28 EU MPs on private visit to J&K tomorrow, briefed by NSA and PM – National Herald

A delegation of 28 MPs of the European Parliament were briefed on the situation in Kashmir on Monday in New Delhi by the National Security Advisor Ajit Doval and the Prime Minister. The delegation, on a private visit, is expected to fly to Kashmir on Tuesday. It is not clear though whether they will be allowed to meet the incarcerated political leaders including the three former chief ministers of Jammu & Kashmir, Farooq Abdullah, Mehbooba Mufti and Omar Abdullah.

The visit comes barely a week after a scathing hearing on Kashmir at the US House of Representatives, followed by the request of six US Senators for permission to visit Kashmir and see the ground realities for themselves.

The private visit of the EU delegation appears to be part of Government of Indias campaign to reassure the international community that there is no violation of human rights in J & K, that by and large the situation on the ground has remained peaceful and normal and that people in J & K by and large have accepted the revocation of Article 370 and Article 35A.

See the original post:

28 EU MPs on private visit to J&K tomorrow, briefed by NSA and PM - National Herald

Posted in NSA

Healthy ageing talks and courses for the elderly by NSA – The New Paper

There is something for everyone at the Active Ageing Nuggets event organised by the National Silver Academy (NSA).

Seniors can pick up valuable knowledge and tips on how to age well through the dozens of talks and specially curated educational videos.

Interesting topics include dementia, traditional Chinese medicine, acupuncture, financial literacy planning for retirement, caregiving and IT skills.

There will also be health and nutrition talks, as well as sharing of tips on how to reduce diabetes and hypertension and the signs and symptoms to look out for. The elderly can also sign up for some NSA courses after the talks.

Held at Heartbeat @ Bedok Atrium, Level 1, the Active Ageing Nuggets will take place from 11am to 8pm on Nov 1 and 2. Admission is free and no registration is required. Seats for the talks are on a first-come-first-served basis. Participants can also enjoy movie screenings with family and friends.

NSA is a network of post-secondary education institutions and community-based organisations offering a wide range of learning opportunities subsidised for those aged 50 years and above.

Most courses are SkillsFuture credit eligible too. Course topics cover both work skills and life skills in fields as varied as health and wellness, business and finance, IT, the humanities and arts.

Visit http://www.nsa.org.sg for the full list of courses or call 6478 5029 for more information. For details on the Active Ageing Nuggets event schedule, please visit http://www.c3a.org.sg/event_NSA_Bedok.

View post:

Healthy ageing talks and courses for the elderly by NSA - The New Paper

Posted in NSA

Sheep industry unites to set the record straight – The Scottish Farmer

EVIDENCE and facts, rather than 'headline grabbing' sensationalism, was to the fore at the first of a series of 'Setting the sheep farming record straight meetings organised by the National Sheep Association.

Kicking off at the Welshpool Livestock Market, Powys, the NSA was joined at the event by British Wool and Hybu Cig Cymru Meat Promotion Wales to counteract the 'almost weekly headlines claiming agriculture is responsible for many of the environmental and health problems' facing society.

NSA chief executive Phil Stocker said: It feels absolutely the right thing to do to be putting effort into positioning our industry as a solution and not the cause of global problems. Weve experienced unprecedented criticism and attack for the duration of this year. These meetings are the perfect platform to share evidence-based facts and statistics on what the actual situation is rather than that which many of the headline grabbing media would have you believe.

HCC meat quality executive Dr Eleri Thomas said: It was good to see a really engaged audience at Welshpool, raising exactly the issues that will be important for us as a levy board over the coming months. We discussed how the industry could give a unified response to the misleading media coverage on livestock farming and meat-free food.

"Also, we had the opportunity to explore how HCCs industry development work such as the Red Meat Development Programme feeds through into outcomes that have a wide benefit, for instance waste reduction, increasing shelf-life, and telling a consistent story to the consumer of how Welsh red meat is a sustainable, high-welfare, high-quality product.

British Wool was there to demonstrate its work to promote the high welfare standards of UK sheep farmers and shearers. Producer marketing executive Laura Johnson said: Working together with farmers to negate any negativity around animal welfare in the sheep farming industry is important and these meetings are doing that by giving farmers the confidence to defend their industry against false or misrepresented information.

NSA and British Wool will travel to Penrith and District Farmers Mart this Thursday, October 31, for their next farmer meeting. A full list of the future meetings with dates and locations can be found at http://www.nationalsheep.org.uk/events. All meetings are free to attend and open to all involved in the sheep sector, whether an NSA member or not.

