Badan Keamanan Nasional: Perbedaan antara revisi

Konten dihapus Konten ditambahkan
Arkwatem (bicara | kontrib)
Tidak ada ringkasan suntingan
k Membatalkan suntingan oleh INTERNASIONAL CYBER CRIME (bicara) ke revisi terakhir oleh Taylorbot: suntingan tidak membangun
Tag: Pengembalian SWViewer [1.6]
 
(66 revisi perantara oleh 37 pengguna tidak ditampilkan)
Baris 1:
{{terjemah|Inggris}}
{{rapikan}}
{{Infobox NSA}}
[[Berkas:Keith Alexander, official military portrait.jpg|jmpl|125px|ka|Letjen Keith B. Alexander, direktur ke-16 NSA dan sedang menjabat.]]
'''NationalBadan SecurityKeamanan AgencyNasional''' ('''NSA'''{{lang-en|National Security Agency}}, disingkat '''''Badan Keamanan Nasional''NSA''') adalah sebuah agensi [[kriptografi]] milik pemerintah [[Amerika Serikat]], didirikan oleh [[Presiden AS|Presiden]] [[Harry S. Truman]] pada [[4 November]] [[1952]]. NSA bertugas untuk mengumpulkan dan menganalisis [[komunikasi]] negara lain, serta melindungi [[informasi]] milik Amerika Serikat. NSA mengkoordinasi, mengarahkan, serta menjalankan aktifitasaktivitas-aktifitasaktivitas amat istimewa bertujuan untuk mengumpulkan informasi [[intelijen]] dari luar negeri, terutama menggunakan [[kriptoanalisis]]. Selain itu, NSA melindungi komunikasi pemerintah dan [[sistem informasi]] di AS dari agensi lainnya, yang melibatkan kriptografi tingkat tinggi. NSA merupakan bagian dari [[Departemen Pertahanan Amerika Serikat|Dephan AS]], dan dikepalai oleh seorang [[direktur NSA|direktur]] dari [[militer AS]] berpangkat [[Letnan Jenderal]] atau [[Laksamana Madya]]. NSA adalah komponen kunci dari [[Komunitas Intelijen Amerika Serikat]], yang dipimpin oleh [[Direktur Intelijen Nasional Amerika Serikat|Direktur Intelijen Nasional]].
 
== Organisasi ==
=== Peran ===
[[ImageBerkas:National Security Agency headquarters, Fort Meade, Maryland.jpg|thumbnailjmpl|300px225px|rightka|Markas besar NSA di [[Fort Meade]], [[Maryland]]]]
Kegiatan-kegiatan NSA meliputi [[penyadapan]] dan [[pengamanan]]. Penyadapan NSA meliputi [[telepon]], komunikasi [[internetInternet]], komunikasi [[radio]], serta komunikasi-komunikasi lainnya yang dapat disadap. Pengamanan NSA meliputi komunikasi [[militer]], [[diplomasi|diplomatik]], serta komunikasi-komunikasi rahasia atau sensitif pemerintah. NSA merupakan organisasi yang mempekerjakan [[ahli matematika]] dan memiliki [[superkomputer]] terbanyak di dunia.<ref>[http://www.nsa.gov/about/ Introduction to NSA/CSS], NSA. Retrieved 15 May 2006.</ref> Namun NSA berusaha untuk tetap ''[[low profile]]'', bahkan Pemerintah AS pernah tidak mengakui keberadaannya selama beberapa tahun. Karena itu, NSA sering dipelesetkan sebagai ''No Such Agency'' (Tidak ada agensi seperti itu), atau ''Never Say Anything'' (Jangan bilang apa-apa).
 
Karena tugasnya mengumpulkan informasi, termasuk informasi rahasia, maka NSA juga terlibat dalam penelitian [[kriptoanalisis]], pemecahan [[Sandi (disambiguasi)|sandi]] dan [[kode (kriptografi)|kode]]. Pendahulu NSA seperti ''[[Purple Code]]'', ''[[Venona]]'', dan ''[[JN-25]]'' sendiri telah berhasil memecahkan [[kriptografi pada Perang Dunia II|banyak sandi]] pada [[Perang Dunia II]].
 
