn=0.006069,0.010664&t=k&hl=en NSA Headquarters]
* [http://www.hal-pc.org/journal/nov99/Column/caught/caught.html "FAILURE IS NOT AN OPTION: It comes bundled with the software."|by Al Massey] {{Webarchive|url=https://web.archive.org/web/20051004030815/http://www.hal-pc.org/journal/nov99/Column/caught/caught.html |date=2005-10-04 }}
* [http://users.skynet.be/terrorism/html/usa_nsa.htm NSA: Bibliography|Compilation and research by Jean-Pierre H. Coumont] {{Webarchive|url=https://web.archive.org/web/20060216080043/http://users.skynet.be/terrorism/html/usa_nsa.htm |date=2006-02-16 }}
* [http://www.nytimes.com/2005/12/16/politics/16program.html New York Times NSA Phone Taps Article] [http://www.nytimes.com/2005/12/16/politics/16program.html?ei=5088&en=e32070df8d623ac1&ex=1292389200&pagewanted=print alternate link]
* [http://www.boston.com/news/nation/washington/articles/2005/12/23/wiretaps_said_to_sift_all_overseas_contacts?mode=PF Wiretaps said to sift all overseas contacts (Boston Globe)]
* Kurt Nimmo. [http://kurtnimmo.com/?p=169 NSA snoop story: Tell me something I don’t already know] {{Webarchive|url=https://web.archive.org/web/20060323234820/http://kurtnimmo.com/?p=169 |date=2006-03-23 }}, ''Another Day in the Empire'', December 24, 2005.
* Kevin Zeese. [http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html NSA mounted massive spy op on peace group, documents show] {{Webarchive|url=https://web.archive.org/web/20071013213539/http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html |date=2007-10-13 }}, ''Raw Story'', January 10, 2006.
* [http://www.fas.org/irp/eprint/nsa-interview.pdf First person account of NSA interview and clearance]
* Joanne Leyland, [http://www.theroyalist.net/content/view/1528/2/ "American Intelligence Service Denies Eavesdropping On Princess Diana"], The Royalist, [[13
* [http://www.theatlantic.com/doc/200604/nsa-surveillance Big Brother Is Listening]
</div>
Baris 275 ⟶ 279:
[[Kategori:Badan intelijen Amerika Serikat]]
[[Kategori:Organisasi kriptografi]]
[[Kategori:Badan intelijen]]
▲[[de:National Security Agency]]
|