The NSA is working on an autonomous online defense system

TECHi's Author
Opposing Author Wired Read Source Article
Last Updated
TECHi's Take
Alfie Joshua
Alfie Joshua
  • Words 115
  • Estimated Read 1 min

More than a year after Edward Snowden first spilled the beans on the NSA’s digital surveillance practices, you wouldn’t think that he had much left to reveal. In an interview with Wired, however, the former spy has revealed that the agency is building an autonomous online defense system that will, not only crush digital attacks on the US, but could also launch digital retaliations in the blink of an eye. The in-no-way-ominously-named MonsterMind is designed to scour metadata databases, analyzing the traffic patterns in a way that’d make malicious traffic stand out. Foreign attackers launching DDoS or malware attacks against financial institutions, infrastructure or government systems could then be identified, and blocked.

Wired

Wired

  • Words 182
  • Estimated Read 1 min
Read Article

Edward Snowden has made us painfully aware of the government’s sweeping surveillance programs over the last year. But a new program, currently being developed at the NSA, suggests that surveillance may fuel the government’s cyber defense capabilities, too. The NSA whistleblower says the agency is developing a cyber defense system that would instantly and autonomously neutralize foreign cyberattacks against the US, and could be used to launch retaliatory strikes as well. The program, called MonsterMind, raises fresh concerns about privacy and the government’s policies around offensive digital attacks. Although details of the program are scant, Snowden tells WIRED in an extensive interview with James Bamford that algorithms would scour massive repositories of metadata and analyze it to differentiate normal network traffic from anomalous or malicious traffic. Armed with this knowledge, the NSA could instantly and autonomously identify, and block, a foreign threat. Cryptographer Matt Blaze, an associate professor of computer science at the University of Pennsylvania, says if the NSA knows how a malicious algorithm generates certain attacks, this activity may produce patterns of metadata that can be spotted.

Source

NOTE: TECHi Two-Takes are the stories we have chosen from the web along with a little bit of our opinion in a paragraph. Please check the original story in the Source Button below.

Balanced Perspective

TECHi weighs both sides before reaching a conclusion.

TECHi’s editorial take above outlines the reasoning that supports this position.

More Two Takes from Wired

The North Korean IT Workers Stole more than 80 American Identities
The North Korean IT Workers Stole more than 80 American Identities

In this hyper-connected world, stealing someone's identity is not just cybercrime; it’s now becoming a source of profit and power.…

Here’s how to use Spotify to its full potential
Here’s how to use Spotify to its full potential

Spotify is pretty much a must-have for anyone who even remotely enjoys music, which is basically everyone, but even those…

New Orleans has actually become a fairly lively tech hub
New Orleans has actually become a fairly lively tech hub

It's hard to imagine New Orleans popping up in any conversation about tech hubs in the United States, but that's…

TuneIn thinks Internet radio still has a chance against Spotify
TuneIn thinks Internet radio still has a chance against Spotify

Radio was dying well before the rise of music streaming services like Spotify, but their rise has definitely hastened its death,…