NATO Continue Black Sea Drills Near Occupied Crimea: USS Vicksburg leads naval rapid reaction force – Video


NATO Continue Black Sea Drills Near Occupied Crimea: USS Vicksburg leads naval rapid reaction force
NATO ships continued a joint exercise in the Black Sea off the Romanian coast on Monday. The naval rapid reaction force in the Black Sea drills consists of a United States flagship, the guided...

By: UKRAINE TODAY

Go here to read the rest:

NATO Continue Black Sea Drills Near Occupied Crimea: USS Vicksburg leads naval rapid reaction force - Video

NATO Allies Come to Grips With Russia's 'Hybrid Warfare'

Riga: NATO allies are scrambling to protect vulnerable Baltic partners from the threat of hybrid warfare; a Russian tactic that officials and experts say is based on deception rather than formal declaration of war.

Russian President Vladimir Putin's use of anonymous "little green men" to slice Crimea away from Ukraine last year sent alarm bells ringing throughout the three small Baltic NATO and EU members.

They endured decades of Soviet occupation after the Red Army rolled in during World War II. While a full-scale invasion is improbable now, hybrid meddling and destabilisation tactics designed to test NATO's commitment to collective defence are not.

Lithuanian President Dalia Grybauskaite did not mince her words when she said: "The first stage of confrontation is taking place, I mean informational war, propaganda and cyber-attacks. So we are already under attack."

Trojan Horse

According to James Sherr of Britain's Chatham House think-tank, hybrid warfare is "designed to cripple a state before that state even realises the conflict has begun.

"It's a model of warfare designed to slip under NATO's threshold of perception and reaction."

NATO Deputy Secretary General Alexander Vershbow has called it a modern example of the ancient Trojan Horse tactic.

NATO is "looking at how we prepare for, deter, and, if required, defend against hybrid threats," the former US ambassador to Moscow said recently at a security conference in the Latvian capital Riga.

Not to be caught off guard amid an increased Russian military presence in the Baltic, alliance members have mounted a series of troop rotations into the region.

Read more from the original source:

NATO Allies Come to Grips With Russia's 'Hybrid Warfare'

NATO exercises have Russians worried

(CNN) -

As the U.S. and several Eastern European NATO countries conduct a series of military exercises near Russia's border, Russian President Vladimir Putin has ordered his Northern Fleet "to full alert in a snap combat readiness exercise" in the Arctic, state-run media reported Monday.

At least one Russian leader described the drill as routine and unrelated to the "international situation."

The fleet got its orders at 8 a.m. Monday, according to Sputnik, launching a land, sea and air drill that will involve 38,000 troops, 41 ships, 15 submarines and 110 aircraft.

"The main task of the (combat readiness drill) is to assess the armed forces from the Northern Fleet's capabilities in fulfilling tasks in providing military security of the Russian Federation in the Arctic region," Russian Defense Minister Gen. Sergey Shoigu told the media outlet. "New challenges and threats of military security demand the further heightening of military capabilities of the armed forces and special attention will be paid to the state of the newly formed strategic merging (of forces) in the North."

The drills will run through Friday, Sputnik reported.

A flotilla of minesweepers will support the Northern Fleet's nuclear submarines in the Barents Sea as part of the drill, the Tass news agency reported, citing a Defense Ministry statement.

"Mine-sweeping groups of the Kola Flotilla have moved to the designated areas of the Barents within the framework of a snap check of combat readiness of the Northern Fleet forces for supporting the deployment of the main forces of the fleet, including the deployment of nuclear and diesel submarines of the Northern Fleet," the statement says.

The ships will conduct magnetic, acoustic and contact demining sweeps during the drill, Tass reported.

Despite a number of countries participating in various military drills in Eastern Europe, a Kremlin spokesman described the Northern Fleet inspection as routine practice aimed at improving military capabilities.

Original post:

NATO exercises have Russians worried

Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update – Video


Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update
Visit http://PastorMikeOnline.com - In today #39;s show, Pastor Mike Hoggard discusses topics that include: NSA using IOS and Android apps to spy on Americans, H...

By: MikeHoggardVideos

More:

Pastor Mike Online 03-12-15, NSA Spy Apps, Hillary Has Horns, And Ferguson Update - Video

Posted in NSA

Everyone’s a Target, NSA’s Mass Surveillance and Cyber Warfare in the Middle East – Video


Everyone #39;s a Target, NSA #39;s Mass Surveillance and Cyber Warfare in the Middle East
Since the revelations of Edward Snowden, there has been a great deal of discussion about NSA and domestic eavesdropping. But except for Germany, there has been very little examination of NSA #39;s...

