Badan Keamanan Nasional: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
Tidak ada ringkasan suntingan |
k Membatalkan suntingan oleh INTERNASIONAL CYBER CRIME (bicara) ke revisi terakhir oleh Taylorbot: suntingan tidak membangun Tag: Pengembalian SWViewer [1.6] |
||
(66 revisi perantara oleh 37 pengguna tidak ditampilkan) | |||
Baris 1:
{{terjemah|Inggris}}
{{Infobox NSA}}
[[Berkas:Keith Alexander, official military portrait.jpg|jmpl|125px|ka|Letjen Keith B. Alexander, direktur ke-16 NSA dan sedang menjabat.]]
'''
== Organisasi ==
=== Peran ===
[[
Kegiatan-kegiatan NSA meliputi [[penyadapan]] dan [[pengamanan]]. Penyadapan NSA meliputi [[telepon]], komunikasi [[
Karena tugasnya mengumpulkan informasi, termasuk informasi rahasia, maka NSA juga terlibat dalam penelitian [[kriptoanalisis]], pemecahan [[Sandi (disambiguasi)|sandi]] dan [[kode (kriptografi)|kode]]. Pendahulu NSA seperti ''[[Purple Code]]'', ''[[Venona]]'', dan ''[[JN-25]]'' sendiri telah berhasil memecahkan [[kriptografi pada Perang Dunia II|banyak sandi]] pada [[Perang Dunia II]].
Markas besar NSA terletak di [[Fort George G. Meade]], [[Maryland]], sekitar 16 km di [[timur laut]] [[Washington, D.C.]]. Anggaran yang digunakan NSA dirahasiakan oleh pemerintah AS,
|url=http://english.people.com.cn/200512/19/print20051219_229129.html
|accessdate=2007-08-30
Baris 18 ⟶ 19:
|accessdate=2006-08-06
|author=Gorman, Siobhan
|title=NSA risking electrical overload
|title=NSA risking electrical overload}}</ref> Selain markas besar di Ft. Meade, NSA juga memiliki fasilitas-fasilitas lain seperti [[Pusat Kriptologi Texas]] di [[San Antonio]], [[Texas]].<!--▼
|archive-date=2006-08-20
NSA juga terlibat dalam industri keamanan komunikasi, diantaranya pembuatan [[perangkat keras]] dan [[software|lunak]] khusus komunikasi aman, pabrik [[semikonduktor]] khusus di Fort Meade, serta penilitian [[kriptografi]] tingkat tinggi. NSA juga memiliki kontrak dengan perusahaan-perusahaan swasta di bidang [[riset]] dan peralatan.▼
|archive-url=https://web.archive.org/web/20060820135709/http://www.baltimoresun.com/news/nationworld/bal-te.nsapower06aug06,0,5137448.story?coll=bal-home-headlines
|dead-url=yes
▲
▲NSA juga terlibat dalam industri keamanan komunikasi,
====Strategy====
The NSA increased its reliance on American industry for the purposes of domestic spying, through a project code-named Project GROUNDBREAKER.<ref>[http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa27.pdf](§27 NSA director Hayden's testimony senate select committee on Intelligence 17 October 2002)</ref> It is linked to the DOD doctrines called "Fight the net" and "Information Operations Roadmap".<ref>CRS Report for Congress: ''Information Operations and Cyberwar:Capabilities and Related Policy Issues'', Clay Wilson, [http://www.au.af.mil/au/awc/awcgate/crs/rl31787.pdf read pdf file]</ref> Ex-director [[Michael Hayden]] has said, "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application".<ref>Remarks by General Michael V.Hayden: ''What American Intelligence and especially the NSA has been doing to defend the nation''; Monday, [[January 23]], [[2006]] [http://www.globalsecurity.org/intell/library/news/2006/intell-060123-dni01.htm]</ref> Two examples of relying on American industry for the purposes of domestic spying are the use of [[Communications Assistance for Law Enforcement Act|CALEA]]<ref>Sec.103: Assistance capability Requirements; [http://www.askcalea.net/calea/103.html AskCALEA]</ref><ref>Sec.106: Co-operation of Equipment Manufacturers and Providers of Telecommunications Support Services; [http://www.askcalea.net/calea/106.html AskCALEA]</ref> on US telecommunication companies, and NarusInsight. Under CALEA, all US telecommunication companies were forced to install hardware capable of monitoring data and voice by May 14, 2007. The act also forced US telecommunication companies to build national technology standards to support CALEA. NarusInsight is one type of spying hardware, capable of monitoring an [[Optical Carrier#OC-192|OC-192 network line]] in real-time, and gives AT&T the power to monitor all 7,432,000 DSL lines it owns. According to [http://narus.com Narus], after data capture its software can replay "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols".
