Jump to content

Talk:National Security Agency

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 122.150.200.116 (talk) at 11:30, 24 September 2013 (iPhone fingerprint scanner - privacy/security issues: new section). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

AQUAINT/ Perfect Citizen

Has anybody heard of this?

- http://www-nlpir.nist.gov/projects/aquaint/
- http://www.ai.sri.com/project/aquaint
- http://www.pbs.org/wgbh/nova/military/nsa-police.html

It's basically is a datamining system that basically uses artificial intelligence capability to gather information and organize data into dossiers on everybody, then uses inferential reasoning capability to use the information available to determine additional data of extreme detail, ideally to the point that the system could automatically gain insights into the personalities of the people they're looking at, and even be able to determine how their thought processes work, what they would do, what they wouldn't do and so on. It's designed to be able to answer questions in essay form. This system would effectively allow the NSA to gather every single knowable facet of data on everybody. The more data gathered, the more accurate the profile is so they'd have a great reason to collect as much as they could on as many as they could.

This system would be a privacy nightmare the likes the world has never seen, one researcher actually quit, and the guy who created the program did express some concern that this system could be dangerous when made operational.

This may be pretty soon as the NSA is creating a program called "Perfect Citizen" which they are developing alongside Raytheon. The system is allegedly designed to protect computer networks and such, but an internal memo circulated referred to the system as being "Big Brother", and is suspected of being designed for being able to perform massive automatic surveillance and datamining on American Corporations and Citizens. Perfect Citizen may be an active version of AQUAINT

- http://en.wikipedia.org/wiki/Perfect_Citizen
- http://www.theregister.co.uk/2010/07...rfect_citizen/
- http://www.networkworld.com/news/201...source=nww_rss
- http://theweek.com/article/index/204...itizen-program
- http://www.foxnews.com/scitech/2010/...e-spying-tool/

AVKent882 (talk) 06:12, 5 August 2010 (UTC)[reply]

Include SE-Linux ?

The NSA does have a secondary mission, which is to secure the american government computer systems. This is not mentioned in the article. To accomplish that mission, research is performed. One interesting research project was the implementation of Mandatory Access Controls in the Linux kernel. This research project was done to show that such a thing is possible, but also possible for internal use by the NSA, since linux is free and they own lots of computers. I recommend this project be mentioned. You can read about it at [ http://www.nsa.gov/selinux ]. Also, does the article mention that the NSA improved the security of the DES encryption algorithm? Or that it invented the SHA and SHA-1 hash? I'm not sure because I didn't read it all.

Aaaand I recommend not mentioning this project suggested by the anonymous user in order to avoid polluting the page with even more useless fluff. If this article included every toy that the NSA had ever implemented, it would run for miles. That trivia belongs on the algorithms' specific pages, and perhaps the general page on encryption algos, both with links back to this article, which is about the NSA, not "stuff the NSA made." That is far too much of a niche topic to justify a mention -- perhaps under a broader paragraph tying together NSA work and cryptography in general? Even then I'd be reluctant. And: "Also, does the article mention ... I'm not sure because I didn't read it all." ...noted without further comment.
All in favor of deleting this graf and freeing up some space at the top of our page?--GodelMetric 07:48, 7 August 2007 (UTC)[reply]
The proper procedure for a Talk page is to archive the "long stable" inactive discussion at the time of the "deletion". Having just added to this topic, however, you must leave it in place for a while so other interested parties get a chance to see the addition. — DAGwyn 17:19, 8 August 2007 (UTC)[reply]
It's an anonymous comment that's been here for at least 6 months. (Could be longer -- I didn't look back further than that.) What qualifies as "a while"? --GodelMetric 23:01, 18 August 2007 (UTC)[reply]

Style:"NSA" vs "the NSA"

Moved from Wikipedia talk:WikiProject Cryptography/WikiProject Notice.:...On another nit altogether, it feels better (in AE perhaps) to say '...that NSA has taken this position...' than '...that the NSA has taken...'. In parallel usage, I think, with NASA which is almost always used without 'the'. It's been a jarring note for me as folks add 'the' before NSA. I've usually let it slide, but sometimes removed 'the'. Don't have any good ideas on how to handle this nit, however. A note at NSA? Too nitty? Frankly, I've contracted a bit of an obsession about it. Perhaps it will be resolved by Valentine's Day? ww 14:45, 27 Apr 2004 (UTC)

I have, I must confess, added a couple of "the"s in front of "NSA"s, which I'll stop. Both styles are probably OK, though...Usage research: Bruce Schneier's section in Applied Cryptography on (the) NSA switches between adding a "the" and omitting it. The web pages at nsa.gov favour omitting the "the" most of the time. — Matt 08:39, 28 Apr 2004 (UTC)
In the American English I'm familiar with, typically NSA is written as "the NSA", whereas NASA is written simply as NASA. This is somewhat inconsistent of course, but it's how heard it almost exclusively. As in "I went to work for the NSA" (substitute: "the CIA", "the FBI"—but not "the NASA"). --Delirium 08:48, Apr 28, 2004 (UTC)
I've been pondering this since I posted that nit. Perhaps the distinction (again, it may be an AE thing) is that 'the' is used when contrasting the agency (NSA) to others in the American pantheon of alphabet soup. For instance, "...the NSA, a division of the DoD, competes with the CIA and with the DIA for funds...". DIA, by the way has the same ambivalence about the 'the' as with NSA, but CIA does not. "CIA has infiltrated..." sounds just as acceptable as "the CIA has infiltrated.." though the factual status of any such claim however worded seems in recent years to have been a little dicey.
Anyway, NSA sounds best with the 'the' dropped in circumstances in which there is no possibility of confusion with others of its soup fellows. As in, "NSA announced today that ww will be charged with munitions trafficing..." or "..Berstein was very incensed at NSA's action yesterday...". But, like most less than blatantly obvious langauge usage points, I (or my ear) may feel differently tomorrow about all this.
ww 15:06, 1 May 2004 (UTC)[reply]
I think a reason for people's variant usage on this depends on whether they are mentally expanding "NSA" into "National Security Agency" or not; if you are, it can be jarring to read without a "the" prelude. I guess that sometimes the acronym takes on a life of its own and becomes a proper noun in its own right, e.g. NASA or DES (though very rarely you will see "the DES", which is quite odd to read!). I'm guessing that "NSA" is used in both ways. — Matt 09:21, 3 May 2004 (UTC)[reply]
Matt, Indeed, that sounds reasonable. I'll ponder on it. I've thought of another illuminating, I think, example. DEC (of fond memory alas) was never used with 'the'. Perhaps that, along with the NASA case (<--- NB, not even relevant -- different thing altogether!) is what has shifted the ear to NSA being correct w/o the. ww 15:40, 3 May 2004 (UTC)[reply]
I think Matt's explanation sums up why the NSA sounds right to me, but not the NASA. To use other examples from the U.S. governmental agencies, the IRS and DEA articles prefix their respective acronyms with the, whereas the FEMA and OSHA pages sensibly omit the definite article. The ATF and TSA articles have both usages. Wmahan. 22:30, 2004 May 3 (UTC)

<== left shift, saves us all from squinting at ':' for a while

Having pondered this for some days, I feel queasy. NSA sounds right (no 'the') when the image in my mind's eye (now there's a shaken, not merely stirred, grammatical virtual metaphor!) is of the crypto org. When I'm thinking about its existence as one among many government agencies (the image here is of a herd of large behemouths -- imagine bronto sized mastodons from here to the horizon), then 'the NSA' feels right. The key (hah, good one that!) seems to be that it be used in accord with the general use of 'the' in English. It notifies the listener the speaker is now / was just / will be shortly talking about one particular thing out of a herd of possible things that might have been meant. When 'the' doesn't sound right, there was only one possible thing, namely that large crypto behemouth in Ft Meade; there "aren't any others" possible at this point in the discussion. Thus, among us cryptiacs (or cryptonauts?), and in articles on same, it should be NSA, no 'the'. When discussing non crypto things, it should take the 'the' there. That's the best I'm been able to do whilst hanging over the rail. Still seasick. Any comments? ww 16:54, 10 May 2004 (UTC)[reply]

My guess is that part of the explanation is much simpler. American English tends to "NASA" and "DEC" because these acronyms are pronounced as words. When pronounced as a word, "the" never sounds right. Compare also "FEMA" and "OSHA" which are pronounced. With an initialism like "CIA" or "NSA", saying "the cee-eye-ay" or "the en-ess-ay" seems more natural, and the same with "IRS" and "DEA".
Unfortunately this isn't an absolute rule for initialisms, since "HP" and "IBM" are never prefixed with "the". Also, this applies only to common usage. I think that insiders of some organizations like the CIA (but not others like the IRS) always omit the "the", so a spook would probably say simply "CIA". --165.189.91.148 21:52, 7 Jan 2005 (UTC)
I think with IBM and HP, it's probably because you'd expand it to "the International Business Machines" and "the Hewlett-Packard", which is clearly not right. Things like NSA and CIA, standing for "Foo Agency", can accomodate a "the" more naturally. — Matt Crypto 00:12, 8 Jan 2005 (UTC)
Having been at NSA headquarters, I can inform you that NSA personnel simply use "NSA" and not "the NSA". 204.221.76.252 (talk) 16:16, 21 July 2008 (UTC)[reply]

dubious claim about electricity usage

Surely the claim here about NSA HQ drawing 4x the power of an Earth simulator is bogus? I cannot believe that an entire building (including coffee makers, microwaves, lots of PCs, lighting, heating, pumps, etc etc) draws only 4x this amount. Just doesn't pass the mental back of the envelope plausibility test/ There's something odd about this sentence if it's not merely OTL. Can anyone make sense of this? If not, I think it should be rubbed out. Call Edward G Robinson! ww 15:38, 24 May 2004 (UTC)[reply]

The amount of electricity is derived from NSA themselves: http://www.nsa.gov/about/about00018.cfm#18

The only online reference to a comparison with Earth Simulators appears to be: http://tim.movementarian.com/archives/000115.html — Matt 08:28, 25 May 2004 (UTC)[reply]

Matt, I'm still dubious. BGE is said (by NSA site noted above) to sell $21 x 10^6 of electricity to NSA/year. Earth Simlulator is said (in a PR leaflet on their Web site) to use 6MW of electricity, meaning 24 MW for four of them. At an assumed $.10/kwh, $21 million is 21 x 10^5 MW if I haven't dropped some decimals. This is just a tad larger than 24MW for 4 of those Earth Simulators. Anyway it's not quite what was implied as the, as nearly as I can figure from the leaflet, the 6MW figure includes the entire building, the 5120 NEC vector processors, and all the AC and lighting too. So it's not just the Earth Simulator, it's a lot of auxillary stuff too. On the other hand, NSA's bill is for the entire facility including the fab plant and the incinerators for secret stuff and the cafeteria(s) and so on for several 10's of thousands of folks. Sure sounded impressive didn't it?
I'm removing the comparison forthwith. ww 18:53, 9 Jun 2004 (UTC)
Good idea, it seems to not be a verifiable fact. — Matt 22:26, 9 Jun 2004 (UTC)
Not to mention an irrelevant comparison... Adraeus 00:53, 12 Sep 2004 (UTC)
Is it possible that power generation is done on site? (Solar/Garbage disposal (see White elephant) As such, Adraeus is on point, a irreleavent comparison etc. --ORBIT 00:13, 15 Apr 2005 (UTC)

budget

In the Puzzle Palace, does it not say that NSA has no budget?

