[LINK] The NSA Mission Statement

stephen at melbpc.org.au stephen at melbpc.org.au
Sun Nov 24 22:09:16 AEDT 2013


This NSA document is(was) the National Security Agency Mission Statement. 

It was intended to cover the 2012-2016 period, and was written early 2012 
just before Snowden’s leaks, so it illuminates NSA official thinking before 
Snowden upset their political plotting.

Bear in mind, when reading it, their criminal idiot activities worldwide. 

Also note since this: "NSA officials claim that the agency’s sweeping 
domestic surveillance programs have helped in 54 “terrorist-related 
activities.” But, US congressional staff members say that the use of such 
figures by defenders of the agency has drastically overstated the value of 
their domestic surveillance programs in counterterrorism." 

Ref: http://www.nytimes.com/2013/11/23/us/politics/nsa-report-outlined-
goals-for-more-power.html

Whatsmore, "The U.S. Justice Department has notified a Somali-American man 
who was convicted this year of trying to detonate a bomb in Portland, Ore., 
that his trial included evidence derived from *warrantless wiretapping* and
is a move that could disrupt plans to sentence him next month."


So, even American people convicted by NSA surveillance may not be jailed. 

Also, consider that Australia, being one the group of five, apparently has 
an NSA obligation to conduct surveillance locally. For example, Indonesia. 

We all know how well that's gone.


So I'd suggest one considers the NSA Master Plans here. Then, consider what 
the NSA achieved? For what it's worth, I regard the NSA as an IDIOT gang of 
illegal, criminal thugs. Also perhaps, international terrorists themselves.


http://www.nytimes.com/interactive/2013/11/23/us/politics/23nsa-sigint-
strategy-document.html


SIGINT Strategy  2012-2016

23 February 2012  

TOP SECRET, TO USA, AUS, CAN, GBR, NZL


(U) Vision

(U) Ensure Signals Intelligence provides THE decisive edge in advancing the 
full spectrum of U.S. national security interests.

(U) Mission

(U) Defend the nation through SIGINT-derived advantage with a skilled work 
force trained, equipped and empowered to access and unlock the secrets of 
our adversaries.

(U) Values

(U) We will constantly strive to improve our knowledge, our people, our 
technology, and our products. Through innovation and personalization, we 
will advance the SIGINT system. Our customers and stakeholders can rely on 
us to provide timely, high quality products and services, because we never 
stop innovating and improving, and we never give up!

(U) The Environment

(U//FOUO) For decades, Signals Intelligence has sustained deep and 
persistent access to all manner of adversaries to inform and guide the 
actions and decisions of Presidents, military commanders, policy
makers and clandestine service officers. As the world has changed, and 
global interdependence and the advent of the information age have 
transformed the nature of our target space, we have adapted in
innovative and creative ways that have led some to describe the current day 
as “the golden age of SIGINT.”

(U//FOUO) That reputation was hard-won, but will only endure if we keep 
sight of the dynamic and increasingly market driven forces that continue to 
shape the SIGINT battle space. We must proactively position ourselves to 
dominate that environment across discovery, access, exploitation, analysis,
collaboration and in the products and services we provide. The SIGINT 
system and our interaction therein must be as agile and dynamic as the 
information space we confront.

(U//FOUO) The mission space for SIGINT in the years ahead will continue to 
grow at a rapid pace amidst a dramatically new set of challenges:

(U//FOUO) The interpretation and guidelines for applying our authorities, 
and in some cases the authorities themselves, have not kept pace with the 
complexity of the technology and target environments, or the operational 
expectations levied on NSA’s mission.

• (U) Digital information created since 2006 grew tenfold, reaching 1.8 
exabytes in 2011, a trend projected to continue; ubiquitous computing is 
fundamentally changing how people interact as individuals become untethered 
from information sources and their communications tools; and the traces 
individuals leave when they interact with the global network will define 
the capacity to locate, characterize and understand entities.

• (U) Cyberattacks offer a means for potential adversaries to overcome 
overwhelming U.S. advantages in conventional military power and to do so in 
ways that are instantaneously and exceedingly hard to trace. Such attacks 
may not cause the mass casualties of a nuclear strike, but they could 
paralyze U.S. society all the same.

• (U) The international system – as constructed following the Second World 
War – will be almost unrecognizable by 2025 owing to the rise of emerging 
powers, a globalizing economy, an historic transfer of relative wealth and 
economic power from West to East, and the growing influence of non-state 
actors.

(U) Expectations

(U//FOUO) The power of information, its short shelf life in the information 
age and the speed at which it moves will set the conditions for how NSA 
interacts with customers. Transactional, passive or linear relationships 
will be replaced by embedded, deeply interactive engagements. Existing 
investments in cyber security will by necessity expand across the 
enterprise to meet the demand and speed of action required to thwart our 
adversaries. To remain a value for the warfighter our information must be
immediately available at the lowest classification level. The nation will 
continue to depend upon NSA to be the lead for the application of the 
science of cryptography, sustaining access and understanding of data even 
as encryption becomes automatic, transparent and prolific. Products and 
services from NSA will evolve into forms and across boundaries that mirror 
the networked and agile manner in which people interact in the information 
age, and we will share information, responsibly and securely, with
external partners and customers.

(U//FOUO) For SIGINT to be optimally effective, legal, policy, and process 
authorities must be as adaptive and dynamic as the technological and 
operational advances we seek to exploit. Nevertheless, the culture of 
compliance, which has allowed the American people to entrust NSA with 
extraordinary authorities, will not be compromised in the face of so many 
demands, even as we aggressively pursue legal authorities and a policy 
framework mapped more fully to the information age.