See the original post:

Sheep industry unites to set the record straight - The Scottish Farmer

Posted in NSA

Inside Track: Is NSA Ajit Doval up or down in the Modi-2 regime? – The Indian Express

Prime Minister Narendra Modi with Minister of External Affairs S Jaishankar and NSA Ajit Doval

Is National Security Advisor Ajit Doval up or down in the Modi-2 regime? On one hand, with Amit Shah as Home Minister, Dovals wings automatically get clipped in internal security matters. When Rajnath Singh was home minister, Doval held forth freely at North Block meetings. But with Shah as boss there is less scope for interventions. At times, when Doval issues instructions to the IB chief or other agency heads, he is informed that they have to first check with Shah. On the other hand, there is physical evidence that Dovals clout is expanding in other areas. For instance, earlier he occupied just one floor of Sardar Patel Bhawan as his personal office. Now Doval, raised to the rank of Cabinet minister, has taken over most of the building for the National Security Council (NSC) Secretariat, which has expanded noticeably. There are even three deputy NSAs and the building entrance has got a facelift. Most importantly, the rules of business were re-framed this month so that the NSC can generate Cabinet notes and act like a full government department.

Defence Minister Rajnath Singh sent word to the Indian ambassador in France that he wanted a pandit to be present when he landed in Bordeaux for the formal ceremony of officially handing over the first of the 36 Rafale jets manufactured for the Indian Air Force. The French authorities, alerted that a puja would be performed on the runway, made discrete inquiries as to what the procedure entailed. At the Dassault Aviation Centre, Rajnath, carried out the rituals of a shastra puja, the ceremony for worshipping weapons. He offered a coconut and flowers, while a lemon was placed under the aircraft wheel. Singh put kum kum on his finger to inscribe the auspicious figure Om on the jet. The French witnessing the ceremony, including the Minister for Armed Forces, top army brass and senior officials of Dassault, heaved a sigh of relief. They had been informed that traditionally Indians inscribe a swastika during a puja. The swastika is an unhappy symbol for France since it evokes memories of Nazi occupation of the country during World War II.

Veteran journalist Ashok Maliks field of expertise is the media. His last job in fact was as press secretary to the President. But in his new position as policy advisor in the Ministry of External Affairs he has reportedly been told not to offer advice on the media. The External Publicity Division is possessive about its turf, even if its efforts for positive coverage on Kashmir in the foreign press have fallen rather short.

The recent BCCI elections demonstrated that this is yet another sphere in which Amit Shah holds sway. However, it was not Shah alone who rooted for Sourav Ganguly over Brijesh Patel for the presidents post. Along with MoS Finance Anurag Thakur, Assam minister Himanta Biswa Sarma, who controls the seven votes from the Northeast states, and Congressman Rajiv Shukla who is influential with the Madhya Pradesh, Rajasthan and Hyderabad cricket boards, also backed Ganguly. While the common surmise is that Shah coveted a winning face for his party in the Bengal Assembly polls, the BJP president realises that Bengals cautious dada has a history of keeping on the right side of all political parties, whether the TMC, CPI(M) or Congress, and is unlikely to throw his lot solely with the BJP. The common target of the new BCCI members from different camps is Vinod Rai, till last week head of the BCCIs Committee of Administrators (CoA). The cricket bosses who lost control of the most lucrative sport in the country for over three years had announced to all and sundry that they would settle scores by investigating some of the financial transactions of the CoA. Forewarned, the Supreme Court, while permitting the elected office-bearers to take charge, scuttled attempts for a potential witch-hunt against predecessors by inserting two safeguard clauses. No proceedings against the CoA members is possible without court clearance and legal expenses will be borne by the BCCI.

The Garvi Gujarat building, the new Gujarat Bhavan in Delhi inaugurated by PM Modi on September 2, has won plaudits and publicity. But the Bhavan, located on the prestigious Akbar Road, still awaits a resident cook. It is not easy to persuade a skilled Gujarati cook to move to Delhi, since cooks find the cost of living much cheaper in their home state and they prefer the familiar surroundings. The Gujarat authorities put out tenders for an agency to run the kitchen. The tender has finally been awarded, now everyone is waiting for the cook.

This article first appeared in the print edition on October 27, 2019 under the title Inside track: Some up, some down.

