{"id":28483,"date":"2015-01-08T21:45:49","date_gmt":"2015-01-09T02:45:49","guid":{"rendered":"http:\/\/www.opensource.im\/uncategorized\/snowden-us-has-put-too-much-emphasis-on-cyber-offense-needs-defense.php"},"modified":"2015-01-08T21:45:49","modified_gmt":"2015-01-09T02:45:49","slug":"snowden-us-has-put-too-much-emphasis-on-cyber-offense-needs-defense","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/edward-snowden\/snowden-us-has-put-too-much-emphasis-on-cyber-offense-needs-defense.php","title":{"rendered":"Snowden: US has put too much emphasis on cyber-offense, needs defense"},"content":{"rendered":"<p><p>    Edward Snowden, in his interview with James Bamford for PBS'    NOVA.  <\/p>\n<p>    NOVA\/ PBS  <\/p>\n<p>    In an on-camera    interview with James Bamford for an upcoming episode of PBS'    NOVA, Edward Snowden warned that the US Department    of Defense and National Security Agency have over-emphasized    the development of offensive network capabilities, placing the    US' own systems at greater risk. With other countries now    developing offensive capabilities that approach those of the    NSA and the US Cyber Command, Snowden believes the US has much    more at stake.  <\/p>\n<p>    The raw transcript of the NOVAinterview showed    Snowden in full control, to the point of giving direction on    questions and even suggesting how to organize the report and    its visual elements. Snowden frequently steered questions away    from areas that might have revealed more about NSA operations,    or he went into areas such as White House policy that he    considered \"land mines.\" But the whistleblowereloquently    discussed the hazards of cyber warfare and the precariousness    of the approach that the NSA and Cyber Command had taken in    terms of seeking to find and exploit holes in the software of    adversaries. In fact, he says the same vulnerabilities are in    systems in the US. \"The same router thats deployed in the    United States is deployed in China,\" Snowden explained. \"The    same software package that controls the dam floodgates in the    United States is the same as in Russia. The same hospital    software is there in Syria and the United States.\"  <\/p>\n<p>    Video from the NOVA interview.  <\/p>\n<p>    Some of the interview, which took place last June in Russia,    possibly foreshadowed the cyber attack on Sony Pictures.    Snowden said that the capabilities for cyber attacks such as    the \"Shamoon\" malware attack in 2012 and other \"wiper\" attacks    similar to what happened toSony Pictures were \"sort of a    Fisher Price, babys first hack kind of a cyber campaign,\"    capable of disruption but not really of creating long-term    damage. But he said more sophisticated organizations, including    nation-state actors, are \"increasingly pursuing the capability    to launch destructive cyber attacks as opposed to the    disruptive kinds that you normally see online...and this is a    pivot that is going to be very difficult for us to navigate.\"  <\/p>\n<p>    \"I dont want to hype the threat,\" Snowden told Bamford.    \"Nobodys going to press a key on their keyboard and bring down    the government. Nobodys going to press a key on their keyboard    and wipe a nation off the face of the earth.\" But Snowden    emphasized that the US should be focusing more on defending    against adversaries than trying to penetrate their networks to    collect information and do damage.  <\/p>\n<p>    \"When you look at the problem of the US prioritizing offense    over defense, imagine you have two bank vaults, the United    States bank vault and the Bank of China,\" Snowden explained.    \"The US bank vault is completely full. It goes all the way up    to the sky. And the Chinese bank vault or the Russian bank    vault or the African bank vault or whoever the adversary of the    day is, theirs is only half full or a quarter full or a tenth    full.\" But because the US has focused on being able to break    into other networks, he said, it has made its own technology    vulnerableand other countries can use the same vulnerabilities    to attack the US' networks.  <\/p>\n<p>    \"Were opening ourselves up to attack,\" Snowden said. \"Were    lowering our shields to allow us to have an advantage when we    attack other countries overseas, but the reality is when you    compare one of our victories to one of their victories, the    value of the data, the knowledge, the information gained from    those attacks is far greater to them than it is to us because    we are already on top. Its much easier to drag us down than it    is to grab some incremental knowledge from them and build    ourselves up.\"  <\/p>\n<p>    The most valuable piece of infrastructure for the US that is at    risk, Snowden said, is the Internet itself. \"We use the    Internet for every communication that businesses rely on every    day,\" he explained. \"If an adversary didn't target our power    plants but they did target the core routers, entire parts of    the United States could be cut off... and we would go dark in    terms of our economy and our business for minutes, hours, days.    That would have a tremendous impact on us as a society and it    would have a policy backlash.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See original here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/arstechnica.com\/tech-policy\/2015\/01\/snowden-us-has-put-too-much-emphasis-on-cyber-offense-needs-defense\" title=\"Snowden: US has put too much emphasis on cyber-offense, needs defense\">Snowden: US has put too much emphasis on cyber-offense, needs defense<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Edward Snowden, in his interview with James Bamford for PBS' NOVA. <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[47],"tags":[],"class_list":["post-28483","post","type-post","status-publish","format-standard","hentry","category-edward-snowden"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28483"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=28483"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/28483\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=28483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=28483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=28483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}