Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
SUBSCRIBE
Zerosecurity
  • Home
  • Security
    • Exploits
    • Mobile Security
  • Malware
  • Data Breaches
  • Crypto
  • Privacy
  • Downloads
    • Malwarebytes
    • Exploits
    • Paper Downloads
    • Software & Service Reviews
No Result
View All Result
Zerosecurity
No Result
View All Result
Home Technology News Legal

NSA Declines eavesdropping on Phone calls

Paul Anderson by Paul Anderson
December 18, 2013
in Legal, Technology News
0
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Rick Ledgett, who is in charge of assessing the impact of Snowden’s leaks, told CBS televisions’s “60 Minutes” how the contractor held a “roadmap” of the US intelligence community’s weaknesses and strengths.

You might also like

Downthem DDoS service owner gets a 2-year prison sentence

Megaupload Plans to Return After 5 Years

Clinton pledges to grow the technology sector

NSA’s chief General Keith Alexander stated that rumors that the agency was routinely eavesdropping on the phone calls of american citizens was false, insisting that fewer than 60 “US persons” were really being targeted worldwide.  Ledgett mentioned of specific concern was Snowden’s theft of approximately 31,000 documents the NSA official referred to as an “exhaustive list of the requirements that have been levied against the National Security Agency.”

“What that gives is, what topics we’re interested in, where our gaps are,”  Ledgett stated. “Additional information about US capabilities and US gaps is provided as part of that.”

The data leaked could and will offer a rival country a “roadmap of what we know, what we don’t know, and give them — implicitly — a way to protect their information from the US intelligence community’s view,” the NSA official added.  “It is the keys to the kingdom.”

Ledgett said he would be open to the possibility of an amnesty for Snowden, who remains exiled in Russia, if he agreed to stop further leaks of classified information.  “My personal view is, yes, it’s worth having a conversation about” a possible deal, mentioned Ledgett.  Snowden is being convicted of espionage by US authorities for leaking files that may aid other nations. The former NSA contractor has insisted he leaked documents to kindle public debate and expose the NSA’s far-reaching monitoring. But Alexander declined the idea of any amnesty for Snowden.

“This is analogous to a hostage-taker taking 50 people hostage, shooting 10 and then say ‘You give me full amnesty and I’ll let the other 40 go,'” Alexander told “60 Minutes.”

Alexander also challenged the view that the NSA was engaged in widespread surveillance of Americans.

“NSA can only target the communications of a US person with a probable cause finding under specific court order,” he said, referring to the secret Foreign Intelligence Surveillance Court.

“Today, we have less than 60 authorizations on specific persons to do that.”

Tags: 60 minutesCBSNational Security AgencyNSASnowdenunited-states
Share30Tweet19
Paul Anderson

Paul Anderson

Editor and chief at ZeroSecurity. Expertise includes programming, malware analysis, and penetration testing. If you would like to write for ZeroSecurity, please click "Contact us" at the top of the page.

Recommended For You

Downthem DDoS service owner gets a 2-year prison sentence

by Christi Rogalski
June 30, 2022 - Updated on July 7, 2022
0
Downthem DDoS Service owner sentenced

Matthew Gatrel, a resident of St. Charles, Illinois, has been sentenced to two years in prison for violating the Computer Fraud and Abuse Act (CFAA). The 33-year-old was...

Read more

Megaupload Plans to Return After 5 Years

by Paul Anderson
July 15, 2016 - Updated on May 26, 2022
0
Megaupload Plans to Return After 5 Years

The huge file-sharing website, Megaupload is scheduled to relaunch, five years after being raided and shut down by the FBI. After its owner, Kim Dotcom, was detained and...

Read more

Clinton pledges to grow the technology sector

by Paul Anderson
July 2, 2016
0
Clinton pledges to grow the technology sector

Speaking in Denver on Tuesday at a startup incubator called Galvanize, Democratic presidential hopeful Hillary Clinton made quite a few proposals concerning intellectual property and called for administrative...

Read more

Twitch.tv punishes view bot maker with a lawsuit

by Paul Anderson
June 21, 2016
0
Twitch.tv punishes view bot maker with a lawsuit

Twitch has had it with bots that unnaturally increase view counts for videos. The game-streaming company is now handing out lawsuits to programmers of these bots. In a post...

Read more

DMCA requests quadruple in two years says Google

by Kyle
June 20, 2016
0
DMCA requests quadruple in two years says Google

Google has been bombarded with DMCA takedown requests. The corporation has seen the volume of takedown notices from rights holders quadruple over the last two years. In 2016...

Read more
Next Post
Tor Network being used to Hide Malware servers Increases

Tor Network being used to Hide Malware servers Increases

Related News

BlueSky Ransomware backdoors KMSAuto activator

BlueSky Ransomware Infects KMSAuto Activator users

July 20, 2022 - Updated on July 22, 2022
BlackCat Ransomware aka “ALPHV” infections on the rise

BlackCat Ransomware aka “ALPHV” infections on the rise

June 16, 2022 - Updated on July 20, 2022
GIFs in messaging apps are tracking you

GIFs in messaging apps are tracking you

July 19, 2022
Zerosecurity

We cover the latest in Information Security & Blockchain news, as well as threat trends targeting both sectors.

Categories

  • Crypto
  • Data Breaches
  • DotNet Framework
  • Downloads
  • Exploits
  • Exploits
  • Information
  • Legal
  • Malware
  • Malware Analysis
  • Mobile Security
  • Paper Downloads
  • Piracy
  • Privacy
  • Programming
  • Public
  • Security
  • Security
  • Software & Service Reviews
  • Technology News
  • Tools
  • Tutorials
  • Video Tutorials
  • Whitepapers
  • Zero Security
  • Contact Us
  • List of our Writers

© 2022 ZeroSecurity, All Rights Reserved.

No Result
View All Result
  • Home
  • Security
  • Exploits
  • Data Breaches
  • Malware
  • Privacy
  • Mobile Security
  • Tools
  • Contact Us
  • Privacy Policy

© 2022 ZeroSecurity, All Rights Reserved.