Pages

Thursday, March 12, 2009

al Qaeda's Legacy

al Qaeda's Legacy
By Gerald: Internet Anthropologist Think Tank
03.12.09

al Qaeda's Legacy to the world will be in part
the loss of Internet privacy.

Tremendous efforts are underway to track and trace
anyone, any where, any time on the Internet.

To develop the ability to penetrate any PC,
invisible, key logging, browsing any PC.

We have seen evidence of such operations.
While investigating terrorist IPs we have
discovered back doors on the PCs leading 
to Intelligence agency's.

And reported these leaks to NSA and the CIA.

Which leads to a confusing Paradigm:
Does the priority lie with penetrating
PCs and networks or in protecting them?

So far NSA's paradigm has been focused
on prnetrating PCs and networks,
NOT PROTECTING THEM.

This article outlines the details.




NSA Chief Continues Bid to Take Over Cybersecurity

By Kim Zetter EmailMarch 09, 2009 | 2:06:05 PMCategories: Cybersecurity  

Nsa_director_keith_alexander

In the wake of the resignation on Friday of National Cyber Security Center (NCSC) Director Rod Beckstrom overconcerns that the National Security Agency plans to take over government cybersecurity efforts, comes an announcement that NSA Director Lt. Gen. Keith Alexander will be giving the keynote address at this year's RSA security conference.

The talk is being billed as an explanation about why cybersecurity is a national security issue.

The release says Alexander will be talking about "how the Internet enables cyber criminals and others in conducting targeted attacks and what can be done to combat this threat."

The Bush Administration frequently tried to equate crime on the internet with national security to gather support for its interest in monitoring internet activities. Alexander's RSA talk will likely continue this trend and serve to bolster the NSA's efforts to wrest control of the government's cybersecurity efforts from the Department of Homeland Security, a prospect that concerns civil liberties advocates, given the NSA's acknowledged warrantless domestic wiretapping program and allegations that the agency also secretly tapped domestic internet communications without a warrant.

Last month, Director of National Intelligence Admiral Dennis Blair told Congress that the NSA, rather than the DHS which currently oversees cybersecurity, should take over the government's cybersecurity efforts. A week later, Beckstrom, DHS's current cybersecurity chief, tendered his resignation (.pdf).

 

In his letter, Beckstrom criticized the NSA's encroachment on DHS territory. He wrote:

"NSA effectively controls DHS cyber efforts through detailees, technology insertions and the proposed move of NPPD and the NCSC to a Fort Meade NSA facility. NSA currently dominates most national cyber efforts. While acknowledging the critical importance of NSA to our intelligence efforts, I believe this is a bad strategy on multiple grounds. The intelligence culture is very different than a network operations or security culture. In addition, the threats to our democratic processes are significant if all top level government network security and monitoring are handled by any one organization (either directly or indirectly). During my term as Director, we have been unwilling to subjugate the NCSC underneath the NSA."



SOURCE:

XXXXXXXXXXXXXXXXXXXXXX

Penetration or protection from Cyber Pearl Hartbor.




No comments:

Post a Comment