The NSA is working on an autonomous online defense system

TECHi's Author Alfie Joshua
Opposing Author Wired Read Source Article
Last Updated
TECHi's Take
Alfie Joshua
Alfie Joshua
  • Words 115
  • Estimated Read 1 min

More than a year after Edward Snowden first spilled the beans on the NSA’s digital surveillance practices, you wouldn’t think that he had much left to reveal. In an interview with Wired, however, the former spy has revealed that the agency is building an autonomous online defense system that will, not only crush digital attacks on the US, but could also launch digital retaliations in the blink of an eye. The in-no-way-ominously-named MonsterMind is designed to scour metadata databases, analyzing the traffic patterns in a way that’d make malicious traffic stand out. Foreign attackers launching DDoS or malware attacks against financial institutions, infrastructure or government systems could then be identified, and blocked.

Wired

Wired

  • Words 182
  • Estimated Read 1 min
Read Article

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyber defense capabilities, too. The NSA whistleblower says the agency is developing a cyber defense system that would instantly and autonomously neutralize foreign cyberattacks against the US, and could be used to launch retaliatory strikes as well. The program, called MonsterMind, raises fresh concerns about privacy and the government’s policies around offensive digital attacks. Although details of the program are scant, Snowden tells WIRED in an extensive interview with James Bamford that algorithms would scour massive repositories of metadata and analyze it to differentiate normal network traffic from anomalous or malicious traffic. Armed with this knowledge, the NSA could instantly and autonomously identify, and block, a foreign threat. Cryptographer Matt Blaze, an associate professor of computer science at the University of Pennsylvania, says if the NSA knows how a malicious algorithm generates certain attacks, this activity may produce patterns of metadata that can be spotted.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Wired

The North Korean IT Workers Stole more than 80 American Identities
The North Korean IT Workers Stole more than 80 American Identities

In this hyper-connected world, stealing someone's identity is not just cybercrime; it’s now becoming a source of profit and power.…

Here’s how to use Spotify to its full potential
Here’s how to use Spotify to its full potential

Spotify is pretty much a must-have for anyone who even remotely enjoys music, which is basically everyone, but even those…

This is Samsung’s answer to the iPad Pro and Surface Pro 4
This is Samsung’s answer to the iPad Pro and Surface Pro 4

Productivity-focused tablets are breathing new life into a market that's been on the decline for a while now, and Samsung…

Zerodium just awarded hackers a million bucks for breaking into iOS 9
Zerodium just awarded hackers a million bucks for breaking into iOS 9

Zerodium is an interesting company. It makes its money by purchasing exploits and security information regarding popular software, and then…