Read the original post:

Inside Track: Is NSA Ajit Doval up or down in the Modi-2 regime? - The Indian Express

Posted in NSA

Binaries and Brews: Jailbreak Security Summit convenes hackers on NSA’s doorstep – CyberScoop

Written by Sean Lyngaas Oct 15, 2019 | CYBERSCOOP

Of the countless security conferences held across the globe, only one combines craft beer and malware analysis in the National Security Agencys backyard.

Every year, federal contractors andanalysts at Beltway cybersecurity companies gather for a day at Jailbreak Brewerys Laurel, Maryland, headquarters to trade specialized knowledgein digital forensics.

The training is really good; the beers are even better, said a Department of Justice employee sipping a Lemon Meringue Berliner Weisse.

The DOJ employee, who declined to speak on the record, has been coming since the summits inception in 2015. I learn something new every year, he said, before descending from the bar and taking a seat in front of the presentation stage.

That is the comfort zone that Kasey Turner, a former NSA employee, sought to create when he opened the brewery in 2014 with cybersecurity contractor-turned-entrepreneur Justin Bonner.

We wanted this to be everybodys own jailbreak, Turner told CyberScoop. Whatever drama is in your lifewhile you sit here and drink a beer, we hope that you dont think about that for a few minutes.

The brewerys name is a nod to the cybersecuritydefinition of a jailbreak: using a vulnerability to gain root access to a device and install whatever programs you like on it.

Its more about the freedom of the jailbreak, so to speak,Turner said. Youre setting your phone free from the network and all of the constraints that are put on it.

It was early Friday evening and Turner and his colleague Tom McGuire, another ex-NSA-er, were taking a break from the exertions of running the brewery to reflect on how their project had progressed. Around them, glasses clinked as attendees lingered long after the last speaker had finished to share stories and exchange contact information. 0Day IPA was available at the bar, the walls were adorned with Big Lebowski-themed art, and 90s grunge hummed through the hall.

Before cybersecurity became a multibillion-dollar and endlessly hyped industry, security conferences had this low-key feel.

They were small, they were intimate, and you pretty much went to them because there wasnt anywhere else to talk about this stuff, Turner recalled. This was your opportunity to meet with these people and talk with them and put a face to a handle.

Sarah Edwards, a Mac/iOS forensics specialist who, fittingly, presented on jailbreaking tools at the conference, said the event was fertile ground for collaborating with others in her niche. It helped drive home the many positive reasons to jailbreak a phone, she said, including to study the devices interactions with its applications in order to make them more secure.

While previous summits focused on SCADA systems or Internet of Things devices, this years theme was reverse-engineering malware.

We need to make reverse engineering accessible to more people, proclaimedapresenterfrom theJohns Hopkins University Applied Physics Laboratory, in between meditations on binary static analysis. Carbon Blacks Erika Noerenberg riffed on the ability of a threat-hunting tool to decrypt payloads, while Google Project Zeros Maddie Stone walked attendees through how she deconstructed a vulnerability exploited in WhatsApp.

Each of us in this room may have a different reason for analyzing [a bug], Stone said.

Mike Bell, a longtime NSA contractor, presented on Ghidra, the reverse-engineering tool that the NSA publicly released earlier this year.

Looking relaxed in a sailor hat after going outon a boatthe previous night with fellowpresenters, Bell talked about his hope that Ghidra would be a valuable resource for academic researchers. Bell, who had helped write some of Ghidras algorithms, stood at the bar, his chin raised slightly, exuding an eagerness about where the project would go next.

The simple fact is the team cant keep up with all the changes in industry, Bell said, explaining one reason why the NSA released Ghidra publicly.

The camaraderie on display is one reason Turner and McGuire say they want to keep the conference small and unassuming, a contrast to the pomp and glitz of other industry events. What started for Turner and McGuire as a means of catching up with former colleagues will stay that way, they said.

Having a conference at a brewery gets people going, Turner said. They talk to one another.

View post:

Binaries and Brews: Jailbreak Security Summit convenes hackers on NSA's doorstep - CyberScoop

Posted in NSA

The Week That Will Be – Lawfare

Event Announcements(More details on theEvents Calendar)

Tuesday, October 15, 2019, 9:15 a.m.: The Hudson Institute will host a debate on the broader implications for U.S. Middle East policy following the latest developments in Syria and Turkey. Hudson Senior Fellow Mike Doran will argue in favor of President Trumps withdrawal decision, while Hudson Fellow Blaise Misztal will argue the move is detrimental to U.S. interests. More details and registration for the event can be found here.