Markas besar NSA terletak di [[Fort George G. Meade]], [[Maryland]], sekitar 16 km di [[timur laut]] [[Washington, D.C.]]. Anggaran yang digunakan NSA dirahasiakan oleh pemerintah AS, namuntetapi total penggunaan listrik tahunan NSA saja melebihi 31 juta [[dolar AS]] (190 miliar [[rupiah]]).<ref>{{cite web
|url=http://english.people.com.cn/200512/19/print20051219_229129.html
|accessdate=2007-08-30
Baris 18 ⟶ 19:
|accessdate=2006-08-06
|author=Gorman, Siobhan
|title=NSA risking electrical overload
|title=NSA risking electrical overload}}</ref> Selain markas besar di Ft. Meade, NSA juga memiliki fasilitas-fasilitas lain seperti [[Pusat Kriptologi Texas]] di [[San Antonio]], [[Texas]].<!--
|archive-date=2006-08-20
NSA juga terlibat dalam industri keamanan komunikasi, diantaranya pembuatan [[perangkat keras]] dan [[software|lunak]] khusus komunikasi aman, pabrik [[semikonduktor]] khusus di Fort Meade, serta penilitian [[kriptografi]] tingkat tinggi. NSA juga memiliki kontrak dengan perusahaan-perusahaan swasta di bidang [[riset]] dan peralatan.
|archive-url=https://web.archive.org/web/20060820135709/http://www.baltimoresun.com/news/nationworld/bal-te.nsapower06aug06,0,5137448.story?coll=bal-home-headlines
 
|dead-url=yes
In addition to its Ft. Meade headquarters, the NSA has other facilities such as the [[Texas Cryptology Center]] in [[San Antonio, Texas]].
|title=NSA risking electrical overload}}</ref> Selain markas besar di Ft. Meade, NSA juga memiliki fasilitas-fasilitas lain seperti [[Pusat Kriptologi Texas]] di [[San Antonio]], [[Texas]].<!--
 
