NSA

facebook_page
twitter_page

Last quote about NSA

Eugene Kaspersky - Microsoft
Trust is essential in cybersecurity, which depends on collaboration between vendors, researchers, clients.feedback
share this quote
Oct 26 2017
“This often-condemned law provides no space to distinguish the extraordinary disclosure of inappropriately classified information in the public interest – whistleblowing – from the malicious disclosure of secrets to foreign governments by those motivated by a specific intent to harm to their countrymen.” said Edward Snowden speaking about NSA. It’s one of the 165 quotes about NSA you can find on this page. 103 people have said something about this topic. Among them: Eugene Kaspersky, James Lewis and Michael Hayden. Browse the quotes by date and by name to find those that are relevant to you.
Automatically powered by Storyzy
Take our quote verification challenge and find out !

All quotes about NSA

Orr Dunkelman

I don't trust the designers. There are quite a lot of people in NSA who think their job is to subvert standards. My job is to secure standards.feedback

Rich Lowry

He used Washington-speak three times to basically answer your question: 'No, I cannot work with Steve Bannon,'.feedback

Lauren Fish - Center for a New American Security

NSA is truly an intelligence-collection organization,'. It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect.feedback

Maciej Ceglowski

I enjoy the looking-glass aspect of our industry, where running a mildly profitable small business makes me a crazy maverick not afraid to break all the rules. I was frustrated that everyone fixated on the NSA, while meanwhile the apparatus of commercial surveillance was orders of magnitude bigger.feedback

Michael Hayden

If American espionage cannot protect the special tools that it possesses, it doesn't matter that they are good people working for good purposes under good oversight. If they cannot protect the tools, I just can't mount the argument to defend that they should have them. This is the one that, unless resolved, I think actually could constitute a legitimate argument to do less.feedback

Ryan Trapani

CIA's mission is to aggressively collect foreign intelligence overseas to protect America from terrorists, hostile nation states and other adversaries. It is CIA's job to be innovative, cutting-edge, and the first line of defense in protecting this country from enemies abroad.feedback

Brad Smith

This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.feedback

Michael Hayden

I disagree with Jim Comey. I know encryption represents a particular challenge for the FBI. ... But on balance, I actually think it creates greater security for the American nation than the alternative: a backdoor.feedback

Volodymyr Groysman

Our IT specialists are doing their job and protecting critical infrastructure. Important systems have not suffered. The attack will be repelled, and the attackers will be detected.feedback

Ted Lieu

If the NSA has a kill switch for this new malware attack, the NSA should deploy it now.feedback

Cyrille Gibot

Like many other companies and institutions around the world, we are experiencing interference with some of our systems within the TNT network. We are assessing the situation and are implementing remediation steps as quickly as possible and we regret any inconvenience to our customers.feedback

Adam Schiff

I . . . think the Russians were watching and decided that, well, we didn't respond to that. They could get away with a cyberattack.feedback

Michael Sulmeyer

What it really confirms is that . . . you don't have to be the best in the business to cause a lot of disruption. And that's what they showed they were willing and able to do. This is a big deal.feedback

Jake Williams

This is a case where you've got a weaponized, government-sponsored exploit [or hacking tool] being used to deliver ransomware. If North Korea goes unchecked with this, I would expect other developing nations to follow suit. I think that would change the cyberthreat landscape quite a bit.feedback

Jake Williams

This is like knowingly taking tainted bills from a bank robbery.feedback

Adam Schiff

They do it with loudspeakers. They do it by telling people in the North what a terrible regime they live under that's starving their own people.feedback

Dan Coats

The NSA has made Herculean, extensive efforts to devise a counting strategy that would be accurate.feedback

Rick Ledgett

We’re working on that with the Congress and we'll come to a satisfactory resolution, because we have to.feedback

Elizabeth Goitein

How can we accept the government's reassurance that our privacy is being protected when the government itself has no idea how many Americans' communications are being swept up and stored?feedback

Titus Nichols

Simply plugging a flash drive into a computer is not downright frightening. My client is innocent until proven guilty and we plan to enter a plea of not guilty.feedback