I haven't read Bamford's book, but I can't imagine that those supercomputers were donated out of the goodness of Seymour Cray's heart...he may have meant the NSA's budget was classified. See: [1] — Matt 07:19, 4 Nov 2004 (UTC)
I seem to recall that Bamford's Body of Secrets places the NSA budget at ~$13B and the CIA at ~$3-4B. That figure is clearly out-of-date, but it does give some sense of scale. (I believe it's in the "Heart" chapter near the end.) --A, 8 August 2007

They have no published budget. Even something as simple as how much toilet paper they want to order could give enemies information (how many people use the building, and therefor an estimate of staff). It's all classified. [[User:GregNorc|GregNorc|Talk]]

Their budget is classfied, they do not have to get approval for the money they spend, they just request a large amount of money and hope 90%+ gets approved. —Preceding unsigned comment added by 144.103.20.118 (talkcontribs)

The secret space program, which I believe stemmed from the NSA / CSS now has developed into many avenues... I don't know how much NSA is involved with the trillions+ of $ covertly being used for these private interests and agendas. We need disclosure and truth! —Preceding unsigned comment added by 173.50.135.161 (talk) 10:51, 14 January 2010 (UTC)[reply]

Another budget comment -- it says the NSA is an agency "having a budget much larger than that of the CIA," but doing some Googling makes this claim seem doubtful. http://www.fas.org/irp/commission/budget.htm says the NSA has 3.6 billion and http://www.fas.org/irp/budget/ says the CIA had nearly 30 billion just a few years ago, so I doubt that the NSA's budget is much larger

The first link places the CIA budget at $3.1-$3.2 billion with the NSA budget at $3.6 billion. The second link makes no mention of either specific agency's budget, but merely states that the overall budget for all intelligence was $26.7 billion for FY 1998. Based on that, NSA's budget was bigger than CIA's, and it can be assumed that with its increase in personnel and increased activity in domestic and foreign spying that its budget has increased moreso than CIA's. --Rodzilla (talk) 13:49, 7 February 2007 (UTC)[reply]
The FAS estimates come up at the top of Google searches, but these are all just estimates. The numbers for the NSA seem to fall between $3B and $15B, and even the FAS estimates leave the bulk of the US intel budget unidentified. An article on the FAS website suggests $5B. (cite) globalsecurity.org places the number at $7.5B , and the CIA budget at $5B. (cite) Regardless, the figures are all over the place -- there doesn't seem to be any immediately apparent reason why the FAS figures are better estimates. --A, 8 August 2007

I removed the 11 billion figure and replaced it with classified sine we have no way of knowing the true budget —Preceding unsigned comment added by 128.172.27.29 (talk) 16:49, 23 May 2009 (UTC)[reply]

Ok someone reversed my edit, there is no reference for this 11 billion dollar figure anywhere to be seen. Having unreferenced information on a critical question of an intelligence agency's budget is unacceptable. —Preceding unsigned comment added by 128.172.27.29 (talk) 17:15, 23 May 2009 (UTC)[reply]

Strategy for the NSA

Hayden and the NSA have a strategy to shift greater reliance on American industry for the purposes of domestic spying (see Gen. Hayden Statement to Congress - see section 27), EFF class action suit Although Gen. Hayden said at the National Press Club that "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application" [2], his testimony that, "One senior executive confided that the data management needs we outlined to him were larger than any he had previously seen" Gen. Hayden Statement to Congress - see section 27 before the Joint Inquiry of the Senate Select Committee On Intelligence and the House Permanent Select Committee On Intelligence) indicates that NSA's database was projected to be considerably larger than AT&T's 300 terabyte "Daytona" database of caller information. The NarusInsight is one type of spying hardware, capable of monitoring of an OC-192 network line in realtime (39,000 DSL lines) or give AT&T the power to monitor all 7,432,000 DSL lines it owns. After data capture, according to Narus, its software can replay, "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols" (see [3]). China Telecom uses this same type of technology to spy and censor its people in a more primitive way. China telecom has started the process to acquire this technology logistically and financially. Shanghai Telecom seeks system AbrahamLincoln24 05:58, 14 December 2006 (UTC)[reply]

The NSA has a strategy to shift greater reliance on American industry for the purposes of domestic spying. The NSA strategy is called project GROUNDBREAKER (see section 27 [4]). (aww somebody didn't like Mr. Haydens transcript its ok I'll fix it)Moreover this strategy is linked to the DOD doctrines called "Fight the net" and "Information Operations Roadmap" ( see [5]). Although eX-director Gen Hayden has said "As the director, I was the one responsible to ensure that this program was limited in its scope and disciplined in its application" (see [6]). Two examples of relying on American industry for the purposes of domestic spying is the use of CALEA (see SEC.103 [7]) (see SEC.106 [8]) on US telecommunication companies and NarusInsight. Under the CALEA Act all US telecommunication companies are forced install hardware capable of monitoring data and voice by May 14 2007. CALEA Act also forces US telecommunication companies to build national technology standards to support CALEA. NarusInsight is one type of spying hardware, capable of monitoring of an OC-192 network line in real-time (39,000 DSL lines) or give AT&T the power to monitor all 7,432,000 DSL lines it owns. After data capture, according to Narus (see [9]), its software can replay, "streaming media (for example, VoIP), rendering of Web pages, examination of e-mails and the ability to analyze the payload/attachments of e-mail or file transfer protocols". China Telecom uses this same type of technology to spy and censor its people in a more primitive way. China telecom has started the process to acquire this technology logistically and financially. Shanghai Telecom seeks system AbrahamLincoln24 01:06, 15 December 2006 (UTC)[reply]

This may be an inappropriately judgmental comment, but this section is really, really horrible. It's totally out-of-place, it's not relevant to the overall discussion, it's badly composed, it lacks citation, and it's totally devoid of context. Interpreted liberally, it seems to be a current-events comment about NSA wiretapping activities, which makes it especially inappropriate. Should be yanked; it's astonishing that it's remained this long. --A, 8 August 2007
As I noted when I reverted this paragraph in the main page - Hayden is not the head any more, so why copy a paragraph from his article over to here? — RevRagnarok Talk Contrib 03:13, 15 December 2006 (UTC)[reply]
@Revragnarok
Todays NSA strtegy was conceived and implemented by Gen Hayden. It does not matter that he is an ex-head of the NSA today. This is because future NSA directors will have to foallow his stradegy. AbrahamLincoln24 07:22, 15 December 2006 (UTC)[reply]

The paragraph on strategy needs work. CALEA - the Communications Assistance for Law Enforcement Act, give the FBI new authorities, not NSA. FBI can require equipment providers to build in tap capabilities, but CALEA doesn't do anything for NSA, which uses other means to access communications. You might want to note that all big EU countries have authorities similar to CALEA, along with Russia, China, India and Japan. The statement that Hayden is the architect of NSA's strategy - do they even they have a strategy? - needs some explanation. Does it mean a strategy to adjust from collecting on public switch networks to collecting on the internet. It's not a domesitc intelligence strategy. The quote from an unnamed executive about data management doesn't refer to domestic spying, but to the problems NSA has coping with the floods of traffic - voice, email, sms, etc - billions of messages a day (the article could cite the recent Baltimore Sun articles on "Turbulence"). The reference to NarusInsight is puzzling - it's just one technology among many - why is it special? If the article is going to refer to China, it might help to include a link to "Golden Shield," the Chinese domestic surveillance program.

Thank you for helping me make this wiki better. My statement CALEA is not wrong. I think you should read the CALEA law. CALEA law SEC. 102 part (5) "The term `government' means the government of the United States and any agency or instrumentality thereof, the District of Columbia, any commonwealth, territory, or possession of the United States, and any State or political subdivision thereof authorized by law to conduct electronic surveillance." http://www.askcalea.net/calea/102.html This means any US government agency from the NSA, CIA to believe it or not US Fish and Wildlife Service can conduct electronic surveillance. The law is very wide here. Another point you make is that I do not note other big countries that use a form of CALEA, I did look at the history of this discussion CHINA. That part was removed. The statement that Hayden is the architect of NSA's strategy is true because he said so in US testimony to congress. Please read his testimony pdfs. Lastly you are confused what domestic spying is, I should have been more clear. Using laws to put always on backdoors in software and hardware in all tecom industries on US soil is by definition domestic spying. I will rewrite it make this section more clear. Also I will add more info on the strategy of Gen Hayden from banking to telcoms. I will reference everything I talk about to make this section more clear.

I assume that this is still AbrahamLincoln24; these are not NSA "strategies." They're specific NSA programs that have been implemented under Hayden. You are correct that CALEA is an NSA program, but you seem to be using this notion that it's a "strategy" to shoehorn an extraneous discussion of a controversial NSA program into the article. -- GodelMetric 23:07, 18 August 2007 (UTC)[reply]

Employer of mathematicians

Despite being the world's largest single employer of Ph.D. mathematicians,

Hem. I strongly doubt this. In many countries, the university and research system is government-run, and thus the largest single employer of PhD mathematicians is probably the government of any of those countries. David.Monniaux 20:46, 20 Feb 2005 (UTC)

Perhaps, although I'd think it reasonable to class these mathematicians as being employed by whatever institution they work at for this kind of thing. But at the least, I'd like to see a half-decent source for the claim. (With an agency as secretive as the NSA, it's quite difficult to get solid fact, rather than mere speculation. Particularly on this topic, I think we need to be quite careful about citing sources.)
Having done some digging, I've found that NSA themselves claim, "It [NSA] is said to be the largest employer of mathematicians in the United States and perhaps the world." [10] and "Currently, we are the largest employer of mathematicians in the country." [11] (Conspicuous lack of "Ph.D.", though.); also "In 1996 we hired 60 mathematicians, 40 with PhD's. In 1997 we made 50 hires, 30 with PhD's, and we expect this trend of aggressive pace of hiring [to continue]. Let me stress that hiring at a pace of 50-60 mathematicians per year (equivalent to a good-sized math department) is a good measure of our commitment to math in an era of declining resources.". [12]. — Matt Crypto 23:12, 20 Feb 2005 (UTC)
As you said, it of course depends how you define "employer".
I think that we should be very prudent with those claims; everything surrounding NSA seems to be based on hearsay. Once, at a conference, I met a NSA researcher in cryptography and I asked him whether they did a lot of fundamental research, like what he was presenting (as opposed to more applied activities); he said that they actually did not. While of course the guy probably could not say anything precise without stumbling into "classified" areas, this, to me, indicates that there are conflicting reports about the real size of the NSA research departments.
Heck the NSA even classified an elliptic curve. Universities are the employeers not the governments themselves. Paychecks ome from the universities themselves. A research grant from the NSF does not mean you are an NSF employee. Timothy Clemans 20:49, 6 October 2006 (UTC)[reply]
Furthermore, the NSA probably has an interest in having such rumors etc. floated around, to increase the aura of power that it has. The mere fact that its budget is classified is of the same tendency. David.Monniaux 07:16, 21 Feb 2005 (UTC)
Actually there really are a large number of professional mathematicians at NSA HQ, and the Research & Engineering building is one of the largest at NSA HQ. Of course much of the work is mission-inspired rather than "of purely academic interest". — DAGwyn 05:39, 16 November 2006 (UTC)[reply]

I'd love to know how many steaganographers they have Sea level 01:43, 1 February 2006 (UTC)[reply]

Several years ago, there was at least one stego group. Presumably it was able to justify its existence. — DAGwyn 05:39, 16 November 2006 (UTC)[reply]

James Bond-style espionage

Several bits of spy fiction (notably the Bond film Die Another Day and the thriller Enemy of the State) have portrayed the NSA as directly involved in the more, well, movie-like side of intelligence. The NSA are exclusively restricted to nerdy stuff, aren't they? They leave the violent derring-do (and more generally, any actual legwork) to the CIA and the armed forces, right? If so, we should probably make that point in the article. --Robert Merkel 14:02, 23 August 2005 (UTC)[reply]

Yes, I believe you're right, but it'd be great to have a source saying so explicitly. — Matt Crypto 14:06, 23 August 2005 (UTC)[reply]
There was an article in the New York Times a couple of years ago describing black bag jobs to steal codes from foreign consulates. I beleve the article said the operatives worked directly for NSA, but I'm not sure. Also NSA intercept operators sometimes work under dangerous conditions, see, e.g. USS Liberty incident. --agr 15:44, 24 August 2005 (UTC)[reply]
MI5 or MI6 (I forget which) has a webpage dedicated to debunking Hollywood's portrayal (especially James Bond) of espionage. I think it was the FAQ section of the Career/Recruitment page. 205.174.22.28 02:33, 13 May 2006 (UTC)[reply]


Well I can't say NSA does do "super secret" missions. Normally NSA only does regular computer work (not regular, but you get the point). Most NSA missions aren't entirly let of the country (as far as the public knows), It's usually CIA's job to do the "black ops" and "007" things. — Preceding unsigned comment added by The Goiter*Guru (talkcontribs) 22:48, 15 February 2011 (UTC)[reply]

Be more specific

  • "Many people oppose NSA's"
  • "It has been suggested that in practice, NSA/CSS implements an end run"
  • "In the past, there have been alleged instances of improper violations"
  • etc.

