男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
USEUROPEAFRICAASIA 中文雙語Fran?ais
Home / World

NSA chief details program at hackers' conference in Vegas

By Associated Press in Las Vegas, Nevada | China Daily | Updated: 2013-08-02 07:09

 NSA chief details program at hackers' conference in Vegas

US Army General Keith Alexander, head of the country's National Security Agency, delivers a keynote address at the Black Hat hacker conference on Wednesday in Las Vegas, where he faced comments from hecklers in the crowd. Isaac Brekken / Associated Press

NSA chief details program at hackers' conference in Vegas

The head of the US National Security Agency defended the government's much-criticized surveillance program against hecklers among a crowd of computer systems analysts on Wednesday, but also had a challenge for them: If you don't like it, lend your talent to build a better one.

"You're the greatest tech talent anywhere in the world. Help us," Army General Keith Alexander said at the hacker conference for the buttoned-up corporate and government security analyst crowd, not the one later in the week for the more counter-culture types.

Alexander spent much of his 45-minute address explaining how government methods used to collect telephone and e-mail data helped foil 54 terror plots since 1993. He was interrupted at times by hecklers, but also drew applause.

"Our nation takes stopping terrorism as one of the most important things," he said, standing in short sleeves with a slide on the screen behind him showing a timeline and the number of foiled plots.

"Freedom!" one man shouted from the middle of the standing-room crowd.

"Exactly. And with that, when you think about it, how do we do that? Because we stand for freedom," Alexander replied before continuing his keynote speech to the annual Black Hat conference at Caesars Palace. Organizers said the conference drew 7,000 people.

Alexander didn't refer in his address specifically to leaks by former NSA systems analyst contractor Edward Snowden of classified documents that brought attention on the government's surveillance efforts.

He remained unapologetic, denying another heckler's claim that he lied to Congress about methods the NSA uses to "connect the dots" and "go after the bad actors who may want to do us harm".

"People say, 'I hear what you say, but I don't trust that,"' Alexander said.

"How do we defend this country? That is the question," he said. "The nation needs to know we're going to do the right thing."

The four-star general, who has headed the NSA for eight years, said it wasn't true the agency listens to specific phone calls and reads e-mails. He said "no one at NSA" has ever gone outside the legal boundaries of the Patriot Act and Foreign Intelligence Surveillance Act programs allowing the collection of "metadata".

Alexander emphasized oversight of his programs by US Congress, courts and the administration, and posted a slide of the type of broad one-line "metadata" that he said the agency collects from communications abroad: date, duration, phone number calling, phone number receiving, and a note about the authorizing entity.

"There are no names in the database," he said. "No addresses. No credit card numbers. The database is like a lockbox."

Alexander said the data led to the disruption of 13 terror plots in the US, 25 in Europe, five in Africa and 11 in Asia. He spoke of a thwarted plot to bomb the New York City subway system in September 2009, but didn't specify others.

"We get all these allegations of, 'What they could be doing,"' Alexander said. "But when you check, like the (congressional) intelligence committees, they find that hasn't happened. Zero times."

Ted Doty, a computer product security manager and blogger from Atlanta, said he wasn't convinced.

"The smart people know that what's interesting is the connection trees," Doty said, referring to the links between one caller and the next. "That's what the NSA wants."

(China Daily 08/02/2013 page12)

Today's Top News

Editor's picks

Most Viewed

Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 灵宝市| 霍邱县| 南康市| 临颍县| 沧州市| 正阳县| 博兴县| 惠州市| 吴川市| 南汇区| 耒阳市| 扬中市| 喀什市| 平罗县| 万源市| 宁武县| 漯河市| 平凉市| 崇明县| 德庆县| 嵊州市| 宁乡县| 朝阳市| 米泉市| 平南县| 无棣县| 固安县| 绵阳市| 岳西县| 明光市| 京山县| 石嘴山市| 偏关县| 驻马店市| 西峡县| 北流市| 平乐县| 偃师市| 惠东县| 交口县| 桂阳县| 长岭县| 兰州市| 吴江市| 延寿县| 定陶县| 景泰县| 遂溪县| 武安市| 台南市| 榆社县| 朝阳县| 紫阳县| 镇原县| 高台县| 卫辉市| 南开区| 鹤岗市| 襄樊市| 竹北市| 庆云县| 黄龙县| 闸北区| 濮阳县| 巴塘县| 遂溪县| 沙坪坝区| 星子县| 丰城市| 高邮市| 竹北市| 乡城县| 孟州市| 芒康县| 即墨市| 安国市| 虎林市| 曲沃县| 老河口市| 泰兴市| 仙桃市| 琼结县|