Who would have thought the Enemy of the NSA is its Methods of Operations

The NSA has had decades to refine how it operates.  The personnel and technology are meant to fulfill the mission of the NSA.


OPS 2A and 2B BuildingsThe National Security Agency/Central Security Service (NSA/CSS) leads the U.S. Government in cryptology that encompasses both Signals Intelligence (SIGINT) and Information Assurance (IA) products and services, and enables Computer Network Operations (CNO) in order to gain a decision advantage for the Nation and our allies under all circumstances.

I never noticed until now that in the Mission Statement is “under all circumstances.”  This means the NSA spent a lot of time thinking about threats to its operations. Out of all the scenarios that the NSA went through, it is very unlikely they foresaw the case where they are in a PR disaster and are being attacked by Allies and the USA.

Just check out the latest Google News search for “NSA."

New York Daily News


Hill lawmakers battle over future of NSA spying, in wake of White ...

Fox News-5 hours agoShare
FILE: Oct. 28, 2013: A photo illustration of an NSA logo and a cellphone simulating a call to German Chancellor Angela Merkel, Frankford, ...

In the Sen Mark Udall post on Huffington the call is made to change NSA operations.

WASHINGTON -- Colorado Sen. Mark Udall (D) said on Sunday that any arguments against reform of the National Security Agency's surveillance programs crumbled this past week, following the release of a White House report that criticized the programs and a judge's ruling that questioned their constitutionality.

Speaking on ABC's "This Week," Udall said, "The arguments for the status quo fell apart this week in Washington."

"It's now time to really fundamentally reform the way in which the NSA operates," he said.

Maybe it is worthwhile to think about what happens if there is a PR disaster in your data center operations and documents are in public domain as to how you operate.