Ilmu Informatika    
   
Daftar Isi
(Sebelumnya) National Science FoundationNational Semiconductor SC/MP (Berikutnya)

National Security Agency

National Security Agency
National Security Agency.svgA dangerous business, US Navy and National Reconnaissance during the Cold War, NSA
  • ^ "National Cryptologic Memorial (Daftar/Tabel -- Names) – NSA/CSS". NSA.gov. Retrieved January 13, 2012. 
  • ^ "The National Security Agency Frequently Asked Questions". National Security Agency. Retrieved April 15, 2010. 
  • ^ Gorman, Siobhan. "NSA risking electrical overload". Archived from the original on August 11, 2006. Retrieved August 6, 2006. 
  • ^ Steve Fidel (January 6, 2011). "Utah's $1.5 billion cyber-security center under way". Deseret News. Retrieved January 6, 2011. 
  • ^ Bamford, James (March 15, 2012). "The NSA Is Building the Country’s Biggest Spy Center (Watch What You Say)". Wired Magazine. Retrieved February 26, 2013. 
  • ^ a b National Security Agency (2009). "ARC Registration". NSA ARC. Retrieved April 13, 2011. 
  • ^ a b DNI (2009). "2009 National Intelligence Consumer's Guide". Director of National Intelligence. Retrieved April 13, 2011. 
  • ^ a b US Army. "Theater Army Operations, Field Manual No. 3-93 (100–7)". Retrieved April 13, 2011. 
  • ^ a b Joe Jarzombek (2004). "Systems, Network, and Information Integration Context for Software Assurance". Carnegie Mellon University. Retrieved April 13, 2011. 
  • ^ a b Dr. Christopher Griffin (2010). "Dealing with Sensitive Data at Penn State’s Applied Research Laboratory: Approach and Examples". msu.edu. Retrieved April 13, 2011. 
  • ^ a b Misiewicz (September 1998). "Thesis; Modeling and Simulation of a Global Reachback Architecture ...". Retrieved April 13, 2011. 
  • ^ PR Newswire (September 25, 2001). "Auto-trol Technology Corporation". highbeam.com. Retrieved April 14, 2011. 
  • ^ Auto-Trol / (September 25, 2001). "press release". 
  • ^ Davis, Harvey (March 12, 2002). Statement for the Record (Speech). 342 Dirksen Senate Office Building, Washington, D.C.. http://www.nsa.gov/public_info/speech es_testimonies/12mar02.shtml. Retrieved November 24, 2009.
  • ^ Scott Shane and Tom Bowman (December 4, 1995). "No Such Agency Part Four - Rigging the Game". The Baltimore Sun. Retrieved February 24, 2013. 
  • ^ Bamford, James (December 25, 2005). "The Agency That Could Be Big Brother". The New York Times. Retrieved September 11, 2005. 
  • ^ Priest, Dana and Arkin, William, A hidden world, growing beyond control, Washington Post
  • ^ "National Security Agency and the U.S. Department of Homeland Security Form New Partnership to Increase National Focus on Cyber Security Education" (Press release). NSA Public and Media Affairs. April 22, 2004. http://www.nsa.gov/public_info/press_ room/2004/nsa_dhs_new_partnership.sht ml. Retrieved July 4, 2008.
  • ^ "Wall Street Journal CEO Council 2010 Annual Meeting."
  • ^ Richelson, Jeffrey T.; Ball, Desmond (1985). The Ties That Bind: Intelligence Cooperation Between the UKUSA Countries. London: Allen & Unwin. ISBN 0-04-327092-1
  • ^ Patrick S. Poole, ECHELON: America's Secret Global Surveillance Network (Washington, D.C.: Free Congress Foundation, October 1998)
  • ^ National Security Agency. United States Signals Intelligence Directive 18. National Security Agency July 27, 1993. Last access date March 23, 2007
  • ^ "European Parliament Report on ECHELON" (PDF). July 2001. Retrieved July 4, 2008. 
  • ^ "Nicky Hager Appearance before the European Parliament ECHELON Committee". Nicky Hager / Cryptome Archive. April 2001. Retrieved July 4, 2008. 
  • ^ Die Zeit: 40/1999 "Verrat unter Freunden" ("Treachery among friends", German), available at archiv.zeit.de
  • ^ Report A5-0264/2001 of the European Parliament (English), available at European Parliament website
  • ^ "Echelon: Big brother without a cause". BBC News. July 6, 2000. Retrieved July 4, 2008. 
  • ^ "Interception capabilities 2000". Retrieved July 4, 2008. 
  • ^ a b David Alan Jordan. Decrypting the Fourth Amendment: Warrantless NSA Surveillance and the Enhanced Expectation of Privacy Provided by Encrypted Voice over Internet Protocol. Boston College Law Review. May, 2006. Last access date January 23, 2007
  • ^ Gorman, Siobhan (May 17, 2006). "NSA killed system that sifted phone data legally". Baltimore Sun (Tribune Company (Chicago, IL)). Archived from the original on September 27, 2007. Retrieved March 7, 2008. "The privacy protections offered by ThinThread were also abandoned in the post–September 11 push by the president for a faster response to terrorism." 
  • ^ See refs of Thomas Andrews Drake article
  • ^ a b Bamford, Shadow Factory, p 325–340
  • ^ James Risen & Eric Lichtblau (December 16, 2005), Bush Lets U.S. Spy on Callers Without Courts, New York Times
  • ^ Gwu.edu
  • ^ 6th Circuit Court of Appeals Decision
  • ^ "For Your Eyes Only?". NOW. February 16 2007.  on PBS
  • ^ Lichtblau, Eric and Risen, James (April 15, 2009). "N.S.A.'s Intercepts Exceed Limits Set by Congress". The New York Times. Retrieved April 15, 2009. 
  • ^ Ackerman, Spencer (April 16, 2009). "NSA Revelations Spark Push to Restore FISA". The Washington Independent (Center for Independent Media). Retrieved April 19, 2009. 
  • ^ Gorman, Siobahn (March 10, 2008). "NSA's Domestic Spying Grows As Agency Sweeps Up Data". The Wall Street Journal Online. Retrieved February 19, 2013 2008. 
  • ^ Davies, D.W.; W.L. Price (1989). Security for computer networks, 2nd ed. John Wiley & Sons. 
  • ^ Robert Sugarman (editor) (July 1979). "On foiling computer crime". IEEE Spectrum (IEEE). 
  • ^ Thomas R. Johnson (December 18, 2009). "American Cryptology during the Cold War, 1945–1989.Book III: Retrenchment and Reform, 1972–1980, page 232". NSA, DOCID 3417193 (file released on 2009-12-18, hosted at cryptome.org). Retrieved January 3, 2010. 
  • ^ Draft NIST SP 800-131, June 2010.
  • ^ Bruce Schneier (November 15, 2007). "Did NSA Put a Secret Backdoor in New Encryption Standard?". Wired News. Retrieved July 4, 2008. 
  • ^ Schneier, Bruce (1996). Applied Cryptography, Second Edition. John Wiley & Sons. pp. 609–610. ISBN 0-471-11709-9. 
  • ^ "United States Patent 6,947,978 – Method for geolocating logical network addresses". United States Patent and Trademark Office. September 20, 2005. Retrieved July 4, 2008. 
  • ^ Mike Rosen-Molina (May 19, 2007). "Ex-Guantanamo lawyers sue for recordings of client meetings". The Jurist. Retrieved May 22, 2007. 
  • ^ "CCR v. Bush". Center for Constitutional Rights. Retrieved June 15, 2009. 
  • ^ "The National Security Agency Insignia". National Security Agency. Retrieved July 4, 2008. [dead link]
  • Further reading