Tuesday, October 15, 2019, 2:00 p.m.: The Heritage Foundation will host an event focusing on the ongoing challenges with U.S. border security. The event will feature a panel of Senior Heritage Legal Fellows who will discuss the role that states can play in assisting the federal government with enforcing immigration laws. More details and registration for the event can be found here.

Wednesday, October 16, 2019, 10:00 a.m.: The Senate Foreign Relations Committee will hold a hearing on U.S.-Iran policy. The committee will hear testimony from Brian Hook, the U.S. special representative for Iran.

Wednesday, October 16, 2019, 2:00 p.m.: The House Foreign Affairs Subcommittee on the Middle East, North Africa and International Terrorism will hold a hearing on the Syria Study Group's recommendations for U.S. policy. The subcommittee will hear testimony from the study group's co-chairs, Dana Stroul and Michael Singh.

Wednesday, October 16, 2019, 3:00 p.m.: The Senate Foreign Relations Subcommittee on East Asia, the Pacific, and International Cybersecurity Policy will hold a hearing on the implementation of the Asia Reassurance Initiative Act (ARIA) and America's Indo-Pacific Strategy. The subcommittee will hear testimony from David Stilwell, the assistant secretary of state for East Asian and Pacific affairs; Randall Schriver, the assistant defense secretary for Indo-Pacific security; and Gloria Steele, the acting assistant administrator for Asia at the U.S. Agency for International Development.

Thursday, October 17, 2019, 10:00 a.m.: The House Homeland Security Subcommittee on Emergency Preparedness, Response, and Recovery will hold a hearing on defending the homeland from bioterrorism. The subcommittee will hear testimony from Asha George, the executive director of the Bipartisan Commission on Biodefense; Umair Shah, the executive director of Harris County Public Health; and Jennifer Rakeman, the assistant commissioner and director of the Public Health Laboratory in the New York City Department of Health and Mental Hygiene.

Thursday, October 17, 2019, 10:00 a.m.: The House Foreign Affairs Committee will hold a hearing titled, "The Betrayal of Our Syrian Kurdish Partners: How Will American Foreign Policy and Leadership Recover?" The committee will hear testimony from James Jeffrey, the U.S. special representative for Syria engagement and the special envoy to the global coalition to defeat ISIS, and Joey Hood, the principal deputy assistant secretary of state for near eastern affairs.

Thursday, October 17, 2019, 11:00 a.m.: The Brookings Institution will host Irelands Minister for Finance Paschal Donohoe for remarks on the impact of Brexit for Ireland in the context of a broader discussion on the future of globalization. More details and registration for the event can be found here.

Thursday, October 17, 2019, 2:00 p.m.: The House Homeland Security Subcommittee on Oversight, Management, and Accountability will hold a hearing titled, "The Public's Right to Know: FOIA at the Department of Homeland Security." The subcommittee will hear testimony from James Holzer, the deputy chief FOIA officer at DHS; Tammy Meckley, the associate director of the immigration records and identity services directorate at U.S. Citizenship and Immigration Services; Alina Semo, the director of the office of government information services; and Vijay D'Souza, the director of the Government Accountability Office's information technology and cybersecurity team.

Employment Announcements(More details on theJob Board)

The following are job announcements of potential interest toLawfarereaders. If you have an announcement to add to the page,emailus.

Policy ProgramCoordinator, National Security Institute

The George Mason University Antonin Scalia Law School seeks a Policy Program Coordinator for the National Security Institute (NSI) on the Arlington, VA., campus. George Mason University has a strong institutional commitment to the achievement of excellence and diversity among its faculty and staff, and strongly encourages candidates to apply who will enrich Masons academic and culturally inclusive environment.

Responsibilities:

TheNSIPolicy Program Coordinator will be responsible for the successful planning and coordination ofNSIpolicy program efforts and events. Responsibilities include, but are not limited to:

Required Qualifications:

Preferred Qualifications:

This is not a supervisory position.

For full consideration, applicants must apply for position number 10522z at http://jobs.gmu.edu/; complete and submit the online application; and upload a cover letter, resume, and a list of three professional references with contact information.

Deputy Executive Director (International Refugee Assistance Project)

EXECUTIVE SUMMARY

The International Refugee Assistance Project (IRAP) works through a robust network of staff, pro bono attorneys and law students to fill a major gap in access to legal aid for refugees, asylum seekers, and other displaced people. IRAP has become the first advocacy organization to provide comprehensive legal representation to refugees throughout the registration, protection and resettlement processes. As fear, division, hatred, and economic uncertainty persist in the global consciousness and manifest in discriminatory policies, speech, and actions, individuals across the world must respond by demanding and upholding commitments to justice. IRAP is leveraging its volunteers and resources to fight back and ensure that we continue to uphold the humanitarian tradition of welcoming those who need refuge.

