72 Facts About NSA

1.

The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence .

FactSnippet No. 672,359
2.

The NSA is tasked with the protection of U S communications networks and information systems.

FactSnippet No. 672,360
3.

The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine.

FactSnippet No. 672,361
4.

The NSA currently conducts worldwide mass data collection and has been known to physically bug electronic systems as one method to this end.

FactSnippet No. 672,362
5.

The NSA is alleged to have been behind such attack software as Stuxnet, which severely damaged Iran's nuclear program.

FactSnippet No. 672,363
6.

The NSA is entrusted with providing assistance to, and the coordination of, SIGINT elements for other government organizations – which are prevented by law from engaging in such activities on their own.

FactSnippet No. 672,364
7.

NSA's actions have been a matter of political controversy on several occasions, including its spying on anti–Vietnam War leaders and the agency's participation in economic espionage.

FactSnippet No. 672,365
8.

In 2013, the NSA had many of its secret surveillance programs revealed to the public by Edward Snowden, a former NSA contractor.

FactSnippet No. 672,366
9.

However, the project turned out to be controversial, and an internal review by the NSA concluded that its Minaret program was "disreputable if not outright illegal".

FactSnippet No. 672,367
10.

NSA mounted a major effort to secure tactical communications among U S forces during the war with mixed success.

FactSnippet No. 672,368
11.

The NSA tracked these individuals in a secret filing system that was destroyed in 1974.

FactSnippet No. 672,369
12.

In 1986, the NSA intercepted the communications of the Libyan government during the immediate aftermath of the Berlin discotheque bombing.

FactSnippet No. 672,370
13.

The White House asserted that the NSA interception had provided "irrefutable" evidence that Libya was behind the bombing, which U S President Ronald Reagan cited as a justification for the 1986 United States bombing of Libya.

FactSnippet No. 672,371
14.

That year, the NSA founded the NSA Hall of Honor, a memorial at the National Cryptologic Museum in Fort Meade, Maryland.

FactSnippet No. 672,372
15.

NSA's infrastructure deteriorated in the 1990s as defense budget cuts resulted in maintenance deferrals.

FactSnippet No. 672,373
16.

Some NSA whistleblowers complained internally about major problems surrounding Trailblazer.

FactSnippet No. 672,374
17.

Massive extent of the NSA's spying, both foreign and domestic, was revealed to the public in a series of detailed disclosures of internal NSA documents beginning in June 2013.

FactSnippet No. 672,375
18.

Part of NSA's mission is to serve as a combat support agency for the Department of Defense.

FactSnippet No. 672,376
19.

The NSA has spied extensively on the European Union, the United Nations and numerous governments including allies and trading partners in Europe, South America and Asia.

FactSnippet No. 672,377
20.

In July 2015, WikiLeaks published documents showing that NSA spied on federal German ministries since the 1990s.

FactSnippet No. 672,378
21.

In 2013, reporters uncovered a secret memo that claims the NSA created and pushed for the adoption of the Dual EC DRBG encryption standard that contained built-in vulnerabilities in 2006 to the United States National Institute of Standards and Technology, and the International Organization for Standardization .

FactSnippet No. 672,379
22.

NSA had given the right answer, everybody understood that the NSA had approached him.

FactSnippet No. 672,380
23.

In 1997, Lotus negotiated an agreement with the NSA that allowed the export of a version that supported stronger keys with 64 bits, but 24 of the bits were encrypted with a special key and included in the message to provide a "workload reduction factor" for the NSA.

FactSnippet No. 672,381
24.

Document included in NSA files released with Glenn Greenwald's book No Place to Hide details how the agency's Tailored Access Operations and other NSA units gain access to hardware.

FactSnippet No. 672,382
25.

NSA has declared that it relies on the FBI to collect information on foreign intelligence activities within the borders of the United States, while confining its own activities within the United States to the embassies and missions of foreign nations.

