NSA's Keith Alexander Doubles Down On His Plan To Spy On Wall Street To 'Protect' Wall Street

from the this-again? dept

Keith Alexander still doesn't seem to realize that the public has seen through his bullshit, because he keeps doubling down. There were numerous reports this week on a speech Alexander gave, in which he talked up his plan to "protect" Wall Street by getting access to the financial industry's networks.
Drawing an analogy to how the military detects an incoming missile with radar and other sensors, Alexander imagined the NSA being able to spot "a cyberpacket that's about to destroy Wall Street." In an ideal world, he said, the agency would be getting real-time information from the banks themselves, as well as from the NSA's traditional channels of intelligence, and have the power to take action before a cyberattack caused major damage.
The thing is, this isn't new. Back in July, the Washington Post's excellent profile of Keith "collect it all" Alexander pointed out that he'd been pushing this exact solution for quite some time, though execs from Wall Street found the idea to be ridiculous, since they fully understood what it meant:
His proposed solution: Private companies should give the government access to their networks so it could screen out the harmful software. The NSA chief was offering to serve as an all-knowing virus-protection service, but at the cost, industry officials felt, of an unprecedented intrusion into the financial institutions’ databases.

The group of financial industry officials, sitting around a table at the Office of the Director of National Intelligence, were stunned, immediately grasping the privacy implications of what Alexander was politely but urgently suggesting. As a group, they demurred.

“He’s an impressive person,” the participant said, recalling the group’s collective reaction to Alexander. “You feel very comfortable with him. He instills a high degree of trust.”

But he was proposing something they thought was high-risk.

“Folks in the room looked at each other like, ‘Wow. That’s kind of wild.’ ”
In other words, even well before all the details of Alexander's overreach as NSA director came out, Wall Street execs had no interest in giving him such access to their networks.

But this is the same basic pitch that Alexander has been making for years. The biggest joke in the intelligence community is the fact that Alexander technically has two jobs: he's both the head of the NSA -- in charge of collecting information for surveillance -- and the head of US Cyber Command, which runs the military's "cyber" initiatives. Alexander loves to use the cover of his Cybercommand position to pretend that his focus is on protecting data and networks.

You may recall that, the NSA's talking points on the breaking ground for the massive Utah datacenter were entirely focused on how the center would be used to protect the internet -- leaving out how it would actually be used to spy on the network. Members of Congress have raised concerns for a while about the conflict of interest between Alexander's two roles. The fact that he uses the Cybercommand role to pretend his focus is on cybersecurity, while in actuality he's been destroying cybersecurity by undermining standards, creating backdoors and encouraging vulnerabilities is a huge problem.

But, perhaps even more stunning, is his inability to recognize that people aren't believing what he says any more, such that he'd start pushing this ridiculous desire to get access to Wall Street's networks yet again, years after it was rejected -- but also after the evidence of his efforts to trample the 4th Amendment have become clear.
Hide this

Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.

Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.

While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.

–The Techdirt Team

Filed Under: cybercommand, cybersecurity, keith alexander, nsa, nsa surveillance, surveillance, wall street

Reader Comments

Subscribe: RSS

View by: Time | Thread

  1. icon
    GEMont (profile), 11 Oct 2013 @ 6:39am

    The road to hell....

    This is probably not the best forum to air this thought, but it occurred while reading it, so....

    With all of the years of secret intrusions into the internet, including as it turns out, direct links to the web backbone, and NSA operatives creating backdoors into unknown web software with unknown capabilities, it occurred to me that it may now be possible for law enforcement to have "evidence" of wrong-doing, such a state secrets or kiddie-porn, planted directly onto a citizen's computer for later "discovery" by LEOs, eliminating the need to actually catch real bad guys and enhancing law enforcement's apparent effectiveness in the public's eye.

    And then it occurred to me that real perps could use this very same process to deny ownership of real state secrets or kiddie porn they made or bought, that was found on their computers by LEOs, simply by claiming the LEOs had downloaded the material to their computers through the backdoors that have been manufactured for specifically that purpose by NSA operatives working inside IT companies.

    In a way, the global surveillance of the public has created a near perfect escape clause for criminals who get caught with contraband material on their computer, since it is widely known now that Law Enforcement has the capabilities to pull off such stunts and the bad track record that proves they really would use it in such a manner.

    At the same time, it has created a tremendous opportunity for Authority to plant evidence on the computers of innocents who have in some way, angered the powers that be or who stand in the way of those on top of the food chain getting what they desire.

    They have done nothing to solve the known problems facing law enforcement through this overwhelming public surveillance, but have definitely created a greater problem than was originally apparent, both for the public and themselves.

Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here

Subscribe to the Techdirt Daily newsletter

Comment Options:

  • Use markdown. Use plain text.
  • Make this the First Word or Last Word. No thanks. (get credits or sign in to see balance)    
  • Remember name/email/url (set a cookie)

Follow Techdirt
Special Affiliate Offer

Essential Reading
Techdirt Deals
Report this ad  |  Hide Techdirt ads
Techdirt Insider Chat
Recent Stories

This site, like most other sites on the web, uses cookies. For more information, see our privacy policy. Got it

Email This

This feature is only available to registered users. Register or sign in to use it.