IRAP is now seeking nominations and applications for the position of Deputy Executive Director.

Since its founding in 2008, IRAP has used legal aid, litigation and advocacy to protect and advance the rights of refugees, both domestically and internationally; the organization has also remained committed to developing the next generation of human rights attorneys through its work with law students. The global turn against refugee resettlement coupled with IRAPs highly effective model has led to a period of rapid expansion to meet new levels of demand. In the past two years, IRAPs annual budget has increased from $2 million to $9 million, and over the past six years, its staff has grown from ten to seventy-five.

As it builds capacity through this period of tremendous growth, IRAP seeks a Deputy Executive Director (DED) to provide strategic vision and leadership, lead infrastructure development and programmatic oversight, manage IRAPs dedicated and talented team, and steward the organizations continued development to maximize impact. Reporting directly to Becca Heller, IRAPs founder and Executive Director, the DED will work closely with staff across the organization and at all levels to foster IRAPs culture of collaboration and identify opportunities for increased support and development.

The ideal candidate will demonstrate a deep connection to IRAPs mission to use legal advocacy to find safe places to live and safe passage for the worlds most persecuted individuals. S/he/they will be an inclusive, passionate leader committed to combatting inequitable policies impacting refugees and other displaced people and to delivering the highest quality legal and advocacy services. S/he/they will bring at least eight years of progressive leadership experience in a legal and/or nonprofit setting, with demonstrable success in change implementation. The new Deputy Executive Director will be an experienced manager who excels at supporting, mentoring, and motivating staff; developing structures and processes that facilitate efficient and effective communication across leadership and teams within an organization; and supporting teams that work closely with individuals who have experienced trauma.

TO APPLY

More information about IRAP may be found at:https://refugeerights.org/.

This search is being conducted with assistance from Callie Carroll, Allison Kupfer Poteet, Hallie Dietsch and Javier Garcia ofNPAG. Due to the pace of this search, candidates are strongly encouraged to apply as soon as possible. Applications including a cover letter describing your interest and qualifications, your resume (in Word format), and where you learned of the position should be sent to:[emailprotected]profitprofessionals.com. In order to expedite the internal sorting and reviewing process, please type your name (Last, First) as the only contents in the subject line of your e-mail.

IRAP believes that diversity is critical to fostering a strong workplace and serving our clients well. We strongly encourage applications from people with lived experiences in the communities that we serve, members of other marginalized communities, and individuals whose identities are underrepresented in the legal profession.

Legal Service Director/U.S. Legal Director(International Refugee Assistance Project)

The International Refugee Assistance Project (IRAP) works through a robust network of staff, pro bono attorneys and law students to fill a major gap in access to legal aid for refugees, asylum seekers, and other displaced people. IRAP has become the first advocacy organization to provide comprehensive legal representation to refugees throughout the registration, protection and resettlement processes. As fear, division, hatred, and economic uncertainty persist in the global consciousness and manifest in discriminatory policies, speech, and actions, individuals across the world must respond by demanding and upholding commitments to justice. IRAP is leveraging its volunteers and resources to fight back and ensure that we continue to uphold the humanitarian tradition of welcoming those who need refuge.

IRAPs Legal Services Department is growing in response to the increased demand to protect those whose rights are being threatened and is now seeking nominations and applications for the positions of Legal Service Director and U.S. Legal Director, both within its Legal Services Department.

Since its founding in 2008, IRAP has used legal aid, litigation and advocacy to protect and advance the rights of refugees, both domestically and internationally; the organization has also remained committed to developing the next generation of human rights attorneys through its work with law students. The global turn against refugee resettlement coupled with IRAPs highly effective model has led to a period of rapid expansion to meet new levels of demand. In the past two years, IRAPs annual budget has increased from $2 million to $9 million, and over the past six years, its staff has grown from ten to seventy-five.

Reporting to IRAPs Executive Director, Becca Heller, the Legal Services Director will lead a team of five talented program directors who oversee the work of over 40 staff. The Legal Services Department focuses on protecting the rights of refugees, and the Director will provide critical strategic partnership to the Executive Director as IRAP navigates this new phase of growth. The Legal Services Director will provide direct supervision to the U.S. Legal Services Director, Middle East Director, Director of Pro Bono, the Director of Complementary Pathways and the Intake and Legal Information Director. S/he/they will oversee staff based in New York City, Jordan, Lebanon, and remotely around the world.

