Former NSA Director Reflects On Snowden Leaks

  /     /     /  
Publicated : 22/11/2024   Category : security


Former NSA Director Reflects On Snowden Leaks


Gen. Keith Alexander defends NSAs controversial spying programs as lawful.



Washington, D.C. — MIRCon — Gen. Keith Alexander, the former director of the National Security Agency (NSA), here today described the fallout from the Edward Snowden leaks as the low point of his tenure at the intelligence agency.
Not because [Snowden] took it [the documents]… but because people believed the NSA was doing something wrong. But we were doing exactly what our country asked us to do to protect against terrorist acts with laws approved by the administration, Congress, and the courts, Alexander said here yesterday during the question-and-answer portion of his keynote address at FireEyes MIRCon conference. Our nations programs are to protect our nation and our allies. To have people at NSA treated like rotten people… was absolutely wrong. The way it was characterized was sensationalized and inflamed.
Alexander said in his keynote that he had one of the best jobs in the world serving as director of the NSA. Because we did really neat things. Some have been revealed publicly, and not in a favorable light. Some have not been revealed, but have saved lives.
The former NSA director was asked whose phone call data is stored in the NSAs databases under the agencys controversial program exposed in the Snowden leaks. Alexander said with phone-records surveillance metadata collected via its Foreign Intelligence Surveillance Act (FISA) program, the agency can drill down into call traffic to and from known terrorists, for example. Our data is in there, my data is in there. If I talk to an Al-Qaeda operative, my chances of being looked at are really good. If you dont make calls to an operative, then the NSA wont be looking at your call data, he said.
The agency studies some 140 to 180 numbers per year culled from the metadata information it gathers in FISA, he said. Everything the NSA does with this program is audited 100 percent, he said.
As for the NSAs data-gathering program under FISA 702 -- which includes content of emails, instant messages, browsing history, and other online communications -- Alexander said if a citizen comes in contact with a terrorist, the NSA will likely be looking at those records. He reiterated that the agency handles that data carefully: The people who touch [this] data go through 400 hours of training on how to deal with this data. Thats more [training] than we give pilots.
When asked about revelations that the US and its allies monitor phone calls of one anothers leaders -- such as reports of the US monitoring of German chancellor Angela Merkels calls --Alexander called the practice a tough issue driven by the reality that nations act in their best interests, and the US isnt the only ally keeping tabs on foreign leaders calls.
We at times want to make sure a war doesnt go on in a certain area. In the Middle East, if players are doing something in that area that is a very hot spot, its important that our political and military leaders understand whats going on. If we need to collect it, eyes wide open, I need this for the good of the nation and allies. We need to be willing to say that to the allies as well, and those will be political decisions made in the future, he said.
Alexander said the key elements to defending the nations networks from todays cybercrime, cyber espionage, and politically motivated attacks include situational awareness, training security experts in both offense and defense, cybersecurity legislation, and closer coordination between government and industry in protecting networks. We have no way of working together right now.
But nothing prevents industry and government from working together for a common cause to defend ourselves. And we should do that. If small and midsized organizations worked with government and private industry, too, there would be even more attack intelligence that could be gathered. Sharing that information at network speed would be significant, he said. Think how much better our cyber defense would be. We can and should do this.

Last News

▸ DHS-funded SWAMP scans code for bugs. ◂
Discovered: 23/12/2024
Category: security

▸ Debunking Machine Learning in Security. ◂
Discovered: 23/12/2024
Category: security

▸ Researchers create BlackForest to gather, link threat data. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Former NSA Director Reflects On Snowden Leaks