Badan Keamanan Nasional: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
k {{rapikan}} |
k Membatalkan suntingan oleh INTERNASIONAL CYBER CRIME (bicara) ke revisi terakhir oleh Taylorbot: suntingan tidak membangun Tag: Pengembalian SWViewer [1.6] |
||
(69 revisi perantara oleh 37 pengguna tidak ditampilkan) | |||
Baris 1:
{{terjemah|Inggris}}
{{Infobox NSA}}
[[Berkas:Keith Alexander, official military portrait.jpg|jmpl|125px|ka|Letjen Keith B. Alexander, direktur ke-16 NSA dan sedang menjabat.]]
'''Badan Keamanan Nasional''' ({{lang-en|National Security Agency}}, disingkat '''NSA''') adalah sebuah agensi [[kriptografi]] milik pemerintah [[Amerika Serikat]], didirikan oleh [[Presiden AS|Presiden]] [[Harry S. Truman]] pada [[4 November]] [[1952]]. NSA bertugas untuk mengumpulkan dan menganalisis [[komunikasi]] negara lain, serta melindungi [[informasi]] milik Amerika Serikat. NSA mengkoordinasi, mengarahkan, serta menjalankan aktivitas-aktivitas amat istimewa bertujuan untuk mengumpulkan informasi [[intelijen]] dari luar negeri, terutama menggunakan [[kriptoanalisis]]. Selain itu, NSA melindungi komunikasi pemerintah dan [[sistem informasi]] di AS dari agensi lainnya, yang melibatkan kriptografi tingkat tinggi. NSA merupakan bagian dari [[Departemen Pertahanan Amerika Serikat|Dephan AS]], dan dikepalai oleh seorang [[direktur NSA|direktur]] dari [[militer AS]] berpangkat [[Letnan Jenderal]] atau [[Laksamana Madya]]. NSA adalah komponen kunci dari [[Komunitas Intelijen Amerika Serikat]], yang dipimpin oleh [[Direktur Intelijen Nasional Amerika Serikat|Direktur Intelijen Nasional]].
== Organisasi ==
=== Peran ===
[[Berkas:National Security Agency headquarters, Fort Meade, Maryland.jpg|jmpl|225px|ka|Markas besar NSA di [[Fort Meade]], [[Maryland]]]]
Kegiatan-kegiatan NSA meliputi [[penyadapan]] dan [[pengamanan]]. Penyadapan NSA meliputi [[telepon]], komunikasi [[Internet]], komunikasi [[radio]], serta komunikasi-komunikasi lainnya yang dapat disadap. Pengamanan NSA meliputi komunikasi [[militer]], [[diplomasi|diplomatik]], serta komunikasi-komunikasi rahasia atau sensitif pemerintah. NSA merupakan organisasi yang mempekerjakan [[ahli matematika]] dan memiliki [[superkomputer]] terbanyak di dunia.<ref>[http://www.nsa.gov/about/ Introduction to NSA/CSS], NSA. Retrieved 15 May 2006.</ref> Namun NSA berusaha untuk tetap ''[[low profile]]'', bahkan Pemerintah AS pernah tidak mengakui keberadaannya selama beberapa tahun. Karena itu, NSA sering dipelesetkan sebagai ''No Such Agency'' (Tidak ada agensi seperti itu), atau ''Never Say Anything'' (Jangan bilang apa-apa).
Karena tugasnya mengumpulkan informasi, termasuk informasi rahasia, maka NSA juga terlibat dalam penelitian [[kriptoanalisis]], pemecahan [[Sandi (disambiguasi)|sandi]] dan [[kode (kriptografi)|kode]]. Pendahulu NSA seperti ''[[Purple Code]]'', ''[[Venona]]'', dan ''[[JN-25]]'' sendiri telah berhasil memecahkan [[kriptografi pada Perang Dunia II|banyak sandi]] pada [[Perang Dunia II]].
