What is the National Security Agency?

National Security Agency logo

The National Security Agency (NSA) is a member of the U.S. intelligence community and plays an integral role in safeguarding national interests and achieving military objectives by gathering, analyzing and sharing data and signals intelligence. The NSA is widely acknowledged as the country’s foremost authority on cryptanalysis and its role in preserving national security is twofold. Firstly, NSA analysts gather and decrypt intelligence from electronic communications and sources such as email, videos, photos, stored data, internet phone calls, chat, video conferencing, file transfers, and online social networking accounts. Subsequently, the NSA uses its gathered intelligence to protect the nation’s classified data and national security systems from unauthorized access and tampering by foreign and internal adversaries. Established by President Harry Truman with the express purpose of coordinating and improving the collection and analysis of intelligence communications, the NSA plays a significant role in protecting both the United States and the world at large; therefore, it is vital for individuals with a strong interest in international relations to gain an understanding of the functions of this critical intelligence agency.

The National Security Agency’s Origins

The protection of communications and systems in the United States through the use of cryptology, cipher and other methods can be traced back to the American Revolution with the formation of the Secret Committee of Correspondence; however, it was after World War I with the advent of the radio that national security experienced a pronounced evolution. The Black Chamber—or, the Bureau of Cipher—was established after the war and was disguised as a New York commercial code company. The Black Chamber used cryptanalysis to intercept foreign communications, notably monitoring and decoding communications sent to and from Japanese delegates during the Washington Naval Conference which first convened on November of 1921, giving U.S. negotiators a strong advantage. However, the organization was disbanded in 1929, when Secretary of State Henry Stimson famously quipped, “gentlemen do not read each other’s mail.”

During World War II, the group OP-20-G played an important role in providing vital intelligence on adversaries, such as the Japanese, thereby surpassing the information-gathering capabilities of all other agencies and allowing the U.S. military to be more effective and precise in its operations. OP-20-G was greatly respected, allowing it to metamorphose into the Army Security Agency (ASA) and later, the Armed Forces Security Agency (AFSA), which united all cryptologic activities of the Army and the Navy. However, the organization faced difficulty in its operations, mainly in centralizing data collection efforts, processing the communications intelligence and coordinating with other agencies. President Truman tasked New York attorney George A. Brownell with forming a committee that included representatives from the Department of State, Department of Defense, and the Central Intelligence Agency in order to find a solution to AFSA’s operational woes; upon receiving the committee’s official recommendations regarding the United States Government Communications Intelligence (COMINT) in a five-part report, Truman established the National Security Agency on November 4, 1952.

Throughout the Cold War, the NSA expanded U.S. surveillance activities and was able to moni-tor and intercept the communications of various foreigners and U.S. citizens through programs such as Project MINARET. The project notably surveilled Americans traveling to Cuba and participating in the anti-Vietnam War movement, and resulted in thousands of citizens being placed on watch lists. The lack of clear legal constraints resulted in the severe violation of privacy: In 1972, the U.S. Supreme Court’s Keith decision noted that, even though the government has the responsibility to protect the American people from disruptive activity, the government cannot use warrantless electronic surveillance devices—especially for domestic espionage activities. NSA’s Operation Shamrock was investigated by the “Church Committee” and in August of 1975, NSA director Lieutenant general Lew Allen testified to the House of Representatives’, disclosing NSA’s activities. This lead to the introduction of the Foreign Intelligence Surveillance Act in 1978 by Congress, which helped monitor and regulate the NSA and notably, established the need for acquiring warrants through the United States Foreign Intelligence Surveillance Court (FISC) prior to pursuing any clandestine efforts.

Roles and Responsibilities of the NSA

The NSA is known as the premier cryptology organization, and until the end of the Cold War, cryptography in the United States was solely the concern of the NSA (and the organizations that preceded it). The NSA, along with the National Bureau for Standards and IBM, played a signifi-cant role in the development of the Data Encryption Standard, an algorithm used in the encryp-tion of data. The development of the DES launched cryptography as an academic discipline.

Operating under the purview of the Department of Defense, the NSA is tasked with two primary responsibilities. The first is producing SIGINT, or signals intelligence, and sharing it with vari-ous parties—such as the military, members of the executive branch, government agencies and foreign allies. Signals intelligence is any information that has the potential to be intercepted and utilized by adversarial groups and is derived from various signals, sources, systems, and satellite communications. SIGINT can be used in a number of ways, including to help secure the nation and its allies; protect troops; prevent domestic and international terrorism, crime and narcotics; and assist with diplomatic negotiations and foreign relations. The NSA’s second responsibility is information assurance, or the protection of national security systems crucial to intelligence, military operations and other government activities. The NSA helps prevent the theft of classified information and ensures that these materials are available to policymakers and others in government.

NSA Data Collection Methods and Controversy

To protect national security interests, the NSA engages in mass surveillance and the collection of metadata, which includes the gathering and tracking of American and foreign citizens’ phone calls, text messages, social media posts, emails, internet browser history and more. Mass surveillance by the United States was initially conducted as part of WWI security efforts, such as when the U.S. government monitored telegrams sent to and received by the United States. This surveillance was allowed to continue on into peacetime to help ensure that the U.S. government was kept abreast of pressing domestic and international affairs—especially those related to the expansionist policies of rival nations, like Japan.

By their very nature, the NSA’s methods of data collection are shrouded in secrecy. The NSA has been known to install listening posts around the world in order to gather foreign intelligence, thereby creating considerable controversy. To wit, there exists a special division within the NSA named the Special Collection Service; this classified body installs eavesdropping devices in places such as foreign embassies and government buildings and is dubbed the “Mission Impossible” task force. The NSA was embroiled in significant international controversy when it was exposed as having conducted surveillance on the German government, including monitoring the cell phone of German Chancellor Angela Merkel through an antenna installed on the roof of the U.S. Embassy. The United States justified its actions on the basis that some of the terrorists involved in the planning and execution of the September 11th attacks had operated out of Hamburg, Germany, and the revelation created tension between the U.S. and German governments—who had long considered one another to be strong allies.

