Endpoint // Privacy
6/30/2014
12:10 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

NSA Director Downplays Damage From Snowden Leaks

New NSA director tells The New York Times he'll have to be more open about agency's activities than his predecessors.

Admiral Michael Rogers, who three months ago replaced the retired General Keith Alexander as head of the National Security Agency (NSA), says it's impossible to prevent an insider attack at the agency from ever occurring again. But the fallout from the more than one million documents leaked by former NSA contractor Edward Snowden has not been devastating, Rogers told The New York Times in an interview.

Rodgers told the newspaper that terrorist groups have adjusted their communications operations to bypass the surveillance methods the Snowden documents revealed:

    "Am I ever going to sit here and say as the director that with 100 percent certainty no one can compromise our systems from the inside?" he asked. "Nope. Because I don’t believe that in the long run." …
    "You have not heard me as the director say, 'Oh, my God, the sky is falling.' I am trying to be very specific and very measured in my characterizations."

The key is for the agency to "ensure that the volume" of information leaked by Snowden can't be pilfered again, he said in the interview. Among other things, the agency since has instituted a two-man rule, where information systems professionals must provide codes to get access to sensitive information in NSA's systems.

Alexander, meanwhile, called Snowden's document leaks "the greatest damage to our combined nations' intelligence systems that we have ever suffered."

 

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2015-0192
Published: 2015-07-02
Unspecified vulnerability in IBM Java 8 before SR1, 7 R1 before SR2 FP11, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to gain privileges via unknown vectors related to the Java Virtual Machine.

CVE-2015-1914
Published: 2015-07-02
IBM Java 7 R1 before SR3, 7 before SR9, 6 R1 before SR8 FP4, 6 before SR16 FP4, and 5.0 before SR16 FP10 allows remote attackers to bypass "permission checks" and obtain sensitive information via vectors related to the Java Virtual Machine.

CVE-2015-1916
Published: 2015-07-02
Unspecified vulnerability in IBM Java 8 before SR1 allows remote attackers to cause a denial of service via unknown vectors related to SSL/TLS and the Secure Socket Extension provider.

CVE-2015-3157
Published: 2015-07-02
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

CVE-2015-3202
Published: 2015-07-02
fusermount in FUSE before 2.9.3-15 does not properly clear the environment before invoking (1) mount or (2) umount as root, which allows local users to write to arbitrary files via a crafted LIBMOUNT_MTAB environment variable that is used by mount's debugging feature.

Dark Reading Radio
Archived Dark Reading Radio
Marc Spitler, co-author of the Verizon DBIR will share some of the lesser-known but most intriguing tidbits from the massive report