This article is from the source 'nytimes' and was first published or seen on . It last changed over 40 days ago and won't be checked again for changes.

You can find the current article at its original source at http://www.nytimes.com/2013/07/19/us/military-to-deploy-units-devoted-to-cyber-operations.html

The article has changed 7 times. There is an RSS feed of changes available.

Version 4 Version 5
N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks N.S.A. Imposes Rules to Protect Secret Data Stored on Its Networks
(about 4 hours later)
The National Security Agency has imposed new rules designed to sharply restrict the sharing and downloading of top-secret material from its computer networks after an review of how Edward J. Snowden, a former agency contractor, managed to expose several of the country’s most sensitive surveillance programs, two of the Pentagon’s most senior officials said Thursday. The National Security Agency has imposed new rules designed to sharply restrict the sharing and downloading of top-secret material from its computer networks after a review of how Edward J. Snowden, a former agency contractor, managed to expose several of the country’s most sensitive surveillance programs, two of the Pentagon’s most senior officials said Thursday.
First among the new procedures is a “two-man rule” — based on the model of how nuclear weapons are handled — that requires two computer systems administrators to work simultaneously when they are inside systems that contain highly classified material.First among the new procedures is a “two-man rule” — based on the model of how nuclear weapons are handled — that requires two computer systems administrators to work simultaneously when they are inside systems that contain highly classified material.
“This makes our job more difficult,” Gen. Keith B. Alexander, the head of the N.S.A. and the commander of the military’s Cyber Command, told the Aspen Security Forum, an annual meeting on security issues. He described future plans to keep the most sensitive data in a highly encrypted form, sharply limiting the number of system administrators — like Mr. Snowden — who can move data throughout the nation’s intelligence agencies and the Defense Department.“This makes our job more difficult,” Gen. Keith B. Alexander, the head of the N.S.A. and the commander of the military’s Cyber Command, told the Aspen Security Forum, an annual meeting on security issues. He described future plans to keep the most sensitive data in a highly encrypted form, sharply limiting the number of system administrators — like Mr. Snowden — who can move data throughout the nation’s intelligence agencies and the Defense Department.
Hours before General Alexander described the new defenses, Ashton B. Carter, the deputy secretary of defense, said the conditions that allowed Mr. Snowden to download and remove data without detection amounted to “a failure to defend our own networks.”Hours before General Alexander described the new defenses, Ashton B. Carter, the deputy secretary of defense, said the conditions that allowed Mr. Snowden to download and remove data without detection amounted to “a failure to defend our own networks.”
“It was not an outsider hacking in, but an insider,” he said.“It was not an outsider hacking in, but an insider,” he said.
General Alexander spoke in defense of the N.S.A.’s surveillance programs, including its collection of a vast database of information about all phone calls made and received in the United States. “You need a haystack to find a needle,” he said, even while acknowledging that he was open to the idea that the nation’s telecommunications companies, rather than the government, should retain control of the data. General Alexander spoke in defense of the N.S.A.'s surveillance programs, including its collection of a vast database of information about all phone calls made and received in the United States. “You need a haystack to find a needle,” he said, even while acknowledging that he was open to the idea that the nation’s telecommunications companies, rather than the government, should retain control of the data.
But at the security forum, of which The New York Times is a media sponsor, General Alexander also revealed for the first time that President Obama, shortly after taking office, had been surprised by the number of errors the agency made, which resulted in what General Alexander called the inadvertent collection of information about American citizens.But at the security forum, of which The New York Times is a media sponsor, General Alexander also revealed for the first time that President Obama, shortly after taking office, had been surprised by the number of errors the agency made, which resulted in what General Alexander called the inadvertent collection of information about American citizens.
“When the president first came on board, we had a huge set of mistakes that we were working through in 2009,” he told the audience. “He said essentially, ‘I can see the value of these, but how do we ensure that we get these within compliance and that everything is exactly right?’ ” That suggested that Mr. Obama had questioned the execution of a program he had inherited from President George W. Bush, but satisfied himself by having the N.S.A. set up what the general called a “directorate of compliance,” an internal watchdog group. “When the president first came on board, we had a huge set of mistakes that we were working through in 2009,” he told the audience. “He said essentially, ‘I can see the value of these, but how do we ensure that we get these within compliance and that everything is exactly right?' That suggested that Mr. Obama had questioned the execution of a program he had inherited from President George W. Bush, but satisfied himself by having the N.S.A. set up what the general called a “directorate of compliance,” an internal watchdog group.