-->
Asal mula NSA dapat dirunut sejak pendirian ''Armed Forces Security Agency'' (AFSA, Badan Keamanan Angkatan Bersenjata) pada [[20 Mei]] [[1949]]. Organisasi ini awalnya didirikan di dalam Dephan AS, dibawah komando para [[Kepala Staf]] di militer AS. AFSA awalnya bertugas untuk mengatur aktivitas intelijen elektronik dan komunikasi dari [[intelijen militer]] di ketentaraan AS. Namun, AFSA hanya memiliki kendali koordinasi yang kecil. Lalu pada [[10 Desember]] [[1951]], [[Direktur CIA|Direktur]] [[CIA]] [[Walter Bedell Smith]] mengirimkan [[memo]] kepada Sekretaris Eksekutif [[Dewan Keamanan Nasional Amerika Serikat|Dewan Keamanan Nasional AS]] [[James S. Lay]], menyatakan "kendali dan koordinasi terhadap pengumpulan dan pemrosesan intelijen komunikasi terbukti tidak efektif" dan menyarankan sebuah survei terhadap aktivitas intelijen komunikasi. Usulan ini diterima pada [[13 Desember]] [[1951]], dan penyelidikan diizinkan pada [[28 Desember]] 1951. Laporan tersebut selesai pada [[13 Juni]] [[1952]], dikenal sebagai "Laporan Komite Brownell]], dari nama ketua komite [[Herbert Brownell]]. Komite ini menyelidiki sejarah aktivitas intelijen komunikasi AS dan mengatakan dibutuhkan koordinasi dan pengaturan yang jauh lebih besar di tingkat nasional. AFSA lalu diganti menjadi NSA, dan peran NSA tidak lagi hanya mencakup intelijen angkatan bersenjata.
Formalisasi dari pembentukan NSA disahkan oleh surat yang ditulis [[Presiden AS]] [[Harry S. Truman]] pada Juni 1952. NSA didirikan secara resmi melalui revisi ''National Security Council Intelligence Directive'' (NSCID) pada [[24 Oktober]] [[1952]], dan mulai eksis pada [[4 November]] [[1952]]. Surat Truman tersebut nyatanya merupakan informasi rahasia, dan tidak diketahui umum selama bertahun-tahun.
▲=== History ===
=== Insignia ===▼
[[Image:National Security Agency seal.png|thumb|125px|right]]▼
Lambang NSA terdiri dari [[elang botak]] menghadap ke kanan, lambang [[perdamaian]], mencengkeram sebuah kunci pada kukunya, melambangkan cengkeraman NSA pada sistem keamanan dan misinya membongkar dan melindungi rahasia. Elang tersebut berada pada latar belakang biru, dan dadanya berbentuk perisai biru dengan 13 garis merah dan putih, melambangkan warna-warna [[bendera AS]]. Pada pinggir lambang, terdapat lingkaran putih dengan tulisan "NATIONAL SECURITY AGENCY" dan "UNITED STATES OF AMERICA", dengan dua bintang di antara kedua tulisan tersebut. Lambang ini mulai digunakan sejak [[1965]], saat [[Direktur NSA]] [[Marshall Carter]] memerintahkan pembuatan lambang NSA.<ref>{{cite web|title=The National Security Agency Insignia|publisher=National Security Agency|url=http://www.nsa.gov/history/histo00018.cfm|accessdate=2006-12-26|archiveurl=https://web.archive.org/web/20040307182659/http://www.nsa.gov/history/histo00018.cfm|archivedate=2004-03-07|dead-url=yes}}</ref>
<!--
==Involvement with non-government cryptography==
NSA has been involved in debates about public policy, both as a behind-the-scenes adviser to other departments, and directly during and after [[Bobby Ray Inman|Vice Admiral Bobby Ray Inman]]'s directorship.
The NSA was embroiled in controversy concerning its involvement in the creation of the [[Data Encryption Standard]] (DES), a standard and public [[block cipher]] used by the [[US government]]. During development by [[IBM]] in the 1970s, the NSA recommended changes to the [[algorithm]]. There was suspicion the agency had deliberately weakened the algorithm sufficiently to enable it to eavesdrop if required. The suspicions were that a critical component
Because of concerns that widespread use of strong cryptography would hamper government use of [[Telephone tapping|wiretap]]s, the NSA proposed the concept of [[key escrow]] in 1993 and introduced the [[Clipper chip]] that would offer stronger protection than DES but would allow access to encrypted data by authorized law enforcement officials. The proposal was strongly opposed and key escrow requirements ultimately went nowhere. However, NSA's [[Fortezza]] hardware-based encryption cards, created for the Clipper project, are still used within government, and the NSA ultimately revealed the design of the [[Skipjack (cipher)|SKIPJACK cipher]] (but not the key exchange protocol) used on the cards.
