NSA

facebook_page
twitter_page

Last quote about NSA

Patrick Toomey
This is an important victory for the rule of law. The NSA has secretly spied on Americans' internet communications for years, but now this surveillance will finally face badly needed scrutiny in our public courts. We look forward to arguing this case on the merits. Our government shouldn't be searching the private communications of innocent people in bulk, examining the contents of Americans' emails and chats day in and day out. This mass surveillance threatens the foundations of a free internet.feedback
share this quote
NEW May 24 2017
You can find on this page a variety of quotes, by one or many people, on what they said about NSA. 67 people are quoted and you can read 103 citations of them about NSA. Edward Snowden, James Lewis, Brad Smith and Matthew Hickey, are those who have spoken the most about this topic. Edward Snowden said: “Despite warnings, (NSA) built dangerous attack tools that could target Western software. Today we see the cost. If [the NSA] had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, this may not have happened.”.
Automatically powered by Storyzy
Take our quote verification challenge and find out !
James Lewis

I haven't found an analyst who doesn't say it doesn't come from the NSA cache.feedback

James Lewis

NSA should be embarrassed – they've had a lot of damaging leaks. Microsoft needs to admit that the 20th century is over, it's a much more hostile environment, and that hobbling the NSA won't make us any safer.feedback

Thomas Bossert

This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties, potentially criminals or foreign nation-states, that were put together in such a way as to deliver phishing emails, put it into embedded documents, and cause infection, encryption and locking. Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators.feedback

Emily Orton - Darktrace

You can buy these things and launch them. The barriers of entry to hacking are going down.feedback

Emily Orton - Darktrace

There are stockpiles of the most sophisticated cyber exploits up for sale. There is a whole marketplace if you want to hack and you don't have to be good at it.feedback

Brad Smith

This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. (...) We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.feedback

Brad Smith

We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the US military intelligence organisation National Security Agency (NSA) has affected customers around the world. An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen. The governments of the world should treat this attack as a wake-up call.feedback

Brad Smith

This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. [Governments] need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world.feedback

Scott Ludlam

We've seen what happens when the US NSA (National Security Agency) ... develops hacking tools, effectively weapons for breaking in to ordinary people's computers then loses control of one of those exploits that has then been effectively weaponised by a criminal organisation that is now seeking to ransom people. I think we need to keep a much closer eye on what government agencies are doing with these cyber weapons .. because they could've tipped off the government, they could have tipped off users of these operating systems but they didn't, they kept those exploits to themeslves.feedback

Patrick Toomey

It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen. These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world. It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone's digital life safer.feedback

Adam Segal

The NSA is supposed to lead the vulnerability equities process with all the other government agencies gathered round to discuss their interests in the vulnerability, and to weigh the offensive capabilities against defensive concerns for the private sector and US interests. It seems that in this case their hand was forced. They knew the vulnerability was online because of Shadow Brokers and Vault 7 so they went to Microsoft and warned the company they needed to patch it.feedback

Brad Smith

This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.feedback

Edward Snowden

Despite warnings, (NSA) built dangerous attack tools that could target Western software. Today we see the cost. If [the NSA] had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, this may not have happened.feedback

Andrew Komarov

WannaCry ransomware uses one of the exploits released recently by Shadowbrokers in the leaked NSA tools archive. This is pretty normal practice, where cybercriminals are using the latest vulnerabilities in order to increase the efficiency of their malware.feedback

Dan Sullivan

Shadow Brokers obtained the NSA tools that exposed a vulnerability in Microsoft's operating systems. They dumped the instructions detailing how to get in. The exploit is the 'crowbar' to open the door and the ransomware is the 'hand grenade' you lob in once the door is open.feedback

Mike Rogers

I would highlight much, not all, much of what was in the intelligence community's assessment, for example, on the Russian efforts against the U.S. election process in 2016, was informed by knowledge we gained through (Section) 702 authority.feedback

