News Website/Publication: nytimes.com/The New York Times Author(s): David E. Sanger and Thom Shanker Author(s) description, job title or background: N/A Date and Timestamp: JAN. 14, 2014 140 Character Summary: Secret N.S.A. implant devices can access computer systems regardless of Internet connection 10 C's Score: 86
http://www.nytimes.com/2014/01/15/us/nsa-effort-...
Richard A. Clarke, an official in the Clinton and Bush administrations who served as one of the five members of the advisory panel, explained the group’s reasoning in an email last week, saying that “it is more important that we defend ourselves than that we attack others.”
“Holes in encryption software would be more of a risk to us than a benefit,” he said, adding: “If we can find the vulnerability, so can others. It’s more important that we protect our power grid than that we get into China’s.”
“How do you ensure that Cyber Command people” are able to look at “those that are attacking us?” a senior official, who compared it to submarine warfare, asked in an interview several months ago.
“That is what the submarines do all the time,” said the official, speaking on the condition of anonymity to describe policy. “They track the adversary submarines.” In cyberspace, he said, the United States tries “to silently track the adversaries while they’re trying to silently track you.”
Would you like to comment?
Join Diigo for a free account, or sign in if you are already a member.