- ‘I Am Alive’ app gains popularity in terror-ravaged Lebanon
- Gun giveaways gain popularity among Republican candidates
- S.C. hospital worker slapped with $525 federal fine for refilling $0.89 soda
- Teen from ‘Jihad Jane’ plot becomes youngest ever to serve time on U.S. terror charges
- Iranian woman forgives son’s killer at the gallows
- Nebraska principal sorry for ‘don’t tattle’ flier
- Illinois readies to spend $100M for Obama museum in Chicago
- John Edwards back in court — this time as a lawyer for Va. boy’s malpractice case
- Covered California reports more than 200K in overtime Obamacare sign-ups
- Thanks, Chuck: Hagel says U.S. sending Ukraine sleeping mats, helmets
NSA tightens data access rules after Snowden’s leaks
The National Security Agency has tightened the rules and procedures governing insiders’ access to data after contract technician Edward J. Snowden stole a still-unknown number of electronic documents from the NSA computer systems he administered, two top Pentagon officials said Thursday.
One of the officials, NSA Director Gen. Keith Alexander, said that he was open to the idea of allowing telephone companies, rather than his agency, store the huge database of records that NSA collects every day from Americans’ phone calls.
“I think it’s something we should consider,” Alexander said, adding that it might help tamp down fears that his agency is invading Americans’ privacy.
Gen. Alexander said the agency has greatly limited the access of computer technicians like Mr. Snowden, including instituting a “two-man rule” for access to server rooms and reining in downloading privileges for certain types of data.
“This makes our job more difficult,” he said, adding that future plans included encryption of the most sensitive data, so that even if it were stolen, it would not be accessible to the thief.
“We’re taking the actions to fix this,” Gen. Alexander said. “We will fix this.”
Earlier Thursday, Ashton B. Carter, the deputy secretary of defense, said the conditions that allowed Mr. Snowden to download and remove data without detection amounted to “a failure to defend our own networks.”
“It was not an outsider hacking in, but an insider,” he said.
Both men spoke at the Aspen Institute Security Forum, an annual summer retreat in the tony Colorado ski holiday town that brings together current and former intelligence and homeland security officials, Pentagon leaders, defense and security contractors, and the national news media.
© Copyright 2014 The Washington Times, LLC. Click here for reprint permission.
About the Author
Shaun Waterman is an award-winning reporter for The Washington Times, covering foreign affairs, defense and cybersecurity. He was a senior editor and correspondent for United Press International for nearly a decade, and has covered the Department of Homeland Security since 2003. His reporting on the Sept. 11 Commission and the tortuous process by which some of its recommendations finally became ...
- Senator's memo shows Iran links in Homeland Security's troubled immigration program
- Help wanted: Homeland Security plagued by vacancies at the top
- Dems back bill to fix problems in investor visa program
- Democrats proceed with Mayorkas vote despite pending investigation
- Game players don't think peace has a chance in Syria
Latest Blog Entries
TWT Video Picks
By Joy Overbeck
Redemption by government is futile
- Joe Biden's first Instagram pic mocked as shill for sunglass ad
- Jews being told to register in Ukraine: John Kerry
- Obama taunts GOP, takes nationally televised victory lap on Obamacare
- BOLTON: A 'three-state solution' for Middle East peace
- Army goes to war with National Guard, seizes Apache attack helicopters
- Elderly Chicago man robs bank to go 'home' to prison; judge fulfills his desire
- Cliven Bundy's Nevada ranch wrecked by retreating feds
- Chavez seizes Cargill factory
- Atheists rush to stage Easter display: 'Jesus Christ is a myth'
- IRS emails reveal discussion with Justice about suing nonprofits for election activities
Top 10 handguns in the U.S.