NSA juga terlibat dalam industri keamanan komunikasi, diantaranyadi antaranya pembuatan [[perangkat keras]] dan [[software|lunak]] khusus komunikasi aman, pabrik [[semikonduktor]] khusus di Fort Meade, serta penilitian [[kriptografi]] tingkat tinggi. NSA juga memiliki kontrak dengan perusahaan-perusahaan swasta di bidang [[riset]] dan peralatan.<!--
====Strategy====
The NSA increased its reliance on American industry for the purposes of domestic spying, through a project code-named Project GROUNDBREAKER.<ref>[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa27.pdf](§27 NSA director Hayden's testimony senate select committee on Intelligence 17 October 2002)</ref> It is linked to the DOD doctrines called "Fight the net" and "Information Operations Roadmap".<ref>CRS Report for Congress: ''Information Operations and Cyberwar:Capabilities and Related Policy Issues'', Clay Wilson, [http://www.au.af.mil/au/awc/awcgate/crs/rl31787.pdf read pdf file]</ref> Ex-director [[Michael Hayden]] has said, "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application".<ref>Remarks by General Michael V.Hayden: ''What American Intelligence and especially the NSA has been doing to defend the nation''; Monday, [[January 23]], [[2006]] [http://www.globalsecurity.org/intell/library/news/2006/intell-060123-dni01.htm]</ref> Two examples of relying on American industry for the purposes of domestic spying are the use of [[Communications Assistance for Law Enforcement Act|CALEA]]<ref>Sec.103: Assistance capability Requirements; [http://www.askcalea.net/calea/103.html AskCALEA]</ref><ref>Sec.106: Co-operation of Equipment Manufacturers and Providers of Telecommunications Support Services; [http://www.askcalea.net/calea/106.html AskCALEA]</ref> on US telecommunication companies, and NarusInsight. Under CALEA, all US telecommunication companies were forced to install hardware capable of monitoring data and voice by May 14, 2007. The act also forced US telecommunication companies to build national technology standards to support CALEA. NarusInsight is one type of spying hardware, capable of monitoring an [[Optical Carrier#OC-192|OC-192 network line]] in real-time, and gives AT&T the power to monitor all 7,432,000 DSL lines it owns. According to [http://narus.com Narus], after data capture its software can replay "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols".
-->
=== HistorySejarah ===
Asal mula NSA dapat dirunut sejak pendirian ''Armed Forces Security Agency'' (AFSA, Badan Keamanan Angkatan Bersenjata) pada [[20 Mei]] [[1949]]. Organisasi ini awalnya didirikan di dalam Dephan AS, dibawah komando para [[Kepala Staf]] di militer AS. AFSA awalnya bertugas untuk mengatur aktivitas intelijen elektronik dan komunikasi dari [[intelijen militer]] di ketentaraan AS. Namun, AFSA hanya memiliki kendali koordinasi yang kecil. Lalu pada [[10 Desember]] [[1951]], [[Direktur CIA|Direktur]] [[CIA]] [[Walter Bedell Smith]] mengirimkan [[memo]] kepada Sekretaris Eksekutif [[Dewan Keamanan Nasional Amerika Serikat|Dewan Keamanan Nasional AS]] [[James S. Lay]], menyatakan "kendali dan koordinasi terhadap pengumpulan dan pemrosesan intelijen komunikasi terbukti tidak efektif" dan menyarankan sebuah survei terhadap aktivitas intelijen komunikasi. Usulan ini diterima pada [[13 Desember]] [[1951]], dan penyelidikan diizinkan pada [[28 Desember]] 1951. Laporan tersebut selesai pada [[13 Juni]] [[1952]], dikenal sebagai "Laporan Komite Brownell]], dari nama ketua komite [[Herbert Brownell]]. Komite ini menyelidiki sejarah aktivitas intelijen komunikasi AS dan mengatakan dibutuhkan koordinasi dan pengaturan yang jauh lebih besar di tingkat nasional. AFSA lalu diganti menjadi NSA, dan peran NSA tidak lagi hanya mencakup intelijen angkatan bersenjata.
 
Formalisasi dari pembentukan NSA disahkan oleh surat yang ditulis [[Presiden AS]] [[Harry S. Truman]] pada Juni 1952. NSA didirikan secara resmi melalui revisi ''National Security Council Intelligence Directive'' (NSCID) pada [[24 Oktober]] [[1952]], dan mulai eksis pada [[4 November]] [[1952]]. Surat Truman tersebut nyatanya merupakan informasi rahasia, dan tidak diketahui umum selama bertahun-tahun.
=== History ===
The origins of the National Security Agency can be traced to the [[May 20]], [[1949]] creation of the Armed Forces Security Agency ('''AFSA'''). This organization was originally established within the US [[Department of Defense]] under the command of the [[Joint Chiefs of Staff]]. The AFSA was to be responsible for directing the communications and electronic intelligence activities of the US [[military intelligence]] units—the [[Army Security Agency]], the [[Naval Security Group]], and the [[United States Air Force Security Service|Air Force Security Service]]; however, the agency had little power and lacked a centralized coordination mechanism. The creation of the NSA resulted from a [[December 10]], [[1951]], memo sent by [[Central Intelligence Agency|CIA]] Director [[Walter Bedell Smith]] to James S. Lay, Executive Secretary of the [[National Security Council (USA)|National Security Council]]{{Fact|date=July 2007}}. The memo observed that "control over, and coordination of, the collection and processing of Communications Intelligence had proved ineffective" and recommended a survey of communications intelligence activities. The proposal was approved on [[December 13]], [[1951]], and the study authorized on [[December 28]], [[1951]]. The report was completed by [[June 13]], [[1952]]. Generally known as the "Brownell Committee Report," after committee chairman [[Herbert Brownell]], it surveyed the history of U.S. communications intelligence activities and suggested the need for a much greater degree of coordination and direction at the national level. As the change in the security agency's name indicated, the role of the NSA was extended beyond the armed forces.
 