Baris 71 ⟶ 73:
}}</ref>
Technically, almost all modern telephone,
The NSA's presumed collection operations have generated much criticism, possibly stemming from the assumption that the NSA/CSS represents an infringement of Americans' [[privacy]].{{Fact|date=August 2007}} However, the NSA's [[United States Signals Intelligence Directive 18]] (USSID 18) strictly prohibits the interception or collection of information about "...US persons, entities, corporations or organizations..." without explicit written legal permission from the [[Attorney General]] of the United States
There have been alleged violations of USSID 18 that occurred in violation of the NSA's strict charter prohibiting such acts.{{Fact|date=February 2007}} In addition, ECHELON is considered with indignation by citizens of countries outside the [[UKUSA]] alliance, with widespread suspicion that the United States government uses it for motives other than its national security, including [[politics|political]] and [[industrial espionage]].[http://www.fas.org/irp/program/process/rapport_echelon_en.pdf] The chartered purpose of the NSA/CSS is solely to acquire significant foreign intelligence information pertaining to National Security or ongoing military intelligence operations.
Baris 112 ⟶ 114:
==Staff==
<div style="-moz-column-count:2; column-count:2;">
<big>'''Directors'''</big>
{{main|Director of the National Security Agency}}
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
*
<small>''USA'', ''USAF'', and ''USN'' are the United States Army, United States Air Force, and United States Navy, respectively.</small>
Baris 136 ⟶ 138:
<big>'''Deputy Directors'''</big>
*Dec. 1952
*Nov. 1953
*Jun. 1956
*Aug. 1956
*Oct. 1957
*Aug. 1958
*Apr. 1974
*May 1978
*Apr. 1980
*Jul. 1982
*Jun. 1985
*Mar. 1988
*Jul. 1990
*Feb. 1994
*Oct. 1997
*Jun. 2000
*Aug. 2006
<big>'''Notable cryptanalysts'''</big>
Baris 164 ⟶ 166:
*[[Herbert Yardley]]
</div>
==NSA encryption systems==
{{main|NSA encryption systems}}
[[
NSA is responsible for the encryption-related components in these systems:
Baris 175 ⟶ 177:
*[[Fortezza]] encryption based on portable crypto token in [[PC Card]] format
*[[KL-7]] ADONIS off-line rotor encryption machine (post-WW II to 1980s)
*[[KW-26]] ROMULUS electronic in-line teletype encryptor (
*[[KW-37]] JASON fleet broadcast encryptor (
*[[KY-57]] VINSON tactical radio voice encryptor
*[[KG-84]] Dedicated Data Encryption/Decryption
Baris 191 ⟶ 193:
* KAL 007 Shootdown incident. Here are the combined U.S. Electronic Intercept and Russian Federation supplied transcripts of the shootdown in progress - [http://www.rescue007.org/shootdown.htm]
-->
== Referensi ==
Baris 196 ⟶ 199:
<!-- Dead note "NSACreated": [http://www.nsa.gov/truman/truma00001.pdf Memorandum on Communications Intelligence Activities] (October 24, 1952) -->
== Lihat pula ==
* [[Central Intelligence Agency]] (CIA)
* [[Federal Bureau of Investigation]] (FBI)
* [[National Reconnaissance Office]] (NRO)
* [[Direktur Badan Keamanan Nasional Amerika Serikat]]
<!--
==See also==
Baris 229 ⟶ 233:
* [[HARVEST]]
-->
== Bacaan lanjutan ==
* [[James Bamford|Bamford, James]], ''[[Body of Secrets: Anatomy of the Ultra-Secret National Security Agency]]'', Doubleday, 2001, ISBN 0-385-49907-8.
* [[James Bamford|Bamford, James]], ''[[The Puzzle Palace (book)|The Puzzle Palace]]'', Penguin Books, ISBN 0-14-006748-5.
* [[Steven Levy|Levy, Steven]], ''[[Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age]]''
* [[Patrick Radden Keefe|Radden Keefe, Patrick]], ''[[Chatter: Dispatches from the Secret World of Global Eavesdropping]]'', Random House, ISBN 1-4000-6034-6.
* [[Robert A. Liston|Liston, Robert A.]], ''[[The Pueblo Surrender: a Covert Action by the National Security Agency]]'', ISBN 0-87131-554-8.
* [[David Kahn|Kahn, David]], ''[[The Codebreakers]]'', 1181 pp., ISBN 0-684-83130-9.
* [[Andrew Tully|Tully, Andrew]], ''[[The Super Spies: More Secret, More Powerful than the CIA]]'', 1969, LC 71080912.
* [[James Bamford|Bamford, James]], [[New York Times]], December 25, 2005; The Agency That Could Be Big Brother.
