intelligence
DESCRIPTION
describing the intelligenceTRANSCRIPT
Phase 4IP
HLS630: Organizational and Policy
Challenges
1503B-01
Colorado Technical University On-Line
Melissa Hall
Professor Suzanne Swab
September 14, 2015
NSA Pros
Electronically sharing collected data securely, while making sense of it.
Increase noticeably the security of national security systems.
Increases vital operations and data when and where required.
Pros Continued
1. “Offering the least principles for creating and overseeing an intelligence function
2. Providing rules for safeguarding confidentiality and constitutional rights inside
the intelligence procedure.
3. Offering typical rules and procedures for applying or evaluating the intelligence
function of the agency.
Cons of NSA
Any conversation regarding the NSA’s surveillance and data collection practices
could very well disclose state secrets.
Cons Continued…
1. “The challenge of the National Criminal Intelligence Sharing Plan is aligning
policies to leverage the existing systems; each system needs to overcome policy barriers and
technology barriers so they can leverage their assets” (Michael, 2003).
There are two main functions of the NSA: defending the
information systems of The U.S. government by utilizing code
making and changing secret, foreign intelligence communication
into thorough text (Levy,2011).
The disclosed secrets regarding the NSA’s program PRISM, NSA call database and vast Informant, promptly caught the attention of the public.
The Director, National Security Agency will:- Assess and consent all cryptographic implementations
envisioned to safeguard national security systems and/or national security data.
Offers both guidance and assistance to U.S. Government Departments, to include agencies ,with classifying defense necessities and choosing the encryption algorithms and product implementations.
Offers any endorsements for developments to the overarching objectives and aspirations or key polices of the strategy
Provide recommendations for implementation.The National Security Agency has long been involved with the computer security research community in examining a broad range of computer security subjects to include operating system security, as part of its data or information assurance mission.
The National Security Agency has long been involved with the computer security research community in examining a broad range of computer security, as part of its Information Assurance purpose.
The security mechanisms implemented in the system provide flexible support for a wide range of security policies. They make it possible to configure the system to meet a wide range of security requirements.
NSA is subject to rigorous internal compliance and external oversight. Like many other regulated entities, NSA has an enterprise-wide compliance program, led by NSA's Director of Compliance, a position required by statute. NSA's compliance program is designed to provide precision in NSA's activities to ensure that they are consistently conducted in accordance with law and procedure
References
About NSA. (n.d.). Retrieved from https://www.nsa.gov/about/commitment/index.shtml
Levy, A. (2011, May 11). An Overview of the Major U.S. Intelligence Agencies: What is the Difference Between the DIA, NSA, CIA and FBI? Retrieved from http://angelialevy.com/2011/05/11/ an-overview-of-the-major-u-s-intelligence-agencies-what-is-the-difference-between-the-dia-nsa-cia-and-fbi/
Ludloff, M. (2013, July 19). Privacy v Security, Transparency v Secrecy: The NSA, PRISM, and the Release of Classified Documents. Retrieved from http://blog.patternbuilders.com/2013/07/19/ privacy-v-security-transparency-v-secrecy-nsa-prism-others/
Michael, S. (2003, December 1). Intelligence officials call for info-sharing organization.
National Security Agency, Civil Liberties and Privacy Office Report. (2014, April 16). Retrieved from http://fas.org/irp/nsa/clpo-702.pdf
Security-Enhanced LinuxSecurity-Enhanced Linux. (n.d.). Retrieved from https://www.nsa.gov/research/ selinux/index.shtml
The Comprehensive National Cybersecurity Initiative. (n.d.). Retrieved from https://www.whitehouse.gov/issues/foreign-policy/cybersecurity/national-initiative