By: American University of Beirut

Go here to see the original:

Everyone's a Target, NSA's Mass Surveillance and Cyber Warfare in the Middle East - Video

Posted in NSA

NSAs top lawyer joins private sector

The top lawyer for the National Security Agency, Rajesh De, has stepped down from his post and will join the law firm Mayer Brown.

Des last day was Friday, and he plans to start at Mayer Brown in June as head of the firms privacy and security practice in Washington. He had been NSAs general counsel since April 2012 and oversaw the exposure of the governments controversial surveillance program by former NSA contractor Edward Snowden.

Its a natural time to move on, De said.

The NSAs deputy general counsel Teisha Anthony will be the acting general counsel until a permanent replacement is named. De defended the NSAs practices during his three-year tenure, arguing that the agency has acted within the legal and policy framework provided by the executive branch, Congress and the courts.

But he said that reasonable people can have an intelligent and thoughtful discussion about what they want that framework to look like. De said he hopes Congress, which has a June deadline to reauthorize Section 215 of the Patriot Act the provision that grants the NSA legal authority to collect Americans phone records will reach a resolution that allows the government to preserve the operational capabilities it needs to maintain national security, while also addressing the need to move the metadata out of the governments hands.

De declined to comment specifically on Snowden, other than to say that he believes no one should consider themselves above the law. No person, a king or an IT guy, should consider themselves above our democratic system, De said. Theres a legal process we all adhere to. None of us is above the system.

In his new role, De who was a partner in Mayer Browns litigation group before joining the government will advise companies in the financial services, health-care, retail and manufacturing sectors on data privacy and cybersecurity issues. He said he has not decided whether he will register as a lobbyist.

De held a number of senior roles in the Obama administration over the past six years, including staff secretary and deputy assistant to the president, principal deputy assistant attorney in the Justice Departments Office of Legal Policy, and counsel to the 9/11 Commission.

De is joining Mayer Brown at a time when law firms are clamoring to grow their data privacy and cybersecurity practices. A number of major firms, including DLA Piper and Pillsbury, have bulked up their cybersecurity capabilities in recent months.

Privacy and cybersecurity is probably the number one issue clients have been asking us about over the last year, Mayer Brown Chairman Paul Theiss said. Its certainly the fastest-growing.

See more here:

NSAs top lawyer joins private sector

Posted in NSA

Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

Want to know something odd? Its 2015 and all the top anti-virus products for Mac OS X use insecure lines to transmit their software to Apple Apple machines. Download files, known as .dmg files,for products including Kaspersky, Symantec Symantec, Avast, Avira, Intego, BitDefender, Trend Micro, ESET and F-Secure are all sentover unencrypted HTTP lines, rather than the more secure HTTPS. There is method in their madness, as they trust Apples Gatekeepersecurity technology to recognise the digital signatures they sign their software with that should guarantee the authenticity of the download.

But a former NSA and NASA staffer Patrick Wardle, who now heads up research at security start-up Synack, believes he has found a new way to abuse such insecure downloads and bypass protections in Apple Macs without getting caught. Normally, anyone who intercepts a download to turn it nasty wont get away with it, as Mac Gatekeeperwill see that the vendors original signature has been altered or taken away entirely, and the software tampered with, meaning its no longer trusted.

Yetthe Gatekeeper software doesnt check all components of Mac OS X download files, according to Wardle. He believes he can sneak a malicious version of whats known as a dylib file into legitimate downloads done over HTTP to infect Macs and start stealing data.These dylibs (short for dynamic libraries) are designed to be re-used by different applications; they might be used for actions such as compressing a file or using native graphics capabilities of the operating system. Theyre supposed to make apps work more efficiently.

If an attacker can hijack the dylib processes used by Mac apps, however, they can carry out nasty attacks and send user data to their own servers, the researcher explained. Such an attack would not be trivial, Wardle admits. First, the attacker would have to get on the same network as a target, either by breaching it or simply logging on to the same public Wi-Fi. They would also have to injecta legitimate yet vulnerable application into the downloadand shuffle around the content of the .dmg so thatthe injected legitimate softwareis shown to the user. The latter is not so tricky:the attacker can set the name and icon of thisvulnerable app so nothing looks suspicious, said Wardle.

Finding vulnerable apps shouldnt be too hard either.Wardle created a scanner that looked for applications that would use his naughty dylibs. He found around 150 on his own machine, including hugely popular software likeMicrosoftWord and Excel,Apples own iCloud Photos and Dropbox. The list also includedApples developer tool XCODE and email encryption key management software GPG Keychain, both of which he abused in his proof of concept attacks. According to a recent article in The Intercept, Snowden files showed researchers were demonstrating how amodified version of XCODEcould be used to siphon off targets passwords and other data. Wardle said it was 100 per cent coincidence that his former employer had also targeted XCODE.