The creation of the NSA was authorized in a letter written by President [[Harry S. Truman]] in June of [[1952]]. The agency was formally established through a revision of National Security Council Intelligence Directive (NSCID) 9 on [[October 24]], [[1952]], and officially came into existence on [[November 4]], [[1952]]. President Truman's letter was itself [[classified information|classified]] and remained unknown to the public for more than a generation.
 
=== Insignia ===
[[Image:National Security Agency seal.png|thumb|125px|right]]
The [[heraldic]] insignia of NSA consists of a [[bald eagle]] facing its right, a symbol of peace, grasping a key in its talons, representing NSA's clutch on security as well as the mission to protect and gain access to secrets. The eagle is set on a background of blue and its breast features a blue shield supported by thirteen bands of red and white. The surrounding white circular border features "National Security Agency" around the top and "[[United States of America]]" underneath, with two five-pointed silver stars between the two phrases. The current NSA insignia has been in use since [[1965]], when then-[[DIRNSA]], [[Marshall Carter|LTG Marshall S. Carter]] directed for the creation of a device to represent NSA.<ref>{{cite web|title=The National Security Agency Insignia|publisher=National Security Agency|url=http://www.nsa.gov/history/histo00018.cfm|accessdate=2006-12-26}}</ref>
 
=== InsigniaLambang ===
[[ImageBerkas:National Security Agency seal.png|thumbjmpl|125px|rightka|Lambang NSA]]
Lambang NSA terdiri dari [[elang botak]] menghadap ke kanan, lambang [[perdamaian]], mencengkeram sebuah kunci pada kukunya, melambangkan cengkeraman NSA pada sistem keamanan dan misinya membongkar dan melindungi rahasia. Elang tersebut berada pada latar belakang biru, dan dadanya berbentuk perisai biru dengan 13 garis merah dan putih, melambangkan warna-warna [[bendera AS]]. Pada pinggir lambang, terdapat lingkaran putih dengan tulisan "NATIONAL SECURITY AGENCY" dan "UNITED STATES OF AMERICA", dengan dua bintang di antara kedua tulisan tersebut. Lambang ini mulai digunakan sejak [[1965]], saat [[Direktur NSA]] [[Marshall Carter]] memerintahkan pembuatan lambang NSA.<ref>{{cite web|title=The National Security Agency Insignia|publisher=National Security Agency|url=http://www.nsa.gov/history/histo00018.cfm|accessdate=2006-12-26|archiveurl=https://web.archive.org/web/20040307182659/http://www.nsa.gov/history/histo00018.cfm|archivedate=2004-03-07|dead-url=yes}}</ref>
<!--
==Involvement with non-government cryptography==
NSA has been involved in debates about public policy, both as a behind-the-scenes adviser to other departments, and directly during and after [[Bobby Ray Inman|Vice Admiral Bobby Ray Inman]]'s directorship.
 
The NSA was embroiled in controversy concerning its involvement in the creation of the [[Data Encryption Standard]] (DES), a standard and public [[block cipher]] used by the [[US government]]. During development by [[IBM]] in the 1970s, the NSA recommended changes to the [[algorithm]]. There was suspicion the agency had deliberately weakened the algorithm sufficiently to enable it to eavesdrop if required. The suspicions were that a critical component &mdash; the so-called [[Substitution box|S-box]]es &mdash; had been altered to insert a "backdoor"; and that the key length had been reduced, making it easier for the NSA to discover the key using massive computing power, although it has since been discovered that the changes in fact ''strengthened'' the algorithm against [[differential cryptanalysis]].
 