Sally Yates

We were really concerned about the compromise here. I don't know what steps they may have taken to act. It was a topic of a whole lot of discussion in the department of justice and with other members of the intelligence community. We had really the experts within the national security division. We were trying to make a determination about how best to deal with this. Our point was that logic would tell you that you don't want the NSA to be in a position where the Russians might have leverage over you.feedback

Elijah Cummings

The Pentagon's warning to Gen Flynn was bold, italicized and could not have been clearer. These documents raise grave questions about why General Flynn concealed the payments he received from foreign sources after he was warned explicitly by the Pentagon. There's obviously a paper trail.feedback

Elijah Cummings

I do not understand why the White House is covering for Michael Flynnafter the president fired him for lying. There is a paper trail that the White House does not want our committee to follow.feedback

Phillip Misner - Microsoft

We encourage customers to ensure their computers are up-to-date.feedback

Matt Suiche

As soon as they bypass the firewalls, they target the machines using Microsoft exploits. We now have all of the tools the NSA used to compromise SWIFT (via) Cisco firewalls, Windows.feedback

Phillip Misner - Microsoft

Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers. Understandingly, customers have expressed concerns around the risk this disclosure potentially creates. Our engineers have investigated the disclosed exploits, and most of the exploits are already patched. Below is our update on the investigation.feedback

Matthew Hickey

I'll bet it's not the only SWIFT service bureau that's been compromised.feedback

Matthew Hickey

It is very significant as it effectively puts cyber weapons in the hands of anyone who downloads it. A number of these attacks appear to be 0-day exploits which have no patch and work completely from a remote network perspective. It's an absolute disaster. I have been able to hack pretty much every Windows version here in my lab using this leak.feedback

Richard Dearlove

What lingers for Trump may be what deals – on what terms – he did after the financial crisis of 2008 to borrow Russian money when others in the west apparently would not lend to him. For Trump and the administration, that is. The only possible explanation is that Trump started tweeting without understanding how the NSA-GCHQ relationship actually works.feedback

Michael Hayden

To be on her desk in the first place, the report must already have intelligence in the first place or NSA would not have published it, especially if it involved any U.S. person information. So the original intelligence value judgment is made by a career intelligence professional at NSA.feedback

Tom Cotton

Typically, we wouldn't see transcripts of intercepts to begin with. Those transcripts are part of the raw intelligence that analysts at the NSA and CIA and other intelligence agencies use to produce finished products that then we would review. Susan Rice is the Typhoid Mary of the Obama administration foreign policy.feedback

Curtis Dukes

It's incumbent on the NSA to say, This is an important mission. That has not occurred.feedback

Richard Ledgett - National Security Agency

What happened here was, they fought back. So it kind of became a hand-to-hand combat thing. We'd remove their malware. They would deploy new malware, even though they knew we were in the system. They were just trying to get around us.feedback

Richard Ledgett - National Security Agency

We're being very open about the (Section 702) programme, and will be. Yes. All of the major cyber threat actors that we worry about have efforts in place, have that capability. Can you take out a traffic system? Absolutely. Can you take out comm(unication)s systems? Absolutely. Can you take out gas and oil distribution, and energy distribution systems? Absolutely you can. ... We're more vulnerable than most. Like a turtle, touch them and they pull in their shell.feedback

Mike Rogers

No sir, nor would I, that would be expressly against the construct of the Five Eyes agreement. I believe that the relationship is strong enough ... this is something we will be able to deal with. We have fundamental, foundational interests with each other, and we need to keep working together.feedback

Adam Schiff

I hope that we can put an end to this wild-goose chase because what the president said was just patently false. And the wrecking ball it created now has banged into our British allies and our German allies, it's continuing to grow in terms of damage, and he needs to put an end to this.feedback

Rand Paul

I spent nine and a half years as an undercover officer. I was the dude in the back alleys at 4 in the morning collecting intelligence to protect our homeland. … The men and the women in the CIA, they do their job regardless of who is in the White House. Same for NSA. Same for FBI. These men and women are putting themselves in harm's way.feedback

Devin Nunes

That is very possible, and we don't have the answers to those questions yet. We had a deadline of Friday for the NSA, FBI and CIA to get us those names that were unmasked through the FISA system. We didn't get those names on Friday, and until we get those names, we can't rule this out.feedback