The NSA has also courted controversy with American citizens, coming under fire for the unconstitutionality of its surveillance and data collection activities, which critics argue impinge on privacy laws and violate the Fourth Amendment. The NSA reportedly collaborates with technology and Internet companies to obtain access to phone records, emails, and cloud-stored files, though some of these companies (such as Google and Yahoo) insist that they require a court order before releasing information; however, Sprint, AT&T and others have reportedly handed over millions of records on ordinary citizens not suspected of any wrongdoing, all without a court order. Such records are now housed in the NSA call database in perpetuity. The NSA, for its part, has continuously argued that its surveillance activities are in full compliance with the law; that it takes civil liberties very seriously and only collects critical information necessary for policymakers to ensure the security of the U.S. and its allies.

The NSA is able to conduct its data collection thanks to laws such as the Communications Assistance for Law Enforcement Act, which requires communications companies to make their facilities available to law enforcement agencies or to supply consumer information following a court order. Since the September 11 attacks, provisions in the Patriot Act have allowed the NSA to expanded its widespread surveillance of suspected terrorists in an effort to fight domestic and international terror.

One of the undisclosed programs covered under the Patriot Act is Planning Tool for Resource Integration, Synchronization, and Management (PRISM). Operating under the Foreign Intelli-gence Surveillance Act (FISA), PRISM allows the NSA to solicit technology companies to gain access to phone, email and other records of foreign citizens in the event that certain search terms or phrases trigger red flags. However, information has since come to light indicating that these searches often extend to U.S. citizens and that the NSA paid technology companies millions of dollars for their disclosures. PRISM and other programs were unveiled in a series of revelations by former NSA contractor Edward Snowden in 2013.

Since its inception, the Patriot Act has been criticized by many in government and the public sphere, and programs such as PRISM have faced litigation from the ACLU. Critics believe that these programs have been abused and have rarely succeeded in foiling terrorist plots; such was the case with the Boston Marathon attacks, as the terrorists were found to have visited an Al-Qaeda website. Foreign governments, especially members of the European Union, have ex-pressed outrage at the mass surveillance of their citizens and their Internet activities. The NSA and its proponents (including former President Barack Obama), however, have argued that these surveillance programs are effective, having thwarted a plot against the New York City subway, for instance. They also argue that such programs face rigorous bipartisan Congressional scrutiny and are subject to extensive oversight. The Patriot Act has elicited so much criticism that a compromise was reached in the form of the Freedom Act in 2005, which reinforced certain segments of the Patriot Act while limiting the information the NSA can gather without a warrant.

The National Security Agency plays an important role in ensuring national security; facilitating foreign, military and diplomatic affairs; and fortifying classified information and national security systems. The NSA does not carry out its duty without a significant amount of scrutiny, however, as the constitutionality of its measures is often called into question. Given the important work of the NSA and growing public interest in the agency’s sometimes controversial activities, it is essential for individuals studying international relations to fully comprehend its operations and outcomes in order to anticipate and address future challenges.

Learn More

As the nation’s oldest private military college, Norwich University has been a leader in innova-tive education since 1819. Through its online programs, Norwich delivers relevant and applica-ble curricula that allow its students to make a positive impact on their places of work and their communities.
Our online Master of Arts in International Relations program offers a curriculum that evolves with current events to help you face the future of international affairs. Norwich University’s master’s degree in international relations covers many subjects to give you a look at the internal workings of international players, examine the role of state and non-state actors on the global stage, and explore different schools of thought. You can further strengthen your knowledge by choosing one of five concentrations in International Security, National Security, International Development, Cyber Diplomacy, or Regions of the World.

Recommended Readings:
Isolationism & U.S. Foreign Policy After World War I
7 Components of Liberalism

Sources:

https://www.fcc.gov/public-safety-and-homeland-security/policy-and-licensing-division/general/communications-assistance

https://link.springer.com/chapter/10.1007/978-3-642-19074-2_9

https://www.nsa.gov/

https://www.nsa.gov/news-features/declassified-documents/cryptologic-spectrum/assets/files/early_history_nsa.pdf

https://www.nap.edu/read/5131/chapter/19

https://www.nsa.gov/about/cryptologic-heritage/museum/

https://www.eff.org/nsa-spying/timeline

https://books.google.ca/books/about/Spies_Wiretaps_and_Secret_Operations.html?id=91FyAJDjAvQC&redir_esc=y

http://foreignpolicy.com/2017/04/17/trove-of-stolen-nsa-data-is-devastating-loss-for-intelligence-community/

https://www.theverge.com/2014/7/2/5863933/oversight-board-that-condemned-nsa-phone-surveillance-says-prism-is-legal

https://www.theguardian.com/world/2013/jun/07/nsa-prism-records-surveillance-questions

https://history.state.gov/milestones/1776-1783/secret-committee

https://www.nsa.gov/news-features/declassified-documents/cryptologic-histories/assets/files/origins_of_nsa.pdf

https://history.state.gov/historicaldocuments/frus1950-55Intel/d99

http://www.historycommons.org/context.jsp?item=civilliberties_107

https://it.ojp.gov/PrivacyLiberty/authorities/statutes/1286

https://www.theguardian.com/us-news/2015/jul/08/nsa-tapped-german-chancellery-decades-wikileaks-claims-merkel

IMAGE CREDIT: https://www.nsa.gov


November 2 2017