Because of concerns that widespread use of strong cryptography would hamper government use of [[Telephone tapping|wiretap]]s, the NSA proposed the concept of [[key escrow]] in 1993 and introduced the [[Clipper chip]] that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials. The proposal was strongly opposed and key escrow requirements ultimately went nowhere. However, NSA's [[Fortezza]] hardware-based encryption cards, created for the Clipper project, are still used within government, and the NSA ultimately revealed the design of the [[Skipjack (cipher)|SKIPJACK cipher]] (but not the key exchange protocol) used on the cards.
Baris 71 ⟶ 73:
}}</ref>
 
Technically, almost all modern telephone, internetInternet, fax and satellite communications are exploitable due to recent advances in technology and the 'open air' nature of much of the radio communications around the world.
The NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans' [[privacy]].{{Fact|date=August 2007}} However, the NSA's [[United States Signals Intelligence Directive 18]] (USSID 18) strictly prohibits the interception or collection of information about "...US persons, entities, corporations or organizations..." without explicit written legal permission from the [[Attorney General]] of the United States <ref name="USSID18">National Security Agency. [http://cryptome.org/nsa-ussid18.htm United States Signals Intelligence Directive 18]. National Security Agency [[July 27]], [[1993]]. Last access date [[March 23]], [[2007]]</ref> The [[US Supreme Court]] has ruled that intelligence agencies cannot conduct surveillance against American citizens. There are a few extreme circumstances where collecting on a US entity is allowed without a USSID 18 waiver, such as with civilian distress signals, or sudden emergencies such as [[September 11, 2001 attacks|9/11]]; however, the [[USA PATRIOT Act]] has significantly changed privacy legality.
 
There have been alleged violations of USSID 18 that occurred in violation of the NSA's strict charter prohibiting such acts.{{Fact|date=February 2007}} In addition, ECHELON is considered with indignation by citizens of countries outside the [[UKUSA]] alliance, with widespread suspicion that the United States government uses it for motives other than its national security, including [[politics|political]] and [[industrial espionage]].[http://www.fas.org/irp/program/process/rapport_echelon_en.pdf] The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations.
Baris 112 ⟶ 114:
 
==Staff==
<div style="-moz-column-count:2; column-count:2;">
<big>'''Directors'''</big>
{{main|Director of the National Security Agency}}
*1952&ndash;19561952–1956 [[Lieutenant General (United States)|Lt. Gen.]] [[Ralph J. Canine]], USA
*1956&ndash;19601956–1960 [[Lieutenant General (United States)|Lt. Gen.]] [[John A. Samford]], USAF
*1960&ndash;19621960–1962 [[Vice Admiral|V. Adm.]] [[Laurence H. Frost]], USN
*1962&ndash;19651962–1965 [[Lieutenant General (United States)|Lt. Gen.]] [[Gordon A. Blake]], USAF
*1965&ndash;19691965–1969 [[Lieutenant General (United States)|Lt. Gen.]] [[Marshall S. Carter]], USA
*1969&ndash;19721969–1972 [[Vice Admiral|V. Adm.]] [[Noel A. M. Gaylor]], USN
*1972&ndash;19731972–1973 [[Lieutenant General (United States)|Lt. Gen.]] [[Samuel C. Phillips]], USAF
*1973&ndash;19771973–1977 [[Lieutenant General (United States)|Lt. Gen.]] [[Lew Allen, Jr.]], USAF
*1977&ndash;19811977–1981 [[Vice Admiral|V. Adm.]] [[Bobby Ray Inman]], USN
*1981&ndash;19851981–1985 [[Lieutenant General (United States)|Lt. Gen.]] [[Lincoln D. Faurer]], USAF
*1985&ndash;19881985–1988 [[Lieutenant General (United States)|Lt. Gen.]] [[William E. Odom]], USA
*1988&ndash;19921988–1992 [[Vice Admiral|V. Adm.]] [[William O. Studeman]], USN
*1992&ndash;19961992–1996 [[Vice Admiral|V. Adm.]] [[John M. McConnell]], USN
*1996&ndash;19991996–1999 [[Lieutenant General (United States)|Lt. Gen.]] [[Kenneth A. Minihan]], USAF
*1999&ndash;20051999–2005 [[Lieutenant General (United States)|Lt. Gen.]] [[Michael Hayden|Michael V. Hayden]], USAF
*2005&ndash;Present2005–Present [[Lieutenant General (United States)|Lt. Gen.]] [[Keith B. Alexander]], USA
 