Markas besar NSA terletak di [[Fort George G. Meade]], [[Maryland]], sekitar 16 km di [[timur laut]] [[Washington, D.C.]]. Anggaran yang digunakan NSA dirahasiakan oleh pemerintah AS, tetapi total penggunaan listrik tahunan NSA saja melebihi 31 juta [[dolar AS]] (190 miliar [[rupiah]]).<ref>{{cite web
|url=http://english.people.com.cn/200512/19/print20051219_229129.html
|accessdate=2007-08-30
|author=People's Daily
|title=Biggest intelligence agency in US}}</ref> Pada tahun 2006, [[suratkabar]] AS ''[[Baltimore Sun]]'' melaporkan NSA berisiko memiliki terlalu banyak beban listrik, yang diakibatkan kurangnya infrastruktur listrik di Fort Meade untuk menjalankan peralatan-peralatan NSA.<ref>{{cite web
|url=http://www.baltimoresun.com/news/nationworld/bal-te.nsapower06aug06,0,5137448.story?coll=bal-home-headlines
|accessdate=2006-08-06
|author=Gorman, Siobhan
|title=NSA risking electrical overload
|archive-date=2006-08-20
|archive-url=https://web.archive.org/web/20060820135709/http://www.baltimoresun.com/news/nationworld/bal-te.nsapower06aug06,0,5137448.story?coll=bal-home-headlines
|dead-url=yes
}}</ref> Selain markas besar di Ft. Meade, NSA juga memiliki fasilitas-fasilitas lain seperti [[Pusat Kriptologi Texas]] di [[San Antonio]], [[Texas]].
NSA juga terlibat dalam industri keamanan komunikasi, di antaranya pembuatan [[perangkat keras]] dan [[software|lunak]] khusus komunikasi aman, pabrik [[semikonduktor]] khusus di Fort Meade, serta penilitian [[kriptografi]] tingkat tinggi. NSA juga memiliki kontrak dengan perusahaan-perusahaan swasta di bidang [[riset]] dan peralatan.<!--
====Strategy====
The NSA increased its reliance on American industry for the purposes of domestic spying, through a project code-named Project GROUNDBREAKER.<ref>[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa27.pdf](§27 NSA director Hayden's testimony senate select committee on Intelligence 17 October 2002)</ref> It is linked to the DOD doctrines called "Fight the net" and "Information Operations Roadmap".<ref>CRS Report for Congress: ''Information Operations and Cyberwar:Capabilities and Related Policy Issues'', Clay Wilson, [http://www.au.af.mil/au/awc/awcgate/crs/rl31787.pdf read pdf file]</ref> Ex-director [[Michael Hayden]] has said, "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application".<ref>Remarks by General Michael V.Hayden: ''What American Intelligence and especially the NSA has been doing to defend the nation''; Monday, [[January 23]], [[2006]] [http://www.globalsecurity.org/intell/library/news/2006/intell-060123-dni01.htm]</ref> Two examples of relying on American industry for the purposes of domestic spying are the use of [[Communications Assistance for Law Enforcement Act|CALEA]]<ref>Sec.103: Assistance capability Requirements; [http://www.askcalea.net/calea/103.html AskCALEA]</ref><ref>Sec.106: Co-operation of Equipment Manufacturers and Providers of Telecommunications Support Services; [http://www.askcalea.net/calea/106.html AskCALEA]</ref> on US telecommunication companies, and NarusInsight. Under CALEA, all US telecommunication companies were forced to install hardware capable of monitoring data and voice by May 14, 2007. The act also forced US telecommunication companies to build national technology standards to support CALEA. NarusInsight is one type of spying hardware, capable of monitoring an [[Optical Carrier#OC-192|OC-192 network line]] in real-time, and gives AT&T the power to monitor all 7,432,000 DSL lines it owns. According to [http://narus.com Narus], after data capture its software can replay "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols".
-->
=== Sejarah ===
Asal mula NSA dapat dirunut sejak pendirian ''Armed Forces Security Agency'' (AFSA, Badan Keamanan Angkatan Bersenjata) pada [[20 Mei]] [[1949]]. Organisasi ini awalnya didirikan di dalam Dephan AS, dibawah komando para [[Kepala Staf]] di militer AS. AFSA awalnya bertugas untuk mengatur aktivitas intelijen elektronik dan komunikasi dari [[intelijen militer]] di ketentaraan AS. Namun, AFSA hanya memiliki kendali koordinasi yang kecil. Lalu pada [[10 Desember]] [[1951]], [[Direktur CIA|Direktur]] [[CIA]] [[Walter Bedell Smith]] mengirimkan [[memo]] kepada Sekretaris Eksekutif [[Dewan Keamanan Nasional Amerika Serikat|Dewan Keamanan Nasional AS]] [[James S. Lay]], menyatakan "kendali dan koordinasi terhadap pengumpulan dan pemrosesan intelijen komunikasi terbukti tidak efektif" dan menyarankan sebuah survei terhadap aktivitas intelijen komunikasi. Usulan ini diterima pada [[13 Desember]] [[1951]], dan penyelidikan diizinkan pada [[28 Desember]] 1951. Laporan tersebut selesai pada [[13 Juni]] [[1952]], dikenal sebagai "Laporan Komite Brownell]], dari nama ketua komite [[Herbert Brownell]]. Komite ini menyelidiki sejarah aktivitas intelijen komunikasi AS dan mengatakan dibutuhkan koordinasi dan pengaturan yang jauh lebih besar di tingkat nasional. AFSA lalu diganti menjadi NSA, dan peran NSA tidak lagi hanya mencakup intelijen angkatan bersenjata.
