There's not much value to us attacking Chinese systems. We might take a few computers offline. We might take a factory offline. We might steal secrets from a university research programs, and even something high-tech. But how much more does the United States spend on research and development than China does?
You shouldn't send an email from a computer that's associated with you if you don't want it to be tracked back to you. You don't want to hack the power plant from your house if you don't want them to follow the trail back and see your IP address.
I went to a website the other day and right at the top of the page it showed me my ip address. It was the most disturbing moment I have ever experienced. This website even told me what internet browser I was using, and what day it was. Computers can do anything.
Congress hasn't declared war on the countries - the majority of them are our allies - but without asking for public permission, NSA is running network operations against them that affect millions of innocent people. And for what? So we can have secret access to a computer in a country we're not even fighting?
I describe myself as an indoor cat, because I'm a computer guy and I always have been.
When we talk about computer network exploitation, computer network attack, we're not just talking about your home PC. We're talking about your cell phone, and we're also talking about internet routers themselves. The NSA is attacking the critical infrastructure of the internet to try to take ownership of it. They hack the routers that connect nations to the internet itself.
I've been recognized every now and then. It's always in computer stores. It's something like brain associations, because I'll be in the grocery store and nobody will recognize me. Even in my glasses, looking exactly like my picture, nobody will recognize me. But I could be totally clean-shaven, hat on, looking nothing like myself in a computer store, and they're like, "Snowden?!"
People have to be free to investigate computer security. People have to be free to look for the vulnerabilities and create proof of concept code to show that they are true vulnerabilities in order for us to secure our systems.
I do everything on the computer. TV is obsolete technology for me.
If you ask anybody at Cyber Command or look at any of the job listings for openings for their positions, you'll see that the one thing they don't prioritize is computer network defense. It's all about computer network attack and computer network exploitation at Cyber Command.
I built my own studio. I don't have the professional language to describe it because I'm not a videographer - but I'm a technician. So I get the camera, I get all the things that translate the camera to the computer, I set up a live session, I do the security on it, I set up a background so I can key it out, like newscasters do, and replace it with whatever I want - and I can be anywhere I need to be.
We should never allow computers to make inherently governmental decisions in terms of the application of military force, even if that's happening on the internet.
Someone recently talked about mass surveillance and the NSA revelations as being the atomic moment for computer scientists. The atomic bomb was the moral moment for physicists. Mass surveillance is the same moment for computer scientists, when they realize that the things they produce can be used to harm a tremendous number of people.
Follow AzQuotes on Facebook, Twitter and Google+. Every day we present the best quotes! Improve yourself, find your inspiration, share with friends
or simply: