The National Security Agency has a relatively short history compared to many other government agencies. Years before the creation of the NSA, the first security services in the world were established in various departments of the U.S. military (“Pre-1952 Historical Timeline”). The first establishment was the U.S. Navy Code and Signal Section beginning in 1916 (“Pre-1952 Historical Timeline”). These began during World War I in order to assist with code-breaking and intelligence. The Army established its own intelligence section called the U.S. Army Code and Cipher Section in 1917 (Pre-1952 Historical Timeline”). As communication means advanced and the need for intelligence increased, the Navy created the Radio Intelligence Office in 1924 (Pre-1952 Historical Timeline”). The first direct predecessor of the NSA was the Signal Intelligence Service, formed in 1929 (Pre-1952 Historical Timeline”). In 1943, the Signal Intelligence Service was renamed the Signal Intelligence Agency (“A History of the NSA”). The Signal Intelligence Service formed the Army Security Agency in 1945 which President Truman made into the National Security Agency in 1952 (“A History of the NSA”).
The modern National Security Agency, post 9/11, has many res...
... middle of paper ...
... Apr. 2014.
Thiessen, Marc A. Courting Disaster: How the CIA Kept America Safe and How Barack Obama Is Inviting the next Attack. Washington, D.C.: Regnery Pub., 2010. Print.
United States. National Security Agency. 60 Years of Defending Our Nation. National Security Agency, 14 Dec. 2012. Web. 6 Apr. 2014.
United States. U.S. Department of Justice. Office of Public Affairs. The NSA Program to Detect and Prevent Terrorist Atacks Myth v. Reality. U.S. Department of Justice, 27 Jan. 2006. Web. 22 Mar. 2014.
U.S. Constitution. Amend. IV.
Zengerle, Patricia, and Tabassum Zakaria. "NSA Chief: Agency Programs Prevented over 50 Potential Terrorist Acts." Ed. Jackie Frank. Reuters. Reuters, 18 June 2013. Web. 6 Apr. 2014.
Zengerle, Patricia. "FBI Official Says NSA Programs Helped Foil NYSE Bombing Plot." Ed. Jackie Frank. Reuters. Reuters, 18 June 2013. Web. 6 Apr. 2014.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- Knowledge of the techniques of the information security discipline, including encryption, access control, physical security, training, threat analysis, and authentication. As an Information Technology major at the United States Naval Academy (USNA), the faculty selected me to participate on USNA’s team for the 2010 Cyber Defense Exercise hosted by the National Security Agency. The competition, which we won, required us to design, operate, and defend our virtual network. As File Systems Manager, I was personally responsible for the encryption, user authentication, and intrusion analysis of our web server, exchange services, and databases.... [tags: Security, National security, Computer security]
1605 words (4.6 pages)
- America’s international supremacy originates from the hard work of her agencies at home which provide a strong foundation for security and international diplomacy. One of these security agencies is the National Security Agency, or NSA. “By 2008, the NSA had become the largest, most costly, and most technologically sophisticated spy organization the world has ever known” (Bamford 1). The National Security Agency is a beneficial government program and a core component of protecting America from terrorist attacks.... [tags: protecting America from terrorist attacks]
1117 words (3.2 pages)
- The National Security Agency (NSA) was created in 1952 and is headquartered in Forte Meade, Maryland. It is under the direction of the Department of Defense and reports to the Director of National Intelligence. Although classified, the NSA has an estimated 37,000 employees (1) and an estimated operating budget of about 11 billion dollars per year, for comparison the Central Intelligence Agency has an estimated 20,000 employees and an operating budget of about 14 billion dollars per year (2). At the moment the director of the NSA is Keith B.... [tags: cryptology, online information]
1248 words (3.6 pages)
- The National Security Agency was originated, as a unit to decipher code communications during World War I. It is an old and one of the largest US intelligence organization. It operates under the Department of Defense and reports to the Director of National Intelligence. Its responsibility is to guard the US Government Communication and Information system. It accomplishes its mission by bugging electronic systems, using subversive software for sabotaging and intercepting phone conversations and Internet communications of people.... [tags: world war I, US intelligence]
1278 words (3.7 pages)
- The NSA can capture more than 1 Yottabyte of data each day, but what is the NSA to start and is it abusing its power. NSA stands for National security agency, it works with the united stated government to prevent individuals from developing terrorist activity. To prevent activities such as terrorism, the NSA intercepts communications between people online which is good, but not all interceptions are illegal activates because the NSA can also intercept individuals that have no criminal background.... [tags: yottabyte, surveillance, monitoring]
563 words (1.6 pages)
- Can you be sure that the government is not monitoring your every call and keystroke. The government has created a program under the National Security Agency that records the public’s usage of data and communications. In recent developments, the media has depicted the NSA as the ominous Orwellian Big Brother that is watching every move you make and thought you think. This is not far from the truth since your metadata from every call or online search is recorded, stored, and can be used to decode you as a person.... [tags: nsa, patriot act, metadata, fourth amendment]
2822 words (8.1 pages)
- Introduction In recent years the National Security Agency (NSA) has received extensive scrutiny as a result of their disclosed participation in nationwide surveillance programs that ultimately violates thousands of innocent American’s privacy rights. Only recently has the exposure been brought the forefront of media headlines, still the NSA privacy violations date back to the early 2000s when the domestic spying program known as the “President’s Surveillance Program,” was implemented by President George W.... [tags: spied computer games, oreign surveillance]
1117 words (3.2 pages)
- ... These large companies feel that such operations are unjust and not fair to them or their users since the NSA collects this data without anyone’s consent or permission. Furthermore, the issue of consumer privacy also brings up the discussion as to whether or not the government is overreaching with their power or whether they have the power to spy on their citizens to begin with; another discussion around this topic is regarding the role of the states in helping develop some sort of regulations for this type of information gathering activities.... [tags: private, data, companies, power]
614 words (1.8 pages)
- In the past few years the National Security Agency has been all over the news, and not in a good way. Former contractor of the National Security Edward Snowden leaked classified documents to several media outlets on such a scale the world took notice. The day the world learned about the Prism program among others was June, 5, 2013 when Ed Snowden gave the specifics of the programs to The Guardian, and the Washington Post. Ed Snowden turned those secrets over as a member of the NSA but fled the country before the leaks so he would not be imprisoned by the authorities.... [tags: Domestic Surveillance]
2540 words (7.3 pages)
- National Security Agency/Central Security Service The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missions, Signals Intelligence (SIGINT) and Information Assurance (IA).... [tags: essays research papers]
583 words (1.7 pages)
- Turning to Environmentally Friendly Products to Limit Toxins in the Spokane River
- Scrutinization of Kate Chopin’s The Story of an Hour
- Worldwide Public Health Concerns: Osteoporosis
- Human Trafficking as an Expression of Evil
- Tremendous Spirit and Feminism Displayed in Charlotte Bronte’s Jane Eyre
- Herman Melville's Bartlevy, the Scrivener