Preview

Signals Intelligence and United States

Good Essays
Open Document
Open Document
593 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Signals Intelligence and United States
National Security Agency/Central Security Service
The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missions, Signals Intelligence (SIGINT) and Information Assurance (IA). The Signals Intelligence (SIGINT) mission uses cryptologic machines to break foreign codes to find out what they know and what they are doing. The biggest accomplishment publicly known was when they broke the Japanese military code in World War II and learned that Japan had plans of invading Midway Island. This allowed us to attack and destroy Japan's superior fleet. With this intelligence, it was said to have shortened the Pacific war by over one year.
The Information Assurance (IA) mission becomes more important every day as technology becomes more advanced. The Information Assurance (IA) mission is to make all government equipment that is used to send classified and sensitive information impenetrable so that no one can hack into them and steal viable information belonging to the United States. These two missions together promote a single goal: information superiority for America and its Allies.
To accomplish these two main missions the NSA has established four main goals to follow:
1. Deliver Responsive Signals Intelligence and Information Assurance for National Security under Any Circumstance.
2. Radically Improve the Production and Protection of Information.
3. Enhance an Expert Workforce to Meet Global Cryptologic Challenges.
4. Create and Integrate Business Management Capabilities Within the Enterprise and With Stakeholders.
The NSA also has one of the biggest research and

You May Also Find These Documents Helpful

  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information security is the protection of information against accidental or malicious disclosure, modification or destruction. Information is an important, valuable asset of IDI which must be managed with care. All information has a value to IDI. However, not all of this information has an equal value or requires the same level of protection. Access controls are put in place to protect information by controlling who has the rights to use different information resources and by guarding against unauthorised use. Formal procedures must control how access to information is granted and how such access is changed. This policy also mandates a standard for the creation of strong passwords, their protection and frequency of change.…

    • 1356 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 1232 Words
    • 14 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Confidentiality, integrity, and availability (CIA) concepts  Layered security solutions implemented for the seven domains of a typical IT infrastructure …

    • 1232 Words
    • 14 Pages
    Satisfactory Essays
  • Powerful Essays

    The events of September 11th, 2001 have had a larger impact on the United States Intelligence Community than any single event in its history. It forced the U.S. Intelligence community to look critically at their policies, organization, and how they handled business. The Joint Inquiry, 9/11 Commission, and Inspectors General found numerous deficiencies in communication, technological capabilities, and limited oversight. The government responded to these gaps through creation of legislation, implementation of regulations, a massive restructuring of the intelligence community, and utilization of new technologies.…

    • 1813 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Powerful Essays

    America’s Central Intelligence Agency (CIA) was officially established through the National Security Act of 1947, but the concept of intelligence gathering had existed since the days of the Revolutionary War. The CIA is the successor to the Office of Strategic Services (OSS), which was created in 1942 to help organize espionage activities during World War II. The mission of the CIA is to collect bits of strategic information in order to protect the United States of America from foreign enemies. The intelligence is then given to the President and senior government policy makers. Along with CIA officials, they analyze it and make decisions based upon what they find, in order to protect the country from potential enemies and terrorist plots. The current Director of the CIA is Leon Edward Panetta, who was…

    • 1900 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Testbacksecurity

    • 2284 Words
    • 10 Pages

    A firewall is a mechanism that keeps certain kinds of network traffic out of a private network.…

    • 2284 Words
    • 10 Pages
    Good Essays
  • Best Essays

    George Tenet CIA

    • 3296 Words
    • 14 Pages

    The Central Intelligence Agency (CIA) is an independent United States Government agency who are responsible for providing national security intelligence to senior United States policymakers (CIA,2007). Since the 1960 's and World War II, foreign intelligence has been important to the United States since the days of President George Washington, that such efforts have been coordinated on a government-wide level. The Central Intelligence Agency Act was passed in 1949, which supplemented the 1947 Act, granting the Agency more powers. The agency was permitted to use confidential fiscal and administrative procedures and was exempted from many of the usual limitations on expenditures. Thus, allowing funds to now be accounted in budgets of other departments and then transferred to the Agency without restrictions, while ensuring the secrecy of the CIA’s budget, which is an important consideration in covert operations. The Act created a Director of Central Intelligence (DCI) as head of the Intelligence Community, head of the CIA, and principal…

    • 3296 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Does the NSA have a good enough reason to spy on its own citizens along with the other billions of foreigners when there are laws implemented to stop that exact act? Is it necessary to create more terrorists because of the hate towards this program, just to possibly catch the current ones we face now? What is the real end goal? Is it to create a black mail mega-data for the government to have insurance due to the debt? Maybe the U.S.A is planning a global attack themselves, or it really is meant to stop terroristic acts against the United States.…

    • 833 Words
    • 4 Pages
    Good Essays
  • Good Essays

    “We seek to develop policies and arrangements to make the peace both permanent and just. This can be done only on the basis of comprehensive and appropriate information” (Dwight D. Eisenhower). As the other countries start to build intelligence agencies after the WWII, it becomes more important America do build its own intelligence agency. Thus in 1947, the Central Intelligence Agency was created. Ever since, there had been a debate among the people if it’s necessary for the CIA to exists. America needs the CIA to protect the nation from terrorism, avoid any conflict with other nations, and compete with other countries’ intelligence agency.…

    • 482 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Two key components of maintaining confidentiality are the integrity of information and its security. Integrity is achieved by the accuracy and completeness of information using proper processing methods. Security measures are needed to protect information from a wide variety of threats.…

    • 379 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NSA leaked

    • 1272 Words
    • 6 Pages

    Eight months later, media outlets around the world have published more than 100 revelations in over a dozen languages. We now know that the NSA has tracked private American citizens’ phone calls, emails and social connections; monitored Internet traffic in and out of the U.S.; and spied on allied countries and foreign companies alike. What we have learned so far suggests that the agency has gone from protecting national security to facilitating the United States’ political and economic advantage on the world stage.…

    • 1272 Words
    • 6 Pages
    Good Essays
  • Good Essays

    The second mission is to secure the borders of the U.S. to Mexico and Canada. This is key in keeping terrorism at bay. We cannot afford to let terrorist fall through the cracks and sneak across our borders…

    • 528 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Reflection 1- Csp

    • 498 Words
    • 2 Pages

    Of these four goals two are closely linked with community service/volunteerism namely Goal 1 and Goal 4.…

    • 498 Words
    • 2 Pages
    Good Essays