<small>''USA'', ''USAF'', and ''USN'' are the United States Army, United States Air Force, and United States Navy, respectively.</small>
Baris 136 ⟶ 138:
<big>'''Deputy Directors'''</big>
 
*Dec. 1952 &ndash; Nov. 1953 [[R. Adm.]] [[Joseph Wenger]], USN
*Nov. 1953 &ndash; June 1956 [[Brigadier General|Brig. Gen.]] [[John Ackerman]], USAF
*Jun. 1956 &ndash; Aug. 1956 [[Major General|Maj. Gen.]] [[John A. Samford]], USAF
*Aug. 1956 &ndash; Sep. 1957 Mr. [[Joseph H. Ream]]
*Oct. 1957 &ndash; Jul. 1958 Dr. [[H. T. Engstrom]]
*Aug. 1958 &ndash; Apr. 1974 Dr. [[Louis W. Tordella]], USN
*Apr. 1974 &ndash; May 1978 Mr. [[Benson K. Buffham]]
*May 1978 &ndash; Apr. 1980 Mr. [[Robert E. Drake]]
*Apr. 1980 &ndash; Jul. 1982 Ms. [[Ann Z. Caracristi]]
*Jul. 1982 &ndash; Jun. 1985 Mr. [[Robert E. Rich]]
*Jun. 1985 &ndash; Mar. 1988 Mr. [[Charles R. Lord]]
*Mar. 1988 &ndash; Jul. 1990 Mr. [[Gerald R. Young]]
*Jul. 1990 &ndash; Feb. 1994 Mr. [[Robert L. Prestel]]
*Feb. 1994 &ndash; Oct. 1997 Mr. [[William P. Crowell]]
*Oct. 1997 &ndash; June 2000 Ms. [[Barbara mcnamara|Barbara A. McNamara]]
*Jun. 2000 &ndash; Aug. 2006 Mr. [[William B. Black, Jr.]]
*Aug. 2006 &ndash; present Mr. [[John C. (Chris) Inglis]]
 
<big>'''Notable cryptanalysts'''</big>
Baris 164 ⟶ 166:
*[[Herbert Yardley]]
</div>
[[de:{{wikisource|National Security Agency]]Archive}}
 
==NSA encryption systems==
{{main|NSA encryption systems}}
 
[[ImageBerkas:STU-IIIphones.nsa.jpg|thumb|right|250px|[[STU-III]] secure telephones on display at the [[National Cryptologic Museum]]]]
 
NSA is responsible for the encryption-related components in these systems:
Baris 175 ⟶ 177:
*[[Fortezza]] encryption based on portable crypto token in [[PC Card]] format
*[[KL-7]] ADONIS off-line rotor encryption machine (post-WW II to 1980s)
*[[KW-26]] ROMULUS electronic in-line teletype encryptor (1960s&ndash;1980s1960s–1980s)
*[[KW-37]] JASON fleet broadcast encryptor (1960s&ndash;1990s1960s–1990s)
*[[KY-57]] VINSON tactical radio voice encryptor
*[[KG-84]] Dedicated Data Encryption/Decryption
Baris 191 ⟶ 193:
* KAL 007 Shootdown incident. Here are the combined U.S. Electronic Intercept and Russian Federation supplied transcripts of the shootdown in progress - [http://www.rescue007.org/shootdown.htm]
-->
 
== Referensi ==
 
Baris 196 ⟶ 199:
 
<!-- Dead note "NSACreated": [http://www.nsa.gov/truman/truma00001.pdf Memorandum on Communications Intelligence Activities] (October 24, 1952) -->
== Lihat pula ==
* [[Central Intelligence Agency]] (CIA)
* [[Federal Bureau of Investigation]] (FBI)
* [[National Reconnaissance Office]] (NRO)
* [[Direktur Badan Keamanan Nasional Amerika Serikat]]
<!--
==See also==
Baris 229 ⟶ 233:
* [[HARVEST]]
-->
 
