{"id":208152,"date":"2017-02-15T10:20:51","date_gmt":"2017-02-15T15:20:51","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/trump-is-engaged-on-cyber-threats-says-former-nsa-head-fortune.php"},"modified":"2017-02-15T10:20:51","modified_gmt":"2017-02-15T15:20:51","slug":"trump-is-engaged-on-cyber-threats-says-former-nsa-head-fortune","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/trump-is-engaged-on-cyber-threats-says-former-nsa-head-fortune.php","title":{"rendered":"Trump Is Engaged on Cyber Threats, Says Former NSA Head &#8211; Fortune"},"content":{"rendered":"<p><p>                  U.S.                  Secretary of Homeland Security John Kelly (L),                  National Security Advisor General Mike Flynn (C),                  and Keith Alexander wait for a meeting on cyber                  security in the Roosevelt Room of the White House                  January 31, 2017 in Washington,                  D.C.Photograph by BRENDAN                  SMIALOWSKIAFP\/Getty Images                <\/p>\n<p>    President Trump's early tenure has been    marked by reports of slipshod cybersecurity practices, and     dysfunction      among the    country's intelligence agencies. But behind the scenes, Trump    has shown he is attuned to hacking threats, and prepared to    defend the U.S. in cyber-space, according to the former head of    the National Security Agency.  <\/p>\n<p>    Speaking at a breakfast in San    Francisco on Tuesday morning, retired General Keith Alexander    described a recent meeting at which the President discussed    cybersecurity issues with members of his inner circle.    According to Alexander, Trump's behavior shifted significantly    once members of the media left the event.  <\/p>\n<p>    The Presidents demeanor changed to    what you would expect of a corporate CEO,\" said Alexander. \"The    part that struck me was he listened. He took what they said,    restated it, went on to next thing and allowed everyone to    talk.\"  <\/p>\n<p>    The gathering reportedly included    Trump, adviser Jared Kushner, Defense Secretary James Mattis,    former New York City mayor Rudy Giuliani, and others.       <\/p>\n<p>    Alexander also said Trump's comportment    in the meeting was \"the president our nation needs to see,\" and    expressed confidence Trump would be able to develop a    comprehensive strategy to combat cyber threats.       <\/p>\n<p>    The remarks come at a time of ongoing    tumult among White House security staffmost notably the         sudden resignation      of National    Security Adviser Michael Flynn on Mondayand are at odds with    earlier news reports that portrayed Trump as sometimes cavalier    about what he famously called \"the cyber\" in a presidential    debate last fall.  <\/p>\n<p>    On the question of Flynn's resignation,    Alexander said he was not aware of what occurred behind the    scenes, only stating he was sure the White House had good    reasons to back the departure.   <\/p>\n<p>    Alexander's assessment of Trump and    cybersecurity is significant in part because as the former head    of the country's top spy agency, he presided over a    controversial set of intelligence gathering techniques that    were exposed by former NSA contractor Edward Snowden in 2013.       <\/p>\n<p>        Get Data Sheet     ,     Fortunes      technology newsletter.       <\/p>\n<p>    In addressing the breakfast, hosted by    the State of Maryland during the RSA security conference,    Alexander also spoke about the challenge of balancing privacy    and security, and the wisdom of \"hacking back\" against other    countries.  <\/p>\n<p>    The pervasive hacking conducted by    countries like North Korea and China is a source of ongoing    frustration for companies, and has led some to suggest the    private sector should retaliate with cyber-attacks of their    own.   <\/p>\n<p>    Alexander, however, believes such    retaliation is possible but ill-advised. Using Sony     (     sne        )      as an example, he explained could    easily avenge North Korea's devastating attack of 2014 by    \"hacking back,\" perhaps with the discreet aid of U.S. defense    contractors.   <\/p>\n<p>    \"Youd kick North Korea's buttwipe out    their seven computers and we would be done with it,\" he said    about a hypothetical Sony counter-strike. But heres the    problem. North Korea assumes its a government attack and they    escalate. They throw artillery into Seoul and we've started a    land war on the Korean peninsula, even if it started with a    company trying to protect themselves.  <\/p>\n<p>    Instead of companies taking cyber    retaliation into their own hands, Alexander instead argues it's    the government's job to address these issues as part of its    larger mandate to defend the United States. He said this should    include assistance to build \"cyber domes\" across key industrial    sectors, and \"network speed\" threat coordination between    government and the private sector.  <\/p>\n<p>    Cyber has become an element of    national power,\" he said, alongside traditional diplomatic,    military, and economic initiatives.   <\/p>\n<p>    One of the most difficult cybersecurity    tasks for the Trump administration will be how to address a new    generation of device and communication tools that are all but    impossible to spy on. Fueled in part by Edward Snowden's    revelations,     Apple      (    aapl    )      and other companies began introducing    encryption features that can't be broken by law enforcement or    even accessed by the companies themselves.  <\/p>\n<p>    Last spring, encryption was at the    heart of a hugely publicized     court fight      between Apple and the FBI, which    sought access to a locked iPhone owned by a terrorist    responsible for the San Bernardino massacre. (The stand-off    ended abruptly after the FBI succeeded in unlocking the iPhone    on its own account, but the issue is likely to return again    soon in light of newer versions of the iPhone with even    stronger security measures).   <\/p>\n<p>    According to Alexander, the trouble    with ubiquitous encryption is that terrorists can plan in    perfect secrecy. Alexander cited a 2009 plot to blow up the New    York City subway that was foiled after intelligence agencies    intercepted an emailsomething that would not have been    possible if the plotters had used today's encryption tools, he    noted.   <\/p>\n<p>    Any solution that gives spy services a    window into encrypted communication is problematic, however,    because it can involve weakening the overall security of a    device or messaging service. Such an outcomeespecially in the    form of a \"back door\" that lets law enforcement get around    encryptionis fiercely opposed by the tech community, which    points out any such back door will also be exploited by    criminals or repressive governments.  <\/p>\n<p>    Alexander acknowledged this tension,    but did not offer a specific solution.   <\/p>\n<p>    \"Im not for back doors but I dont buy    the fact we cant [have both privacy and security],\" Alexander    said. \"We have to drive two groups together and force them to    work on this. I dont think we should accept fact people die    because were intractable.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/fortune.com\/2017\/02\/14\/donald-trump-nsa-cyber-threats\/\" title=\"Trump Is Engaged on Cyber Threats, Says Former NSA Head - Fortune\">Trump Is Engaged on Cyber Threats, Says Former NSA Head - Fortune<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> U.S. Secretary of Homeland Security John Kelly (L), National Security Advisor General Mike Flynn (C), and Keith Alexander wait for a meeting on cyber security in the Roosevelt Room of the White House January 31, 2017 in Washington, D.C.Photograph by BRENDAN SMIALOWSKIAFP\/Getty Images President Trump's early tenure has been marked by reports of slipshod cybersecurity practices, and dysfunction among the country's intelligence agencies <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/trump-is-engaged-on-cyber-threats-says-former-nsa-head-fortune.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-208152","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/208152"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=208152"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/208152\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=208152"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=208152"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=208152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}