IRAPs US Legal Services team assists individuals navigating the refugee recognition, resettlement, and visa application processes through their mentorship ofpro bonoteams, in-house representation, and legal information andpro sematerials. Reporting to IRAPs Legal Services Director, the U.S. Legal Services Director will lead a team of talented attorneys, intake caseworkers, and legal assistants who provide individual legal assistance to refugees and other displaced people around the world. Once hires are completed, the Director will supervise 14 IRAP staff and support a national pro bono network of over 1,000 attorneys and law students.

The ideal candidates will demonstrate a deep connection to IRAPs mission to use legal advocacy to find safe places to live and safe passage for the worlds most persecuted individuals. They will be an inclusive, passionate leaders committed to combatting inequitable policies impacting refugees and other displaced people and to delivering the highest quality legal and advocacy services. They will be a experienced managers who excel at supporting, mentoring, and motivating legal staff; developing processes that facilitate the efficient and effective delivery of direct legal services by staff and volunteer lawyers; and leading teams that work closely with individuals who have experienced trauma. The Directors be decisive, keenly analytical leaders and thinkers who will build and support healthy culture around prioritization, team communication and decision making. Both the Legal Services Director and U.S. Legal Services Director must have law degrees and be admitted to practice law in the United States.

These searches are being conducted by Meredith Horton, Allison Kupfer Poteet, Hallie Dietsch, and Javier Garcia of the national search firmNPAG. For more information, full position descriptions and instructions on how to apply, please visit the links below.

https://nonprofitprofessionals.com/current-searches-all/irap-ld

https://nonprofitprofessionals.com/current-searches-all/irap-usld

Call for Papers, ESIL Research Forum of the European Society of International Law

The ESIL Research Forum is a scholarly conference that promotes engagement with research in progress by members of the Society. It has a small and intensive format. The Forum targets scholars at an early stage of their careers. Approximately 15-25 paper submissions will be selected. During the Forum,selected speakers will receive comments on their presentations from members of the ESIL Board and invited experts.

The 2020 Research Forum addresses the topic:

Solidarity: The Quest for Founding Utopias of International Law

Solidarity is a founding utopia of international law. It has long appeared in the legal discourses of leading international law scholars as a value and political concept incorporated into international legal norms and evidenced in multilateral and bilateral treaties as an essential condition of interstate cooperation. As a principle of international law, it is mostly identifiable through the trust and confidence shown by states to one another in order to reap the mutual benefits of cooperation. In a broader sense, it also reveals a highly ambiguous ethical ideal not extraneous to the civilizing mission of a world order of interdependent states and communities addressing shared needs in a spirit of global cooperation and mutual responsibility. In response to the new global challenges faced by todays international legal system, solidarity has acquired a special prominencewith unprecedented developments in various fields of international law (e.g. trade law, environmental law, humanitarian law, disaster law, health law) while its utopian dimension has been stressed and expanded towards new directions.

The 2020 ESIL Research Forum aims to inspire thoughtful reflections on the genealogy of international solidarity by focusing on the actors, norms and processes influencing its evolution over time. Beyond the search for definitions, the scope of the Forumis to explore transformations and practical manifestations of this longstanding principle in the international legal community. Special attention will be given to international solidarity as interpreted by international and domestic courts and tribunals and to the analysis of some key areas where solidaristic paradigms have led to either positive outcomes or controversial repercussions.

Preference will be given to proposals in one of the following areas:

1.The historical boundaries of international solidarity

2. Solidarity and private law analogies

3.The invention of European solidarity

4. A human rights-based solidarity? Universal vs regional approaches

5. Peace and security: solidarity and the United Nations

6. International solidarity in emergency situations

7. Social solidarity economy and sustainable development

8. Civil society and transnational solidarity

9. International solidarity and burden-sharing: migration and refugee law

10. International solidarity and current trends: populism, nationalism vs multilateralism

Abstracts (of no more than 750 words) should be submitted to [emailprotected] by Monday 30 September 2019. Please include the following information with your abstract: your name, affiliation, email address, whether you are an ESIL member, plus a one-page curriculum vitae.

Successful applicants will be notified by email by 4 November 2019. Complete paper drafts will be required by 19 February 2020. Papers may in due course be published in the ESIL SSRN Conference Paper Series.