Read Wikipedia:Avoid weasel terms. Thanks. --Eleassar my talk 13:42, 12 September 2005 (UTC)[reply]

Famous people (non cryppies)

Not sure where to put that stuff... but people may be interested. RevRagnarok 00:40, 22 September 2005 (UTC)[reply]

Previous Directors

I just reverted a change on Hayden, who is now a General but when heading it up was a Lt. Gen. Should we have the position that the director help in the position, or the position upon that person's retirement/death? Seems to be a pain if you were to go make changes to all entries every time somebody gets promoted... RevRagnarok 23:11, 11 October 2005 (UTC)[reply]

The given rank should be what he was at the time of his directorship. If there is an article about the guy then that should explain that he was promoted after completing his directorship. --K. AKA Konrad West TALK 23:31, 11 October 2005 (UTC)[reply]
OK, then User:Caligatio needs to stop changing it back to General. RevRagnarok 23:09, 13 October 2005 (UTC)[reply]

My Page Reversion POV

User posted very slanted Point of View- not appropriate for Wikipedia--Adam (talk) 00:59, 21 December 2005 (UTC)[reply]

NPOV revert

Reverted the following, contacted author:

And what the mainstream media, and the Democratic Party would not like you to know, is that the President is authorized to order such activities, see Executive Order#12333, Signed by Ronald Reagan in 1981...see it here https://www.cia.gov/cia/information/eo12333.html, and that this whole contraversy is just another attempt to smear the Bush administration!
Also this very same Executive Order was used by President Bill Clinton, and vetted by his the Deputy Attorney General, Jamie Gorelick...here is her testimony,
"The Department of Justice believes, and the case law supports, that the president has inherent authority to conduct warrantless physical searches for foreign intelligence purposes," "and that the President may, as has been done, delegate this authority to the Attorney General."
"It is important to understand," , "that the rules and methodology for criminal searches are inconsistent with the collection of foreign intelligence and would unduly frustrate the president in carrying out his foreign intelligence responsibilities."
Deputy Attorney General Jamie Gorelick
Testifying before the Senate Intelligence Committee
July 14, 1994
http://www.nationalreview.com/york/york200512200946.asp

--KJK::Hyperion 02:03, 21 December 2005 (UTC)[reply]

It it just me, or is this just bizarro world? Even with the rewrite, the article implies the Office of the President has the authority to do something because it gave itself that authority via an executive order. It could be argued that the President has this authority via the Constitution, but not by granting that authority to himself. --User:Belltower 03:30 10 May 2006 (UTC)

Removed Text

I removed the text of Executive Order 12333. There's already a link in the main section (when it should likely be a reference). If it's something you really want around, start a new article and move it there. Especially since the person who added it never bothered to preview or wikify it, it looked horrible. -- RevRagnarok 23:30, 21 December 2005 (UTC)[reply]


I question wether the "phone taps" section should be included at all. There is a lot of information on it because it has happened since the creation of this site, however the agency has been involved in several controversies throughout its history none of which have their own section. If it is to be mentioned at all, the "phone taps" issue ought to be included under a "Controversies" section in which other issues such as the Iran-Contra affair are discussed. -Bunbury

I removed "they are also going to help us legalize marijuana for the common good." from the ROLE section for pretty obvious reasons. -GeorgeFromNY

Chantilly, Virginia

I live near Chantilly Virginia, where there is a large black building in the Westfield Business park. It is commonly understood to be a NSA building, but little more is known beyond that. I mistakenly belived it was the headquarters for the NSA. Anyone know anything about this? If so, can it be added as it is a NSA building, but is not mentioned in the article.

Zidel333 03:00, 29 December 2005 (UTC)[reply]

NSA has increased from 16,000 to 58,000 some odd employees worldwide since 2000. I don't think they all fit in one building. NMAP 4 just arrived from Fydor so have fun. Ask them at the Directors Service Program Department of Defense National Security Agency 9800 Savage Road Fort George G. Meade, MD 20755-6515 Attn: R1 (DSP), Suite 6515.

[https://www.vmware.com/company/federal.html GTSI Chantilly, Va. (703) 502-2000 gtsi.com]... agreement for a joint initiative with the US National Security Agency (NSA) to enhance and certify the security of VMware's virtual machine technology...My recollection is that 15,000 Chantilly Drive used to be Contel Federal Systems which put in all the fiber optic backbones, cell phone repeaters and satellites,but I think they were obsoleted by GTE back around ninety and seven and its now hyperdigm.

whois.nic.ddn.mil (192.112.36.5)whois.internic.net (198.41.0.5)Government Systems Inc. Attn: Network Information Center 14200 Park Meadow Dr.Suite 200 Chantilly, VA 2200,

As we head toward the year 2000, http://www.controlconceptsinc.com/profile.htm Control Concepts] has formed strong alliances with many leading manufacturers. These companies include American Megatrends, Inc. (AMI), RDI Computer Corp., Seagate and Western Digital (through DSS) and others that have led to our successful implementation of a General Services Administration (GSA) Federal Supply Schedule. Initiated in the 1994/1995 Fiscal year, this GSA Schedule has provided a very successful vehicle to sell to the government on all levels. The GSA Schedule has also led to a major win in November of 1996 with the Naval Information Systems Management Center (NISMC). Sea level 01:41, 1 February 2006 (UTC)[reply]

Coordinates?

Um... why do we need the geographical coordinates of the NSA Operations Building to the nearest, what, foot? - dcljr (talk) 03:41, 14 January 2006 (UTC)[reply]

When we want to dig safe it helps to know where the utilities are Sea level 00:52, 1 February 2006 (UTC)[reply]
Having GPS coordinates on this page is un-necessary as nobody is going to be able to actually drive that close to the building anyway. So what is the point? --74.52.3.50 23:30, 15 May 2006 (UTC)[reply]
Hasn't this user been disrupting the page elsewhere (discussed below)? The coordinates bit struck me as weird, too. Is that common practice on any other pages? --GodelMetric 07:24, 7 August 2007 (UTC)[reply]
To answer my own question, no, it's not. It's used for geographical locations alone, such as the locations of Fort Meade or Langley, but not for any of the other agencies. The coords on the NSA page proper merely point to Fort Meade, and are therefore redundant with that information -- and inaccurate as well with regard to the location of the NSA, which is just a bureaucratic organization, after all. Anyway, slight epistemological digression aside, I'm changing it.--GodelMetric 07:54, 7 August 2007 (UTC)[reply]
I removed the coordinates when somebody added them on a previous occasion a few months ago. — DAGwyn 17:21, 8 August 2007 (UTC)[reply]
Agreed; GPS coordinates let the terrorists win. Agalmic (talk) 13:08, 4 July 2008 (UTC)[reply]
Well, largely I just think it's unnecessary to provide that information for nearly any Wikipedia site; also it's pretty much useless, since if you need to know where NSA HQ is, you will be told where to go and what to do when you get there. But I would agree that there is no point in making life even the least bit easier for terrorists. — DAGwyn (talk) 22:16, 8 July 2008 (UTC)[reply]
We should also include the coordinates to NSA's Friendship Annex (FANX) compound, as well. —Preceding unsigned comment added by 204.221.76.252 (talk) 16:20, 21 July 2008 (UTC)[reply]
There are a lot of locations controlled by NSA, so why single out some of them and not others? Is there a good reason for giving GPS coordinates? — DAGwyn (talk) 21:06, 21 July 2008 (UTC)[reply]

Sen. Leahy

Senator Leahy refused to comment when asked why the same foreign wiretapping measures were praised by democrats during
the Clinton administration in the previous decade.

Actually, Leahy disputed that the measures were the same. "Foreign Intelligence" was not interpreted by the Clinton administration to apply to every American citizen calling overseas, absent a warrant. Skyraider 00:53, 26 January 2006 (UTC)[reply]

There's some additional information here. Skyraider 01:19, 26 January 2006 (UTC)[reply]

In fiction

I'm afraid that with this article, we're looking increasingly like the encyclopedia that Slashdot built: specifically, the ballooning size of the "in fiction" section. I suggest we split out this information into a separate article like NSA in fiction, and in this article we write a paragraph or two on "popular understandings of the agency" which would include mentions (but not lists) of how the agency is treated in fiction. — Matt Crypto 08:57, 3 February 2006 (UTC)[reply]

I would add references to Enemy of the State, and to Sneakers, for getting way out ahead of the game and actually bringing some of the more intense parts of cryptography into the public consciousness. That said, I'd reject with prejudice any movie that plugs the NSA in as their evil villain of the month -- the two movies I cited are more topical as far as the political concerns that pervasive eavesdropping suggests. Even if have to keep our articles neutral, we can definitely cite those films. ;) --GodelMetric 08:16, 7 August 2007 (UTC)[reply]

I note that you have repeatedly deleted reference to official State Department intelligence policy, and wonder if you could explain why you consider this a fiction?Federal Street 12:14, 3 February 2006 (UTC)[reply]

Erm, what are you talking about? — Matt Crypto 12:43, 3 February 2006 (UTC)[reply]
Your edits of 1-3 Feb, 2006Sea level 14:27, 3 February 2006 (UTC)[reply]
As to the general suggestion, please do so. It's one of my pet peeves with Wikipedia's articles on military and intelligence related topics. --Robert Merkel
I see you've got to it before me, thanks! — Matt Crypto 17:32, 6 February 2006 (UTC)[reply]

Etc

Would anyone care to comment on how recent revelations ....<snip>Sea level 14:27, 3 February 2006 (UTC)[reply]
No. As you've been told repeatedly, this is not an NSA discussion board. Please don't post off-topic here, otherwise I might have to start being more threatening, and I don't like doing that. By all means, give us feedback and suggestions on how we can improve this article, but please avoid off-topic comments on the NSA itself. — Matt Crypto 14:51, 3 February 2006 (UTC)[reply]
I hope I won't be blocked for this! But can Matt explain why writing...
"Keeping these things in mind, I would like to see some discussion in the article as to what sort of internal checks and balances exist to keep any rogue elements in check and whether that is possible, or desirable. The main question is just whether there is a way to address these concerns in the article?"Sea level 14:44, 2 February 2006 (UTC)[reply]
... is off-topic? To me, it seems like the basis of constitutional law, doesn't it? Tazmaniacs 23:29, 5 February 2006 (UTC)[reply]
Well, that paragraph is quite reasonable and on-topic, and we certainly can discuss how to improve the article's treatment of this matter. My comments should be taken in the context of the history of Sea level's posts to this page, nearly all of which were off-topic. Eventually he started re-adding them with "is there a way to discuss this in an article" at the end, presumably hoping to keep his comments on-topic by a technicality, but by that point it was clear he wasn't really interested in improving the article, but just having a forum to air his views (and clutter up this page in the process). — Matt Crypto 23:38, 5 February 2006 (UTC)[reply]
I'm sorry Matt, but this article needs to start getting more encyclopedic. It should be dealing with the facts of what the NSA is, what it does, who it does it to, who it does it for and what the extent of its operations are. There are ongoing Congressional investigations and law suits, public policy statements, and disclosures almost every day so its properly considered a current event.

Please explain why its your opinion any of that should be considered off topic, it certainly wouldn't be Wikipedia policy for anything as contraversial as the NSA to be discussed on the discussion page. Sea level 15:27, 3 February 2006 (UTC)[reply]

If you don't comprehend why extended discussion about the NSA is off-topic on this talk page (as opposed to extended discussion about the encyclopedia article on the NSA) then I can not, and will not, waste my time explaining it to you any further. To put it baldly, if you persist in disrupting this talk page, then I will block you. (You are apparently a sockpuppet of User:Federal Street and User:rktect, to boot.) — Matt Crypto 15:39, 3 February 2006 (UTC)[reply]

As to the NSA's first appearance in fiction surely Sneakers http://www.imdb.com/title/tt0105435/ predates the example given here.

"believed to be"?

why is the NSA "believed to be" the largest intellegence agency? dposse 02:59, 21 March 2006 (UTC)[reply]

I presume someone would write that when it's one of those facts that has never been officially confirmed (e.g. by release of employee numbers or budget), but is widely understood to be true. — Matt Crypto 08:52, 21 March 2006 (UTC)[reply]

Ah, ok. thanks. dposse 01:12, 22 March 2006 (UTC)[reply]

san antonio nsa activities

It's interesting to note that no mention is made of NSA's extensive activities at Lackland AFB here in San Antonio (vis: Air Intelligence Agency; AKA: AIA). There was also a recent purchase of a fair amount of real estate in the area intended to house approx 1200 NSA employees initially with room for up to 3000 in total. Anyone interested can verify this with articles published in the San Antonio Express News (the local daily).

Cheers...—The preceding unsigned comment was added by 24.243.56.169 (talkcontribs) 04:58, 5 May 2006 (UTC)

History

"For a long time its existence was not even acknowledged by the U.S. government." When did the government first publicly admit that the NSA exists? Jimpartame 03:23, 12 May 2006 (UTC)[reply]

I'm not sure that they have -- my impression is that it's merely an open secret at this point. this article explains that the NSA wasn't actually a statutory beast -- elsewhere in the article I recall discussion about Truman's 1952 memorandum (not Congressional Act!) establishing the NSA. But check out this weirdness:

Less well known than the Church Committee was its House counterpart, the Pike Committee. Chaired by Otis Pike (D-NY), it also operated from 1975 to 1976, and likewise focused on the NSA. When Pike demanded a copy of the 'charter' establishing NSA, he was rebuffed, as the so-called charter was actually Truman's secret memorandum. Although the committee subpoenaed the directive, the NSA, with help from the Justice Department and the Pentagon, successfully blocked them from seeing it. Aside from a very small portion (revealed only for the purpose of showing that NSA was exempt from certain legal restrictions on the use of communications intelligence), the NSA 'charter' remains one of the most deeply buried secrets of the federal government.

