Snowden Archive
——
The SIDtoday
Files
Browse the Archive

Third SID/IAD Offsite – It’s All About Networks!

SUMMARY

When NSA exploits an enemy's network, the next logical step is to see if the same network vulnerability exists in U.S. government networks so we can fix them. And when NSA discovers and fixes weaknesses in U.S. government networks, it makes sense to search enemy networks for those same weaknesses to exploit them. The SID director hosted talks about this and other topics.

DOCUMENT’S DATE

Sep 28, 2004

PUBLICLY AVAILABLE

Feb 05, 2018