Edward Snowden

Edward Snowden
Edward Joseph "Ed" Snowdenis an American computer professional, former Central Intelligence Agencyemployee, and former contractor for the United States government who copied and leaked classified information from the National Security Agencyin 2013 without prior authorization. His disclosures revealed numerous global surveillance programs, many run by the NSA and the Five Eyes Intelligence Alliance with the cooperation of telecommunication companies and European governments...
NationalityAmerican
ProfessionOther
Date of Birth21 June 1983
CityElizabeth City, NC
CountryUnited States of America
We're opening the doors to people launching missiles and dropping bombs by taking the human out of the decision chain for deciding how we should respond to these threats. And this is something we're seeing more and more happening in the traditional means as our methods of warfare become increasingly automated and roboticized such as through drone warfare.
Cyber Command is supposed to be defending our critical infrastructure at home, but they are spending so much time looking at how to attack networks, how to break systems, and how to turn things off. I don't think it adds up as representing a defensive team.
If you ask anybody at Cyber Command or look at any of the job listings for openings for their positions, you'll see that the one thing they don't prioritize is computer network defense. It's all about computer network attack and computer network exploitation at Cyber Command.
When the lights go out at a power plant sometime in the future, we're going to know that that's a consequence of deprioritizing defense for the sake of an advantage in terms of offense.
I think the public still isn't aware of the frequency with which the cyber-attacks, as they're being called in the press, are being used by governments around the world, not just the US.
We need to put the security back in the National Security Agency. We can't have the national surveillance agency.
The most important thing to the United States is not being able to attack our adversaries, the most important thing is to be able to defend ourselves. And we can't do that as long as we're subverting our own security standards for the sake of surveillance.
The way the United States intelligence community operates is it doesn't limit itself to the protection of the homeland. It doesn't limit itself to countering terrorist threats, countering nuclear proliferation. It's also used for economic espionage, for political spying to gain some knowledge of what other countries are doing.
No one would argue that it's in the United States' interest to have independent knowledge of the plans and intentions of foreign countries. But we need to think about where to draw the line on these kind of operations so we're not always attacking our allies, the people we trust, the people we need to rely on, and to have them in turn rely on us.
The internet is shared critical infrastructure for everyone on earth. It's not supposed to be a domain of warfare. We're not supposed to be putting the Unied States' economy on the frontlines in the battleground.
When you're attacking a router on the internet, and you're doing it remotely, it's like trying to shoot the moon with a rifle. Everything has to happen exactly right. Every single variable has to be controlled and precisely accounted for. And that's not possible to do when you have limited knowledge of the target you're attacking.
The United States need to put internet processes, policies, and procedures in place with real laws that forbid going beyond the borders of what's reasonable to ensure that the only time that we and other countries around the world exercise these authorities are when it is absolutely necessary.
The internet exchange is sort of the core points where all of the international cables come together, where all of the internet service providers come together, and they trade lines with each other. These are priority one targets for any sort of espionage agency, because they provide access to so many people's communications.
Encryption works. Properly implemented strong crypto systems are one of the few things that you can rely on. Unfortunately, endpoint security is so terrifically weak that NSA can frequently find ways around it.