James Bamford also suggested in a talk that prior to The Puzzle Palace (1983) there really wasn't any public awareness of the NSA at all -- the book was the catalyst for that. He claims he went on a talk show with Sen. Bill Bradley, and mocked Bradley because the Senator didn't know about it... Regardless, everything I can find seems to indicate that there was never a "moment of disclosure."--GodelMetric 07:36, 7 August 2007 (UTC)[reply]
David Kahn's "The Codebreakers" contained a substantial amount of coverage of the NSA in general terms; it was a best seller (and Book of the Month club primary selection), so clearly it contributed to "public awareness" of the NSA, well before Bamford's "The Puzzle Palace". As to government "disclosure", there definitely have been changes along those lines; at one time the NSA was not shown in the US Govt. Organization Manual, and NSA employees were told to say that they worked for "the DoD". In recent times, road signs have appeared, maps now show the Agency HQ, many EO secrecy orders have been rescinded, etc., etc. So the "hide its very existence" policy has definitely been aupplanted. There is now even an NSA Web site. I no longer recall whether there was one single "coming out" event. — DAGwyn 17:37, 8 August 2007 (UTC)[reply]

Industrial espionage

I think it should be mentioned in this article that the NSA has stolen technological knowledge from the german wind turbine manufacturer Enercon, which was used for a fake patent that later kept Enercon from selling its products in the US. -- Imladros

Source? -Harmil 15:13, 17 May 2006 (UTC)[reply]
see [13] (german article in Die Zeit), [14] as well as [15] for many other cases. -- Imladros

Call Connected Thru the NSA

Recently the rock band They Might Be Giants have created a ringtone for download called "Call Connected Thru the NSA" the lyrics consist of " Call connected thru the NSA, complete transmission thru the NSA, suspending your right for the duration of the permanent war." hope you guys can add it in here.

Grossly Exaggerated Claim With No Evidence

"Evidence strongly suggests[citation needed] that in practice, NSA/CSS implements an end run around legal restrictions on internal surveillance by having partner agencies in other countries spy on US citizens while the NSA returns the favor for these agencies, thereby avoiding illegal spying on their own citizens." This information is entirely wrong. There is a specific law that prvents EXACTLY this sort of behavoir. This section should be removed from the Wikipedia article. I came across a legal document on the Internet about this, a while back. Might have been on a site like www.abovetopsecret.com forums. We should figure this out and fix this so we are not misleading people. —The preceding unsigned comment was added by 80.221.24.23 (talkcontribs) 05:24, 7 June 2006 (UTC)

OK, I've removed it from the article. At the very least, then, we would need to cite a source for this to remain in the article. — Matt Crypto 22:24, 7 June 2006 (UTC)[reply]
While Matt's reaction to 80.221.24.23's comment is certainly correct, as far as I know (though I have indeed come across this allegation), there is a nubbin of truth here. NSA has been confined to non-US intelligence from its establishment, but it has not always obeyed this stricture. In particular, the Church Committee brought to public knowledge that NSA had also been tapping targeted communications entirely within US communications for some time. Apparently in concert with assorted other outrageous acts (eg, by FBI, DoD branches, CIA, etc) over the preceeding two decades+ in continuation of the Cold War struggle, or with what could be construed to be such. I myself think the Houston Plan of Watergate fame was of a piece in this pattern, but I'm aware of no actual evidence for connections (eg, did Houston know about anything being done by the Agencies, outside frankly political bounds of the White House?). The revelations about NSA were a major scandal at the time, though only one among a great many and so less remembered than some, and is claimed to have resulted in a new committment by NSA to hew strictly to the terms of its charter. Since 9/11/01, it would appear that the old days have returned, though perhaps this time with a (secret) revision of its charter, again in service to the greater good of the war being waged. So perhaps something might be said on the Church committee and what it found under the secrecy rocks?
I have even heard testimony (or perhaps broadcast talking-head discussion) from NSA types explaining that the wholesale wiretapping isn't "a danger to privacy because a trained NSA suprevisor must approve anything beyond the mere automatic eavesdropping by pattern search algorithms". This may be evidence only of a terminally paranoid mind, but I am unable to stop myself from asking: how and where did so many NSA supervisors get such privacy protection training, and how many of them are there? But this is merely my own concern, as far as I know. Unless someone actually knows something? ww 20:02, 11 July 2006 (UTC)[reply]

Patent Citation

Ok, I think I have found a source for the "Citation needed" bit in the patent section, see: [16], however, it seems to be a clone (or vice versa) of this page, your thoughts? Help plz 12:29, 26 June 2006 (UTC)[reply]

No, that's just a mirror (it even says it's taken from Wiki), so it can't be used as a source (it would literally be citing ourselves). Ddye 12:59, 26 June 2006 (UTC)[reply]

ECHELON and Domestic activities

What reason in ECHELON listed under domestic activities? Its my understanding that ECHELON is exclusively foreign. Torturous Devastating Cudgel 15:50, 17 August 2006 (UTC)[reply]

Fixed, ECHELON section moved out of Domestic activities to it's own section. Sleigh 12:20, 15 November 2006 (UTC)[reply]

ECHELON at all

As far as I'm aware Echelon has never been admitted to by the NSA or the government at all, nor has anything on it been leaked, should we even include information of such dubious prominence without covering the substantial "echelon is nothing more than a conspiracy theory" side as well? Wintermut3 20:00, 10 December 2006 (UTC)[reply]

Wintermut3 then retracted that comment, claiming to have seen EU documentation to the contrary. However, there are some issues here that deserve discussion: (1) The whole so-called "ECHELON" uproar was instigated and promoted by Duncan Campbell, who expanded a modicum of fact into a sea of speculation. The EU commission's report was pretty much just Campbell's claims. (2) There has long been a "special relationship" among the US and various British COmmonwealth nations to share intelligence monitoring work and results, and eavesdropping facilities around the world to achieve this. (3) That does not have a codename "ECHELON," however. An NSA document search turned up only two "hits" on "ECHELON", one of them clearly referring to "one of a series of levels or grades in an organization or field of activity" (from Merriam-Webster's online dictionary), and the other not comprehensible without looking up the full source context. (4) Data from such monitoring is obviously like "drinking from a fire hose;" it cannot feasibly all be forwarded or stored for use in snooping on random citizens, but must be prefiltered according to various criteria (perhaps for matches against a list of "phrases of interest"). (5) A secret operation is not necessarily a conspiracy. — DAGwyn 05:50, 14 December 2006 (UTC)[reply]


4 is not the case. — Preceding unsigned comment added by 46.7.228.74 (talk) 02:36, 12 April 2013 (UTC)[reply]

Specific Instances/Eras of Involvement

The CIA article includes brief summaries for different eras and specific instances of Agency involvement, and I think something similar should be included on this article. Too much of the article's focus is currently focused on domestic activity when that is not the Agency's primary role (or even technically its role at all). A good reference for pre-NSA intelligence (relevant, as it was performed by the AFSA and other precursors to the NSA) can be found here. At this point, I'm not sure yet where good summaries/lists of major NSA involvement in the last 40 years can be found. --Rodzilla 03:45, 27 December 2006 (UTC)[reply]

Almost all of them are still classified, for a variety of reasons including political sensitivity and not wanting to disclose sources and methods lest they "dry up." — DAGwyn 07:35, 27 December 2006 (UTC)[reply]
Yes, the specifics about a lot of them are, but there's a good number that at the very least, the existence of isn't classified. For example, the USS Liberty incident, the USS Pueblo incident, the Cuban Missile Crisis, etc...I doubt Body of Secrets would have made it to 600 pages if everything NSA has done in the last 30 years was still classified. --Rodzilla 07:39, 27 December 2006 (UTC)[reply]
I was referring to a large number of intelligence successes that have not been disclosed to the public. — DAGwyn 07:20, 6 January 2007 (UTC)[reply]
RodZilla is answering you. Body of Secrets has detailed rundowns of major NSA involvement in a number of important international incidents throughout the Cold War. They're obviously not classified.--GodelMetric 07:38, 7 August 2007 (UTC)[reply]
No he wasn't. The numerous intelligence successes are rarely reported publicly (almost never). What "Body of Secrets" was able to report was pretty much limited to politically visible problems that had attracted public (news media) attention. It should be obvious that this presents a badly distorted view of the Agency's actual activities. — DAGwyn 17:26, 8 August 2007 (UTC)[reply]
I tend to disagree -- e.g., my recollection is that Bamford's chapter on the U.S.S. Liberty, for example, was something of a revelation at the time. Regardless, RodZilla is correct -- the book is a pretty good rundown of the NSA's involvement in a number of important events since its creation. The original question was where there were lists of NSA involvement in various events, and while Bamford's list obviously can't be comprehensive, it's clearly informative. I'm not sure why we'd want a comprehensive list anyway, even if it were available, which, as you point out, it's not. -- GodelMetric 23:19, 18 August 2007 (UTC)[reply]

There's a good list of various documents here as well. --Rodzilla 03:56, 27 December 2006 (UTC)[reply]

Wasn't there a rather heavy-handed attempt by the NSA to suppress dissemination of the RSA algorithm in 1977? I remember following the controversy quite closely at the time, in Scientific American. Does that belong in the article? DavidCBryant 12:33, 26 August 2007 (UTC)[reply]

location

what state is the NSA in where's the nearest city?

The article says, "Headquarters for the National Security Agency is at Fort George G. Meade, Maryland, approximately ten miles (16 km) northeast of Washington, D.C." — Matt Crypto 20:57, 1 March 2007 (UTC)[reply]
Ft. Meade is adjacent to Bowie and Laurel, Maryland, and not far from Columbia. — DAGwyn 02:17, 2 March 2007 (UTC)[reply]
Oops, I meant Jessup, not Bowie (which is also very near). — DAGwyn 01:26, 5 March 2007 (UTC)[reply]

Employees

I wonder about the accuracy of the number 30,000 employees stated in the infobox. In my opinion, we should change it to "Classified", because no reliable documents confirm that NSA declares its real employees every year. Also,30,000 is just a temporary number in certain specific year, not an updated information. This case is similar to CIA's budget, which is usually kept in secret but was exceptionally made public in 1997 and 1998. Or else, we should make detailed clarification that in what year the number of employees is 30,000. Apple•w••o••r••m• 06:26, 16 March 2007 (UTC)[reply]

Additional, see NGA, for example. The budget and employees are stated in concrete number with the specific years beside. Apple•w••o••r••m• 06:34, 16 March 2007 (UTC)[reply]
But the workforce number is not classified. It's about 30,000. That's from the horse's mouth. There's a big difference between classified and not (the biggest one I can think of offhand is jail time). The number changes daily (mostly Fridays at the end of a pay period or Mondays when they do the read-ins) so they just say "about 30,000" for simplicity. With satellite technology, you can count the cars I suppose... Obviously, I'm joking because that's only one building. — RevRagnarok Talk Contrib 11:56, 16 March 2007 (UTC)[reply]
Besides, you can't count the supercars that are cloaked. BQZip01 15:08, 16 March 2007 (UTC)[reply]
Assuming parkings around their building on that photograph in the article, they probably suffer from traffic jams -- A man without a country (talk) 16:54, 18 September 2009 (UTC)[reply]

The very notion is problematic, because much of the infrastructure is now "outsourced", and there are many organizations (think tanks, steady contractors, etc.) and individuals (including many military personnel) who are strongly affiliated with NSA but who are not officially employess of NSA. — DAGwyn 00:48, 17 March 2007 (UTC)[reply]

Which I believe is why the full budget is classified. But back to the point, it says approx so that should be fine. — RevRagnarok Talk Contrib 00:59, 17 March 2007 (UTC)[reply]
In 1997, the aggregate budget for the US intelligence was declared publicly for the first time [17]. It means that the budget for NSA must be included in the total of $26.6 billion. Apple•w••o••r••m• 14:41, 17 March 2007 (UTC)[reply]
Yes, that was an anomaly. The best we could do with that is "<$26.6B (1997)" in the infobox which is probably useless today (late Clinton era and pre-9/11); the CIA says that includes them too, but does that include all of the IC? — RevRagnarok Talk Contrib 15:07, 17 March 2007 (UTC)[reply]
Of course it's not certain that the 1997 statistic includes all of IC but there's highly chance that NSA's budget belonged to it, since it'll be ironical if one of the most important and prominent members of IC like NSA was left out. Apple•w••o••r••m• 15:40, 17 March 2007 (UTC)[reply]
Yes, it's surely included but what can we now do with that information? There's no way to extrapolate the number of employees based on it, which is what this thread was originally about. The questionable part about the 30K is what DAGwyn brings up - is that a full count of govt' employees plus military plus contractors? Or gov't only? Or only civilians? However, going back to my first statement - just because it is not publicly available, doesn't mean it is classified. There is a difference between classification and distribution restrictions. — RevRagnarok Talk Contrib 16:24, 17 March 2007 (UTC)[reply]