    • James Bamford, Body of Secrets: Anatomy of the Ultra-Secret National Security Agency, Doubleday, 2001, ISBN 0-385-49907-8.
    • James Bamford, The Puzzle Palace, Penguin Books, ISBN 0-14-006748-5.
    • Church Committee, Intelligence Activities and the Rights of Americans: 1976 US Senate Report on Illegal Wiretaps and Domestic Spying by the FBI, CIA and NSA, Red and Black Publishers (May 1, 2008).
    • Hanyok, Robert J. (2002). Spartans in Darkness: American SIGINT and the Indochina War, 1945–1975. National Security Agency. Retrieved November 16, 2008. 
    • Johnson, Thomas R. (2008). American Cryptology during the Cold War. National Security Agency: Center for Cryptological History. Retrieved November 16, 2008. 
    • Levy, Steven, Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age– discussion of the development of non-government cryptography, including many accounts of tussles with the NSA.
    • Radden Keefe, Patrick, Chatter: Dispatches from the Secret World of Global Eavesdropping, Random House, ISBN 1-4000-6034-6.
    • Liston, Robert A., The Pueblo Surrender: a Covert Action by the National Security Agency, ISBN 0-87131-554-8.
    • Kahn, David, The Codebreakers, 1181 pp., ISBN 0-684-83130-9. Look for the 1967 rather than the 1996 edition.
    • Tully, Andrew, The Super Spies: More Secret, More Powerful than the CIA, 1969, LC 71080912.
    • Bamford, James, New York Times, December 25, 2005; The Agency That Could Be Big Brother.
    • Sam Adams, War of Numbers: An Intelligence Memoir Steerforth; new edition (June 1, 1998).
    • John Prados, The Soviet estimate: U.S. intelligence analysis & Russian military strength, hardcover, 367 pages, ISBN 0-385-27211-1, Dial Press (1982).
    • Walter Laqueur, A World of secrets.
    • Sherman Kent, Strategic Intelligence for American Public Policy.
    • Matthew Aid, The Secret Sentry: The Untold History of the National Security Agency, 432 pages, ISBN 978-1-59691-515-2, Bloomsbury Press (June 9, 2009).

    External links

    Coordinates: 39°06′32″N 76°46′12″W / 39.109°N 76.770°W / 39.109; -76.770

    (Sebelumnya) National Science FoundationNational Semiconductor SC/MP (Berikutnya)