Both Mr. Carter and General Alexander said that the military has begun to deploy roughly 4,000 people in the Pentagon’s first units devoted to conducting cyberoffense and -defense operations, a new mission that formalizes America’s use of a class of weapons that the Obama administration has rarely discussed in public.Both Mr. Carter and General Alexander said that the military has begun to deploy roughly 4,000 people in the Pentagon’s first units devoted to conducting cyberoffense and -defense operations, a new mission that formalizes America’s use of a class of weapons that the Obama administration has rarely discussed in public.
“I wanted to start this fast,” Mr. Carter said. “Fundamentally, we’re spending everything we can think about spending intelligently for, notwithstanding our budget hassles, because this is an area that we are protecting even as other military capabilities will be cut.”“I wanted to start this fast,” Mr. Carter said. “Fundamentally, we’re spending everything we can think about spending intelligently for, notwithstanding our budget hassles, because this is an area that we are protecting even as other military capabilities will be cut.”
The description of the Pentagon’s new cyberteams, which will be under General Alexander’s command, was the most detailed yet of one of the military’s most closely held projects.The description of the Pentagon’s new cyberteams, which will be under General Alexander’s command, was the most detailed yet of one of the military’s most closely held projects.
The administration recently conceded that it was developing cyberweapons. The best-known example is the covert effort called “Olympic Games,” which the Bush administration used against Iran’s nuclear program. The Obama administration accelerated the program, but suffered a major setback when a computer worm, later named Stuxnet, escaped from the Natanz nuclear enrichment plant in Iran and replicated itself on the Web, where the Iranians and others could download the code that was developed by the N.S.A. and its Israeli counterpart, Unit 8200.The administration recently conceded that it was developing cyberweapons. The best-known example is the covert effort called “Olympic Games,” which the Bush administration used against Iran’s nuclear program. The Obama administration accelerated the program, but suffered a major setback when a computer worm, later named Stuxnet, escaped from the Natanz nuclear enrichment plant in Iran and replicated itself on the Web, where the Iranians and others could download the code that was developed by the N.S.A. and its Israeli counterpart, Unit 8200.
Future operations run by Cyber Command, Mr. Carter suggested, would be focused on the teams. “The teams are new, and they are in addition to the N.S.A. work force,” he said. While they may ultimately be modeled on Special Operations, which provide fighting expertise to supplement traditional forces, for now the cyberforce will be drawn from members of the armed services.Future operations run by Cyber Command, Mr. Carter suggested, would be focused on the teams. “The teams are new, and they are in addition to the N.S.A. work force,” he said. While they may ultimately be modeled on Special Operations, which provide fighting expertise to supplement traditional forces, for now the cyberforce will be drawn from members of the armed services.
The cyberforces are inexpensive, Mr. Carter argued. But their very existence, which General Alexander alluded to in Congressional testimony this year, is bound to be cited by other nations that are justifying the creation of their own cyberunits. The People’s Liberation Army in China has a major effort under way; its Unit 61398 has been accused of stealing corporate secrets and intellectual property from American companies, as well as planning for potential attacks on American infrastructure. Iran has created its own cybercorps, which has been blamed for attacks on Saudi Aramco, a major oil producer, and American banks.The cyberforces are inexpensive, Mr. Carter argued. But their very existence, which General Alexander alluded to in Congressional testimony this year, is bound to be cited by other nations that are justifying the creation of their own cyberunits. The People’s Liberation Army in China has a major effort under way; its Unit 61398 has been accused of stealing corporate secrets and intellectual property from American companies, as well as planning for potential attacks on American infrastructure. Iran has created its own cybercorps, which has been blamed for attacks on Saudi Aramco, a major oil producer, and American banks.
Mr. Carter, a physicist and former Harvard professor who has worked at the Pentagon since the beginning of the Obama administration, blamed the leak of highly classified data partly on decisions made after the investigations into the intelligence failures surrounding the Sept. 11, 2001, terrorist attacks.Mr. Carter, a physicist and former Harvard professor who has worked at the Pentagon since the beginning of the Obama administration, blamed the leak of highly classified data partly on decisions made after the investigations into the intelligence failures surrounding the Sept. 11, 2001, terrorist attacks.
“There was an enormous amount of information concentrated in one place,” Mr. Carter said. But General Alexander defended the information-sharing as necessary.“There was an enormous amount of information concentrated in one place,” Mr. Carter said. But General Alexander defended the information-sharing as necessary.
But as the differences between the two men’s description suggest, the pressure to recompartmentalize information is bound to raise questions about whether the government is restoring a system that, ultimately, was blamed for many of the failures to “connect the dots” before the 2001 attacks.But as the differences between the two men’s description suggest, the pressure to recompartmentalize information is bound to raise questions about whether the government is restoring a system that, ultimately, was blamed for many of the failures to “connect the dots” before the 2001 attacks.