{"id":225917,"date":"2017-07-05T19:06:01","date_gmt":"2017-07-05T23:06:01","guid":{"rendered":"http:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/uncategorized\/another-view-nsa-needs-to-secure-its-files-and-techniques-more-tightly-press-herald.php"},"modified":"2017-07-05T19:06:01","modified_gmt":"2017-07-05T23:06:01","slug":"another-view-nsa-needs-to-secure-its-files-and-techniques-more-tightly-press-herald","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/another-view-nsa-needs-to-secure-its-files-and-techniques-more-tightly-press-herald.php","title":{"rendered":"Another View: NSA needs to secure its files and techniques more tightly &#8211; Press Herald"},"content":{"rendered":"<p><p>    The phenomenon of a recent widespread cyberattack, using    weapons developed by the U.S. National Security Agency to    disrupt major computer operations all over the globe, is not    surprising, but it does call for urgent action on the federal    governments part.  <\/p>\n<p>    Weapons proliferation grew much more lethal when the United    States developed the atomic bomb, intended to end World War II    more rapidly. The technology then got handed to the Soviet    Union. Nuclear weapons eventually ended up in the hands of    China, France, India, Israel, North Korea, Pakistan, Russia and    the United Kingdom, as well as the United States.  <\/p>\n<p>    More recently, Americas and others cyberweapons creatively    have been used to mess up Irans nuclear enrichment program,    using the computer worm known as Stuxnet. It also appears that    U.S. cyberaction has been used to gum up North Koreas rocket    launches.  <\/p>\n<p>    The problem now is that some of the clever procedures that NSA    developed have leaked out, or have been developed independently    by people in basements and elsewhere in Kiev, Moscow and    Pyongyang, and are being used as they were last week from    Ukraine to sabotage important systems, as well as to try to    shake down computer system users across the world.  <\/p>\n<p>    The NSA  witness contractor-defector Edward J. Snowden  is    showing itself to be leaky. Its having difficulty protecting    what it knows and preventing unintended use of the skills it    develops.  <\/p>\n<p>    The NSA must button up its files and techniques much more    tightly. And whatever cyberweapons we have, we must also stay    ahead in that game in our capacity to protect our own cyber    infrastructure.  <\/p>\n<p>    The penalty for falling behind in that development is chaos and    danger in our society and country, incredibly high stakes given    our vulnerability.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read the original: <\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.pressherald.com\/2017\/07\/05\/another-view-nsa-needs-to-secure-its-files-and-techniques-more-tightly\/\" title=\"Another View: NSA needs to secure its files and techniques more tightly - Press Herald\">Another View: NSA needs to secure its files and techniques more tightly - Press Herald<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The phenomenon of a recent widespread cyberattack, using weapons developed by the U.S. National Security Agency to disrupt major computer operations all over the globe, is not surprising, but it does call for urgent action on the federal governments part. Weapons proliferation grew much more lethal when the United States developed the atomic bomb, intended to end World War II more rapidly <a href=\"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/nsa-2\/another-view-nsa-needs-to-secure-its-files-and-techniques-more-tightly-press-herald.php\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"limit_modified_date":"","last_modified_date":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[261463],"tags":[],"class_list":["post-225917","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"modified_by":null,"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/225917"}],"collection":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/comments?post=225917"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/posts\/225917\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/media?parent=225917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/categories?post=225917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/futurist-transhuman-news-blog\/wp-json\/wp\/v2\/tags?post=225917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}