I believe that some number should be given, any way. We can't know the exact number, but it's explicitly stated it's estimate. To make a correct statement, one should also declare the accuracy of the estimate. Yet I believe, many readers would be interested to know the rough number. Few care if it's exactly 38,000 or 35,000 or 43,000; but it's sort of useful information that it's not 10,000 and not 100,000. ellol (talk) 20:34, 3 November 2008 (UTC)[reply]

2013

The number has disappeared from the infobox. Some number or range should be given, based on the available estimates. All of this information is not confidential, see here:

Some estimates (with a dead link to a NSA FAQ):

How many people work for the NSA/CSS and what is its budget?
NSA/CSS employs approximately 30,000 people worldwide. The size of the Agency’s budget is not releasable to the public; however, if the NSA/CSS was considered a corporation in terms of dollars spent, floor space occupied, and personnel employed, it would rank in the top 10 percent of the Fortune 500 companies. It is far from true that NSA/CSS has an unlimited "black" budget, unknown by other government entities. While the budget and size of NSA/CSS are classified, these details are known by the Office of Management and Budget, by both the Senate Select Committee on Intelligence (SSCI) and the House Permanent Select Committee on Intelligence (HPSCI), by the Defense Subcommittees of the Appropriations Committees in both houses of Congress, and by the Office of the Director of National Intelligence. Resources allocated to NSA/CSS are subject to rigorous examination and approval processes.
http://www.nsa.gov/about/about00018.cfm#7

-- Petri Krohn (talk) 10:50, 10 May 2013 (UTC)[reply]

Seems reasonable to me, BOLD 30,000. Sephiroth storm (talk) 01:06, 11 May 2013 (UTC)[reply]

Most of the work may in fact be done by private contractors. The number 30 000 means thus nothing. I have heard the number 1 million mentioned recently. See Snowden leak shines light on US intelligence agencies' use of contractors, The Guardian, 10 June 2013 -- Petri Krohn (talk) 04:45, 11 June 2013 (UTC)[reply]

Zero Hedge claims, that 483,000 private individual have "top secret" access to NSA PRISM data. I do not know where they got the number, but if true, all these should be listed as employees or whatever. (Source: From 9/11 To PRISMgate - How The Carlyle Group LBO'd The World's Secrets) Update: The source for the numbers may be this HuffPost story: NSA Leak Highlights Key Role Of Private Contractors -- Petri Krohn (talk) 08:46, 11 June 2013 (UTC)[reply]

Missions

NSA has two distinct missions. One is Information Assurance and the other is SIGINT. I can't find anything on IA on this page. —Preceding unsigned comment added by 69.255.3.211 (talkcontribs)

See STU-I, STU-II, STU-III, and NSA encryption systems along with others in Category:NSA encryption devices. — RevRagnarok Talk Contrib 01:24, 19 April 2007 (UTC)[reply]
I agree with the IP. The SIGINT mission gets too slight stress in article. Maybe subsections should be created instead of listing main articles only. @pple 15:30, 8 August 2007 (UTC)[reply]

Commanders

Why the head of the NSA is military generals ? its not part of the DoD --Jonybond 20:47, 5 September 2007 (UTC)[reply]

NSA/CSS is a component of the DoD. — DAGwyn 17:40, 6 September 2007 (UTC)[reply]

does not redirect

according to the article

"NSA" redirects here. For other uses, see NSA (disambiguation).

but it does not. check it if you don't believe me.

--Kushalt 01:12, 30 October 2007 (UTC)[reply]

Page history shows that "NSA" redirected to this article until 24 October, 2007; "nsa" and "Nsa" still do. Given the quantity of other (wikilinked) uses of the acronym on the disambiguation page, I question its redirection to this article by default, and will add a different notice instead. —Adavidb 05:30, 30 October 2007 (UTC)[reply]
After finding that a far greater number of articles currently link to this article via "NSA", I've reconsidered and will restore the former redirection. —Adavidb 05:44, 30 October 2007 (UTC)[reply]

Menwith Hill

Surely Menwith Hill should be mentioned as a major NSA station. It is huge underground. The surrounding area of North Yorkshire is populated with Americans. It may have as many staff as Fort Meade? I'm surprised the phrase 'Menwith Hill' does not appear in the article. It's mostly only pretending to be an RAF station. --81.105.245.251 00:45, 8 November 2007 (UTC)[reply]

Is there something useful (and verifiable) that would be contributed by such a mention that isn't already covered by the reference in the ECHELON article? If there is no real purpose in it, then it would just be trivia. The NSA article mentions that there are many facilities; it only names one (and that one over some objections) on the basis of the need to have a link to another related article. — DAGwyn 05:35, 9 November 2007 (UTC)[reply]

Very few Americans live around Menwith Hill. Most folks from the U.S. you will meet there are tourists who used to work there before automation took over practically everything.Johnwrd (talk) 02:10, 14 September 2010 (UTC)[reply]

Contradiction

The section Involvement with non-government cryptography appears to contradict articles Data Encryption Standard and differential cryptanalysis; both of these articles claim that the NSA did NOT design the S-boxes for DES, but IBM was already aware of the differential cryptanalysis.

So which is it? I remember that the DES article also used to say that NSA fixed DES's S-boxes. Were the S-boxes in DES changed in the first place, by IBM or NSA? -- intgr [talk] 18:10, 15 November 2007 (UTC)[reply]

I think the section in Data Encryption Standard covers the claims and counter claims.. While some have speculated (and Alan Konheim has claimed) that the NSA (re)wrote the DES S-boxes, there are others who deny it. I've edited the section to hopefully avoid making an assertion in one direction or the other. — Matt Crypto 19:13, 15 November 2007 (UTC)[reply]
Unfortunately, details of NSA involvement in DES development remain classified (at least they were when I last checked a few years ago). I will say that NSA employees did not "design the S-boxes", but they did have some influence over their design. Also that the publicly known "differential cryptanalysis" methodology is but one form of a class of similar methods of attack, and that it is therefore misleading to apply the current usage of the term to the historical situation. I restored the original text, with a clarification, because it is needed to counter the accusation. — DAGwyn 21:16, 15 November 2007 (UTC)[reply]
I've tweaked it a bit further, simply because the extent of NSA's influence in the design of the S-boxes is not known, or even if there was any influence, because Tuchman has stated, "We developed the DES algorithm entirely within IBM using IBMers. The NSA did not dictate a single wire!" — Matt Crypto 21:41, 15 November 2007 (UTC)[reply]
But what you seem to infer from Tuchman's statement has been contradicted by other IBM DES developers. For example, the Data Encryption Standard article quotes Konheim as saying, "We sent the S-boxes off to Washington. They came back and were all different." Also, the United States Senate Select Committee on Intelligence review reported that "NSA ... indirectly assisted in the development of the S-box structures". Keep in mind that (a) the right hand doesn't always know everything that the left hand is doing; (b) even though IBM staff did the work, they were influenced by NSA advice; and (c) often, public statements are misleadingly worded. The speaker can easily believe that there is a difference between "changing the design of the algorithm" and "suggesting changes to the S-box tables to work more effectively within the given design"; also between "dictate" and "suggest". You have to consider that to reconcile Tuchman's comments with the other sources. I'll look at your tweaks and if necessary further adjust them. — DAGwyn 22:55, 15 November 2007 (UTC)[reply]
I'm not saying that I believe the NSA had no involvement with the S-boxes (to me, it seems they must have had at least some role, and I don't disagree with your reconciliation of Tuchman's comments). It's just that I feel the sources are not clear enough for us to come down definitively one way or the other on Wikipedia. I think the current version is a reasonable take on it, as at DES. — Matt Crypto 19:26, 16 November 2007 (UTC)[reply]

What's the NSA been known to have done first?

What's the NSA been known to have done first? I believe I read an article a couple years ago about how the NSA had created something that was pretty much the same as PGP about 10 years before it was created publically. They were now declassifying that information and allowing the employee that had originally created it to say what he'd done (since he was retiring) -- the employee was hoping for some recognition for what he'd done. EDIT: found a CNN story that said that the UK said that they'd created public-key encryption first. I swear that I saw a bunch of news articles about the NSA creating it first, though. 97.93.88.4 (talk) 09:14, 12 August 2008 (UTC)[reply]

Since GHQ and NSA have a close relationship, the development reached people in both organizations fairly quickly. For the most part, NSA's tasks did not benefit from public key encryption, so they didn't make much use of it. NSA has produced numerous innovations, including contributing to development of computing technology, but many developments remain classified, for fairly obvious reasons. — DAGwyn (talk) 22:44, 14 August 2008 (UTC)[reply]

Alleged Illegal Activity of the NSA

Since the ACLU has been trying for ages to counter the violations of constitutional rights allegedly done by the NSA I have knowledge concerning this and would be happy to provide it. The following are examples that I know of and for your consideration. You can then determine whether there is any value for including what the ACLU considers an issue for our constitutional rights.

All of these examples concern my writing in on-line science sites that were concerning my writing of 14 science descriptions that proved evolution is scientifically impossible. Another writing of mine was in proving undeniably that Einstein's special relativity is false science. The point in mentioning this is to show the science had absolutely nothing to do with national security.

The first example was where I had found on a Hubble telescope image of Orion that there was a previously unknown planet in the zoomable image. I described this science point on a science site where I was being viciously countered by a leader having the name of WWSCD and six others under that leader. (I later found out WWSCD is World Wide Senior Catastrophe Director of the NSA)
The point is that within 24 hours of when I had written the planet's location the planet had been digitally erased from the picture. The hole was an irregular oval and they patched in a piece of background. You could even see the rough edges of the patch before they soon touched up the edge cut.
The second was another suppression of the science that occurred again within 24 hours. This one was on a Gould astronomy picture that was submitted in the American Astronomy meeting in June 2007.
The picture was described as capturing the light of never-getting-before far-distant stars that were at extreme distances. In other words the stars in the picture background were those supposedly distant stars. The problem in the thinking was that there was an eight-star special grouping of stars that was in a vertical, shriveled football-like shape that was shown on the right side in the foreground. The specific problem is that the same exact grouping of stars was also shown in a much smaller location in the right-side background. That back grouping was at the perfect perspective line location required for the size and back location. In other words the back group was an image of the same exact group of stars.
This picture had the back group digitally changed to no longer match at all.
A third attempt at suppression occurred several times over three years with one of those providing the proof. That was on a day when I was writing science descriptions and, like always, during especially interesting science my telephone would ring in mid-paragraph. On this particular time I noticed a message had been recorded on my answering machine and that call was the only one coming in for the morning.
My procedure when calls came in was that I would stop typing after the ring, then look at the caller ID, and then if the caller is unknown I would go back to typing. The recording was (from a person farther away from the phone) “He stopped typing”. After about three seconds (the same person) “He’s started again”. (A person at the phone) An exasperated sigh from my not answering any of their hundred or so calls.
I won't include the fourth provable proof of this, but in conclusion here I will share the following. Who could have enough ability and "pull" to get those pictures digitally altered in lying science within 24 hours? And, why would non-national security science be attacked?
So, if you are interested I would be glad to write these in a section concerning illegal activity of the NSA. — SteveCrum 17:00, 20 November 2008 (UTC) —Preceding unsigned comment added by 63.26.57.136 (talk) [reply]
By the way, do I need to have the above published in the "NSA Gazette" first? And, I would like to mention that even when I sign in the red signed-in name, etc. at the top of the page disappears as soon as I go to any page after signing in. All later pages have a blue, sign in/create account wording shown. — SteveCrum 19:00, 20 November 2008 (UTC) —Preceding unsigned comment added by 63.26.181.181 (talk) [reply]


HA! You realize that NSA can do whatever they want right? Technically while on that base you have NO rights AT ALL.:D (talk) 22:51, 15 February 2011 (UTC)[reply]

You would need Reliable Sources to confirm. Sephiroth storm (talk) 22:43, 16 February 2011 (UTC)[reply]

What do we exactly mean with the word foreign?

