The National Security Agency is a national level intelligence agency functioning under the United States Department of Defense. The department functions on the authority of the Director of National Intelligence. The National Security Agency is mainly responsible for global monitoring, collection and processing of different types of data that are either acquired by normal means or by top secret means. Apart from this the organization is also responsible for collection of intelligence for foreign intelligence and counterintelligence purposes. It is capable of a special signaling system known as Signaling intelligence through which it aims to make the most of the communication (fincen.gov 2018). Headquartered in Maryland, U.S.A, the following agency has an estimated budget of more than $10 billion. The NSA does not involve itself in foreign human espionage and generally carry out different types of work through the transformation of intelligence through intelligence signaling systems. It was formed in the year 1952 just after the end of the Second World War and had actively participated in gathering information during the Cold War era, Vietnam War and the Afghanistan, Iraq and Syria conflicts. The mission of the department is to include different radio eavesdropping, intercepting phone calls and radio calls to ensure the safety of the organization in any different cases of security threat to the nation (dni.gov 2018).
The NSA was created as a part of the belief that the importance of a distinct character of communications intelligence warranted an organization that was to be totally different from that of the armed forces and the other kind of intelligence agencies of U.S.A (Clapper 2015). Though the department operates in coordination with the department of defense, the NSA mainly belongs to the intelligence committee. The main function of the department is to include the protection and the formulation of different codes, ciphers and other cryptology for the U.S military and the other kinds of Government agencies as well as the interception, analysis and solution of different coded transmissions by electronic or other special means. The agency has separate wings for research and development that conducts research of varying formats. It also conducts posts to intercept different type of signals all around the world. The main activities of the following organization can thus be pointed out in a list. They are as follows;
The organization basically uses the Scowcroft model whose elements are as follows;
There are a number of different tools that have been in use by the NSA to counter the different terrorism activities that are presently happening in USA and different parts of the world that threatens the security of USA. Some of them are as follows;
Apart from the above mentioned tools there are also other kinds of acts and special permissions that help the National Security Agency to conduct different types of operations in an organized and secret manner to protect the country and provide accurate intelligence (Falk and Morgenstern 2009).
The National Security Agency is directly under the Department of Defense and therefore its coordination with other intelligence organizations is surely quite common in nature. The agency conducts regular meetings with the other secret intelligence agencies like FBI, CIA, Department of Homeland Security, Department of State and many others as such to keep updated. The coordination with each other also helps to keep danger from terrorism away. The organization was widely criticized after it failed to intercept the attacks of World Trade Center and thus it now communicates different details on intelligence and tries to innovate with new ideas of communication and decoding (dni.gov 2018). The main activities of the organization thus also depend on the existence of a proper intercommunication among the different intelligence agencies.
The different kinds of intelligence collected by the organization are as follows;
References
Clapper, J. (2015, 24 July). “Herding Cats” Aspen Security Forum – Interview by Andrea Mitchell (Links to an external site.)Links to an external site. [Video]. Retrieved from: https://www.youtube.com/watch?v=-1dWq0sxRlY
Falk, O., and Morgenstern, H. (Eds.). 2009. Suicide terror: understanding and confronting the threat. Hoboken, NJ: John Wiley and Sons, Inc.Chapter 7: Medical Management of Suicide Terrorism
Financial Crimes Enforcement Network United States Department of the Treasury. (n.d). USA Patriot Act (Links to an external site.)Links to an external site.. Retrieved from https://www.fincen.gov/statutes_regs/patriot/index.html https://www.heritage.org/research/commentary/2013/7/60-terrorist-plots-since-911-continued-lessons-in-domestic-counterterrorism?ac=1
Office of the Director of National Intelligence (Links to an external site.)Links to an external site.. (https://www.dni.gov/index.php/intelligence-community/members-of-the-ic)
The Federal Bureau of Investigation. Intelligence Collection Disciplines (Links to an external site.)Links to an external site.(INTs) Retrieved from: https://www2.fbi.gov/intelligence/di_ints.htm
Zuckerman, J., Bucci, S., and Carafano, J. 2013. 60 Terrorist Plots Since 9/11: Continued Lessons in Domestic Counterterrorism (Links to an external site.)Links to an external site.. Report SR-137. The Heritage Foundation, Washington DC. Retrieved from:
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download