(U//FOUO) To sustain current mission relevance and to meet the challenges, 
the Signals Intelligence Directorate must undertake a profound and 
revolutionary shift from the mission approach which has served us so well 
in the decades preceding the onset of the information age to a SIGINT 
system that is as agile and dynamic as the information space we confront. 
The environment demands it, the capability of the SIGINT system can achieve 
it and the work force has the creativity and the skill base to make it
possible.

(U//FOUO) What follow are the five challenge goals the SIGINT leadership 
has established to close gaps between the environment and expectations over 
the next five years.

SIGINT Goals for 2012-2016

1. (U//FOUO) Revolutionize analysis – fundamentally shift our analytic 
approach from a production to a discovery bias, enriched by innovative 
customer/partner engagement, radically increasing operational impact across 
all mission domains.

1.1. (U//FOUO) Through advanced tradecraft and automation, dramatically 
increase mastery of the global network

1.2. (U//FOUO) Conduct original analysis in a collaborative information 
space that mirrors how people interact in the information age

1.3. (U//FOUO) Disseminate data at its first point of relevance, share bulk 
data, and enable customers to address niche requirements

1.4. (U//FOUO) Drive an agile technology base mapped to the cognitive 
processes that underpin large scale analysis, discovery, compliance and 
collaboration

2. (U//FOUO) Fully leverage internal and external NSA partnerships to 
collaboratively discover targets, find their vulnerabilities, and overcome 
their network/communication defenses.

2.1. (U//FOUO) Bolster our arsenal of capabilities against the most 
critical cryptanalytic challenges

2.1.1. (S//SI//REL) Employ multidisciplinary approaches to cryptanalytic 
problems, leveraging and integrating mid-point and end-point capabilities 
to enable cryptanalysis

2.1.2. (S//REL) Counter the challenge of ubiquitous, strong, commercial 
network encryption

2.1.3. (TS//SI//REL) Counter indigenous cryptographic programs by targeting 
their industrial bases with all available SIGINT and HUMINT capabilities

2.1.4. (TS//SI//REL) Influence the global commercial encryption market 
through commercial relationships, HUMINT, and second and third party 
partners

2.1.5. (S//SI//REL) Continue to invest in the industrial base and drive the 
state of the art for High Performance Computing to maintain pre-eminent 
cryptanalytic capability for the nation

2.2. (TS//SI//REL) Defeat adversary cybersecurity practices in order to 
acquire the SIGINT data we need from anyone, anytime, anywhere

2.3. (S//SI) Enable discovery capabilities and advanced tradecraft in the 
collection architecture to enable the discovery of mission-critical 
persona, networks, accesses, signals and technologies

2.4. (S//SI) Integrate capabilities into the mission architecture, deepen 
workforce skill base in advanced network and signals analysis, and optimize 
processes and policies for the benefit of discovery

3. (S//SI//REL) Dynamically integrate endpoint, midpoint, industrial-
enabled, and cryptanalytic capabilities to reach previously inaccessible 
targets in support of exploitation, cyber defense, and cyber operations

3.1. (C//REL) Drive the SIGINT mission architecture to underpin 
synchronized, integrated, multi-capability operations, extending it to 
mission partners

3.2. (TS//SI//REL) Integrate the SIGINT system into a national network of 
sensors which interactively sense, respond, and alert one another at 
machine speed

3.3. (U//FOUO) Continuously rebalance our portfolio of accesses and access 
capabilities based on current and projected contributions to key SIGINT 
missions

3.4. (S//SI//REL) Identify new access, collection, and exploitation methods 
by leveraging global business trends in data and communications services


(U) In order to achieve these three mission goals, we must collectively 
liberate the innovation and creativity of our workforce through technology, 
policies, and business processes – hence, the following two goals have been 
set:

4. (U) Collectively foster an environment that encourages and rewards 
diversity, empowerment, innovation, risk-taking and agility

4.1. (U) Empower employees to make decisions and drive change; invest in 
and reward innovation, risk-taking, and teaming

4.2. (U//FOUO) Build compliance into systems and tools to ensure the 
workforce operates within the law and without worry

4.3. (U) Work together to detail, implement, and evolve the strategy

4.4. (U) Provide everyone with the training and experiences necessary to 
lead the world’s most capable SIGINT service and be competitive for 
Intelligence Community leadership positions

5. (U) Enable better, more efficient management of the mission and business 
by establishing new, modifying current, and eliminating inefficient, 
business processes; by strengthening customer relationships; and by 
building necessary internal and external partnerships.

5.1. (U//FOUO) Pursue, develop, and implement policy consistent with the 
pace and scope of operations

5.2. (U//FOUO) Build into systems and tools, features that enable and 
automate end-to-end value-based assessment of SIGINT products and services

5.3. (U//FOUO) Create and sustain a mission management environment that is 
autonomic and agile

5.4. (U//FOUO) Synchronize mission, budget and acquisition, and technology 
and research activities to deliver the capabilities required to keep SIGINT 
relevant

5.5. (U) Align and standardize administrative business processes throughout 
the SIGINT enterprise to reduce the bureaucratic burden on the enterprise

5.6. (U//FOUO) Champion the development of a unified NSA/CSS U.S. customer 
engagement strategy that streamlines processes, increases resource 
efficiencies, eliminates redundancies, and strengthens NSA relationships

--

What a laugh, you NSA cowboy idiots.

Stephen Loosley


Message sent using MelbPC WebMail Server






More information about the Link mailing list