Hi there,
it appears that in this wikipedia article the word foreign has never been singularly hyperlinked.
What do you guys think about hyperlinking it with Alien (law)?
Thanks for your attention.
Maurice Carbonaro (talk) 09:40, 19 February 2009 (UTC)[reply]

Se-Linux

Se-Linux should be mentioned. I saw the first argument for its removal, however, SE-Linux is not useless fluff, it is one of the few US Government technologies released into the open source community, and is now part of the Linux kernel. Sephiroth storm (talk) 01:54, 2 July 2009 (UTC)[reply]

I think there are sources online for example on the NSA site that you could use to add this. -SusanLesch (talk) 03:54, 2 July 2009 (UTC)[reply]

JFK HUSTLER

POL DIPLOMATIC DAI SU' QUA'N 107 POL POLITICAL COAST IVORY COATL FR A JUSTICE FR ALL IS A ATILA. ALEXANDER. vedette-ANDERSEN MB-Mo.o euro € MY TIME IS NOW ATTENTLY TO THE END FR ME... And I hope this last Num —Preceding unsigned comment added by 88.185.121.142 (talk) 17:05, 7 October 2009 (UTC)[reply]

Question

Does reading the NSA article trigger the NSA to open a file on me? (If one isn't already open...) If so should a warning be given to people before they access the article? —Preceding unsigned comment added by 86.138.221.218 (talk) 20:38, 30 March 2010 (UTC)[reply]

I'm afraid the NSA is busy with other things at the moment. Sephiroth storm (talk) 22:55, 30 March 2010 (UTC)[reply]

U.S.S. Liberty

One theory on the Mission of U.S.S. Liberty was that Liberty was monitoring the movements and locating Tank Squadron locations in the 6 Day War, (hence her dangerously close location to the War Zone). The Liberty was said to be a N.S.A./U.S.Navy Ship. Liberty could pick up Tank Radio Transmissions, and with other Stations could pin point their location using Radio Triangulation.Johnwrd (talk) 02:28, 14 September 2010 (UTC)[reply]

Criticisms

Only 1? Lol. Come on. —Preceding unsigned comment added by 83.49.179.37 (talk) 00:27, 29 October 2010 (UTC)[reply]

NSA redirects here?

Looking at the disambig page there are 30 other uses for NSA, 2 of which are the same agency for different countries (U.S. and Norway), one of which is Poland's version of the supreme court, and one of which is a NATO agency. Why would it redirect here instead of being a disambig page? — Preceding unsigned comment added by 174.95.17.119 (talk) 22:48, 23 June 2011 (UTC)[reply]

This NSA is the most commonly referred to NSA in the Anglosphere, by quite a large margin. I assume that is why NSA doesn't redirect to a disambiguation page. I'm not sure I agree that's right though. 78.86.61.94 (talk) 11:58, 20 July 2012 (UTC)[reply]

I would tend to agree with the second IP editor. Sephiroth storm (talk) 12:51, 21 July 2012 (UTC)[reply]

June 24 Intro edits

Edited introduction. According NSA.gov the agency mission also includes information assurance and research. Also naming one type of intel (HUMINT) the NSA doesnt produce isn't useful (Why not say the NSA doesnt produce IMINT, etc.). The first paragraph clearly states the NSA produces SIGINT. — Preceding unsigned comment added by 76.100.72.101 (talk) 13:56, 24 June 2011 (UTC)[reply]

"No Such Agency"

Would it be OK to insert and cite the old acronym "No Such Agency" in the heading area? Between the 70's and 90's it was a long-running sarcastic joke. Foxyshadis(talk) 09:56, 9 September 2011 (UTC)[reply]

It pulls up in Google Maps, so the joke is still going on to a certain degree. That said, find a reliable source. VernoWhitney (talk) 18:57, 11 September 2011 (UTC)[reply]
The New York Times is reliable so I added that. -SusanLesch (talk) 19:11, 11 September 2011 (UTC)[reply]
Indeed. VernoWhitney (talk) 19:16, 11 September 2011 (UTC)[reply]
I think it's even in David Kahn's book from 1967, so the joke is quite old. Need to check, though. Nageh (talk) 20:28, 11 September 2011 (UTC)[reply]

I checked in Kahn's book, he used the 'Never Say Anything' on page 690 but I didn't find a specific use of 'No Such Agency'. I suspect all the alternate names for the initials go back farther than any source we'd find anyways. Japenfold (talk) 01:30, 3 October 2011 (UTC)[reply]

Ranks

The article states that the NSA is headed by a senior military officer. Are his subordinates also military personnel? As in, would the mathematicians have military ranks? 78.86.61.94 (talk) 11:55, 20 July 2012 (UTC)[reply]

NSA is a DoD civilian agency. The Central Security Service staff's the NSA with military personnel. The civilians would not have military ranks. Sephiroth storm (talk) 12:56, 21 July 2012 (UTC)[reply]

Refimprove

I look at some of the sections like Echelon and find a lack of citations. I am tagging the article Refimprove by paragraph until they are found. One for example was sourced to cryptome.org, which, with all due respect to a private citizen, is not the same thing as NSA. -SusanLesch (talk) 14:42, 15 June 2013 (UTC)[reply]

A correction. Cryptome was good enough source for 60 minutes so it was good enough here. This section has been trimmed way back because James Bamford was quoted as saying that Echelon is a legacy system. I think more of this stuff should go into the Echelon article than here. -SusanLesch (talk) 20:39, 15 June 2013 (UTC)[reply]

Rules of NSA on using data without warrant

I found this source:

Where does it go?

Also another:

WhisperToMe (talk) 05:01, 21 June 2013 (UTC)[reply]

NSA fact sheet regarding privacy corrections and response from Udall and Wyden

Sources about the NSA fact sheet regarding privacy corrections and response from Udall and Wyden:

WhisperToMe (talk) 06:54, 25 June 2013 (UTC)[reply]

About the deletion:

WhisperToMe (talk) 14:35, 30 June 2013 (UTC)[reply]

Additional NSA sources

Also, applicant timeline:

WhisperToMe (talk) 22:20, 25 June 2013 (UTC)[reply]

May I ask, what is the purpose of this list? Thanks in advance. -SusanLesch (talk) 01:21, 13 July 2013 (UTC)[reply]
In case someone wants to write more about the NSA, there are some additional sources, easily accessible, which a Wikipedian may use. WhisperToMe (talk) 22:09, 25 July 2013 (UTC)[reply]

Do the NSA headquarters "include" the National Vigilance Park and the Cryptologic Museum?

The NSA picture gallery here includes the National Vigilance Park and the Cryptologic Museum. Are they "on" NSA property? If so I would include them in the NSA headquarters commons category. WhisperToMe (talk) 21:54, 26 June 2013 (UTC)[reply]

They are across the street. The Park is next to an overflow parking lot, and the Museum is at the end of the road. I don't think of them as being on NSA grounds (which is mostly parking lot), just another part of Fort Meade. Kendall-K1 (talk) 00:24, 30 June 2013 (UTC)[reply]
You turn left just before the NSA gate to get to both. The park area area is used as overflow parking for NSA staff, who walk through the gate to get in. There are signs warning visitors to avoid taking pictures in the direction of the NSA buildings, and the area is monitored. Acroterion (talk) 01:39, 30 June 2013 (UTC)[reply]
Thank you. I started a category on the Nat'l Vigilance Park to place PD NSA images taken from the NSA website. WhisperToMe (talk) 10:57, 30 June 2013 (UTC)[reply]

Legacy systems

Hi. I wonder if anyone here can please check over the list of NSA encryption systems to correct a division I just made. Are some still in use or are we carrying forward a lot of old electronics? Thank you in advance. -SusanLesch (talk) 15:13, 1 July 2013 (UTC)[reply]

Also is Fortezza still used, and how did it transition to USB? -SusanLesch (talk) 15:23, 1 July 2013 (UTC)[reply]

NSA exit signage

Here are some highway signs for the NSA:

WhisperToMe (talk) 20:29, 1 July 2013 (UTC)[reply]

Polygraph section

I've removed the polygraph section under "operations." There are several problems.

1. Polygraphing isn't really an "operation" in the sense that a reader would expect (it has nothing to do with SIGINT/COMSEC, just recruitment).

2. The section is far too long. There's more written about polygraphing than about the actual mission of the organization. That's ridiculous.

3. The sources quoted aren't very good.

I'd recommend discussing the polygraph in its own article (or maybe the single scope background investigation article) and linking to that from here. 68.32.165.35 (talk) 01:46, 6 July 2013 (UTC)[reply]

Welcome to Wikipedia! I wrote the particular section discussed (you can see it here) anyhow, a few things:
  • 1. While polygraph has its own article, there are specific aspects to the NSA's polygraphing (particularly the video that the NSA made--this indicates the polygraph is an important component of the NSA) - Based on the sources I read different agencies consider their polygraphs to be separate. Polygraphs can be specific by agency, i.e. the Department of Energy had issues when it tried to establish polygraphs.
  • 2. The sources are in fact what Wikipedia determines to be high quality sources (see WP:V for more information).
  • 3. In regards to it being "too long" while there is the need to not have "undue weight" on any aspect (WP:Undue weight) the thing to do is to shorten it instead of removing it entirely.
WhisperToMe (talk) 02:10, 6 July 2013 (UTC)[reply]
1. It certainly doesn't belong under the "operations" heading. As far as being an "important component of the NSA," I don't think that has been established. It's a single part of the recruitment process.
2. I wouldn't consider anything coming out of antipolygraph.org to be reliable (polygraphs are nonsense, but that's neither here nor there).
3. Since you're the author, I think it would be better for you to shorten it. I don't think it should be there in the first place, but I'm willing to compromise. 68.32.165.35 (talk) 02:27, 6 July 2013 (UTC)[reply]
  • 1. It's "make or break" part of the recruitment process that causes a lot of anxiety in applicants (part of why the NSA made this video and why newspapers have written articles about the NSA polygraphs) and people in the NSA are re-tested every several years, so people already in the NSA also have to deal with it.
  • 2. The major newspapers are actually the sources, and whatever statements that are from anti-polygraph or Maschke are attributed to them. The newspapers believe they are important "critical" voices in regards to the polygraph debate.
  • 3. What section would be a better place for the "polygraph" sub-heading?
  • 4. To help determine what should be shortened, what aspects of this section do you consider the most unimportant?
WhisperToMe (talk) 02:40, 6 July 2013 (UTC)[reply]
That's way past Undue. 3 'graphs on something so trivial? Without even a mention (that I could see) of its use as a security check measure? For something so minor to get more attention than the warrantless surveillance & Internet data capture is absurd. At best, it deserves a couple of lines under "recruitment", & a passing mention (one sentence) under "security measures". TREKphiler any time you're ready, Uhura 03:50 & 03:51, 6 July 2013 (UTC)~[reply]
1. The NSA warrantless surveillance & Internet data capture programs all have separate articles where "excess" information can go. No such article currently exists for "What role polygraphs have in the NSA". There is a reason why {{mainarticle|}} exists. Alternatively one can just add more summary detail to the sections on warrantless surveillance & Internet data capture programs. - Also regarding "Without even a mention (that I could see) of its use as a security check measure? " - Visiting the polygraph article says what it is, and AFAIK it also says intelligence agencies use it. I found a source that does talk about why NSA polygraphs (it officially states that it's to prevent spying, and to find things that may be used to coerce people into giving up secret stuff)
2. The sources about NSA polygraphs do not think of them as a "trivial" part of the agency. Let's look:
Shankar, Vedantam. "Polygraph Test Results Vary Among Agencies." Washington Post. June 19, 2006.
Referred to in: "Polygraph abuse at CIA, NSA." ZDNet. June 20, 2006.
  • Flock, Elizabeth (September 25, 2012). "NSA Whistleblower Reveals How To Beat a Polygraph Test". US News and World Report. Retrieved July 2, 2013. {{cite news}}: Italic or bold markup not allowed in: |work= (help)
  • Stein, Jeff. "NSA lie detectors no sweat, video says." Washington Post. June 14, 2010.
  • Nagesh, Gautham (June 14, 2010). "NSA video tries to dispel fear about polygraph use during job interviews". The Hill. Retrieved June 15, 2013.
  • Not to mention the 1983 report saying "It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."
3. NSA employees routinely take polygraphs (they are reinvestigated every 5 years) so it's a periodic operation and not just recruitment
4. Another indication that it's not trivial for a government agency to have this section is that when polygraphs were proposed for the Department of Energy, many employees protested. (see this Salon source)
5. And another indication that it's not trivial for this article: When Ronald Reagan proposed that his cabinet members get polygraphs in 1985, George Shultz threatened to resign. He said "Management through fear and intimidation is not the way to promote honesty and protect security." (Source: Science Magazine)
WhisperToMe (talk) 04:31, 6 July 2013 (UTC)[reply]

After doing some digging I found sources that discuss practical applications of the polygraph at the NSA. So here is the "biggest possible" paragraph on NSA polygraphs:

