Feeds

NSA: 'Dozens of attacks' prevented by snooping

Spy chief defends data slurping

Providing a secure and efficient Helpdesk

The National Security Agency has defended its slurping of phone records and other business data on the grounds the information contained has helped it fight terrorism.

In a congressional hearing on cybersecurity and government surveillance on Tuesday, NSA Director General Keith Alexander said the NSA's data slurping had let it avert terror attacks.

"It's dozens of terrorist events that these have helped prevent," Alexander said.

He said it was the NSA's "intent" to get specific figures on the number of attacks prevent out in the next week.

The phone records were crucial for "disrupting or contributing to the disruption of terrorist attacks" both in the US and abroad, Alexander said,.

It was difficult to separate the importance of information gleaned from phone records, compared with that generated by trawling the online data of individuals, Alexander indicated. He stated that "these authorities complement each other" in reference to the NSA's use of a variety of snooping methods.

The NSA chief's comments follow a week of revelations about data collection and interception by the US government's spy agencies. He was explicitly questioned by Senator Patrick Leahy about the NSA's use of phone records in conducting investigations.

Great harm has already been done by opening this up, and the consequence is, I believe, that our security has been jeopardized. There is no doubt in my mind that we will lose capabilities as a result of this [disclosure]

Though NSA whistleblower Edward Snowden alleged he could wiretap Obama from his desk, Alexander said he knew of "no way to do that" when probed by congress.

Much of the hearing saw Alexander stress the legitimacy of the various spying programs, referring on multiple occasions to the unanimous support that the Patriot Act had received in the early 2000s. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
SMASH the Bash bug! Apple and Red Hat scramble for patch batches
'Applying multiple security updates is extremely difficult'
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
Hackers thrash Bash Shellshock bug: World races to cover hole
Update your gear now to avoid early attacks hitting the web
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
Stunned by Shellshock Bash bug? Patch all you can – or be punished
UK data watchdog rolls up its sleeves, polishes truncheon
prev story

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.