When NSA exploits an enemy's network, the next logical step is to see if the same network vulnerability exists in U.S. government networks so we can fix them. And when NSA discovers and fixes weaknesses in U.S. government networks, it makes sense to search enemy networks for those same weaknesses to exploit them. The SID director hosted talks about this and other topics.
Sep 28, 2004
Feb 05, 2018