The NSA conducts polygraph tests of employees. For new employees, the tests are meant to discover enemy spies who are applying to the NSA and to uncover any information that could make an applicant pliant to coercion.[1] As part of the latter, historically EPQs or "embarrassing personal questions" about sexual behavior had been included about the NSA polygraph.[1] The NSA also conducts five year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs. In addition the NSA conducts aperiodic polygraph investigations in order to find spies and leakers; those who refuse to take them may receive "termination of employment", according to a 1982 memorandum from the director of the NSA. There are also "special access examination" polygraphs for employees who wish to work in highly sensitive areas, and those polygraphs cover counterintelligence questions and some questions about behavior.[2] NSA's brochure states that the average test length is between two and four hours.[3] NSA polygraphing is, as of 2006, a separate process from polygraphs in other federal agencies. In 2006 Tara Wilk, a computer engineer from Arnold, Maryland quoted in the Washington Post, said "The CIA doesn't respect the NSA's polygraph and the NSA doesn't respect the CIA's polygraph. Nobody knows who the boss is, and they all think they are the most important."[4] A 1983 report of the Office of Technology Assessment stated that "It appears that the NSA [National Security Agency] (and possibly CIA) use the polygraph not to determine deception or truthfulness per se, but as a technique of interrogation to encourage admissions."[5] Sometimes applicants in the polygraph process confess to committing felonies such as murder, rape, and selling of illegal drugs. Between 1974 and 1979, of the 20,511 job applicants who took polygraph tests, 695 (3.4%) confessed to previously undetected felony crimes.[1]

In 2012 Russell Tice, a former NSA employee who worked there for 20 years and took between 12 and 15 polygraphs, said that as time went on the polygraphs became less stringent.[6] Tice accused the NSA of using polygraphs to "gather very personal information on them that they can use to blackmail them into participating in illegal and unethical conduct."[6] He also stated that the NSA "routinely uses polygraphs to terrorize the rank and file of NSA employees".[6] George Maschke, a former U.S. army reserve captain who founded the organization AntiPolygraph.org, criticizes the NSA polygraph process and states that its intended use is being a "psychological tool of coercion."[6] Vanee Vines, an NSA spokesperson, said that "In making these eligibility determinations, NSA complies with the personnel security investigative standards and procedures as outlined in various Intelligence Community directives and policy guidance memoranda."[6]

The NSA began requiring contractor employees to take polygraph tests in 1957.[2] James Bamford stated that in the 1950s and early 1960s, as paraphrased by Craig P. Bauer, author of Secret History: The Story of Cryptology, the agency received a "black eye" because it used a lot of EPQs during the polygraph process; Bamford wrote that the EPQs "bear little relationship to the person's honesty or patriotism."[1] In 1982 military personnel assigned to the NSA were now required to take polygraphs after a spying scandal occurred at the Government Communications Headquarters. In addition, the five year counterintelligence polygraph for employees and the aperiodic polygraphs had also been established at that time.[2] In 2010 the NSA produced a video explaining the polygraph process.[7] The video, ten minutes long, is titled "The Truth About the Polygraph" and was posted to the website of the Defense Security Service. Jeff Stein of the Washington Post said that the video portrays "various applicants, or actors playing them -- it’s not clear -- describing everything bad they had heard about the test, the implication being that none of it is true."[8] The persons in the video describe the process as "calm, quiet, comfortable".[8] Stein argues that "All of which is quite at odds with the experience many test subjects -- and polygraphers themselves -- have related over the years."[8] AntiPolygraph.org argues that the NSA-produced video omits some information about the polygraph process; it produced a video responding to the NSA video.[7] Maschke accused the NSA polygraph video of being "Orwellian".[8]

References

  1. ^ a b c d Bauer, p. 359.
  2. ^ a b c Bamford, Body of Secrets, p. 538.
  3. ^ "Your Polygraph Examination: An Important Appointment to Keep" (PDF). National Security Agency. Retrieved June 17, 2013.
  4. ^ Vedantam, Shankar. "Polygraph Test Results Vary Among Agencies." Washington Post. June 20, 2006. p. 1. Retrieved on July 3, 2013.
  5. ^ McCarthy, Susan. "The truth about the polygraph." Salon. Thursday March 2, 2000. Retrieved on July 5, 2013.
  6. ^ a b c d e Flock, Elizabeth (September 25, 2012). "NSA Whistleblower Reveals How To Beat a Polygraph Test". US News and World Report. Retrieved July 2, 2013. {{cite news}}: Italic or bold markup not allowed in: |work= (help)
  7. ^ a b Nagesh, Gautham (June 14, 2010). "NSA video tries to dispel fear about polygraph use during job interviews". The Hill. Retrieved June 15, 2013.
  8. ^ a b c d Stein, Jeff. "NSA lie detectors no sweat, video says." Washington Post. June 14, 2010. Retrieved on July 5, 2013.

References:

Please use cite templates

Hello all. I would appreciate it if other editors here, including User:WhisperToMe, would please use citation templates like "cite news", "cite book" and "cite web" for any additions you make to this article from now on. I counted the refs here and came away with more templates than not. If this article is ever going to advance to B-class or GA, the refs will need to match. Thank you. -SusanLesch (talk) 14:32, 6 July 2013 (UTC)[reply]

I took a look at the page. For this article I'm fine with using citation templates :) WhisperToMe (talk) 17:22, 6 July 2013 (UTC)[reply]

NSA Security manual, dated 1994, posted to Usenet

Not sure what use this is, but I found something from Usenet:

WhisperToMe (talk) 00:13, 9 July 2013 (UTC)[reply]

Sources needed

We need reliable sources for present or past NSA stations in Morwenstow, United Kingdom; Geraldton, Pine Gap and Shoal Bay, Australia; Leitrim and Ottawa, Canada; Misawa, Japan; and Waihopai, New Zealand. Anyone? Two UK papers are sources for UKUSA Agreement but they don't mention locations. Glad to have a specific area for improvement (and to confirm that my change to B class was premature). I completely forgot about UKUSA during other work on this article. -SusanLesch (talk) 14:38, 11 July 2013 (UTC)[reply]

Polygraph video content and archives

This is a listing of content related to the polygraph video:

WhisperToMe (talk) 06:42, 16 July 2013 (UTC)[reply]

Citation needed

To Fred Bauder. In section National_Security_Agency#Data_mining, I marked "citation needed" for the conclusion of a long sentence: "the comprehensive world-wide mass archiving of communications which NSA is engaged in as of 2013". Where did you get this idea? As I recall, it is not stated in Greenwald's article. -SusanLesch (talk) 15:29, 16 July 2013 (UTC)[reply]

I think it is, "collect it all", the central theme of Greenwald's posting would seem to refer to that. User:Fred Bauder Talk 02:58, 17 July 2013 (UTC)[reply]
The quotation in the reference is "The crux of the NSA story in one phrase: 'collect it all': The actual story that matters is not hard to see: the NSA is attempting to collect, monitor and store all forms of human communication" Whether that is true, it seems to be what Greenwald believes. User:Fred Bauder Talk 03:05, 17 July 2013 (UTC)[reply]
I'll try to edit that sentence. There is a difference between "all forms of" and "all". All forms could just mean a list of types (something like touch, sight, audio; or voicecalls, voicemail and email) that doesn't exclude any others (say, like NSA can't hear voice calls). All forms could be within the law, while an unqualified all certainly is not. -SusanLesch (talk) 14:25, 17 July 2013 (UTC)[reply]
Ok, I have no idea; however, that building in Utah will hold a lot... I would think anything electronically transmitted or stored on a computer connected to the internet could be intercepted in some way. User:Fred Bauder Talk 16:46, 17 July 2013 (UTC)[reply]

If I May Defend Most NSA Employees

I think there is a great deal more information that the article could cover about the NSA and its activities (legal as well as potentially treasonous) and much of it would be contentious and lacking the ability to appear NPOV. However if I may, I would like to suggest an addition to the article which covers the fact that not every NSA employee is a willing accomplice in these latest Snowdon criminal exposures, and the agency employees themselves are overwhelmingly against the crimes that the Bush/Obama regimes are committing against the citizens of the United States. The article should at least give mention to that fact or, bare minimum, provide an external link to the reference supporting that fact.

I would like to suggest some commentary which includes Crypto-Gram Newsletter July 15, 2013 -- (section Pre-9/11 NSA Thinking) and if you're in the security and/or intelligence arena, you are already familiar with Bruce Schneier who has worked in the infrastructure for many decades, producing said newsletter as time and opportunity permits, providing a summary of events related to the U.S. intelligence industry -- so his credentials check and he has legitimacy.

Specifically within the "CRYPTOLOG" newsletter passed within and among the NSA employees there are a number of statements by employees which lament their role in committing these crimes against our country, more so putatively in a time of war. They lament becoming the bad guys violating our citizen's rights, freedoms, and liberties when the NSA is putatively supposed to be defending them; it is not pleasant for most of the NSA employees to be involved no matter how obliquely.

Pre-9/11 NSA Thinking
Specifically, the focus is on the potential abuse of the Government's applications of this new information technology that will result in an invasion of personal privacy. For us, this is difficult to understand. We *are* "the government," and we have no interest in invading the personal privacy of U.S. citizens.
When I asked Hayden about the agency's capability for unwarranted spying on private citizens -- in the unlikely event, of course, that the agency could somehow get the funding, the computer scientists, and the knowledge to begin making sense out of the Internet -- his response was heated. "I'm a kid from Pittsburgh with two sons and a daughter who are closet libertarians," he said. "I am not interested in doing anything that threatens the American people, and threatens the future of this agency. I can't emphasize enough to you how careful we are. We have to be so careful -- to make sure that America is never distrustful of the power and security we can provide."

When history pens the final draft of the Bush/Obama regime's crimes against the United States, it should be noted that not every NSA employee went along willingly, and despite working for an agency that has in effect sided with the enemies of the United States, it was (1) a gradual thing and (2) the crimes were highly compartmentalized at the start and (3) when employees learned of the crimes they did so in an economic environment where finding another job is virtually impossible, not offering opportunities for them to quit the criminal agency. Damotclese (talk) 01:44, 17 July 2013 (UTC)[reply]

There is a complete lack of information on the NSA mind control, Remote Neural Monitoring, ...

... Electronic Brain Link, Remote Nerve/Brain Stimulation, synthetic telepathy, directed energy weapons, and radar or electromagnetic imaging capabilities on Wikipedia.

In all the Wikipedia articles on the NSA and US government, there is no information on the satellite or remote sensor installation which facilitate the governments deployment of NSA mind control, Remote Neural Monitoring, Electronic Brain Link, Remote Nerve/Brain Stimulation, synthetic telepathy, directed energy weapons, and radar or electromagnetic imaging capabilities. This technology is in it's prime, police have access to it nationwide, and articles exist about it's existence. But all of the official Wikipedia pages are lacking in any information on the subject. I suspect someone needs to edit in some information to cover this area of technology and the controversy of it's use. I also suspect heavy censorship and lack of information being provided by the police and government about it. There was an old article on Wikipedia about synthetic telepathy, but an edit war essentially made Wikipedia shut it down (all that's left is the medical grade brain computer interface article).

Here is a circulating document from 2006 on the technology. Enough information exists that there needs to be some mention of it in official articles. This system appears to be the backbone for the NSAs intelligence gathering and communication systems. It is being used not just without warrants, but in complete secrecy, likely because of the illegality of it's use. It allows all the information in the human brain and body to be observed and recorded remotely, what a person sees, hears, thinks, feels, dreams, all information stored in the mind including passwords and history is available to police, NSA, CIA, FBI, and government personnel.

Is the NSA Conducting Electronic Warfare On Americans?

Jonas Holmes May 19, 2006 CHRONICLE ARTICLE

Russ Tice, former NSA intelligence officer and current Whistleblower, was to testify before the Senate Armed Services Committee this week. Apparently the testimony, Mr. Tice wanted to give, makes General Hayden’s phone surveillance program look like very small potatoes. Mr. Tice’s testimony is expected to reveal further illegal activity overseen by General Michael Hayden which even loyal and patriotic NSA employees view as unlawful. I think the people I talk to next week are going to be shocked when I tell them what I have to tell them. IT’S PRETTY HARD TO BELIEVE, Tice said. I hope that they’ll clean up the abuses and have some oversight into these programs, which doesn’t exist right now. According to Mr. Tice, what has been disclosed so far is only the tip of the iceberg. What in the world could Russ Tice be talking about! To figure it out let us take a look at Russ Tice’s work at the NSA.

According to the Washington Times and numerous other sources, Mr. Tice worked on special access programs related to electronic intelligence gathering while working for the NSA and DIA, where he took part in space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. Special Access Programs or SAPs refer to Black Budgets or Black Operations. Black means that they are covert and hidden from everyone except the participants. Feasibly there would be no arena with a greater potential for abuse and misuse than Special Access Programs. Even now Congress and the Justice Department are being denied the ability to investigate these programs because they don’t have clearance. To put it in CNN’s Jack Cafferty’s words a top secret government agency, the NSA, the largest of its kind in the world, is denying oversight or investigation by the American people because investigators lack clearance. To add a layer of irony to the Black Ops cake this travesty is occurring in America, the supposed bastion of Freedom and Democracy, which we are currently trying to export to Iraq.

