Congress is Warned over the Threat of Data ManipulationAdded: Saturday, September 12th, 2015
Category: Bit Torrent Freedom > The Right To Share
Tags:ET, p2p, Torrent, Piracy, Peer To Peer, Network, Hackers, Internet, BitTorrent, Google, utorrent, bitcomet, extratorrent, www.extratorrent.cc, 2015
US intelligence chiefs warned the government that the escalating online data theft might involve the manipulation of digital data.
According to the US director of national intelligence, a “cyber Armageddon” is actually less likely than “cyber operations that will change or manipulate data”. The NSA director joined this point of view, saying that while such efforts hadn’t been noticed yet, American business and governmental agencies had already faced persistent cyber attacks from many sources.
The intelligence chiefs also indicated that American digital networks are now threatened by wide-scale data theft – for example, the recent intrusion into the networks of the Office of Personnel Management. They warned Congress that a mutated phase of cyber attacks would undermine confidence in information stored and accessible on American networks, which created an uncertainty able to threaten US military situational awareness. The chances are that the next step will be the manipulation or the deletion of information, which would compromise its integrity.
It is known that while the NSA had clear rules for protecting American networks, its authorities to engage in offensive action on the Internet were murkier. 2 years ago, Edward Snowden leaked a secret directive on US digital offensive capabilities and a framework for their use. While pointing out that offensive cyber attacks were “an application of force”, the intelligence chiefs suggested that NSA and other agencies require a freer hand and new international norms that would ban extracting mass personally identifiable information. In the meantime, the Snowden’s leak revealed that it was the NSA’s practice worldwide.
The NSA director also said that the global community should not accept data destruction as a national practice. As example of tis practice was the US and Israel creating the Stuxnet worm able to hijack and damage industrial controls for Iranian nuclear centrifuges.
Finally, the FBI director reprised his plea for surreptitious access into end-to-end encrypted data, arguing that nobody had truly tried to find a mathematical solution that would allow the American authorities access without subjecting sensitive data to increased insecurity.
Saturday, September 12th, 2015
|posted by (2015-09-12 12:40:14)|
|They will never ever learn. Software online is one thing, but data should be kept offline only. Basic Computer 101 from being zapped. First lesson learned, but soon forgotten.|
|Such is the story of history, and mankind only plays as a guest before he makes himself disappear and ...hit cue and restart... and over...and... over.....ect.|
|posted by (2015-09-17 00:15:36)|
|Information kept off line is pretty much useless, put it in a searchable database it becomes data. Visit any govt agency today and compare the experience to that of the 50's. Compare running a business today with the 50's. As impressive as computers are their real strength is only apparent when networked. You don't stop buying stuff just because you could be robbed, you buy better locks, or guns.||
Most Popular Stories