All those who take part in the Forum are expected to be ESIL members at the time of their participation.

Selected speakers will be expected to bear the costs of their own travel and accommodation. Some ESIL travel grantsand ESIL carers grantswill be available to offer partial financial support to speakers who have exhausted other potential sources of funding.

Speakers will be informed of several hotels that offer preferential rates to Research Forum participants. Lunch will be provided on both days, and a dinner for presenters, commentators and ESIL Board members will be hosted on the evening of Thursday 23 April 2020.

Attorney, Compliance Unit, National Security Agency

The National Security Agency (NSA) Office of General Counsel (OGC) is seeking highly motivated, skilled attorneys to join its expanded Compliance team of dedicated, professional attorneys advising NSA personnel and senior leadership on end-to-end compliance matters. Become involved in the earliest stages of operational technology development to ensure legal compliance issues are addressed; advise operational and compliance professionals in response to discrete regulatory questions and audits of NSA intelligence programs; team with NSA personnel and legal counterparts at the Department of Justice and the Office of the Director of National Intelligence to ensure NSA's overseers are fully informed of regulations, procedures and policies that support oversight of NSA's intelligence activities. Through work on the legal Compliance team, you will gain unique insight into inner-workings of NSA's technical operations and how its signals intelligence authorities are applied.

The professionals at the National Security Agency (NSA) have one common goal: to protect our nation. The mission requires a strong offense and a steadfast defense. The offense collects, processes and disseminates intelligence information derived from foreign signals for intelligence and counterintelligence purposes. The defense prevents adversaries from gaining access to sensitive of classified national security information.

The NSA OGC is an elite team of lawyers who provide legal advice to the Agency as it carries out its primary missions and all of its support functions. As a valued member of OGC, you will be performing critical work ensuring that Agency operations comply with the law while also protecting both our national security and our civil liberties.

Description of Position

The responsibilities of a Compliance Unit Attorney at the NSA can include:

- Advising the Agency on legal matters involving a particular subject matter (e.g., ensuring compliance with constitutional, statutory, regulatory, procedural, and policy requirements for intelligence operations)

- Analyzing proposed changes to legislation, programs, policies, regulations, or plans to determine impact on the Agency

- Representing the Agency's official position in legal and legislative proceedings, including proceedings before the Foreign Intelligence Surveillance Court

- Representing the Agency in interactions with outside customers, DoD, Congressional representatives, foreign partners, or the general public

- Conferring with/educating clients, customers, or stakeholders on legal or policy issues

- Determining the legal sufficiency of documents

- Drafting legal briefs, pleadings, etc.

- Making legal determinations in accordance with laws, regulations, professional standards, or Agency policies and procedures

The ideal candidate is a highly-motivated and qualified attorney with three years minimum experience, with excellent oral and written communication skills, a desire for continual learning, possesses problem-solving, analytic, and interpersonal skills, and is:

- detail-oriented

- customer and results oriented

- able to adjust to changing situational requirements

- able to build relationships across the Agency and with external stakeholders

- able to manage multiple tasks with competing timelines and deliverables

Experience and knowledge of law in one or more of the following areas is required:

- intelligence operations

- complex litigation

- national security law

This is a full-time position, Monday through Friday.

On-the job training, Internal NSA courses, and external training will be made available based on the need and experience of the selectee.

The Office of General Counsel (OGC) is the exclusive NSA component responsible for providing legal services to all NSA elements. The Office of General Counsel protects NSA's interests concerning the legal and regulatory authorities, requirements, entitlements, obligations and oversight requirements under which the Agency operate.

Salary Range $99,172 - $152,352 (Senior)

*The qualifications listed are the minimum acceptable to be considered for the position. Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.

Entry for Grade 13 is with a Professional Law Degree (LLB or JD).

Degree must be a Professional Law Degree (LL.B. or J.D.) and requires active membership in the bar of the highest court of a State, U.S. commonwealth, U.S. territory, or the District of Columbia.

Grade 13: Must have in excess of 2 years of relevant experience. Relevant experience as determined by the Office of the General Counsel (or the Office of the Inspector General for positions in the OIG) must be professional legal experience that is commensurate with the duties and responsibilities of the position. See DoD Instruction (DoDI) 1442.02 for exceptions to the grade-level standards. Active membership in the bar of the highest court of a State, U.S. commonwealth, U.S. territory, or the District of Columbia is required.