Formalisasi dari pembentukan NSA disahkan oleh surat yang ditulis [[Presiden AS]] [[Harry S. Truman]] pada Juni 1952. NSA didirikan secara resmi melalui revisi ''National Security Council Intelligence Directive'' (NSCID) pada [[24 Oktober]] [[1952]], dan mulai eksis pada [[4 November]] [[1952]]. Surat Truman tersebut nyatanya merupakan informasi rahasia, dan tidak diketahui umum selama bertahun-tahun.
=== Lambang ===
[[Berkas:National Security Agency seal.png|jmpl|125px|ka|Lambang NSA]]
Lambang NSA terdiri dari [[elang botak]] menghadap ke kanan, lambang [[perdamaian]], mencengkeram sebuah kunci pada kukunya, melambangkan cengkeraman NSA pada sistem keamanan dan misinya membongkar dan melindungi rahasia. Elang tersebut berada pada latar belakang biru, dan dadanya berbentuk perisai biru dengan 13 garis merah dan putih, melambangkan warna-warna [[bendera AS]]. Pada pinggir lambang, terdapat lingkaran putih dengan tulisan "NATIONAL SECURITY AGENCY" dan "UNITED STATES OF AMERICA", dengan dua bintang di antara kedua tulisan tersebut. Lambang ini mulai digunakan sejak [[1965]], saat [[Direktur NSA]] [[Marshall Carter]] memerintahkan pembuatan lambang NSA.<ref>{{cite web|title=The National Security Agency Insignia|publisher=National Security Agency|url=http://www.nsa.gov/history/histo00018.cfm|accessdate=2006-12-26|archiveurl=https://web.archive.org/web/20040307182659/http://www.nsa.gov/history/histo00018.cfm|archivedate=2004-03-07|dead-url=yes}}</ref>
<!--
==Involvement with non-government cryptography==
NSA has been involved in debates about public policy, both as a behind-the-scenes adviser to other departments, and directly during and after [[Bobby Ray Inman|Vice Admiral Bobby Ray Inman]]'s directorship.
The NSA was embroiled in controversy concerning its involvement in the creation of the [[Data Encryption Standard]] (DES), a standard and public [[block cipher]] used by the [[US government]]. During development by [[IBM]] in the 1970s, the NSA recommended changes to the [[algorithm]]. There was suspicion the agency had deliberately weakened the algorithm sufficiently to enable it to eavesdrop if required. The suspicions were that a critical component — the so-called [[Substitution box|S-box]]es — had been altered to insert a "backdoor"; and that the key length had been reduced, making it easier for the NSA to discover the key using massive computing power, although it has since been discovered that the changes in fact ''strengthened'' the algorithm against [[differential cryptanalysis]].
Because of concerns that widespread use of strong cryptography would hamper government use of [[Telephone tapping|wiretap]]s, the NSA proposed the concept of [[key escrow]] in 1993 and introduced the [[Clipper chip]] that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials. The proposal was strongly opposed and key escrow requirements ultimately went nowhere. However, NSA's [[Fortezza]] hardware-based encryption cards, created for the Clipper project, are still used within government, and the NSA ultimately revealed the design of the [[Skipjack (cipher)|SKIPJACK cipher]] (but not the key exchange protocol) used on the cards.
Possibly because of previous controversy, the involvement of NSA in the selection of a successor to DES, the [[Advanced Encryption Standard]] (AES), was limited to [[hardware]] performance testing (see [[Advanced Encryption Standard process|AES competition]]).
NSA was a major player in the debates of the 1990s regarding the [[export of cryptography]]. Cryptographic software and hardware had long been classed with [[fighter plane]]s, [[tank]]s, [[cannon]]s, and [[atomic bomb]]s as controllable [[munitions]]. Restrictions on export were reduced but not eliminated in 1996.
The NSA/CSS has, at times, attempted to restrict the publication of academic research into cryptography; for example, the [[Khufu and Khafre]] block ciphers were voluntarily withheld in response to an NSA request to do so.