Edward Snowden

This often-condemned law provides no space to distinguish the extraordinary disclosure of inappropriately classified information in the public interest – whistleblowing – from the malicious disclosure of secrets to foreign governments by those motivated by a specific intent to harm to their countrymen.feedback

Leigh Winner

I can't ever call her a traitor or even believe that. No, that is not Reality. That's not her.feedback

Mike Rogers

In the three-plus years that I have been the Director of the National Security Agency, to the best of my recollection, I have never been directed to do anything I believed to be illegal, immoral, unethical or inappropriate.feedback

Billie Winner-Davis - Air Force

Her words to me was that she was scared she was going to be … they were going to make her disappear.feedback

Mike Rogers

I am not going to discuss the specifics of any interaction or conversations I [...] may or may not have had with the President of the United States, but I will make the following comment. In the three-plus years that I have been the director of the National Security Agency, to the best of my recollection, I have never been directed to do anything I believe to be illegal, immoral, unethical, or inappropriate. Because I feel it is inappropriate, senator. Because of the sensitive nature and the executive privilege aspect to this, I need to be talking to the general counsel in the White House.feedback

Trevor Noah

He loves the performance of doing things. But a lot of the time, nothing's actually being done. Essentially, Donald Trump wants to be president, but he doesn't want to do president. It was people saying, Maybe we'd like to do deals in the future.feedback

Neema Singh Guliani

After months of criticizing the government for allegedly spying on his presidential campaign, President Trump is now hypocritically endorsing a bill that would make permanent the NSA authority that is used to spy on Americans without a warrant.feedback

Trevor Noah

Just like most of Trump's deals, once you start to read the fine print, you realize it's not what it seems. Remember the giant Saudi arms deal last month? The president was bragging on Twitter: 'Bringing hundreds of billions of dollars back to the USA from the Middle East – which will means JOBS, JOBS, JOBS.feedback

Stephen Colbert

Now, all along Donald Trump has said the entire Russia story is fake news. And there is no way to know whether this document that was released is real, other than the fact that the leaker was immediately arrested. Fake news, real prison.feedback

Stephen Colbert

This is how democracy ends. With a fake email sent to the ancient cat lady manning the polling station at your high school gym. The leaker's name, and this is true: Reality Winner. So it's official, the Trump administration is at war with Reality.feedback

Seth Meyers

Four top law firms have turned down requests from the White House to represent President Trump during the Russia investigations. Man, how guilty do you have to be when a lawyer won't even take your case? Bill Cosby has a lawyer. OJ had, like, five of them.feedback

Stephen Colbert

Apparently, Russian hackers tried to gain access to a company called VR systems by sending workers there phony emails that appeared to be from Google that would request their log-in credentials. Okay, here's a little tip. If it looks like Google but isn't really, it's either a hacker or Bing. Just stay away from both of them.feedback

Trevor Noah

I have to admit, when I saw that, I was like, wow, Donald Trump does get things done. Stroke of a pen. Boom. Decisive. Except then I learned that that executive order was more of an executive suggestion. Now, that tweet makes it sound like Trump completed a $110bn deal, got the cash, and then rolled back to America like a presidential Lil Jon. I was even excited. Except it turns out that there was no actual deal. There was no deal that was signed. It was people saying maybe we'd like to do deals in the future.feedback

Seth Meyers

The Department of Justice charged a federal contractor named Reality Leigh Winner yesterday with leaking classified materials to the press about Russia's meddling in the election. This is a confusing story so let me try to break it down: Reality Winner leaked information about a reality denier, who tried to influence the election to support a reality host who is detached from reality.feedback

Matthew Aid

The vast majority of people who do the National Security Agency's intercept work, who translate and analyze – most of them are fresh out of high school. There are thousands of 18 to 21-year-olds doing critically important and secret work around the world.feedback

Erik Wemple

On the Justice Department announced charges against 25-year-old Reality Winner a Georgia-based contractor assigned to the National Security Agency for allegedly removing and sending classified materials to a news organization. The release from Justice came shortly after the Intercept published an article based on a top-secret NSA report detailing Russian attempts to hack into local and state voting systems.feedback