It just gets scarier. The Black Ops that Mr. Tice was involved in related to electronic intelligence gathering via space systems communications, non-communications signals, electronic warfare, satellite control, telemetry, sensors, and special capability systems. For greater insight as to the impact of these programs readers should review decades old FOIA authenticated programs such as MKULTRA, BLUEBIRD, COINTELPRO and ARTICHOKE. Radar based Telemetry involves the ability to see through walls without thermal imaging. Electronic Warfare is even scarier if we take a look at the science. NSA Signals Intelligence Use of EMF Brain Stimulation. NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950's, which included neurological research into "radiation" (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as "Radiation Intelligence," defined as "information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation." Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in the brain continuously. The NSA records and decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.) For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject's verbal thoughts. RNM can send encoded signals to the brain's auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia. Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject's brain and show images from the subject's brain on a video monitor. NSA operatives see what the surveillance subject's eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject's brain while they are in R.E.M. sleep for brain-programming purposes. Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA's domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and SABOTAGE OF TENS OF THOUSANDS OF UNWITTING CITIZENS by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health. National Security Agency Signals Intelligence Electronic Brain Link Technology NSA SigInt can remotely detect, identify and monitor a person's bioelectric fields. The NSA's Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain. Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called "evoked potentials." Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding "evoked potential" or set of "evoked potentials." The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject's brain. NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level). EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain's neural circuits. EMF Brain Stimulation can also change a person's brain-states and affect motor control. Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain). Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community. RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in that specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation: Brain Area Bioelectric Resonance Frequency Information Induced Through Modulation Motor Control Cortex 10 Hz Motor Impulse Co-ordination Auditory Cortex 15 Hz Sound which bypasses the ears Visual Cortex 25 Hz Images in the brain, bypassing the eyes Somatosensory Cortex 09 Hz Phantom Touch Sense Thought Center 20 Hz Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible. Each person's brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person's brain at the frequency of another person's auditory cortex would result in that audio information not being perceived. Additionally, A 1994 congressional hearing reported that nearly half a million Americans were subjected to some kind of cold war era tests, often without being informed and without their consent. In addition, experimentation law is well grounded in constitutional and international law. It is an under-reported fact that two major reports on human rights and torture in the U.S. recently listed illegal radiation experiments. Many more facts are documented below. Therefore, human research subject protections should be a high priority and are just as significant as current issues of torture and illegal wiretapping. IT IS TIME FOR AMERICA TO WAKE UP. It is time for America to protect its Whistleblowers who are our last line of defense against dictatorship and despotism. It is time for America to take responsibility for oversight of its tax dollars and elect leaders who will assume such responsibility now. Yes, the war on terrorism is important. It is even more important and fearful if the terrorism is from within and unknowingly funded by hard working American citizens. There is no Special Access Program beyond the oversight of political leaders elected by the people and for the people. If these political leaders jeopardize national security then that shall be handled in a court of law. But to tell America, to tell the American people, to tell the political leaders elected by the American people that America does not deserve to know what happening in the NSA’s dark, black rooms, with billions of dollars, behind closed doors, when we know that privilege has already been abused; that is the true definition of TERRORISM. That is the true definition of Communism and a Police State, no oversight. So fellow Americans, you may hem and haw in the face of truth but know that one day you will realize that your country has been USURPED from the very principles upon which it was founded.

Godspeed, Russ Tice, the Patriots are with you.

"[A]ll of the official Wikipedia pages are lacking in any information on the subject" because all reliable sources are lacking in any information on the subject. — Arthur Rubin (talk) 05:56, 20 July 2013 (UTC)[reply]
"because all reliable sources are lacking in any information on the subject" not true. there is nearly millions of websites on the subject, information on how neurons can be read remotely and manipulated remotely, patents, laws, and research. information can be found at http://www.mindjustice.org/ and many other websites. RNM is a classified NSA project with tons of people who allege it to exist, and the basic principles of synthetic telepathy are even better established. there are also tons of victims worldwide of it's alleged use, with tons of reports on the technology and it's use. also, see the old Wikipedia article 'synthetic telepathy' - information exists that was once on Wikipedia, before Wikipedia censored it and took it offline. Wikipedia is void on details due to government censorship and attacks to the Wikipedia pages by people who are misinformed on the subject matter, or wish to control and hide the information. http://www.indymedia.org.uk/en/2010/05/451768.html what I want to see is someone create a research article based on the information in the Wikipedia electromagnetism, electron, and electric charge articles, describing how neurons emit radio frequencies, and how microwaves and other electromagnetism can be used to stimulate ion channels and other parts of the nerves remotely. this is what allows remote non invasive brain computer interfaces like RNM/EBL to work. this would be perfect complements to Wikipedia and finally explain in detail how all this nonsense works, without the need to rely on data we cannot obtain from the government directly.
You call http://www.oregonstatehospital.net/ or http://www.mindjustice.org/ reliable? Not in the real-world sense, and not in the Wikipedia sense. As for http://www.indymedia.org.uk/en/2010/05/451768.html , the article Synthetic telepathy, although having little content sourced to anything, was properly merged into Brain–computer interface. If there were reliable sources, information could be added to that article. — Arthur Rubin (talk) 19:09, 20 July 2013 (UTC)[reply]
Cheryl Welsh the director of mindjustice.org is listed as one of six mind control/non-lethal weapons experts in the world by the * United Nations. Yes everything on their website is credible and a proper source of reference, per Wikipedia's standards. mindjustice.org also references books, newspaper articles, and literature, and laws, all very good sources of information on this. did you happen to see the Russian Research section, complete with full copy of the Russian law on this? they also have tons of interviews with PhD doctors and neurologists on the subject. the Synthetic Telepathy article that was removed from Wikipedia also references several patents, and research pieces related to this technology in the USA. There are laws, and patents related to this. None of this is in the Wikipedia Brain Computer Interface article, nothing from it was merged. All that is left is a reference to the militaries investment into the technology and research, which seems to be largely outdated misinformation. It has also been deleted and removed from the article several times, meaning people keep removing the information rather than building on top of it. I actually posted these links in hopes that someone would include or amend the articles with this information. You are ignorant, you keep claiming all this is "irrelevant" and "no good sources of information exist" while ignoring the research and information provided. as far as I am concerned, your statements are irrelevant. I am providing this just for another Wikipedia'er to evaluate and hopefully build on. — Preceding unsigned comment added by Togiff (talkcontribs) 12:07, 23 July 2013 (UTC)[reply]
That is not an official UN document, even if it had been hosted on UN web sites. (The link on the mindjustice page is broken. ) Among the purported "author" organizations, UNIDIR appears to have some credibility, but QUNO does not, and PSIS seems to no longer exist.
No, I don't buy it.
Even if all you say is correct, Welsh and mindjustice would still not be a reliable source, unless Welsh has published her work in reliable sources.
And, even if there were a reliable source for your information, it still wouldn't fit in this article, only in mind control. — Arthur Rubin (talk) 19:18, 23 July 2013 (UTC)[reply]
I tend to agree, that reliable sources are an issue here. Sephiroth storm (talk) 20:01, 23 July 2013 (UTC)[reply]

Employees and budget 2013

Although I have added employee and budget info from reliable sources, it is reasonable to believe that both numbers in the article are underestimates. The NSA claims it has over 30,000 employees at its Fort Meade headquarters,[18] but the Washington Post adds that there are 4,000 NSA employees at Fort Gordon[19] and "the NSA’s station at RAF Menwith Hill ... is planned to grow by one-third, to an estimated 2,500 employees".[20] Also, "In Hawaii, the NSA outgrew its Schofield Barracks Army site years ago."[21] "The NSA’s Pine Gap site in Australia has added hundreds of new employees and several new facilities in recent years."[22] The NSA also has facilities in Texas and Colorado. Using simple addition, we're quickly approaching the 40,000 employees claimed in a Der Spiegel reference that was recently added and then removed from the article.

Also, the estimated $10 billion budget seems quite small for and agency that has 30,000-40,000 employees, 500 defense contractors with their own workforces,[23] lots of capital equipment costs, and lots of current construction costs in Utah and at its Fort Meade headquarters.

I oppose simply saying "Classified" for the employee count and budget when reliable sources have ballpark estimates. It's better to be clear that the values mentioned in the article are only estimates. We must still rely on reliable sources as much as possible, but should be aware that the employee count and budget are probably underestimates. --JHP (talk) 15:36, 22 July 2013 (UTC)[reply]

I made an error. The NSA's over 30,000 employees claim is not just limited to its Fort Meade headquarters. --JHP (talk) 16:00, 22 July 2013 (UTC)[reply]

archive

This Talk page is way too long, can someone archive it, i'm not comfortable with it myself. Sephiroth storm (talk) 20:04, 23 July 2013 (UTC)[reply]

Revert and re-revert

I just re-reverted this revert; a note was left on my talkpage explaining that I had perhaps inadvertently replaced "best" with "breast" but a look at the diff will show that the word "breast" is used perfectly innocently in both versions of the text - to refer to an eagle's thoracic area - and I was merely making small changes to the phrasing. My edit was primarily intended to undo two small changes that produced short, choppy sentences (the first of a series of edits by User:60995shift3; we just have different stylistic tastes) and to the best of my knowledge did not change any meanings; "breast" was already there :-) So I think the anti-vandal tool misfired here, and thanks to User:KoshVorlon for the explanatory note enabling me to figure that out. Yngvadottir (talk) 15:02, 23 August 2013 (UTC)[reply]

RfC concerning the Lavabit email service

There is a request for comments (RfC) that may be of interest. The RfC is at

Talk:Lavabit#RfC: Should information about Lavabit complying with previous search warrants be included?

At issue is whether we should delete or keep the following text in the Lavabit article:

Before the Snowden incident, Lavabit had complied with previous search warrants. For example, on June 10, 2013, a search warrant was executed against Lavabit user Joey006@lavabit.com for alleged possession of child pornography.

Your input on this question would be very much welcome. --Guy Macon (talk) 05:02, 29 August 2013 (UTC)[reply]

iPhone fingerprint scanner - privacy/security issues

Impact of iPhone 5S fingerprint reader and the US-VISIT fingerprint gathering program and the possible resultant privacy/security issues.

Does the NSA (and GCHQ) already have the ‘key’ to your iPhone?

If you have visited the USA in about the last 10 years, on clearing immigration you will have to have given the US a (digital) copy of your fingerprints.

So, if your fingerprints are to be the new ‘key’ to the iPhone (and other future gadgets to follow), who exactly has a copy of that ‘key’?

If the NSA already has the ‘key’ to your iPhone, it is not a great leap to imagine that software could be made so that that ‘key’ could be used remotely to access your data.

It has already been shown that these Governmental agencies have an unquenchable thirst to spy on their own citizens (let alone people outside of their country).

Likewise, if you obtained a UK biometric passport (or an UK ID card) then GCHQ will have a digital copy of your fingerprints. Also, in the UK, if you were arrested (but were never convicted of an offense), then the police have the right to take and keep your fingerprints.

If finger print technology becomes the gold standard means of authenticating your identity (e.g. to access email, banking as well as phone data), then your fingerprints could become the ultimate ‘skeleton key’ for all your data.

Again, the question remains, who already has that data and who could get a hold of it?

Unlike passwords, a fingerprint cannot be ‘reset’

What happens if your fingerprint data becomes compromised?

In traditional security systems, when a password has been cracked, it is a small matter to reset your password (or passwords). However, you can never ‘reset’ a fingerprint. If compromised, your finger prints will remain a permanent open backdoor to your personal security.

It seems that some people are happy for the UK Government (and successive Governments) to have such data, and to be spied on by them. However, what happens if someone else gets a copy of your fingerprints?

High-tech criminal fraud is already big business worldwide and criminal gangs are particularly adept at hacking, and so might actively seek to get your finger print data. With the advent of iPhone5S and iTunes allowing purchases using fingerprint data (and further business models no doubt set to follow) criminal gangs will be incentivized like never before to get your fingerprint data.

In the future, there may be more value in stealing your phone for its fingerprint data than stealing the phone itself. As for the phone re-sale market, you will have to be pretty sure that your fingerprint data is gone, or you may lose considerably more than you made selling your phone.

If your fingerprint data became compromised, perhaps you could try to block the use of your fingerprints as a means of authentication, but you would need to notify every person, business, and governmental organ that your fingerprints have been compromised. Good luck with that!

In the future, if fingerprints become the standard means of authenticating your identity, then you should take great care who you give that data to now, if stolen your life could become very difficult in the future.

iSpy an iPhone?


Also: Senator Al Franken, chairman of the Senate Judiciary Subcommittee on Privacy, Technology and the Law, has written to Apple boss Tim Cook explaining his security concerns: [24]

122.150.200.116 (talk) 11:29, 24 September 2013 (UTC)[reply]