== Bahan Bacaan ==
== Bacaan lanjutan ==
* [[James Bamford|Bamford, James]], ''[[Body of Secrets: Anatomy of the Ultra-Secret National Security Agency]]'', Doubleday, 2001, ISBN 0-385-49907-8.
* [[James Bamford|Bamford, James]], ''[[The Puzzle Palace (book)|The Puzzle Palace]]'', Penguin Books, ISBN 0-14-006748-5.
* [[Steven Levy|Levy, Steven]], ''[[Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age]]'' &mdash; discussion of the development of non-government cryptography, including many accounts of tussles with the NSA.
* [[Patrick Radden Keefe|Radden Keefe, Patrick]], ''[[Chatter: Dispatches from the Secret World of Global Eavesdropping]]'', Random House, ISBN 1-4000-6034-6.
* [[Robert A. Liston|Liston, Robert A.]], ''[[The Pueblo Surrender: a Covert Action by the National Security Agency]]'', ISBN 0-87131-554-8.
* [[David Kahn|Kahn, David]], ''[[The Codebreakers]]'', 1181 pp., ISBN 0-684-83130-9. Look for the 1967 rather than the 1996 edition.
* [[Andrew Tully|Tully, Andrew]], ''[[The Super Spies: More Secret, More Powerful than the CIA]]'', 1969, LC 71080912.
* [[James Bamford|Bamford, James]], [[New York Times]], December 25, 2005; The Agency That Could Be Big Brother.
Baris 243 ⟶ 248:
* [[Sherman Kent]], ''Strategic Intelligence for American Public Policy''
 