==Patents==
The NSA has the ability to file for a [[patent]] from the [[USPTO|US Patent and Trademark Office]] under [[gag order]]. Unlike normal patents, the NSA's are not revealed to the public and do not expire. However, if the Patent Office receives an application for an identical patent from a third party, they will reveal the NSA's patent and officially grant it to the NSA for the full term on that date.<ref>{{cite book
| last = Schneier
| first = Bruce
| authorlink = Bruce Schneier
| title = Applied Cryptography, Second Edition
| publisher = [[John Wiley & Sons]]
| date = 1996
| pages = 609-610
| id = ISBN 0-471-11709-9 }}</ref>
==ECHELON==
{{main|ECHELON}}
NSA/CSS, in combination with the equivalent agencies in the [[United Kingdom]] ''([[Government Communications Headquarters]])'', [[Canada]] ''([[Communications Security Establishment]]),'' [[Australia]] ''([[Defence Signals Directorate]])'', and [[New Zealand]] ''([[Government Communications Security Bureau]])'', and otherwise known as the [[UKUSA]] group, is believed to be in command of the operation of the so-called [[ECHELON]] system. Its capabilities are suspected to include the ability to monitor a large proportion of the world's transmitted civilian [[telephone]], [[fax]] and data traffic, according to a [[December 16]], [[2005]] article in the ''[[New York Times]]''.<ref>{{cite web
|url=http://www.nytimes.com/2005/12/16/politics/16program.html?ei=5088&en=e32070df8d623ac1&ex=1292389200&pagewanted=print
|work=The New York Times
|title=Bush Lets U.S. Spy on Callers Without Courts
|author=[[James Risen]] and [[Eric Lichtblau]]
|date=[[December 16]], [[2005]]
|accessdate=2006-04-26
}}</ref>
Technically, almost all modern telephone, Internet, fax and satellite communications are exploitable due to recent advances in technology and the 'open air' nature of much of the radio communications around the world.
The NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans' [[privacy]].{{Fact|date=August 2007}} However, the NSA's [[United States Signals Intelligence Directive 18]] (USSID 18) strictly prohibits the interception or collection of information about "...US persons, entities, corporations or organizations..." without explicit written legal permission from the [[Attorney General]] of the United States<ref name="USSID18">National Security Agency. [http://cryptome.org/nsa-ussid18.htm United States Signals Intelligence Directive 18]. National Security Agency [[July 27]], [[1993]]. Last access date [[March 23]], [[2007]]</ref> The [[US Supreme Court]] has ruled that intelligence agencies cannot conduct surveillance against American citizens. There are a few extreme circumstances where collecting on a US entity is allowed without a USSID 18 waiver, such as with civilian distress signals, or sudden emergencies such as [[September 11, 2001 attacks|9/11]]; however, the [[USA PATRIOT Act]] has significantly changed privacy legality.
There have been alleged violations of USSID 18 that occurred in violation of the NSA's strict charter prohibiting such acts.{{Fact|date=February 2007}} In addition, ECHELON is considered with indignation by citizens of countries outside the [[UKUSA]] alliance, with widespread suspicion that the United States government uses it for motives other than its national security, including [[politics|political]] and [[industrial espionage]].[http://www.fas.org/irp/program/process/rapport_echelon_en.pdf] The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations.
In his book [[Firewall]], Andy McNab speculates that the [[UKUSA]] agreement is designed to enable the [[NSA]], [[GCHQ]], and other equivalent organizations to gather intelligence on each other's citizens. For example, the NSA cannot legally conduct surveillance on American citizens, but GCHQ might do it for them.
==Domestic Activity==
The NSA's mission, as set forth in [[Executive Order 12333]], is to collect information that constitutes "foreign intelligence or counterintelligence" while ''not'' "acquiring information concerning the domestic activities of United States persons". The NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the USA, while confining its own activities within the USA to the embassies and missions of foreign nations.
The NSA's domestic surveillance activities are limited by the requirements imposed by the [[Fourth Amendment to the U.S. Constitution]]; however, these protections do not apply to non-U.S. persons located outside of U.S. borders, so the NSA's foreign surveillance efforts are subject to far fewer limitations under U.S. law.<ref name="Jordan_David">David Alan Jordan. [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol]. Boston College Law Review. [[May]], [[2006]]. Last access date [[January 23]], [[2007]]</ref> The specific requirements for domestic surveillance operations are contained in the [[Foreign Intelligence Surveillance Act of 1978]] (FISA), which does not extend protection to non-U.S. citizens located outside of U.S. territory.<ref name="Jordan_David" />
The activities described below, especially the publicly acknowledged 'Domestic Phone' tapping and Domestic Call Database programs, have prompted questions about the extent of the NSA's activities and concerns about threats to privacy and the rule of law.
