{"id":4134,"date":"2015-03-11T08:26:29","date_gmt":"2015-03-11T12:26:29","guid":{"rendered":"http:\/\/vweisfeld.com\/?p=4134"},"modified":"2015-03-26T07:09:07","modified_gmt":"2015-03-26T11:09:07","slug":"nsa-chief-speaks-in-princeton","status":"publish","type":"post","link":"https:\/\/vweisfeld.com\/?p=4134","title":{"rendered":"NSA Chief Speaks in Princeton"},"content":{"rendered":"<div id=\"attachment_4136\" style=\"width: 317px\" class=\"wp-caption alignleft\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-4136\" class=\" wp-image-4136\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2015\/03\/US_Navy_120130_N_TC628_277_Vice_Adm_converted.jpg?resize=307%2C203\" alt=\"Mike Rogers, NSA, military\" width=\"307\" height=\"203\" \/><p id=\"caption-attachment-4136\" class=\"wp-caption-text\">Adm. Mike Rogers (photo: wikipedia)<\/p><\/div>\n<p><a href=\"http:\/\/www.navy.mil\/navydata\/bios\/navybio.asp?bioID=434\">Admiral Mike Rogers<\/a>\u2014Director, National Security Agency, and Commander, U.S. Cyber Command (the military\u2019s centralized operational command for cyberspace operations)\u2014spoke at Princeton University yesterday, part of an ongoing effort to establish greater understanding of the NSA mission and encourage private sector partnerships .<\/p>\n<p>He kept his own remarks short, describing the missions of the two agencies he heads, in order to maximize time for audience questions. A key challenge he noted is assuring that efforts to manage the nation\u2019s cyber-threats and foreign intelligence-gathering are appropriately balanced against \u201cthe inherent right to privacy\u201d of the American people. In the late 1960s and early 1970s (the Watergate era), revelations of government spying on U.S. citizens led to two new mechanisms for privacy protection: FISA courts (authorized under the Foreign Intelligence Surveillance Act) and congressional oversight. Unfortunately, Rogers said, the public has lost confidence in both those approaches at a time when threats have rapidly escalated.<\/p>\n<p>\u201cWould we even be having this conversation if it weren\u2019t for the whistleblowers?\u201d an audience member asked.<\/p>\n<p>Rogers responded, \u201cI don\u2019t know any whistleblowers. I only know of thieves who stole government information.\u201d He went on to say that he wished he had that information back, because the loss of it has imperiled troops overseas and many other individuals and activities, as well as entailed considerable costs. He tells his staff that, if they see any information or process of gathering it that they consider illegal, immoral, or unethical, they should raise it within the chain of command, and it isn\u2019t up to each individual person to pick and choose which laws to obey.<\/p>\n<p>In deciding how to respond to a cyber-attack, his command uses the same principle of proportionality that the military does in general. The exact means of retaliation is a policy decision, not his alone. In North Korea\u2019s hacking attack against Sony last November, for example, he urged the President to \u201cthink more broadly,\u201d beyond just cyber-methods, and the U.S. government response to date includes economic sanctions against Pyongyang.<\/p>\n<p>A questioner asked what happens when information amassed on foreigners includes information about Americans (\u201cincidental\u201d information). Rogers wouldn\u2019t speak to whether the FBI or CIA access such information but said the NSA treats it differently, as to whether and how long it is kept, than it does information on foreigners.<\/p>\n<p>Another controversy raised was the NSA\u2019s practice of bulk data storage. Rogers said that at least some bulk data storage is necessary because the agency does not know now what may be useful down the road. There are limits on how long information is retained, but these are currently \u201cmore of an art than a science,\u201d he said. A January report by an expert panel convened by the <a href=\"http:\/\/www.nytimes.com\/2015\/01\/16\/us\/politics\/report-finds-no-alternative-to-bulk-collection-of-phone-data.html?_r=0\">National Academy of Sciences<\/a> concluded that, at present, there are no screening methods that are a viable alternative to bulk data collection, although privacy protections can be strengthened.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admiral Mike Rogers\u2014Director, National Security Agency, and Commander, U.S. Cyber Command (the military\u2019s centralized operational command for cyberspace operations)\u2014spoke at Princeton University yesterday, part of an ongoing effort to establish greater understanding of the NSA mission and encourage private sector &hellip; <a href=\"https:\/\/vweisfeld.com\/?p=4134\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"NSA Chief Speaks in Princeton - Adm. Mike Rogers navigates tricky waters","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193,268,35,186,104],"tags":[416,129],"class_list":["post-4134","post","type-post","status-publish","format-standard","hentry","category-espionage","category-politics","category-real-life","category-technology","category-the-morgue","tag-real-life","tag-wars-and-conflicts"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2NkiT-14G","_links":{"self":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/4134","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4134"}],"version-history":[{"count":1,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/4134\/revisions"}],"predecessor-version":[{"id":4137,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/4134\/revisions\/4137"}],"wp:attachment":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4134"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4134"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4134"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}