FactSnippet No. 672,383
26.

NSA relayed telephone conversations obtained from ground, airborne, and satellite monitoring stations to various U S Army Signal Intelligence Officers, including the 201st Military Intelligence Battalion.

FactSnippet No. 672,384
27.

However, this claim has been debunked and no evidence has been presented demonstrating that the NSA has ever been instrumental in preventing a terrorist attack.

FactSnippet No. 672,385
28.

Besides the more traditional ways of eavesdropping in order to collect signals intelligence, NSA is engaged in hacking computers, smartphones and their networks.

FactSnippet No. 672,386
29.

NSA is led by the Director of the National Security Agency, who serves as Chief of the Central Security Service and Commander of the United States Cyber Command and is the highest-ranking military official of these organizations.

FactSnippet No. 672,387
30.

NSA has an Inspector General, head of the Office of the Inspector General, a General Counsel, head of the Office of the General Counsel and a Director of Compliance, who is head of the Office of the Director of Compliance .

FactSnippet No. 672,388
31.

Unlike other intelligence organizations such as the CIA or DIA, NSA has always been particularly reticent concerning its internal organizational structure.

FactSnippet No. 672,389
32.

The chiefs of other main NSA divisions became associate directors of the senior leadership team.

FactSnippet No. 672,390
33.

NSA Police have use of a K9 division, which generally conducts explosive detection screening of mail, vehicles and cargo entering NSA grounds.

FactSnippet No. 672,391
34.

NSA received criticism early on in 1960 after two agents had defected to the Soviet Union.

FactSnippet No. 672,392
35.

The NSA conducts five-year periodic reinvestigation polygraphs of employees, focusing on counterintelligence programs.

FactSnippet No. 672,393
36.

NSA workers referred to the building as the "Headquarters Building" and since the NSA management occupied the top floor, workers used "Ninth Floor" to refer to their leaders.

FactSnippet No. 672,394
37.

NSA is the largest employer in the state of Maryland, and two-thirds of its personnel work at Fort Meade.

FactSnippet No. 672,395
38.

The NSA headquarters includes a cafeteria, a credit union, ticket counters for airlines and entertainment, a barbershop, and a bank.

FactSnippet No. 672,396
39.

NSA headquarters has its own post office, fire department, and police force.

FactSnippet No. 672,397
40.

The NSA maintains a shuttle service from the Odenton station of MARC to its Visitor Control Center and has done so since 2005.

FactSnippet No. 672,398
41.

NSA decided to move some of its operations to a new satellite facility.

FactSnippet No. 672,399
42.

In 2007, as BGE's largest customer, NSA bought as much electricity as Annapolis, the capital city of Maryland.

FactSnippet No. 672,400
43.

In 1995, The Baltimore Sun reported that the NSA is the owner of the single largest group of supercomputers.

FactSnippet No. 672,401
44.

NSA held a groundbreaking ceremony at Fort Meade in May 2013 for its High Performance Computing Center 2, expected to open in 2016.

FactSnippet No. 672,402
45.

NSA had installations in several U S states and from them observed intercepts from Europe, the Middle East, North Africa, Latin America, and Asia.

FactSnippet No. 672,403
46.

In 2009, to protect its assets and access more electricity, NSA sought to decentralize and expand its existing facilities in Fort Meade and Menwith Hill, the latter expansion expected to be completed by 2015.

FactSnippet No. 672,404
47.

In 2004, NSA closed its operations at Bad Aibling Station in Bad Aibling, Germany.

FactSnippet No. 672,405
48.

In 2012, NSA began to move some of its operations at Yakima Research Station, Yakima Training Center, in Washington state to Colorado, planning to leave Yakima closed.

FactSnippet No. 672,406
49.

NSA operates RAF Menwith Hill in North Yorkshire, United Kingdom, which was, according to BBC News in 2007, the largest electronic monitoring station in the world.

FactSnippet No. 672,407
50.