Sam Biddle

There's nothing in the NSA report indicating the actual voting machines or vote tabulations were compromised.feedback

Matthew Aid

It's a new kind of insider threat that the agency can't defend against.feedback

Vivian Siu - The Intercept

As we reported in the story, the NSA document was provided to us anonymously. The Intercept has no knowledge of the identity of the source.feedback

Keith Golden

It was clear that she would have preferred a different president than who ended up winning.feedback

Keith Golden

I've never met someone so committed to helping others. She is obsessed with the fight against Islamic State. She said the problem was rampant – worse than people were aware of or what the media reported.feedback

Donald J. Trump

Journalism requires that document be published and reported. Rationality requires it be read skeptically.feedback

Wayne Murphy - National Security Agency

The NSA has never . . . at any time conducted 'mass' or 'blanket' surveillance, interception, or analysis . . . of e-mail, text message, telephone, or other telecommunications in Salt Lake City or the vicinity of the 2002 Winter Olympic venues, whether during the 2002 Winter Olympic Games or otherwise.feedback

Jared DeMott

I don't know if people have really realized what's possible, . We all live with a gross amount of insecurity.feedback

Vladimir Putin

Snowden was right in that sense [that NSA surveillance had gone to far]. But I don't think he should have done it. I trust them.feedback

Guillaume Poupard

Why did Admiral Rogers say that, like that, at that time? It really surprised me. It really surprised my European allies. And to be totally frank, when I spoke about it to my NSA counterparts and asked why did he say that, they didn't really know how to reply either. Perhaps he went further than what he really wanted to say. Unfortunately, we now know the reality that we are going to live with forever, probably. Very serious means that they shouldn't have happened and the impacts were very serious for the entire nation.feedback

Eliot Cohen

What is not normal, is asking a hostile government to provide secure comms to avoid FBI/NSA surveillance.feedback

Patrick Toomey

This is an important victory for the rule of law. The NSA has secretly spied on Americans' internet communications for years, but now this surveillance will finally face badly needed scrutiny in our public courts. We look forward to arguing this case on the merits. Our government shouldn't be searching the private communications of innocent people in bulk, examining the contents of Americans' emails and chats day in and day out. This mass surveillance threatens the foundations of a free internet.feedback

Jimmy Wales

I would join with Microsoft and the other leaders of the industry in saying this is a huge screw-up by the government. This is an issue that should have been, the moment the NSA found it, they should have notified Microsoft so they could quietly issue a patch and really chivvy people along long before it became a huge problem. So I think it's very problematic when we see the security services stockpiling and weaponizing what are things that are very risky to the public.feedback

Marcy Wheeler

Heck, at this point, Shadow Brokers doesn't even need to have this exploit (though I'm guessing the NSA and Microsoft both may be erring on the side of caution at this point). Because simply by threatening another leak after leaking two sets of Microsoft exploits, Shadow Brokers will ratchet up the hostility between Microsoft and the government.feedback

Michael Shalyt

It's one thing when I tell them: Look at these past examples, it can be done, the technology is not that so sophisticated. But it's a different thing when it's on the TV, on the news. It's more convincing. In power generation you see this all the time, they're very scared of touching their SCADA (control and data systems) and in general their networks and their configurations: It was working for ten years, 15 years. Why should I ever touch anything? If I screw something up, I'll have downtime in power. Do you know how much that will cost the company?feedback

Michael Shalyt

This is one of the scarier parts for me in the whole story. The things that we really rely on for electricity, water, gas supply health care, there's very little incentive there most of the time to upgrade the systems.feedback

Michael Shalyt

We have to be prepared for serious high technology attacks because this is critical infrastructure, very high priority targets. There are very smart people in other parts of the world, that's not the issue. I think it's the ecosystem here both due to the army but also because there are already hundreds of cyber companies in Israel.feedback

Salim Neino

The concern has always been, when are the real bad guys, the ones that don't care about rules of engagement, the ones who are really out to hurt us, will they become cyber-capable? I think today we found out that those who really want to hurt us have begun to, because they became cyber-capable the moment that the NSA cybertools were released.feedback

