国产热热热精品,亚洲视频久久】日韩,三级婷婷在线久久,99人妻精品视频,精品九热人人肉肉在线,AV东京热一区二区,91po在线视频观看,久久激情宗合,青青草黄色手机视频

USEUROPEAFRICAASIA 中文雙語Fran?ais
China
Home / China / World

NSA chief details program at hackers' conference in Vegas

By Associated Press in Las Vegas, Nevada | China Daily | Updated: 2013-08-02 07:09

NSA chief details program at hackers' conference in Vegas

US Army General Keith Alexander, head of the country's National Security Agency, delivers a keynote address at the Black Hat hacker conference on Wednesday in Las Vegas, where he faced comments from hecklers in the crowd. Isaac Brekken / Associated Press

The head of the US National Security Agency defended the government's much-criticized surveillance program against hecklers among a crowd of computer systems analysts on Wednesday, but also had a challenge for them: If you don't like it, lend your talent to build a better one.

"You're the greatest tech talent anywhere in the world. Help us," Army General Keith Alexander said at the hacker conference for the buttoned-up corporate and government security analyst crowd, not the one later in the week for the more counter-culture types.

Alexander spent much of his 45-minute address explaining how government methods used to collect telephone and e-mail data helped foil 54 terror plots since 1993. He was interrupted at times by hecklers, but also drew applause.

"Our nation takes stopping terrorism as one of the most important things," he said, standing in short sleeves with a slide on the screen behind him showing a timeline and the number of foiled plots.

"Freedom!" one man shouted from the middle of the standing-room crowd.

"Exactly. And with that, when you think about it, how do we do that? Because we stand for freedom," Alexander replied before continuing his keynote speech to the annual Black Hat conference at Caesars Palace. Organizers said the conference drew 7,000 people.

Alexander didn't refer in his address specifically to leaks by former NSA systems analyst contractor Edward Snowden of classified documents that brought attention on the government's surveillance efforts.

He remained unapologetic, denying another heckler's claim that he lied to Congress about methods the NSA uses to "connect the dots" and "go after the bad actors who may want to do us harm".

"People say, 'I hear what you say, but I don't trust that,"' Alexander said.

"How do we defend this country? That is the question," he said. "The nation needs to know we're going to do the right thing."

The four-star general, who has headed the NSA for eight years, said it wasn't true the agency listens to specific phone calls and reads e-mails. He said "no one at NSA" has ever gone outside the legal boundaries of the Patriot Act and Foreign Intelligence Surveillance Act programs allowing the collection of "metadata".

Alexander emphasized oversight of his programs by US Congress, courts and the administration, and posted a slide of the type of broad one-line "metadata" that he said the agency collects from communications abroad: date, duration, phone number calling, phone number receiving, and a note about the authorizing entity.

"There are no names in the database," he said. "No addresses. No credit card numbers. The database is like a lockbox."

Alexander said the data led to the disruption of 13 terror plots in the US, 25 in Europe, five in Africa and 11 in Asia. He spoke of a thwarted plot to bomb the New York City subway system in September 2009, but didn't specify others.

"We get all these allegations of, 'What they could be doing,"' Alexander said. "But when you check, like the (congressional) intelligence committees, they find that hasn't happened. Zero times."

Ted Doty, a computer product security manager and blogger from Atlanta, said he wasn't convinced.

"The smart people know that what's interesting is the connection trees," Doty said, referring to the links between one caller and the next. "That's what the NSA wants."

Editor's picks
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
崇明县| 攀枝花市| 罗甸县| 特克斯县| 吴忠市| 革吉县| 慈利县| 宁化县| 垣曲县| 麟游县| 潮安县| 霍林郭勒市| 松溪县| 西城区| 惠来县| 兴安盟| 张家界市| 大连市| 大英县| 浦江县| 神木县| 济南市| 曲阳县| 鹿邑县| 景宁| 玉山县| 商洛市| 海城市| 岳阳市| 青铜峡市| 古田县| 安岳县| 肥乡县| 安义县| 马关县| 大洼县| 寿光市| 雅江县| 拜城县| 固安县| 抚松县|