In 2013, a new Consolidated Intelligence Center, to be used by NSA, is being built at the headquarters of the United States Army Europe in Wiesbaden, Germany.

FactSnippet No. 672,408
51.

NSA has been involved in debates about public policy, both indirectly as a behind-the-scenes adviser to other departments, and directly during and after Vice Admiral Bobby Ray Inman's directorship.

FactSnippet No. 672,409
52.

NSA was a major player in the debates of the 1990s regarding the export of cryptography in the United States.

FactSnippet No. 672,410
53.

For 50 years, NSA designed and built most of its computer equipment in-house, but from the 1990s until about 2003, the agency contracted with the private sector in the fields of research and equipment.

FactSnippet No. 672,411
54.

NSA was embroiled in some controversy concerning its involvement in the creation of the Data Encryption Standard, a standard and public block cipher algorithm used by the U S government and banking community.

FactSnippet No. 672,412
55.

Involvement of NSA in selecting a successor to Data Encryption Standard, the Advanced Encryption Standard, was limited to hardware performance testing .

FactSnippet No. 672,413
56.

NSA has subsequently certified AES for protection of classified information when used in NSA-approved systems.

FactSnippet No. 672,414
57.

NSA is responsible for the encryption-related components in these legacy systems:.

FactSnippet No. 672,415
58.

NSA oversees encryption in the following systems that are in use today:.

FactSnippet No. 672,416
59.

NSA has specified Suite A and Suite B cryptographic algorithm suites to be used in U S government systems; the Suite B algorithms are a subset of those previously specified by NIST and are expected to serve for most information protection purposes, while the Suite A algorithms are secret and are intended for especially high levels of protection.

FactSnippet No. 672,417
60.

NSA promoted the inclusion of a random number generator called Dual EC DRBG in the U S National Institute of Standards and Technology's 2007 guidelines.

FactSnippet No. 672,418
61.

NSA has the ability to file for a patent from the U S Patent and Trademark Office under gag order.

FactSnippet No. 672,419
62.

One of NSA's published patents describes a method of geographically locating an individual computer site in an Internet-like network, based on the latency of multiple network connections.

FactSnippet No. 672,420
63.

The current NSA insignia has been in use since 1965, when then-Director, LTG Marshall S Carter ordered the creation of a device to represent the agency.

FactSnippet No. 672,421
64.

Crews associated with NSA missions have been involved in a number of dangerous and deadly situations.

FactSnippet No. 672,422
65.

The USA Freedom Act forbids the NSA to collect metadata and content of phone calls unless it has a warrant for terrorism investigation.

FactSnippet No. 672,423
66.

Under the Upstream collection program, the NSA paid telecommunications companies hundreds of millions of dollars in order to collect data from them.

FactSnippet No. 672,424
67.

The NSA has been reported to have access to all communications made via Google, Microsoft, Facebook, Yahoo, YouTube, AOL, Skype, Apple and Paltalk, and collects hundreds of millions of contact lists from personal email and instant messaging accounts each year.

FactSnippet No. 672,425
68.

The United States Foreign Intelligence Surveillance Court, the secret court charged with regulating the NSA's activities is, according to its chief judge, incapable of investigating or verifying how often the NSA breaks even its own secret rules.

FactSnippet No. 672,426
69.

NSA has "generally disregarded the special rules for disseminating United States person information" by illegally sharing its intercepts with other law enforcement agencies.

FactSnippet No. 672,427
70.

An exploit dubbed EternalBlue, created by the NSA, was used in the unprecedented worldwide WannaCry ransomware attack in May 2017.

FactSnippet No. 672,428
71.

Edward Snowden said that if the NSA had "privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, [the attack] might not have happened".

FactSnippet No. 672,429
72.

NSA quit the company after learning his team had hacked Qatari Sheikha Moza bint Nasser's email exchanges with Michelle Obama, just prior to her visit to Doha.

FactSnippet No. 672,430