Thomas Bossert

This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties potentially criminals or foreign nation-states. I don't want to say we have no clues. Despite appearing to be criminal activity intended to raise money, it appears that less than $70,000 has been paid in ransoms and we are not aware of payments that have led to any data recovery.feedback

James Lewis

Think of it like a master key. NSA identified a vulnerability in a Microsoft software that the Shadow Brokers, then released so anybody could use it.feedback

Chris Dore

Using outdated versions of Windows that are no longer supported raises a lot of questions. I doubt there can be any liability that stems back to the NSA.feedback

James Lewis

I haven't found an analyst who doesn't say it doesn't come from the NSA cache.feedback

James Lewis

NSA should be embarrassed – they've had a lot of damaging leaks. Microsoft needs to admit that the 20th century is over, it's a much more hostile environment, and that hobbling the NSA won't make us any safer.feedback

Thomas Bossert

This was not a tool developed by the NSA to hold ransom data. This was a tool developed by culpable parties, potentially criminals or foreign nation-states, that were put together in such a way as to deliver phishing emails, put it into embedded documents, and cause infection, encryption and locking. Once they're let out of the lamp, genies of this kind, especially those created by intelligence services, can later do damage to their authors and creators.feedback

Emily Orton - Darktrace

You can buy these things and launch them. The barriers of entry to hacking are going down.feedback

Emily Orton - Darktrace

There are stockpiles of the most sophisticated cyber exploits up for sale. There is a whole marketplace if you want to hack and you don't have to be good at it.feedback

Brad Smith

This attack provides yet another example of why the stockpiling of vulnerabilities by governments is such a problem. (...) We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military having some of its Tomahawk missiles stolen.feedback

Brad Smith

We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the US military intelligence organisation National Security Agency (NSA) has affected customers around the world. An equivalent scenario with conventional weapons would be the US military having some of its Tomahawk missiles stolen. The governments of the world should treat this attack as a wake-up call.feedback

Brad Smith

This is an emerging pattern in 2017. We have seen vulnerabilities stored by the CIA show up on WikiLeaks, and now this vulnerability stolen from the NSA has affected customers around the world. [Governments] need to take a different approach and adhere in cyberspace to the same rules applied to weapons in the physical world.feedback

Scott Ludlam

We've seen what happens when the US NSA (National Security Agency) ... develops hacking tools, effectively weapons for breaking in to ordinary people's computers then loses control of one of those exploits that has then been effectively weaponised by a criminal organisation that is now seeking to ransom people. I think we need to keep a much closer eye on what government agencies are doing with these cyber weapons .. because they could've tipped off the government, they could have tipped off users of these operating systems but they didn't, they kept those exploits to themeslves.feedback

Patrick Toomey

It would be shocking if the NSA knew about this vulnerability but failed to disclose it to Microsoft until after it was stolen. These attacks underscore the fact that vulnerabilities will be exploited not just by our security agencies, but by hackers and criminals around the world. It is past time for Congress to enhance cybersecurity by passing a law that requires the government to disclose vulnerabilities to companies in a timely manner. Patching security holes immediately, not stockpiling them, is the best way to make everyone's digital life safer.feedback

Adam Segal

The NSA is supposed to lead the vulnerability equities process with all the other government agencies gathered round to discuss their interests in the vulnerability, and to weigh the offensive capabilities against defensive concerns for the private sector and US interests. It seems that in this case their hand was forced. They knew the vulnerability was online because of Shadow Brokers and Vault 7 so they went to Microsoft and warned the company they needed to patch it.feedback

Edward Snowden

Despite warnings, (NSA) built dangerous attack tools that could target Western software. Today we see the cost. If [the NSA] had privately disclosed the flaw used to attack hospitals when they found it, not when they lost it, this may not have happened.feedback

Andrew Komarov

WannaCry ransomware uses one of the exploits released recently by Shadowbrokers in the leaked NSA tools archive. This is pretty normal practice, where cybercriminals are using the latest vulnerabilities in order to increase the efficiency of their malware.feedback

