National Security Agency - The Black Vault
National Security Agency - The Black Vault
National Security Agency - The Black Vault
- No tags were found...
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
2000s<br />
2000s<br />
Looking Ahead<br />
While future challenges and technical advances<br />
remain unknown, NSA must maintain a creative<br />
and versatile approach to its mission.<br />
Today’s most pressing threats include cyber<br />
terrorism, computer hacking, and debilitating<br />
computer viruses. Adversaries are constantly<br />
trying to steal America’s digital information and<br />
compromise U.S. security. NSA protects both<br />
information and information technology that are<br />
essential to U.S. interests; defends critical U.S.<br />
and Allied networks against attack; and helps to<br />
identify and correct vulnerabilities in technology<br />
and operations. Together, these activities –<br />
providing information assurance and enabling<br />
computer network operations, along with the<br />
collection of foreign signals intelligence – form<br />
the core of NSA’s mission.<br />
momentum in the 1990s, NSA responded by<br />
working with the private sector to develop<br />
secure cell phones (CipherTAC-2000, Sectera-<br />
GSM and QSEC-800), as well as a secure modem<br />
to enable laptop access to SECRET networks.<br />
With increased commercial use of Personal<br />
Digital Assistants (PDAs), NSA developed the<br />
“Secure Mobile Environment Portable Electronic<br />
Device” (SME PED), a hand-held communication<br />
device with Type 1 encryption. This device<br />
provided secure voice and protected portable<br />
access to SECRET networks enabling customers<br />
to send and receive classified and unclassified<br />
voice calls as well as email and web browse on<br />
government networks.<br />
In response to rapid technology and<br />
environmental changes, growing commercial<br />
use of Suite B cryptography, and increased<br />
customer expectations for consumer-like<br />
products, the Information Assurance Directorate<br />
initiated a significant two-pronged change<br />
to its business model. First, NSA renewed its<br />
engagement strategy with the private sector<br />
by updating and publishing a set of Protection<br />
Profiles for commercial products/technology to<br />
raise the level of security. Second, NSA shifted<br />
to a commercial technology first approach,<br />
moving away from building government-owned<br />
unique devices and infrastructure. Under this<br />
innovative process, called Commercial Solutions<br />
for Classified (CSfC), NSA supports the use of<br />
composed and layered secure standards-based<br />
commercial devices and services to create<br />
trusted devices and systems that can safeguard<br />
national security information and systems.<br />
General Keith B. Alexander, USA,<br />
Commander, CYBERCOM, Director NSA/Chief CSS<br />
Barack Obama. When foreign intelligence<br />
malware infected U.S. military networks in<br />
2008, NSA expertise played an critical role in<br />
Operation BUCKSHOT YANKEE, the network<br />
defenders’ successful campaign to mitigate the<br />
computer security breach.<br />
Secretary of Defense Robert Gates considered<br />
all of these experiences, and acknowledged<br />
NSA’s expertise in the field, when he elected<br />
to co-locate Cyber Command with NSA at Fort<br />
Meade, and chose General Alexander as its first<br />
Commander. Although a separate Department of<br />
Defense organization, Cyber Command is able<br />
to leverage NSA’s talented workforce, expertise,<br />
and record of innovation when necessary to<br />
accomplish its mission.<br />
NSA/CSS Threat Operations Center<br />
In 2004 NSA Director General Hayden established<br />
the NSA/CSS Threat Operations Center (NTOC)<br />
as a joint Information Assurance and SIGINT<br />
initiative to assess and report on foreign threats<br />
against U.S. information systems. While NTOC’s<br />
methods have changed and will continue to change<br />
with technology, its mission remains faithful to<br />
General Hayden’s vision: “to look for new, creative,<br />
and collaborative ways to leverage our industrialstrength<br />
SIGINT and IA capabilities to live on the<br />
net always, shape the net sometimes, own the net<br />
when needed, and protect the net from those who<br />
wish to do the Nation harm.”<br />
Recent world events and cyber’s unprecedented<br />
growth necessitated a change in the way<br />
NTOC conducted this mission. In 2010 NTOC<br />
transformed its operations center into a more<br />
robust construct, providing maximum situational<br />
awareness of global network activities 24/7, 365<br />
days a year.<br />
Supporting Wireless Communications<br />
<strong>The</strong> NSA Information Assurance Team has<br />
a long and successful history of customer<br />
engagement and industry collaboration to fulfill<br />
its responsibility for the security of <strong>National</strong><br />
<strong>Security</strong> Systems. As the mobile market gained<br />
<strong>The</strong> NSA/CSS Threat Operations Center provides situational awareness<br />
on any adversarial attempt to exploit and attack our networks.<br />
102 60 Years of Defending Our Nation <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> 60 Years of Defending Our Nation 103