===ThinThread===
{{main|ThinThread}}
A wiretapping program named [[ThinThread]] was tested in the late [[1990s]], according to information obtained by the ''[[Baltimore Sun]]'' in [[2006]]. This program may have contributed to the underlying technology used in later systems, but its safeguards on privacy were abandoned after the 9/11 attacks.<ref name="Sun"> {{cite web
| title =NSA killed system that sifted phone data legally
| work =baltimoresun.com
| url=http://www.baltimoresun.com/news/nationworld/bal-te.nsa18may18,1,5386811.story?ctrack=1&cset=true
| accessdate=2006-10-14
| date=[[2006-05-17]]
}}</ref>
===Phone taps===
{{main|NSA warrantless surveillance controversy}}
On [[December 16]], [[2005]], the ''[[New York Times]]'' reported that, under [[White House]] pressure and with an [[Executive order (United States)|executive order]] from President [[George W. Bush]], the National Security Agency, in an attempt to thwart [[terrorism]], had been conducting [[telephone tapping|phone-taps]] on individuals in the U.S. calling persons outside the country, without obtaining warrants from a secret court as required by the [[Foreign Intelligence Surveillance Act]] (FISA).<ref>[[James Risen]] & [[Eric Lichtblau]] (December 16, 2005), [http://www.nytimes.com/2005/12/16/politics/16program.html Bush Lets U.S. Spy on Callers Without Courts], ''[[New York Times]]''</ref>
Proponents of the warrantless surveillance claim that the President has the authority to order such action, arguing that the President has powers under the Constitution that trump laws such as [[Foreign Intelligence Surveillance Act|FISA]]. In addition, some argued that FISA was implicitly overridden by a subsequent statute, the [[Authorization for Use of Military Force]], although most concede this argument is untenable after the Supreme Court's ruling in [[Hamdan v. Rumsfeld]]. On August 2006 in the case [[ACLU v. NSA]], U.S. District Court Judge Anna Diggs Taylor concluded that the NSA's warantless surveillance program was illegal and unconstitutional. However, on July 6, 2007 the 6th Circuit Court of Appeals overturned Judge Taylor's ruling.<ref>[http://fl1.findlaw.com/news.findlaw.com/nytimes/docs/nsa/aclunsa70607opn.pdf 6th Circuit Court of Appeals Decision]</ref> See [[NSA warrantless surveillance controversy]] for details.
===Previous NSA tapping of US citizens===
{{Further|[[Church Committee]]}}
In the years after [[President Nixon]] resigned, there were several investigations of suspected misuse of [[CIA]] and NSA facilities. Senator [[Frank Church]] headed a Senate investigating committee called the [[Church Committee]] which uncovered previously unknown activity, such as a plot to assassinate [[Fidel Castro]] by the CIA, which had been ordered by President [[John F. Kennedy]] and Attorney General [[Robert F. Kennedy]]. During the investigation, it was also found that the NSA was actively tapping the phones of targeted American citizens. After the [[Church Committee]] hearings, the [[Foreign Intelligence Surveillance Act of 1978]] became law, limiting circumstances under which domestic surveillance was allowed.
==In fiction==
{{main|NSA in fiction}}
Since the existence of the NSA has become more widely known in the last few decades, and particularly since the 1990s, the agency has regularly been portrayed in spy fiction. Most such portrayals probably grossly exaggerate the organization's involvement in the more sensational activities of intelligence agencies. An indication of the agency's increased "fame" is its named appearance in the Bond franchise in 2002's ''[[Die Another Day]]''; a [[Bond girl]] portrayed by [[Halle Berry]] worked for them. The [[NSA in fiction|NSA has been featured]] in many other films, television shows, books, [[roleplaying]] games and video games (See [[Splinter Cell]]).
