Criticomm

Last updated

CRITICOM(M) is an abbreviation for "Critical Intelligence Communications [System]" q.v. National Security Agency (NSA) former flash-intelligence alert and warning system. N.B. The official intelligence-community (IC) abbreviation uses two Ms.

The Critical Intelligence Communications network, or CRITICOMM, is designed to flash to the American President and a handful of other senior officials intelligence alerts and warnings of the highest priority—an imminent coup in a Middle East sheikdom, for example, or the assassination of a world leader, or the sinking of a Soviet sub. It is the goal of NSA to have such a CRITIC message on the President's desk within ten minutes of the event. An example of a CRITIC message being sent is the USS Pueblo that was captured by North Korea. The USS Pueblo's CRITIC message was sent by Don McClarren CTO-2.(1)

. . . . In 1973 NSA's CRITICOM/SPINTCOM network was transformed into the Digital Network-Defense Special Security Communications System (DIN/DSCSS), which fully integrated the message traffic into the Defense Department's general service AUTODIN network (automatic digital network).

Sources

Related Research Articles

<span class="mw-page-title-main">National Security Agency</span> U.S. signals intelligence organization

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI). The NSA is responsible for global monitoring, collection, and processing of information and data for foreign and domestic intelligence and counterintelligence purposes, specializing in a discipline known as signals intelligence (SIGINT). The NSA is also tasked with the protection of U.S. communications networks and information systems. The NSA relies on a variety of measures to accomplish its mission, the majority of which are clandestine. The NSA has roughly 32,000 employees.

<span class="mw-page-title-main">Signals intelligence</span> Intelligence-gathering by interception of signals

Signals intelligence (SIGINT) is the act and field of intelligence-gathering by interception of signals, whether communications between people or from electronic signals not directly used in communication. Signals intelligence is a subset of intelligence collection management. As classified and sensitive information is usually encrypted, signals intelligence may necessarily involve cryptanalysis. Traffic analysis—the study of who is signaling to whom and in what quantity—is also used to integrate information, and it may complement cryptanalysis.

<span class="mw-page-title-main">Communications security</span> Discipline of telecommunications

Communications security is the discipline of preventing unauthorized interceptors from accessing telecommunications in an intelligible form, while still delivering content to the intended recipients.

USS <i>Pueblo</i> (AGER-2) US Navy ship attacked & captured by North Korea in 1968

USS Pueblo (AGER-2) is a Banner-class environmental research ship, placed into service during World War II, then converted to a spy ship in 1967 by the United States Navy. She gathered intelligence and oceanographic information, monitoring electronic and radio signals from North Korea. On 23 January 1968, the ship was attacked and captured by a North Korean vessel, in what became known as the "Pueblo incident", or alternatively, as the "Pueblo crisis".

<span class="mw-page-title-main">Bobby Ray Inman</span> United States Navy admiral

Bobby Ray Inman is a retired United States Navy admiral who held several influential positions in the United States Intelligence Community.

<span class="mw-page-title-main">KW-26</span>

The TSEC/KW-26, code named ROMULUS, was an encryption system used by the U.S. Government and, later, by NATO countries. It was developed in the 1950s by the National Security Agency (NSA) to secure fixed teleprinter circuits that operated 24 hours a day. It used vacuum tubes and magnetic core logic, replacing older systems, like SIGABA and the British 5-UCO, that used rotors and electromechanical relays.

The National Security Agency took over responsibility for all U.S. Government encryption systems when it was formed in 1952. The technical details of most NSA-approved systems are still classified, but much more about its early systems have become known and its most modern systems share at least some features with commercial products.

<span class="mw-page-title-main">Carnivore (software)</span> Electronic communication monitor used by the FBI

Carnivore, later renamed DCS1000, was a system implemented by the Federal Bureau of Investigation (FBI) that was designed to monitor email and electronic communications. It used a customizable packet sniffer that could monitor all of a target user's Internet traffic. Carnivore was implemented in October 1997. By 2005 it had been replaced with improved commercial software.

<span class="mw-page-title-main">Emergency population warning</span> Warning issued by authorities to the public en masse

An emergency population warning is a method where by local, regional, or national authorities can contact members of the public to warn them of an impending emergency. These warnings may be necessary for a number of reasons, including:

Project SHAMROCK was the sister project to Project MINARET, an espionage exercise started in August 1945. Project MINARET involved the accumulation of all telegraphic data that entered or exited the United States. The Armed Forces Security Agency (AFSA) and its successor, the National Security Agency (NSA), were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegrams via the Western Union and its associates RCA and ITT. NSA did the operational interception, and, if there was information that would be of interest to other intelligence agencies, the material was passed to them. Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. No court authorized the operation and there were no warrants.

The Worldwide Military Command and Control System, or WWMCCS, was a military command and control system implemented for command and control of the United States Department of Defense. It was created in the days following the Cuban Missile Crisis. WWMCCS was a complex of systems that encompassed the elements of warning, communications, data collection and processing, executive decision-making tools and supporting facilities. It was decommissioned in 1996 and replaced by the Global Command and Control System.

<span class="mw-page-title-main">1969 EC-121 shootdown incident</span> Downing of a U.S. Navy aircraft by North Korean over the Sea of Japan

On 15 April 1969, a United States Navy Lockheed EC-121M Warning Star of Fleet Air Reconnaissance Squadron One (VQ-1) on a reconnaissance mission was shot down by a North Korean MiG-21 aircraft over the Sea of Japan. The plane crashed 90 nautical miles (167 km) off the North Korean coast and all 31 Americans on board were killed, which constitutes the largest single loss of U.S. aircrew during the Cold War era.

After the end of World War II, all the Western allies began a rapid drawdown of military forces, including those of signals intelligence. At the time, the US still had a COMINT organization split between the Army and Navy. A 1946 plan listed Russia, China, and a [redacted] country as high-priority targets.

<span class="mw-page-title-main">XKeyscore</span> Mass surveillance system

XKeyscore is a secret computer system used by the United States National Security Agency (NSA) for searching and analyzing global Internet data, which it collects in real time. The NSA has shared XKeyscore with other intelligence agencies, including the Australian Signals Directorate, Canada's Communications Security Establishment, New Zealand's Government Communications Security Bureau, Britain's Government Communications Headquarters, Japan's Defense Intelligence Headquarters, and Germany's Bundesnachrichtendienst.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<span class="mw-page-title-main">Dishfire</span> Covert global surveillance collection system and database

Dishfire is a covert global surveillance collection system and database run by the United States of America's National Security Agency (NSA) and the United Kingdom's Government Communications Headquarters (GCHQ) that collects hundreds of millions of text messages on a daily basis from around the world. A related analytic tool is known as Prefer.

<span class="mw-page-title-main">2010s global surveillance disclosures</span> Disclosures of NSA and related global espionage

During the 2010s, international media reports revealed new operational details about the Anglophone cryptographic agencies' global surveillance of both foreign and domestic nationals. The reports mostly relate to top secret documents leaked by ex-NSA contractor Edward Snowden. The documents consist of intelligence files relating to the U.S. and other Five Eyes countries. In June 2013, the first of Snowden's documents were published, with further selected documents released to various news outlets through the year.

NOBUS is a term used by the United States National Security Agency (NSA) to describe a known security vulnerability that it believes the United States (US) alone can exploit.

<span class="mw-page-title-main">Operation Formation Star</span> US military operation in 1968 off North Korea

Operation Formation Star was the code name for the emergency re-deployment of U.S. Seventh Fleet warships to the Sea of Japan off the eastern coast of North Korea following that country's seizure of the USS Pueblo (AGER-2) in international waters on 23 January 1968.