Dan Sullivan

Shadow Brokers obtained the NSA tools that exposed a vulnerability in Microsoft's operating systems. They dumped the instructions detailing how to get in. The exploit is the 'crowbar' to open the door and the ransomware is the 'hand grenade' you lob in once the door is open.feedback

Mike Rogers

I would highlight much, not all, much of what was in the intelligence community's assessment, for example, on the Russian efforts against the U.S. election process in 2016, was informed by knowledge we gained through (Section) 702 authority.feedback

Sally Yates

We were really concerned about the compromise here. I don't know what steps they may have taken to act. It was a topic of a whole lot of discussion in the department of justice and with other members of the intelligence community. We had really the experts within the national security division. We were trying to make a determination about how best to deal with this. Our point was that logic would tell you that you don't want the NSA to be in a position where the Russians might have leverage over you.feedback

Elijah Cummings

These documents raise grave questions about why General Flynn concealed the payments he received from foreign sources after he was warned explicitly by the Pentagon. Our next step is to get the documents we are seeking from the White House so we can complete our investigation. I thank the Department of Defense for providing us with unclassified versions of these documents.feedback

Elijah Cummings

I do not understand why the White House is covering for Michael Flynnafter the president fired him for lying. There is a paper trail that the White House does not want our committee to follow.feedback

Phillip Misner - Microsoft

We encourage customers to ensure their computers are up-to-date.feedback

Matt Suiche

As soon as they bypass the firewalls, they target the machines using Microsoft exploits. We now have all of the tools the NSA used to compromise SWIFT (via) Cisco firewalls, Windows.feedback

Phillip Misner - Microsoft

Today, Microsoft triaged a large release of exploits made publicly available by Shadow Brokers. Understandingly, customers have expressed concerns around the risk this disclosure potentially creates. Our engineers have investigated the disclosed exploits, and most of the exploits are already patched. Below is our update on the investigation.feedback

Matthew Hickey

I'll bet it's not the only SWIFT service bureau that's been compromised.feedback

Matthew Hickey

It is very significant as it effectively puts cyber weapons in the hands of anyone who downloads it. A number of these attacks appear to be 0-day exploits which have no patch and work completely from a remote network perspective. It's an absolute disaster. I have been able to hack pretty much every Windows version here in my lab using this leak.feedback

Richard Dearlove

What lingers for Trump may be what deals – on what terms – he did after the financial crisis of 2008 to borrow Russian money when others in the west apparently would not lend to him. For Trump and the administration, that is. The only possible explanation is that Trump started tweeting without understanding how the NSA-GCHQ relationship actually works.feedback

Michael Hayden

To be on her desk in the first place, the report must already have intelligence in the first place or NSA would not have published it, especially if it involved any U.S. person information. So the original intelligence value judgment is made by a career intelligence professional at NSA.feedback

Tom Cotton

Typically, we wouldn't see transcripts of intercepts to begin with. Those transcripts are part of the raw intelligence that analysts at the NSA and CIA and other intelligence agencies use to produce finished products that then we would review. Susan Rice is the Typhoid Mary of the Obama administration foreign policy.feedback

Curtis Dukes

It's incumbent on the NSA to say, This is an important mission. That has not occurred.feedback

Richard Ledgett - National Security Agency

What happened here was, they fought back. So it kind of became a hand-to-hand combat thing. We'd remove their malware. They would deploy new malware, even though they knew we were in the system. They were just trying to get around us.feedback

Richard Ledgett - National Security Agency

We're being very open about the (Section 702) programme, and will be. Yes. All of the major cyber threat actors that we worry about have efforts in place, have that capability. Can you take out a traffic system? Absolutely. Can you take out comm(unication)s systems? Absolutely. Can you take out gas and oil distribution, and energy distribution systems? Absolutely you can. ... We're more vulnerable than most. Like a turtle, touch them and they pull in their shell.feedback

Mike Rogers

No sir, nor would I, that would be expressly against the construct of the Five Eyes agreement. I believe that the relationship is strong enough ... this is something we will be able to deal with. We have fundamental, foundational interests with each other, and we need to keep working together.feedback

