01.07.2014 Views

National Security Agency - The Black Vault

National Security Agency - The Black Vault

National Security Agency - The Black Vault

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

2000s<br />

2000s<br />

Looking Ahead<br />

While future challenges and technical advances<br />

remain unknown, NSA must maintain a creative<br />

and versatile approach to its mission.<br />

Today’s most pressing threats include cyber<br />

terrorism, computer hacking, and debilitating<br />

computer viruses. Adversaries are constantly<br />

trying to steal America’s digital information and<br />

compromise U.S. security. NSA protects both<br />

information and information technology that are<br />

essential to U.S. interests; defends critical U.S.<br />

and Allied networks against attack; and helps to<br />

identify and correct vulnerabilities in technology<br />

and operations. Together, these activities –<br />

providing information assurance and enabling<br />

computer network operations, along with the<br />

collection of foreign signals intelligence – form<br />

the core of NSA’s mission.<br />

momentum in the 1990s, NSA responded by<br />

working with the private sector to develop<br />

secure cell phones (CipherTAC-2000, Sectera-<br />

GSM and QSEC-800), as well as a secure modem<br />

to enable laptop access to SECRET networks.<br />

With increased commercial use of Personal<br />

Digital Assistants (PDAs), NSA developed the<br />

“Secure Mobile Environment Portable Electronic<br />

Device” (SME PED), a hand-held communication<br />

device with Type 1 encryption. This device<br />

provided secure voice and protected portable<br />

access to SECRET networks enabling customers<br />

to send and receive classified and unclassified<br />

voice calls as well as email and web browse on<br />

government networks.<br />

In response to rapid technology and<br />

environmental changes, growing commercial<br />

use of Suite B cryptography, and increased<br />

customer expectations for consumer-like<br />

products, the Information Assurance Directorate<br />

initiated a significant two-pronged change<br />

to its business model. First, NSA renewed its<br />

engagement strategy with the private sector<br />

by updating and publishing a set of Protection<br />

Profiles for commercial products/technology to<br />

raise the level of security. Second, NSA shifted<br />

to a commercial technology first approach,<br />

moving away from building government-owned<br />

unique devices and infrastructure. Under this<br />

innovative process, called Commercial Solutions<br />

for Classified (CSfC), NSA supports the use of<br />

composed and layered secure standards-based<br />

commercial devices and services to create<br />

trusted devices and systems that can safeguard<br />

national security information and systems.<br />

General Keith B. Alexander, USA,<br />

Commander, CYBERCOM, Director NSA/Chief CSS<br />

Barack Obama. When foreign intelligence<br />

malware infected U.S. military networks in<br />

2008, NSA expertise played an critical role in<br />

Operation BUCKSHOT YANKEE, the network<br />

defenders’ successful campaign to mitigate the<br />

computer security breach.<br />

Secretary of Defense Robert Gates considered<br />

all of these experiences, and acknowledged<br />

NSA’s expertise in the field, when he elected<br />

to co-locate Cyber Command with NSA at Fort<br />

Meade, and chose General Alexander as its first<br />

Commander. Although a separate Department of<br />

Defense organization, Cyber Command is able<br />

to leverage NSA’s talented workforce, expertise,<br />

and record of innovation when necessary to<br />

accomplish its mission.<br />

NSA/CSS Threat Operations Center<br />

In 2004 NSA Director General Hayden established<br />

the NSA/CSS Threat Operations Center (NTOC)<br />

as a joint Information Assurance and SIGINT<br />

initiative to assess and report on foreign threats<br />

against U.S. information systems. While NTOC’s<br />

methods have changed and will continue to change<br />

with technology, its mission remains faithful to<br />

General Hayden’s vision: “to look for new, creative,<br />

and collaborative ways to leverage our industrialstrength<br />

SIGINT and IA capabilities to live on the<br />

net always, shape the net sometimes, own the net<br />

when needed, and protect the net from those who<br />

wish to do the Nation harm.”<br />

Recent world events and cyber’s unprecedented<br />

growth necessitated a change in the way<br />

NTOC conducted this mission. In 2010 NTOC<br />

transformed its operations center into a more<br />

robust construct, providing maximum situational<br />

awareness of global network activities 24/7, 365<br />

days a year.<br />

Supporting Wireless Communications<br />

<strong>The</strong> NSA Information Assurance Team has<br />

a long and successful history of customer<br />

engagement and industry collaboration to fulfill<br />

its responsibility for the security of <strong>National</strong><br />

<strong>Security</strong> Systems. As the mobile market gained<br />

<strong>The</strong> NSA/CSS Threat Operations Center provides situational awareness<br />

on any adversarial attempt to exploit and attack our networks.<br />

102 60 Years of Defending Our Nation <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> <strong>National</strong> <strong>Security</strong> <strong>Agency</strong> 60 Years of Defending Our Nation 103

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!