Rick Ledgett

Of course they wouldn't do it. It would be epically stupid. Cyber war is going to look very different - you are going to see massive failures of key infrastructure systems in the countries that are being targeted in a way we have not seen yet. It's a truism that the more things you connect to a network, the more vulnerabilities you introduce.feedback

Andrew Napolitano

Three intelligence sources have informed Fox News that President Obama went outside the chain of command. He didn't use the NSA (National Security Agency), he didn't use the CIA, he didn't use the FBI and he didn't use the Department of Justice. He used GCHQ. What is that? It's the initials for the British intelligence finding agency.feedback

Sean Spicer

He's able to get it and there's no American fingerprints on it. Three intelligence sources have informed Fox News that President Obama went outside the chain of command - he didn't use the NSA, he didn't use the CIA, he didn't use the FBI and he didn't use the Department of Justice - he used GCHQ.feedback

Andrew Napolitano

Three intelligence sources have informed Fox News that President Obama went outside the chain of command. He didn't use the NSA, he didn't use the CIA, he didn't use the FBI, and he didn't use the Department of Justice. There's no American fingerprints on this. What happened to the guy who ordered this? Resigned three days after Donald Trump was inaugurated.feedback

Nathan White

The NSA leaks were shocking because they revealed mass surveillance that impacted all of us. We're not seeing that here – at least not yet.feedback

Michael Hayden

No. So the only part of the U.S. government that can grant the authority to do that is a federal judge. And if I were to want to do that as director of NSA, I'd have to go to the judge, and I'd have to prove to a level of probable cause that the intended target of the surveillance was either the agent of a foreign power or was involved in some sort of criminal activity. That's what I wondered, what happened on Saturday morning.feedback

Jason Healey

If the CIA has this many, we would expect the NSA to have several times more.feedback

Joni Ernst

To make this speech shorter than Mike Flynn's time at the NSA.feedback

Lee Cheol Woo

Our National Intelligence Service told me that North Korea's General Bureau of Espionage was responsible for the terrorism and the assassination of Kim Jong Nam but what Malaysian authorities discovered is that it was North Korea's National Security Agency that took the lead. Since it was the North Korean National Security Agency as well as its Foreign Ministry, who were behind the terrorism, we can say that it was North Korea's state-led terrorism.feedback

Donald J. Trump

America is going to start winning again, winning like never ever before. We're not going to let our country be taken advantage of anymore in any way, shape or form. General Keith Kellogg, who I have known for a long time, is very much in play for NSA – as are three others.feedback

Donald J. Trump

The NSA and the FBI should not interfere in our politics. Information is being illegally given (to newspapers) by the intelligence community (NSA and FBI?) Just like Russia.feedback

Donald J. Trump

Information is being illegally given to the failing @nytimes & @washingtonpost by the intelligence community (NSA and FBI?). Just like Russia. [T]his Russian connection non-sense [sic] is merely an attempt to cover-up the many mistakes made in Hillary Clinton's losing campaign. Crimea was TAKEN by Russia during the Obama Administration. Was Obama too soft on Russia? The fake news media is going crazy with their conspiracy theories and blind hatred. @MSNBC & @CNN are unwatchable. @foxandfriends is great!feedback

Rod Rosenstein

For as long as two decades, Harold Martin flagrantly abused the trust placed in him by the government.feedback

James Stavridis

I think the relationships between the president-elect and the current leadership of the CIA, the NSA and indeed the director of national intelligence are irreparably broken at this point. So let's get a new director of national intelligence, let's get a new head of the CIA in place.feedback

James Clapper

I think there is an important distinction here between healthy skepticism which policymakers -- to include policymaker No. 1 -- should always have on intelligence, but I think there's a difference between skepticism and disparagement. You only need to walk into the lobby and look at the stars on the wall or the NSA and the number of intelligence people who have paid the ultimate price for their country. I am apolitical.feedback

