男女羞羞视频在线观看,国产精品黄色免费,麻豆91在线视频,美女被羞羞免费软件下载,国产的一级片,亚洲熟色妇,天天操夜夜摸,一区二区三区在线电影
USEUROPEAFRICAASIA 中文雙語Fran?ais
China
Home / China / World

NSA chief details program at hackers' conference in Vegas

By Associated Press in Las Vegas, Nevada | China Daily | Updated: 2013-08-02 07:09

NSA chief details program at hackers' conference in Vegas

US Army General Keith Alexander, head of the country's National Security Agency, delivers a keynote address at the Black Hat hacker conference on Wednesday in Las Vegas, where he faced comments from hecklers in the crowd. Isaac Brekken / Associated Press

The head of the US National Security Agency defended the government's much-criticized surveillance program against hecklers among a crowd of computer systems analysts on Wednesday, but also had a challenge for them: If you don't like it, lend your talent to build a better one.

"You're the greatest tech talent anywhere in the world. Help us," Army General Keith Alexander said at the hacker conference for the buttoned-up corporate and government security analyst crowd, not the one later in the week for the more counter-culture types.

Alexander spent much of his 45-minute address explaining how government methods used to collect telephone and e-mail data helped foil 54 terror plots since 1993. He was interrupted at times by hecklers, but also drew applause.

"Our nation takes stopping terrorism as one of the most important things," he said, standing in short sleeves with a slide on the screen behind him showing a timeline and the number of foiled plots.

"Freedom!" one man shouted from the middle of the standing-room crowd.

"Exactly. And with that, when you think about it, how do we do that? Because we stand for freedom," Alexander replied before continuing his keynote speech to the annual Black Hat conference at Caesars Palace. Organizers said the conference drew 7,000 people.

Alexander didn't refer in his address specifically to leaks by former NSA systems analyst contractor Edward Snowden of classified documents that brought attention on the government's surveillance efforts.

He remained unapologetic, denying another heckler's claim that he lied to Congress about methods the NSA uses to "connect the dots" and "go after the bad actors who may want to do us harm".

"People say, 'I hear what you say, but I don't trust that,"' Alexander said.

"How do we defend this country? That is the question," he said. "The nation needs to know we're going to do the right thing."

The four-star general, who has headed the NSA for eight years, said it wasn't true the agency listens to specific phone calls and reads e-mails. He said "no one at NSA" has ever gone outside the legal boundaries of the Patriot Act and Foreign Intelligence Surveillance Act programs allowing the collection of "metadata".

Alexander emphasized oversight of his programs by US Congress, courts and the administration, and posted a slide of the type of broad one-line "metadata" that he said the agency collects from communications abroad: date, duration, phone number calling, phone number receiving, and a note about the authorizing entity.

"There are no names in the database," he said. "No addresses. No credit card numbers. The database is like a lockbox."

Alexander said the data led to the disruption of 13 terror plots in the US, 25 in Europe, five in Africa and 11 in Asia. He spoke of a thwarted plot to bomb the New York City subway system in September 2009, but didn't specify others.

"We get all these allegations of, 'What they could be doing,"' Alexander said. "But when you check, like the (congressional) intelligence committees, they find that hasn't happened. Zero times."

Ted Doty, a computer product security manager and blogger from Atlanta, said he wasn't convinced.

"The smart people know that what's interesting is the connection trees," Doty said, referring to the links between one caller and the next. "That's what the NSA wants."

Editor's picks
Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site.
License for publishing multimedia online 0108263

Registration Number: 130349
FOLLOW US
主站蜘蛛池模板: 宜宾县| 绥宁县| 清徐县| 鹤庆县| 鄂伦春自治旗| 贡嘎县| 辉南县| 新建县| 江川县| 军事| 邵阳市| 增城市| 鄂托克前旗| 和顺县| 丰城市| 攀枝花市| 都安| 伊吾县| 三都| 南川市| 黔江区| 河源市| 呼和浩特市| 开平市| 霍邱县| 伊吾县| 长沙市| 武定县| 霍州市| 肇庆市| 汉阴县| 洛浦县| 久治县| 民和| 年辖:市辖区| 马龙县| 天柱县| 福建省| 通榆县| 丘北县| 鄄城县| 台北市| 苏尼特右旗| 杨浦区| 柳州市| 肇源县| 大同市| 扶沟县| 鹤壁市| 三台县| 永仁县| 张家界市| 临武县| 鄱阳县| 广宗县| 霍城县| 津市市| 邵武市| 无为县| 丽江市| 公主岭市| 璧山县| 兴海县| 金昌市| 江西省| 拉萨市| 台中县| 白水县| 普安县| 祁东县| 璧山县| 无锡市| 读书| 江陵县| 南开区| 沅江市| 资阳市| 宣化县| 河南省| 微山县| 永寿县| 鹿泉市|