Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Former NSA Director Reflects On Snowden Leaks
Newest First  |  Oldest First  |  Threaded View
xyzzy-lwpi
50%
50%
xyzzy-lwpi,
User Rank: Strategist
10/13/2014 | 3:59:42 PM
We're doomed
While the NSA Director is correct in his assessment that what the NSA did was legal, no one ever bothered to ask, "should we be doing this?".  This is where the ethics break-down occurs.  Collecting the data of U.S. citizens (and even many of our allies) is wrong.  The entire U.S. Gov't response to 9-11 was the contemporary equivalent of a sledgehammer wielded by Steinbeck's Lenny - bound by the constraints of political correctness - looking for a nail to hit. 

For example, just look at airport security.  Who can honestly say it's NOT security theater?  Who can honestly say it has made us more secure?

This program has saved lives?!?! Really?  Show me.  Prove the value that any exclusive component of this program has saved a life.  And even if it somehow managed to save a life, how little return has been proven and at what cost?  The potential cost of our freedom by the not unforeseeable misuse of our data.  Or maybe the insane amount of resources spent on this program that could've been better used in actual proven security measures, like say, I dunno, documenting everyone who comes into this country, especially if they're coming from high security risk countries, profiling individuals and tracking where they go and maybe even raising red-flags if they sign up for extracirricular activities... like flying lessons.
Some Guy
50%
50%
Some Guy,
User Rank: Moderator
10/8/2014 | 6:10:52 PM
If you were surprised by NSA scope, you weren't paying attention
If anyone was surprised by the types and scope of NSA's activities, I can only conclude they weren't paying attention. For the most part I agree with Gen. Alexander's assessment that what they were doing was legal. I think it's unfortunate that Whistleblowers in the NSA really have no choice beyond blowing up their lives; there has to be a middle path that identifies potential problems, allows for the fully informed electorate and discourse that has been missing and gets them fixed without having to give up one's country.

My big criticism of NSA is their bad for not having the data encryption at rest and sufficient, timely and appropriate access & audit controls. The harm was completely preventable. Snowden shouldn't have been able to take anything with him.
Marilyn Cohodas
50%
50%
Marilyn Cohodas,
User Rank: Strategist
10/8/2014 | 10:58:30 AM
NSA training
Alexander said, "The people who touch [this] data go through 400 hours of training on how to deal with this data. That's more [training] than we give pilots."

That doesn't give me a whole lot of confidence about the next time I step onto an airplane. 


COVID-19: Latest Security News & Commentary
Dark Reading Staff 10/1/2020
9 Tips to Prepare for the Future of Cloud & Network Security
Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
Attacker Dwell Time: Ransomware's Most Important Metric
Ricardo Villadiego, Founder and CEO of Lumu,  9/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Special Report: Computing's New Normal
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
How IT Security Organizations are Attacking the Cybersecurity Problem
How IT Security Organizations are Attacking the Cybersecurity Problem
The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-24860
PUBLISHED: 2020-10-01
CMS Made Simple 2.2.14 allows an authenticated user with access to the Content Manager to edit content and put persistent XSS payload in the affected text fields. The user can get cookies from every authenticated user who visits the website.
CVE-2020-24861
PUBLISHED: 2020-10-01
GetSimple CMS 3.3.16 allows in parameter 'permalink' on the Settings page persistent Cross Site Scripting which is executed when you create and open a new page
CVE-2020-25990
PUBLISHED: 2020-10-01
WebsiteBaker 2.12.2 allows SQL Injection via parameter 'display_name' in /websitebaker/admin/preferences/save.php. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
CVE-2020-8109
PUBLISHED: 2020-10-01
A vulnerability has been discovered in the ace.xmd parser that results from a lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. This can result in denial-of-service. This issue affects: Bitdefender Engines version 7.84892 and prior vers...
CVE-2019-20902
PUBLISHED: 2020-10-01
Upgrading Crowd via XML Data Transfer can reactivate a disabled user from OpenLDAP. The affected versions are from before version 3.4.6 and from 3.5.0 before 3.5.1.