Baris 243 ⟶ 248:
* [[Sherman Kent]], ''Strategic Intelligence for American Public Policy''
== Pranala
{{commons |Category: NSA images}}
<div class="references-small" {{#if: {{{colwidth|}}}| style="-moz-column-width:{{{colwidth}}}; column-width:{{{colwidth}}};" | {{#if: {{{1|}}}| style="-moz-column-count:{{{1}}}; column-count:{{{1}}} }}};" |}}>
* [http://www.nsa.gov/ NSA official site]
* [http://www.archives.gov/research/guide-fed-records/groups/457.html Records of the National Security Agency/Central Security Service]
* [http://www.darkgovernment.com/nsa.html Overview of the NSA and their Major Programs] {{Webarchive|url=https://web.archive.org/web/20081120090234/http://www.darkgovernment.com/nsa.html |date=2008-11-20 }}
* [http://history.sandiego.edu/gen/20th/nsa.html History of NSA] {{Webarchive|url=https://web.archive.org/web/20080515111519/http://history.sandiego.edu/gen/20th/nsa.html |date=2008-05-15 }}
* [http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html The NSA charter] {{Webarchive|url=https://web.archive.org/web/20080720172513/http://history.sandiego.edu/gen/text/coldwar/nsa-charter.html |date=2008-07-20 }}
* [http://www.thememoryhole.org/nsa/origins_of_nsa.htm "The Origins of the National Security Agency, 1940-1952"]
* [http://montages.blogspot.com/2005/01/outsourcing-intelligence.html "Outsourcing Intelligence"]
* [http://www.gwu.edu/~nsarchiv/ The National Security Archive at George Washington University]
* [http://cryptome.org/ Cryptome]
* [http://web.archive.org/web/20011007015616/http://cryptome.org/nsa-ussid18.htm CRYPTOME.org - USSID 18 DECLASSIFIED]
* [http://www.fas.org/ Federation of American Scientist]
* David Alan Jordan, [http://iilj.org/documents/Jordan-47_BC_L_Rev_000.pdf Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol] {{Webarchive|url=https://web.archive.org/web/20071030095250/http://www.ss8.com/pdfs/Ready_Guide_Download_Version.pdf |date=2007-10-30 }} - Boston College Law Review, Vol. 47, 2006
* [http://maps.google.com/maps?ll=39.108735,-76.771098&spn=0.006069,0.010664&t=k&hl=en NSA Headquarters]
* [http://www.hal-pc.org/journal/nov99/Column/caught/caught.html "FAILURE IS NOT AN OPTION: It comes bundled with the software."|by Al Massey] {{Webarchive|url=https://web.archive.org/web/20051004030815/http://www.hal-pc.org/journal/nov99/Column/caught/caught.html |date=2005-10-04 }}
* [http://users.skynet.be/terrorism/html/usa_nsa.htm NSA: Bibliography|Compilation and research by Jean-Pierre H. Coumont] {{Webarchive|url=https://web.archive.org/web/20060216080043/http://users.skynet.be/terrorism/html/usa_nsa.htm |date=2006-02-16 }}
* [http://www.nytimes.com/2005/12/16/politics/16program.html New York Times NSA Phone Taps Article] [http://www.nytimes.com/2005/12/16/politics/16program.html?ei=5088&en=e32070df8d623ac1&ex=1292389200&pagewanted=print alternate link]
* [http://www.boston.com/news/nation/washington/articles/2005/12/23/wiretaps_said_to_sift_all_overseas_contacts?mode=PF Wiretaps said to sift all overseas contacts (Boston Globe)]
* Kurt Nimmo. [http://kurtnimmo.com/?p=169 NSA snoop story: Tell me something I don’t already know] {{Webarchive|url=https://web.archive.org/web/20060323234820/http://kurtnimmo.com/?p=169 |date=2006-03-23 }}, ''Another Day in the Empire'', December 24, 2005.
* Kevin Zeese. [http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html NSA mounted massive spy op on peace group, documents show] {{Webarchive|url=https://web.archive.org/web/20071013213539/http://rawstory.com/news/2005/National_Security_Agency_spied_on_Baltimore_0110.html |date=2007-10-13 }}, ''Raw Story'', January 10, 2006.
* [http://www.fas.org/irp/eprint/nsa-interview.pdf First person account of NSA interview and clearance]
* Joanne Leyland, [http://www.theroyalist.net/content/view/1528/2/ "American Intelligence Service Denies Eavesdropping On Princess Diana"], The Royalist, [[13
* [http://www.theatlantic.com/doc/200604/nsa-surveillance Big Brother Is Listening]
</div>
{{Agensi intelijen AS}}
[[Kategori:Badan intelijen Amerika Serikat]]
[[Kategori:Organisasi kriptografi]]
[[Kategori:Badan intelijen]]
▲[[de:National Security Agency]]
|