^
+ Follow KEITH ALEXANDER Tag
KEITH ALEXANDER
Array
(
    [results] => Array
        (
            [0] => Array
                (
                    [ArticleID] => 1268065
                    [Title] => NSA: No better way to protect US than surveillance
                    [Summary] => 

The NSA chief said Wednesday he knows of no better way his agency can help protect the U.S. from foreign threats than with spy programs that collect billions of phone and Internet records from around the world.

[DatePublished] => 2013-12-14 06:25:03 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1447904 [AuthorName] => Lara Jakes [SectionName] => World [SectionUrl] => world [URL] => http://img31.imageshack.us/img31/2100/i9tx.jpg ) [1] => Array ( [ArticleID] => 1254411 [Title] => US may split command of spy and cyber agencies [Summary] =>

The White House is considering a proposal to split the work of the single military commander who now oversees both the National Security Agency and cybersecurity operations, presenting an opportunity to reshape the spy agency in the wake of harsh criticism of its sweeping surveillance programs.

[DatePublished] => 2013-11-08 07:02:51 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1536709 [AuthorName] => Nedra Pickler [SectionName] => World [SectionUrl] => world [URL] => http://img200.imageshack.us/img200/4464/bwoh.jpg ) [2] => Array ( [ArticleID] => 954676 [Title] => Officials: NSA programs broke plots in 20 nations [Summary] =>

Top US intelligence officials said Saturday that information gleaned from two controversial data-collection programs run by the National Security Agency thwarted potential terrorist plots in the US and more than 20 other countries — and that gathered data is destroyed every five years.

[DatePublished] => 2013-06-16 10:00:29 [ColumnID] => 0 [Focus] => 0 [AuthorID] => 1440714 [AuthorName] => Kimberly Dozier [SectionName] => World [SectionUrl] => world [URL] => ) [3] => Array ( [ArticleID] => 739455 [Title] => Pentagon weighing how to respond to cyberattacks [Summary] =>

The Defense Department is finalizing policies that will determine what the military can do in the event of a cyberattack as the government figures out who should have the power to shut down computer networks seized by an enemy nation, terrorist group or criminal hacker.

[DatePublished] => 2011-10-21 05:01:00 [ColumnID] => 133272 [Focus] => 0 [AuthorID] => [AuthorName] => [SectionName] => [SectionUrl] => [URL] => ) ) )
abtest
Are you sure you want to log out?
X
Login

Philstar.com is one of the most vibrant, opinionated, discerning communities of readers on cyberspace. With your meaningful insights, help shape the stories that can shape the country. Sign up now!

Get Updated:

Signup for the News Round now

FORGOT PASSWORD?
SIGN IN
or sign in with