==Staff==
<div style="-moz-column-count:2; column-count:2;">
<big>'''Directors'''</big>
{{main|Director of the National Security Agency}}
*1952–1956 [[Lieutenant General (United States)|Lt. Gen.]] [[Ralph J. Canine]], USA
*1956–1960 [[Lieutenant General (United States)|Lt. Gen.]] [[John A. Samford]], USAF
*1960–1962 [[Vice Admiral|V. Adm.]] [[Laurence H. Frost]], USN
*1962–1965 [[Lieutenant General (United States)|Lt. Gen.]] [[Gordon A. Blake]], USAF
*1965–1969 [[Lieutenant General (United States)|Lt. Gen.]] [[Marshall S. Carter]], USA
*1969–1972 [[Vice Admiral|V. Adm.]] [[Noel A. M. Gaylor]], USN
*1972–1973 [[Lieutenant General (United States)|Lt. Gen.]] [[Samuel C. Phillips]], USAF
*1973–1977 [[Lieutenant General (United States)|Lt. Gen.]] [[Lew Allen, Jr.]], USAF
*1977–1981 [[Vice Admiral|V. Adm.]] [[Bobby Ray Inman]], USN
*1981–1985 [[Lieutenant General (United States)|Lt. Gen.]] [[Lincoln D. Faurer]], USAF
*1985–1988 [[Lieutenant General (United States)|Lt. Gen.]] [[William E. Odom]], USA
*1988–1992 [[Vice Admiral|V. Adm.]] [[William O. Studeman]], USN
*1992–1996 [[Vice Admiral|V. Adm.]] [[John M. McConnell]], USN
*1996–1999 [[Lieutenant General (United States)|Lt. Gen.]] [[Kenneth A. Minihan]], USAF
*1999–2005 [[Lieutenant General (United States)|Lt. Gen.]] [[Michael Hayden|Michael V. Hayden]], USAF
*2005–Present [[Lieutenant General (United States)|Lt. Gen.]] [[Keith B. Alexander]], USA
<small>''USA'', ''USAF'', and ''USN'' are the United States Army, United States Air Force, and United States Navy, respectively.</small>
<big>'''Deputy Directors'''</big>
*Dec. 1952 – Nov. 1953 [[R. Adm.]] [[Joseph Wenger]], USN
*Nov. 1953 – June 1956 [[Brigadier General|Brig. Gen.]] [[John Ackerman]], USAF
*Jun. 1956 – Aug. 1956 [[Major General|Maj. Gen.]] [[John A. Samford]], USAF
*Aug. 1956 – Sep. 1957 Mr. [[Joseph H. Ream]]
*Oct. 1957 – Jul. 1958 Dr. [[H. T. Engstrom]]
*Aug. 1958 – Apr. 1974 Dr. [[Louis W. Tordella]], USN
*Apr. 1974 – May 1978 Mr. [[Benson K. Buffham]]
*May 1978 – Apr. 1980 Mr. [[Robert E. Drake]]
*Apr. 1980 – Jul. 1982 Ms. [[Ann Z. Caracristi]]
*Jul. 1982 – Jun. 1985 Mr. [[Robert E. Rich]]
*Jun. 1985 – Mar. 1988 Mr. [[Charles R. Lord]]
*Mar. 1988 – Jul. 1990 Mr. [[Gerald R. Young]]
*Jul. 1990 – Feb. 1994 Mr. [[Robert L. Prestel]]
*Feb. 1994 – Oct. 1997 Mr. [[William P. Crowell]]
*Oct. 1997 – June 2000 Ms. [[Barbara mcnamara|Barbara A. McNamara]]
*Jun. 2000 – Aug. 2006 Mr. [[William B. Black, Jr.]]