Adam Schiff

I hope that we can put an end to this wild-goose chase because what the president said was just patently false. And the wrecking ball it created now has banged into our British allies and our German allies, it's continuing to grow in terms of damage, and he needs to put an end to this.feedback

Rand Paul

I spent nine and a half years as an undercover officer. I was the dude in the back alleys at 4 in the morning collecting intelligence to protect our homeland. … The men and the women in the CIA, they do their job regardless of who is in the White House. Same for NSA. Same for FBI. These men and women are putting themselves in harm's way.feedback

Devin Nunes

That is very possible, and we don't have the answers to those questions yet. We had a deadline of Friday for the NSA, FBI and CIA to get us those names that were unmasked through the FISA system. We didn't get those names on Friday, and until we get those names, we can't rule this out.feedback

Rick Ledgett

Of course they wouldn't do it. It would be epically stupid. Cyber war is going to look very different - you are going to see massive failures of key infrastructure systems in the countries that are being targeted in a way we have not seen yet. It's a truism that the more things you connect to a network, the more vulnerabilities you introduce.feedback

Sean Spicer

He's able to get it and there's no American fingerprints on it. Three intelligence sources have informed Fox News that President Obama went outside the chain of command - he didn't use the NSA, he didn't use the CIA, he didn't use the FBI and he didn't use the Department of Justice - he used GCHQ.feedback

Andrew Napolitano

Three intelligence sources have informed Fox News that President Obama went outside the chain of command. He didn't use the NSA, he didn't use the CIA, he didn't use the FBI, and he didn't use the Department of Justice.feedback

Nathan White

The NSA leaks were shocking because they revealed mass surveillance that impacted all of us. We're not seeing that here – at least not yet.feedback

Michael Hayden

No. So the only part of the U.S. government that can grant the authority to do that is a federal judge. And if I were to want to do that as director of NSA, I'd have to go to the judge, and I'd have to prove to a level of probable cause that the intended target of the surveillance was either the agent of a foreign power or was involved in some sort of criminal activity. That's what I wondered, what happened on Saturday morning.feedback

Jason Healey

If the CIA has this many, we would expect the NSA to have several times more.feedback

Joni Ernst

To make this speech shorter than Mike Flynn's time at the NSA.feedback

Lee Cheol Woo

Our National Intelligence Service told me that North Korea's General Bureau of Espionage was responsible for the terrorism and the assassination of Kim Jong Nam but what Malaysian authorities discovered is that it was North Korea's National Security Agency that took the lead. Since it was the North Korean National Security Agency as well as its Foreign Ministry, who were behind the terrorism, we can say that it was North Korea's state-led terrorism.feedback

Donald J. Trump

Information is being illegally given to the failing @nytimes & @washingtonpost by the intelligence community (NSA and FBI?) Just like Russia.feedback

Rod Rosenstein

For as long as two decades, Harold Martin flagrantly abused the trust placed in him by the government.feedback

James Stavridis

I think the relationships between the president-elect and the current leadership of the CIA, the NSA and indeed the director of national intelligence are irreparably broken at this point. So let's get a new director of national intelligence, let's get a new head of the CIA in place.feedback

James Clapper

I think there is an important distinction here between healthy skepticism which policymakers -- to include policymaker No. 1 -- should always have on intelligence, but I think there's a difference between skepticism and disparagement. You only need to walk into the lobby and look at the stars on the wall or the NSA and the number of intelligence people who have paid the ultimate price for their country. I am apolitical.feedback

Desmond Ball

NSA headquarters at Fort Meade is 35 miles directly west; the large Navy communications station at Annapolis (used to communicate with nuclear submarines) is 20 miles west southwest; and the NSA's Propagation and Research Laboratory on Kent Island is 15 miles to the southwest.feedback

Chris Malone

Ninety-seven percent of their revenue comes from government contracts. The NSA is their largest client, thought to be the most profitable spy agency in the world. Donald Trump will have a lot of leverage to extract concessions out of Booz Allen given their track record and his emphasis on cybersecurity.feedback