Wardled noted that apps from Apples Mac App Store are not vulnerable.

Apps vulnerable to dylib attacks slide from Patrick Wardle

Despite the barriers to successful exploitation, his techniques have provided him with a novel way to bypass Gatekeepers draconian detection mechanism (its also not too dissimilar from DLL attacks of yore on Windows).It is, he added, a cunning way to bypass Mac OS X Gatekeeper protections and allow hackers to go back to their old tricks.

When the injected legitimateapplication is launched the unsigned malicious dylib is loaded or executed(even if the user sets his machine to accept only all apps from the Mac App Store) before theapps main code. At this point the dylib can do anything. I see it a)kicking off the legitimate application that the user was downloading sonothing seems amiss, and b) installing the implant component which will then complete the rest of the attack, persistently infecting the userscomputer. He noted theattack should also work on downloaded .zip filesthat contain applications.

Mac OS X dylib hijacking attacks slide from Patrick Wardle

Read more:

Ex-NSA Researcher Finds Sneaky Way Past Apple Mac's Gatekeeper

Posted in NSA

Reports of NSA spying on Canadian companies fuel calls for more transparency

Critics say a crisis of transparency surrounds modern spying methods in Canada after revelations that a close ally the U.S. National Security Agency has been looking at the communications traffic of at least two Canadian corporations.

There are people from the NSA working inside of CSE as we speak, said NDP defence critic Jack Harris, referring to U.S. intelligence analysts embedded inside the Communications Security Establishment, the NSAs Canadian counterpart.

Mr. Harris said he has many questions about the extent of Canadas close surveillance partnerships with the United States, but Parliamentarians are not authorized to get answers.

Were reaching a crisis point on this, he said in an interview, pointing out that the Conservative government faces several spying controversies.

The Globe and Mail reported on Tuesday that a leaked NSA document from 2012 includes Royal Bank of Canada and Rogers Communications Inc. on a list of global firms whose private communication networks the U.S. agency appeared to be interested in mapping.

The document which The Globe obtained from a confidential source suggests the agency was describing efforts to identify and analyze computer networks controlled by corporations.

Markings on the document, a presentation for intelligence officers, indicate it may have been shared with Ottawa nearly three years ago. Rogers and RBC told The Globe they had no idea the NSA had any interest in their networks, which they insist are secured against intruders.

The NSA has said it will not discuss allegations about its intelligence activities.

There is no indication the NSA went as far as getting at any data inside individual computers or reading communications related to the Canadian companies. However, the presentation suggests the agency went further in using its mapping techniques to look at the computer systems controlled by a Chinese telecom giant.

The name of Huawei Technologies Co. Ltd. appears in the presentation, and the NSA appears to have had a keen interest in isolating the corporations data channels. These links are likely to carry Huawei traffic, reads one slide.

Excerpt from:

Reports of NSA spying on Canadian companies fuel calls for more transparency

Posted in NSA

Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision – Video


Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision
Professor Jeffrey L. Fisher, lead counsel in the digital privacy case Riley v. California, discusses preparing the case and implications of this landmark U.S. Supreme Court Fourth Amendment...

By: stanfordlawschool

See the original post here:

Faculty on Point | Professor Jeffrey Fisher on Digital Privacy and the Riley Decision - Video

First Amendment Test – Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection – Video


First Amendment Test - Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection
First Amendment Test - Lukeville Port of Entry, Arizona, Mexico to U.S.A., Customs and Border Protection, 14 March 2015, Civil Disobedience 0:00:59.954,0:01:01.314 [Ready for Officer] 0:01:05.000,...

By: Robert Trudell

See the original post:

First Amendment Test - Lukeville Port of Entry, Mexico to U.S.A., Customs and Border Protection - Video

MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative – Video


MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative
Attorney who represents the American Freedom Defense Initiative in a first amendment case involving their group wanting to put signs linking Islam to Hitler on Philadelphia buses and trains....

By: NewsmaxTV

Read more from the original source:

MidPoint | Robert Muise, Attorney who represents the American Freedom Defense Initiative - Video

U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755 – Video


U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755
Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, 14 March 2015, GP013755 Part One of this First Amendment Test: https://www.youtube.com/watch?v=Vk9UUg9lMxk...

By: Robert Trudell

See the original post here:

U.S. Customs and Border Protection Agent shuts camera off at Lukeville Port of Entry, GP013755 - Video