*Aug. 2006 – present Mr. [[John C. (Chris) Inglis]]
<big>'''Notable cryptanalysts'''</big>
*[[Lambros D. Callimahos]]
*[[Agnes Meyer Driscoll]]
*[[William F. Friedman]]
*[[Solomon Kullback]]
*[[Frank Rowlett]]
*[[Abraham Sinkov]]
*[[Louis W. Tordella]]
*[[Herbert Yardley]]
</div>
{{wikisource|National Security Archive}}
==NSA encryption systems==
{{main|NSA encryption systems}}
[[Berkas:STU-IIIphones.nsa.jpg|thumb|right|250px|[[STU-III]] secure telephones on display at the [[National Cryptologic Museum]]]]
NSA is responsible for the encryption-related components in these systems:
*[[EKMS]] Electronic Key Management System
*[[FNBDT]] Future Narrow Band Digital Terminal
*[[Fortezza]] encryption based on portable crypto token in [[PC Card]] format
*[[KL-7]] ADONIS off-line rotor encryption machine (post-WW II to 1980s)
*[[KW-26]] ROMULUS electronic in-line teletype encryptor (1960s–1980s)
*[[KW-37]] JASON fleet broadcast encryptor (1960s–1990s)
*[[KY-57]] VINSON tactical radio voice encryptor
*[[KG-84]] Dedicated Data Encryption/Decryption
*[[SINCGARS]] tactical radio with cryptographically controlled frequency hopping
*[[STE]] secure telephone equipment
*[[STU-III]] secure telephone unit, currently being phased out by the [[STE]]
*[[TACLANE]] product line by [[General Dynamics]]
==Some past NSA SIGINT activities==
* [[VENONA project]]
* [[Gulf of Tonkin Incident]]
* [[USS Liberty incident]]
* [[USS Pueblo (AGER-2)]]
* KAL 007 Shootdown incident. Here are the combined U.S. Electronic Intercept and Russian Federation supplied transcripts of the shootdown in progress - [http://www.rescue007.org/shootdown.htm]
-->
== Referensi ==
{{reflist}}
<!-- Dead note "NSACreated": [http://www.nsa.gov/truman/truma00001.pdf Memorandum on Communications Intelligence Activities] (October 24, 1952) -->
== Lihat pula ==
* [[Central Intelligence Agency]] (CIA)
* [[Federal Bureau of Investigation]] (FBI)
* [[National Reconnaissance Office]] (NRO)
* [[Direktur Badan Keamanan Nasional Amerika Serikat]]
<!--
==See also==
* [[Biometric Consortium]]
* [[Bureau of Intelligence and Research]] (INR)
* [[Central Intelligence Agency]] (CIA)
* [[Central Security Service]] (CSS)
* [[Counterintelligence Field Activity]] (DoD - CIFA)
* [[Defence Signals Directorate]] (DSD) of Australia
* [[Defense Intelligence Agency]] (DIA)
* [[Department of Homeland Security]] (DHS)
* [[Diplomatic Security Service]] (DSS)
* [[Espionage]]
* [[Federal Bureau of Investigation]] (FBI)
* [[Government Communications Headquarters]] (GCHQ) of the UK
* [[Narus]] ST-6400 and NarusInsight by Narus Ltd.
* [[National Geospatial-Intelligence Agency]] (NGA)
* [[National Reconnaissance Office]] (NRO)
* [[National Security Whistleblowers Coalition]]
* [[Project SHAMROCK]]
* [[SELinux]]
* [[SIGINT]] (and COMINT)
* [[Skipjack (cipher)]]
* [[TEMPEST]] prevention of compromising emanations
* [[Type 1 encryption]]
===NSA computers===
* [[FROSTBURG]]
* [[HARVEST]]
-->
== Bacaan lanjutan ==
* [[James Bamford|Bamford, James]], ''[[Body of Secrets: Anatomy of the Ultra-Secret National Security Agency]]'', Doubleday, 2001, ISBN 0-385-49907-8.
* [[James Bamford|Bamford, James]], ''[[The Puzzle Palace (book)|The Puzzle Palace]]'', Penguin Books, ISBN 0-14-006748-5.
* [[Steven Levy|Levy, Steven]], ''[[Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age]]'' — discussion of the development of non-government cryptography, including many accounts of tussles with the NSA.
* [[Patrick Radden Keefe|Radden Keefe, Patrick]], ''[[Chatter: Dispatches from the Secret World of Global Eavesdropping]]'', Random House, ISBN 1-4000-6034-6.
* [[Robert A. Liston|Liston, Robert A.]], ''[[The Pueblo Surrender: a Covert Action by the National Security Agency]]'', ISBN 0-87131-554-8.
* [[David Kahn|Kahn, David]], ''[[The Codebreakers]]'', 1181 pp., ISBN 0-684-83130-9. Look for the 1967 rather than the 1996 edition.
* [[Andrew Tully|Tully, Andrew]], ''[[The Super Spies: More Secret, More Powerful than the CIA]]'', 1969, LC 71080912.
* [[James Bamford|Bamford, James]], [[New York Times]], December 25, 2005; The Agency That Could Be Big Brother.
* [[Sam Adams]], [[War of numbers]] Steerforth; New Ed edition (June 1, 1998)
* [[John Prados]], ''The Soviet estimate: U.S. intelligence analysis & Russian military strength'', hardcover, 367 pages, ISBN 0-385-27211-1, Dial Press (1982).
* [[Walter Laquer]], ''A World of secrets''
* [[Sherman Kent]], ''Strategic Intelligence for American Public Policy''
== Pranala luar ==
{{commons |Category: NSA images}}
<div class="references-small" {{#if: {{{colwidth|}}}| style="-moz-column-width:{{{colwidth}}}; column-width:{{{colwidth}}};" | {{#if: {{{1|}}}| style="-moz-column-count:{{{1}}}; column-count:{{{1}}} }}};" |}}>
* [http://www.nsa.gov/ NSA official site]
* [http://www.archives.gov/research/guide-fed-records/groups/457.html Records of the National Security Agency/Central Security Service]
* [http://www.darkgovernment.com/nsa.html Overview of the NSA and their Major Programs] {{Webarchive|url=https://web.archive.org/web/20081120090234/http://www.darkgovernment.com/nsa.html |date=2008-11-20 }}
* [http://history.sandiego.edu/gen/20th/nsa.html History of NSA] {{Webarchive|url=https://web.archive.org/web/20080515111519/http://history.sandiego.edu/gen/20th/nsa.html |date=2008-05-15 }}
* [http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html The NSA charter] {{Webarchive|url=https://web.archive.org/web/20080720172513/http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html |date=2008-07-20 }}
* [http://www.thememoryhole.org/nsa/origins_of_nsa.htm "The Origins of the National Security Agency, 1940-1952"] {{Webarchive|url=https://web.archive.org/web/20080103233603/http://www.thememoryhole.org/nsa/origins_of_nsa.htm |date=2008-01-03 }} —newly declassified book-length report provided by ''[http://www.thememoryhole.org/ The Memory Hole]''.
* [http://montages.blogspot.com/2005/01/outsourcing-intelligence.html "Outsourcing Intelligence"]
* [http://www.gwu.edu/~nsarchiv/ The National Security Archive at George Washington University]
* [http://cryptome.org/ Cryptome]
* [http://web.archive.org/web/20011007015616/http://cryptome.org/nsa-ussid18.htm CRYPTOME.org - USSID 18 DECLASSIFIED]
* [http://www.fas.org/ Federation of American Scientist]
* David Alan Jordan, [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol] {{Webarchive|url=https://web.archive.org/web/20071030095250/http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf |date=2007-10-30 }} - Boston College Law Review, Vol. 47, 2006
* [http://maps.google.com/maps?ll=39.108735,-76.771098&spn=0.006069,0.010664&t=k&hl=en NSA Headquarters]
* [http://www.hal-pc.org/journal/nov99/Column/caught/caught.html "FAILURE IS NOT AN OPTION: It comes bundled with the software."|by Al Massey] {{Webarchive|url=https://web.archive.org/web/20051004030815/http://www.hal-pc.org/journal/nov99/Column/caught/caught.html |date=2005-10-04 }}
* [http://users.skynet.be/terrorism/html/usa_nsa.htm NSA: Bibliography|Compilation and research by Jean-Pierre H. Coumont] {{Webarchive|url=https://web.archive.org/web/20060216080043/http://users.skynet.be/terrorism/html/usa_nsa.htm |date=2006-02-16 }}
* [http://www.nytimes.com/2005/12/16/politics/16program.html New York Times NSA Phone Taps Article] [http://www.nytimes.com/2005/12/16/politics/16program.html?ei=5088&en=e32070df8d623ac1&ex=1292389200&pagewanted=print alternate link]
* [http://www.boston.com/news/nation/washington/articles/2005/12/23/wiretaps_said_to_sift_all_overseas_contacts?mode=PF Wiretaps said to sift all overseas contacts (Boston Globe)]
* Kurt Nimmo. [http://kurtnimmo.com/?p=169 NSA snoop story: Tell me something I don’t already know] {{Webarchive|url=https://web.archive.org/web/20060323234820/http://kurtnimmo.com/?p=169 |date=2006-03-23 }}, ''Another Day in the Empire'', December 24, 2005.
* Kevin Zeese. [http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html NSA mounted massive spy op on peace group, documents show] {{Webarchive|url=https://web.archive.org/web/20071013213539/http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html |date=2007-10-13 }}, ''Raw Story'', January 10, 2006.
* [http://www.fas.org/irp/eprint/nsa-interview.pdf First person account of NSA interview and clearance]
* Joanne Leyland, [http://www.theroyalist.net/content/view/1528/2/ "American Intelligence Service Denies Eavesdropping On Princess Diana"], The Royalist, [[13 Desember]], [[2006]]. ''URL retrieved on [[6 Januari]] [[2007]]''.
* [http://www.theatlantic.com/doc/200604/nsa-surveillance Big Brother Is Listening]
</div>
{{Agensi intelijen AS}}
[[Kategori:Badan intelijen Amerika Serikat]]
[[Kategori:Organisasi kriptografi]]
[[Kategori:Badan intelijen]]
|