Desmond Ball

NSA headquarters at Fort Meade is 35 miles directly west; the large Navy communications station at Annapolis (used to communicate with nuclear submarines) is 20 miles west southwest; and the NSA's Propagation and Research Laboratory on Kent Island is 15 miles to the southwest.feedback

Chris Malone

Ninety-seven percent of their revenue comes from government contracts. The NSA is their largest client, thought to be the most profitable spy agency in the world. Donald Trump will have a lot of leverage to extract concessions out of Booz Allen given their track record and his emphasis on cybersecurity.feedback

Ron Wyden

The NSA has said that it only targets individuals...by searching for email addresses and similar identifiers. If that has changed, the executive branch has an obligation to notify the public.feedback

Cindy Cohn - Electronic Frontier Foundation

We know they purchase vulnerabilities and don't tell the companies their systems are vulnerable.feedback

Glenn Gerstell - National Security Agency

We are big supporters of encryption. Encryption is more of a law enforcement issue.feedback

Mike Rogers

We do acknowledge that we arrested a contractor who had been employed at the NSA.feedback

John Carlin

I'm sure the trusted professionals I work with across the community will take a hard look at anything they can learn from this case, whether it's about contractors or other issues to see whether they can better defend our systems from others who might try to steal from them.feedback

Ron Wyden

The FISA court has publically stated that tens of thousands of wholly domestic communications are caught up under 702 collection every year and that the potential number of Americans impacted is even larger than that. The NSA has said that it only targets individuals under Section 702 by searching for email addresses and similar identifiers. If that has changed, the executive branch has an obligation to notify the public.feedback

James Lewis

The dumping is a tactic they've been developing for the last five years or so. They try it, and if we don't respond they go a little further next time.feedback

Josh Earnest

Mr. Snowden has been charged with serious crimes, and it's the policy of the administration that Mr. Snowden should return to the United States and face those charges. He, of course, will be afforded due process, and there are mechanisms in our criminal justice system to ensure that he's treated fairly and consistent with the law. And that's what the president believes.feedback

Oliver Stone

He helped us with the film enormously but he didn't have any control. We did what we had to do, what we wanted to do. We checked the story with other people. We talked to as many people who would talk to us. We heard the NSA accounts. You know, not that many people have talked about the NSA, so this is really hard-earned research and I think it's very valid.feedback

Heather Conley

In some ways this is a really good vehicle for anti-Americanism. In Germany, the most potent anti-U.S. vehicle was about the NSA, Snowden and privacy … and all that anger, and all that sentiment has gone on to TTIP.feedback

Oliver Stone

Without Lindsay in his life, he doesn't have any friends. He's not close to sister, mother, father, he lives in a computer world, and that's his link to the rest of us.feedback

Tom Fitton - Judicial Watch

These documents show that Hillary Clinton knew her BlackBerry wasn't secure. The FBI and prosecutors ought to be very interested in these new materials.feedback

François Bonnet

It's not new but all the same – on this scale -we need to understand the National Security Agency and the CIA's errors which have undermined the image of the United States as a truly democratic country.feedback

Julian Assange - WikiLeaks

The French people have a right to know their elected government is subject to hostile surveillance.feedback

Jan Philipp Albrecht - European Parliament

I believe that we in the European Union bear a responsibility for this whistleblower. He should not be in the hands of a repressive dictator like Putin and we should not renounce the information that we can get there.feedback

Annette Heuser

What will happen in the future is we are going to see much more serious debate about the degree to which our intelligence services cooperate with US intelligence agencies. The question will be what role European and German intelligence services will play and what the limits of intelligence operations will be, when it comes to privacy and the individual freedoms of our own people.feedback

Thomas Oppermann

Under no circumstances is it justifiable that a world power or a country -especially not our friends, the United States – would recruit BND employees to spy on the work of the German parliamentary NSA investigation committee.feedback

Edward Snowden

People who think I made a mistake in picking Hong Kong as a location misunderstand my intentions. I am not here to hide from justice; I am here to reveal criminality.feedback

Edward Snowden

My intention is to ask the courts and people of Hong Kong to decide my fate. I have been given no reason to doubt your system.feedback