Julian Assange - WikiLeaks

Wikileaks remains committed to publishing information that informs the public, even if many, especially those in power, would prefer not to see it. WikiLeaks must publish. It must publish and be damned.feedback

Ron Wyden

The NSA has said that it only targets individuals...by searching for email addresses and similar identifiers. If that has changed, the executive branch has an obligation to notify the public.feedback

Cindy Cohn - Electronic Frontier Foundation

We know they purchase vulnerabilities and don't tell the companies their systems are vulnerable.feedback

Glenn Gerstell - National Security Agency

We are big supporters of encryption. Encryption is more of a law enforcement issue.feedback

Mike Rogers

We do acknowledge that we arrested a contractor who had been employed at the NSA.feedback

John Carlin

I'm sure the trusted professionals I work with across the community will take a hard look at anything they can learn from this case, whether it's about contractors or other issues to see whether they can better defend our systems from others who might try to steal from them.feedback

Ron Wyden

The FISA court has publically stated that tens of thousands of wholly domestic communications are caught up under 702 collection every year and that the potential number of Americans impacted is even larger than that. The NSA has said that it only targets individuals under Section 702 by searching for email addresses and similar identifiers. If that has changed, the executive branch has an obligation to notify the public.feedback

James Lewis

The dumping is a tactic they've been developing for the last five years or so. They try it, and if we don't respond they go a little further next time.feedback

Josh Earnest

Mr. Snowden has been charged with serious crimes, and it's the policy of the administration that Mr. Snowden should return to the United States and face those charges. He, of course, will be afforded due process, and there are mechanisms in our criminal justice system to ensure that he's treated fairly and consistent with the law. And that's what the president believes.feedback

Oliver Stone

He helped us with the film enormously but he didn't have any control. We did what we had to do, what we wanted to do. We checked the story with other people. We talked to as many people who would talk to us. We heard the NSA accounts. You know, not that many people have talked about the NSA, so this is really hard-earned research and I think it's very valid.feedback

Heather Conley

In some ways this is a really good vehicle for anti-Americanism. In Germany, the most potent anti-U.S. vehicle was about the NSA, Snowden and privacy … and all that anger, and all that sentiment has gone on to TTIP.feedback

Oliver Stone

Without Lindsay in his life, he doesn't have any friends. He's not close to sister, mother, father, he lives in a computer world, and that's his link to the rest of us.feedback

Tom Fitton - Judicial Watch

These documents show that Hillary Clinton knew her BlackBerry wasn't secure. The FBI and prosecutors ought to be very interested in these new materials.feedback

François Bonnet

It's not new but all the same – on this scale -we need to understand the National Security Agency and the CIA's errors which have undermined the image of the United States as a truly democratic country.feedback

Julian Assange - WikiLeaks

The French people have a right to know their elected government is subject to hostile surveillance.feedback

Edward Snowden

My intention is to ask the courts and people of Hong Kong to decide my fate.feedback

Edward Snowden

People who think I made a mistake in picking Hong Kong as a location misunderstand my intentions. I am not here to hide from justice; I am here to reveal criminality. I have had many opportunities to flee HK, but I would rather stay and fight the United States government in the courts, because I have faith in Hong Kong's rule of law.feedback

Barack Obama

So all these steps are designed to ensure that the American people can trust that our efforts are in line with our interests and our values. And to others around the world, I want to make clear, once again, that America is not interested in spying on ordinary people. Our intelligence is focused above all on finding the information that's necessary to protect our people -- and in many cases, protect our allies.feedback

Jan Philipp Albrecht - European Parliament

I believe that we in the European Union bear a responsibility for this whistleblower. He should not be in the hands of a repressive dictator like Putin and we should not renounce the information that we can get there.feedback

Annette Heuser

What will happen in the future is we are going to see much more serious debate about the degree to which our intelligence services cooperate with US intelligence agencies. The question will be what role European and German intelligence services will play and what the limits of intelligence operations will be, when it comes to privacy and the individual freedoms of our own people.feedback

Thomas Oppermann

Under no circumstances is it justifiable that a world power or a country -especially not our friends, the United States – would recruit BND employees to spy on the work of the German parliamentary NSA investigation committee.feedback

Barack Obama

But I also recognise that, as technologies change and people can start running algorithms and programmes that map out all the information that we're downloading on a daily basis into our telephones and our computers, that we may have to refine this further to give people more confidence.feedback

Stefan Grobe - Euronews

Mr. President, let's talk about EU-US relations. We've had the NSA scandal that created a lot of repercussions in Europe, we have the TTIP trade talks that are very complicated and there is a lot of resistance in Europe and the United States, so where are we right now? Your thoughts.feedback

Stefan Grobe - Euronews

The general feeling here is that the president struck the right balance between national security and the need for privacy.feedback

Carl Messineo

It's time to stop the NSA from seizing and searching my emails, my gmail, logging my telephone calls. I never signed up for this. The US citizenry does not want this. And I want the people who see the bus to know that there are millions of others thinking the exact same thing.feedback

Stefan Grobe - Euronews

Today Barack Obama and Angela Merkel still need to rebuild trust and warmth. Whether issues like Ukraine and the NSA scandal can allow that, remains to be seen.feedback

Edward Snowden

I am working to improve the NSA. I am still working for the National Security Agency right now. They are the only ones who don't realise it.feedback

Ken Gude - Center for American Progress

This information could be valuable for him in the negotiations with the US. But generally, he is not in a strong negotiating position, and it is totally impossible that he will receive a general amnesty.feedback

Ken Gude - Center for American Progress

The only way that can be avoided, is if the president issued a pardon for his activities, then he would never face the prospect of prosecution for the actions he was specifically pardoned for. But I think in the realm of reality, a presidential pardon is not really on the table.feedback

Alexei Makarkin

The very presence of Snowden is of symbolic importance to Russia. Snowden has become a symbol of the struggle for freedom, and that's useful for Russia. Today, that's one of the strongest arguments (Russia) could put to the international community.feedback

Edward Snowden

I have worked for the Central Intelligence Agency undercover, overseas. I have worked for the National Security Agency undercover, overseas… So when they say I'm a low-level systems administrator, that I don't know what I'm talking about, I'd say it's somewhat misleading.feedback

Angela Merkel

Since we are talking about the NSA, I have also always told the American president: 'There is no way of spying amongst friends.feedback

Keith Alexander - National Security Agency

That's never happened! In fact, there was this allegation last June that NSA was tapping into the servers of Yahoo or Google or our industry reps. It would be illegal for us to do that and so I don't know what the report is, but I can tell you factually, we do not have access to Google servers, Yahoo servers.feedback

Stephen Vladeck

The hardest thing for the President in this context is the extent to which he cannot satisfy both constituencies, the intelligence community on the one hand, civil liberties advocates and civil liberties organisations on the other.feedback

Edward Snowden

What I can say is that we know that Angela Merkel was monitored by the NSA. But the question is how logical is it that she's the only one who was monitored, how likely is it that she was the German person the NSA was watching?feedback

Julian Assange - WikiLeaks

There is no stopping the publishing process at this stage. Great care has been taken to make sure that Mr Snowden can't be pressured by any state to stop the publications process. The United States, by cancelling his passport has left him for the moment marooned in Russia.feedback

Jay Carney

We make clear what activity the NSA and … our intelligence community engages in, and the fact that they are bound by our laws and the oversight of three branches of government.feedback

Sergei Stanishev

It's not 10 years ago, but there is a progress since then and it was declared also by OLAF. There are common units of the prosecutor's office and many other institutions, including the national security agency, the ministry of interior, which are working on cases of fraud with European funds. And there are not only cases which have been investigated, several dozens, by the way, I don't know if you are aware of this.feedback

No quotes...
|< <
> >|

Quotes about NSA

<
Quote Verifier
verify-icon
Check if the quote you read on social networks is authentic
facebook_page
twitter_page
This webpage has been created by a robot: errors and absent quotes cannot be totally avoided
 
Feedback×

Quote :

Mistake :

Comments :