== Pranala Luarluar ==
{{commons |Category: NSA images}}
<div class="references-small" {{#if: {{{colwidth|}}}| style="-moz-column-width:{{{colwidth}}}; column-width:{{{colwidth}}};" | {{#if: {{{1|}}}| style="-moz-column-count:{{{1}}}; column-count:{{{1}}} }}};" |}}>
* [http://www.nsa.gov/ NSA official site]
* [http://www.archives.gov/research/guide-fed-records/groups/457.html Records of the National Security Agency/Central Security Service]
* [http://www.darkgovernment.com/nsa.html Overview of the NSA and their Major Programs] {{Webarchive|url=https://web.archive.org/web/20081120090234/http://www.darkgovernment.com/nsa.html |date=2008-11-20 }}
* [http://history.sandiego.edu/gen/20th/nsa.html History of NSA] {{Webarchive|url=https://web.archive.org/web/20080515111519/http://history.sandiego.edu/gen/20th/nsa.html |date=2008-05-15 }}
* [http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html The NSA charter] {{Webarchive|url=https://web.archive.org/web/20080720172513/http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html |date=2008-07-20 }}
* [http://www.thememoryhole.org/nsa/origins_of_nsa.htm "The Origins of the National Security Agency, 1940-1952"] &mdash;newly{{Webarchive|url=https://web.archive.org/web/20080103233603/http://www.thememoryhole.org/nsa/origins_of_nsa.htm |date=2008-01-03 }} —newly declassified book-length report provided by ''[http://www.thememoryhole.org/ The Memory Hole]''.
* [http://montages.blogspot.com/2005/01/outsourcing-intelligence.html "Outsourcing Intelligence"]
* [http://www.gwu.edu/~nsarchiv/ The National Security Archive at George Washington University]
* [http://cryptome.org/ Cryptome]
* [http://web.archive.org/web/20011007015616/http://cryptome.org/nsa-ussid18.htm CRYPTOME.org - USSID 18 DECLASSIFIED]
* [http://www.fas.org/ Federation of American Scientist]
* David Alan Jordan, [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol] {{Webarchive|url=https://web.archive.org/web/20071030095250/http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf |date=2007-10-30 }} - Boston College Law Review, Vol. 47, 2006
* [http://maps.google.com/maps?ll=39.108735,-76.771098&spn=0.006069,0.010664&t=k&hl=en NSA Headquarters]
* [http://www.hal-pc.org/journal/nov99/Column/caught/caught.html "FAILURE IS NOT AN OPTION: It comes bundled with the software."|by Al Massey] {{Webarchive|url=https://web.archive.org/web/20051004030815/http://www.hal-pc.org/journal/nov99/Column/caught/caught.html |date=2005-10-04 }}
* [http://users.skynet.be/terrorism/html/usa_nsa.htm NSA: Bibliography|Compilation and research by Jean-Pierre H. Coumont] {{Webarchive|url=https://web.archive.org/web/20060216080043/http://users.skynet.be/terrorism/html/usa_nsa.htm |date=2006-02-16 }}
* [http://www.nytimes.com/2005/12/16/politics/16program.html New York Times NSA Phone Taps Article] [http://www.nytimes.com/2005/12/16/politics/16program.html?ei=5088&en=e32070df8d623ac1&ex=1292389200&pagewanted=print alternate link]
* [http://www.boston.com/news/nation/washington/articles/2005/12/23/wiretaps_said_to_sift_all_overseas_contacts?mode=PF Wiretaps said to sift all overseas contacts (Boston Globe)]
* Kurt Nimmo. [http://kurtnimmo.com/?p=169 NSA snoop story: Tell me something I don’t already know] {{Webarchive|url=https://web.archive.org/web/20060323234820/http://kurtnimmo.com/?p=169 |date=2006-03-23 }}, ''Another Day in the Empire'', December 24, 2005.
* Kevin Zeese. [http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html NSA mounted massive spy op on peace group, documents show] {{Webarchive|url=https://web.archive.org/web/20071013213539/http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html |date=2007-10-13 }}, ''Raw Story'', January 10, 2006.
* [http://www.fas.org/irp/eprint/nsa-interview.pdf First person account of NSA interview and clearance]
* Joanne Leyland, [http://www.theroyalist.net/content/view/1528/2/ "American Intelligence Service Denies Eavesdropping On Princess Diana"], The Royalist, [[13 DecemberDesember]], [[2006]]. ''URL retrieved on [[January6 6Januari]], [[2007]]''.
* [http://www.theatlantic.com/doc/200604/nsa-surveillance Big Brother Is Listening]
</div>
 
<!-- {{Mapit-US-buildingscale|31.9108651|-77.607884}} Unless someone has the CORRECT location, this is useless. Right now it points to the Atlantic. -->
 
{{Agensi intelijen AS}}
 
[[Kategori:Badan intelijen Amerika Serikat]]
[[Kategori:Organisasi kriptografi]]
[[Kategori:Badan intelijen]]
 
[[ar:وكالة الأمن القومي]]
[[br:NSA]]
[[da:NSA]]
[[de:National Security Agency]]
[[en:National Security Agency]]
[[et:NSA]]
[[es:Agencia de Seguridad Nacional]]
[[fr:National Security Agency]]
[[gl:National Security Agency]]
[[hr:National Security Agency]]
[[it:National Security Agency]]
[[he:הסוכנות לביטחון לאומי]]
[[lt:Nacionalinio saugumo agentūra]]
[[nl:National Security Agency]]
[[ja:アメリカ国家安全保障局]]
[[no:National Security Agency]]
[[pl:National Security Agency]]
[[pt:NSA]]
[[ro:National Security Agency]]
[[ru:Агентство национальной безопасности (США)]]
[[sq:Agjencia e Sigurimit Kombëtar Amerikan]]
[[simple:National Security Agency]]
[[sk:National Security Agency]]
[[sr:НСА]]
[[fi:NSA]]
[[sv:National Security Agency]]
[[th:สภาความมั่นคงแห่งชาติสหรัฐอเมริกา]]
[[vi:Cơ quan An ninh Quốc gia Hoa Kỳ]]
[[tr:National Security Agency]]
[[yi:NSA]]
[[zh:美国国家安全局]]