|  | <<  
             ^ 
              >> 
            
              | Date: 1998-12-19 
 
 NSA: Organigramm aufgetaucht-.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 
 Gleichsam als krönenden Abschluss eines Jahrs, das soviel
 Informationen wie kaum eines zuvor über den
 militärisch/elektronischen Komplex in die Öffentlichkeit
 gebracht hat,  komt nun ein Organigramm der National
 Security Agency ans Licht.
 Aufgestöbert wurde es vom Defense Information and
 Electronics Report, gehostet wird es auf Lieblings/site aller
 Echelon-Busters, John Young's Cryptome.
 
 http://jya.com/nsa-chart.htm
 -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
 Adam Hebert
 December 18, 1998 Readers curious about the inner
 workings of the super-secret National Security Agency may
 be curious about the roles of the assorted divisions NSA
 references from time to time. Within the realm of information
 systems security, NSA makes cryptic references to divisions
 such as "X," "I3," and "C" -- typically without an explanation
 of what they are or what they do. Wondering this ourselves,
 we contacted NSA public affairs and asked for an
 explanation.
 
 Several days later, the NSA response to our query was, "we don't normally divulge that information." Explanations that Defense Information and Electronics Report was not looking for sensitive data such as home telephone n
 umbers -- just an organizational breakdown -- fell upon deaf ears. We were instructed we could make that request under the Freedom of Information Act.
 
 So we turned to the FOIA Office, curious how responsive the agency might be. Less than two months later, we got our answer.
 
 NSA supplied DI&ER with 13 pages of organizational charts, but all but two of hundreds of names are blacked-out. NSA revealed the Deputy Director for Information Systems Security is Michael Jacobs, and his assistant is Jo
 hn Nagengast (no surprises there). Beyond that, all positions are to remain anonymous. NSA employees are still provided business cards, though, which they are free to distribute as they see fit. We've even got a couple ou
 rselves.
 
 Interestingly, NSA did not conceal the office telephone numbers that appeared in the Research and Technology "R" division, and showed further equanimity by outlining the "R" mission -- to "manage a research & technology d
 evelopment program that supports NSA's [signals intelligence] and INFOSEC missions."
 
 As a public service to our readers, the information supplied is reprinted in this issue, with all unsightly black redaction marks removed. And in case you were wondering -- "X" is network security, "I3" is Defensive Infor
 mation Operations, and "C" is Security Evaluation.
 
 http://jya.com/dier9850chart.pdf (22K; 6 pp.)
 
 [JYA Note: Though informative, the charts appear to diagram
 only parts of NSA. We'd appreciate information on those
 missing <jy@jya.com>. Anonymous or encrypted mail
 welcome. PGP public keys: http://jya.com/jy-pk.htm .]
 
 
 -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-  -.-. --.-
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 edited by Harkank
 published on: 1998-12-19
 comments to office@quintessenz.at
 subscribe Newsletter
 - -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.- -.-. --.-
 <<  
                   ^ 
                    >>
 |  |  |  |