Barack Obama

But I also recognise that, as technologies change and people can start running algorithms and programmes that map out all the information that we're downloading on a daily basis into our telephones and our computers, that we may have to refine this further to give people more confidence.feedback

Stefan Grobe - Euronews

Mr. President, let's talk about EU-US relations. We've had the NSA scandal that created a lot of repercussions in Europe, we have the TTIP trade talks that are very complicated and there is a lot of resistance in Europe and the United States, so where are we right now? Your thoughts.feedback

Stefan Grobe - Euronews

The general feeling here is that the president struck the right balance between national security and the need for privacy.feedback

Carl Messineo

It's time to stop the NSA from seizing and searching my emails, my gmail, logging my telephone calls. I never signed up for this. The US citizenry does not want this. And I want the people who see the bus to know that there are millions of others thinking the exact same thing.feedback

Stefan Grobe - Euronews

Today Barack Obama and Angela Merkel still need to rebuild trust and warmth. Whether issues like Ukraine and the NSA scandal can allow that, remains to be seen.feedback

Edward Snowden

I am working to improve the NSA. I am still working for the National Security Agency right now. They are the only ones who don't realise it.feedback

Ken Gude - Center for American Progress

This information could be valuable for him in the negotiations with the US. But generally, he is not in a strong negotiating position, and it is totally impossible that he will receive a general amnesty.feedback

Ken Gude - Center for American Progress

The only way that can be avoided, is if the president issued a pardon for his activities, then he would never face the prospect of prosecution for the actions he was specifically pardoned for. But I think in the realm of reality, a presidential pardon is not really on the table.feedback

Alexei Makarkin

The very presence of Snowden is of symbolic importance to Russia. Snowden has become a symbol of the struggle for freedom, and that's useful for Russia. Today, that's one of the strongest arguments (Russia) could put to the international community.feedback

Edward Snowden

I have worked for the Central Intelligence Agency undercover, overseas. I have worked for the National Security Agency undercover, overseas… So when they say I'm a low-level systems administrator, that I don't know what I'm talking about, I'd say it's somewhat misleading.feedback

Angela Merkel

Since we are talking about the NSA, I have also always told the American president: 'There is no way of spying amongst friends.feedback

Keith Alexander - National Security Agency

That's never happened! In fact, there was this allegation last June that NSA was tapping into the servers of Yahoo or Google or our industry reps. It would be illegal for us to do that and so I don't know what the report is, but I can tell you factually, we do not have access to Google servers, Yahoo servers.feedback

Stephen Vladeck

The hardest thing for the President in this context is the extent to which he cannot satisfy both constituencies, the intelligence community on the one hand, civil liberties advocates and civil liberties organisations on the other.feedback

Edward Snowden

What I can say is that we know that Angela Merkel was monitored by the NSA. But the question is how logical is it that she's the only one who was monitored, how likely is it that she was the German person the NSA was watching?feedback

Julian Assange - WikiLeaks

There is no stopping the publishing process at this stage. Great care has been taken to make sure that Mr Snowden can't be pressured by any state to stop the publications process. The United States, by cancelling his passport has left him for the moment marooned in Russia.feedback

Jay Carney

We make clear what activity the NSA and … our intelligence community engages in, and the fact that they are bound by our laws and the oversight of three branches of government.feedback

Barack Obama

We can and must be more transparent. To other around the world, I wanna make clear – once again – that America is not interested in spying on ordinary people. Our intelligence is focused above all on finding the information that is necessary to protect our people and in many cases to protect our allies.feedback

Sergei Stanishev

It's not 10 years ago, but there is a progress since then and it was declared also by OLAF. There are common units of the prosecutor's office and many other institutions, including the national security agency, the ministry of interior, which are working on cases of fraud with European funds. And there are not only cases which have been investigated, several dozens, by the way, I don't know if you are aware of this.feedback

No quotes...
|< <
> >|

Quotes about NSA

<
facebook_page
twitter_page
This webpage has been created by a robot: errors and absent quotes cannot be totally avoided
 
Feedback×

Quote :

Mistake :

Comments :