Entry for Grade 14 is with a Professional Law Degree (LLB or JD).

Degree must be a Professional Law Degree (LL.B. or J.D.) and requires active membership in the bar of the highest court of a State, U.S. commonwealth, U.S. territory, or the District of Columbia.

Grade 14: Must have in excess of 3 years of relevant experience. Relevant experience as determined by the Office of the General Counsel (or the Office of the Inspector General for positions in the OIG) must be professional legal experience that is commensurate with the duties and responsibilities of the position. See DoD Instruction (DoDI) 1442.02 for exceptions to the grade-level standards. Active membership in the bar of the highest court of a State, U.S. commonwealth, U.S. territory, or the District of Columbia is required.

Salary Range: $137,849 - $166,500 (Expert)

*The qualifications listed are the minimum acceptable to be considered for the position. Salary offers are based on candidates' education level and years of experience relevant to the position and also take into account information provided by the hiring manager/organization regarding the work level for the position.

Continue reading here:

The Week That Will Be - Lawfare

Posted in NSA

NSA on the Future of National Cybersecurity – Security Boulevard

Glenn Gerstell, the General Counsel of the NSA, wrote a long and interesting op-ed for the New York Times where he outlined a long list of cyber risks facing the US.

There are four key implications of this revolution that policymakers in the national security sector will need to address:

The first is that the unprecedented scale and pace of technological change will outstrip our ability to effectively adapt to it. Second, we will be in a world of ceaseless and pervasive cyberinsecurity and cyberconflict against nation-states, businesses and individuals. Third, the flood of data about human and machine activity will put such extraordinary economic and political power in the hands of the private sector that it will transform the fundamental relationship, at least in the Western world, between government and the private sector. Finally, and perhaps most ominously, the digital revolution has the potential for a pernicious effect on the very legitimacy and thus stability of our governmental and societal structures.

He then goes on to explain these four implications. Its all interesting, and its the sort of stuff you dont generally hear from the NSA. He talks about technological changes causing social changes, and the need for people who understand that. (Hooray for public-interest technologists.) He talks about national security infrastructure in private hands, at least in the US. He talks about a massive geopolitical restructuring a fundamental change in the relationship between private tech corporations and government. He talks about recalibrating the Fourth Amendment (of course).

The essay is more about the problems than the solutions, but there is a bit at the end:

The first imperative is that our national security agencies must quickly accept this forthcoming reality and embrace the need for significant changes to address these challenges. This will have to be done in short order, since the digital revolutions pace will soon outstrip our ability to deal with it, and it will have to be done at a time when our national security agencies are confronted with complex new geopolitical threats.

Much of what needs to be done is easy to see developing the requisite new technologies and attracting and retaining the expertise needed for that forthcoming reality. What is difficult is executing the solution to those challenges, most notably including whether our nation has the resources and political will to effect that solution. The roughly $60 billion our nation spends annually on the intelligence community might have to be significantly increased during a time of intense competition over the federal budget. Even if the amount is indeed so increased, spending additional vast sums to meet the challenges in an effective way will be a daunting undertaking. Fortunately, the same digital revolution that presents these novel challenges also sometimes provides the new tools (A.I., for example) to deal with them.

The second imperative is we must adapt to the unavoidable conclusion that the fundamental relationship between government and the private sector will be greatly altered. The national security agencies must have a vital role in reshaping that balance if they are to succeed in their mission to protect our democracy and keep our citizens safe. While there will be good reasons to increase the resources devoted to the intelligence community, other factors will suggest that an increasing portion of the mission should be handled by the private sector. In short, addressing the challenges will not necessarily mean that the national security sector will become massively large, with the associated risks of inefficiency, insufficient coordination and excessively intrusive surveillance and data retention.

A smarter approach would be to recognize that as the capabilities of the private sector increase, the scope of activities of the national security agencies could become significantly more focused, undertaking only those activities in which government either has a recognized advantage or must be the only actor. A greater burden would then be borne by the private sector.

Its an extraordinary essay, less for its contents and more for the speaker. This is not the sort of thing the NSA publishes. The NSA doesnt opine on broad technological trends and their social implications. It doesnt publicly try to predict the future. It doesnt philosophize for 6000 unclassified words. And, given how hard it would be to get something like this approved for public release, I am left to wonder what the purpose of the essay is. Is the NSA trying to lay the groundwork for some policy initiative ? Some legislation? A budget request? What?

Charlie Warzel has a snarky response. His conclusion about the purpose:

He argues that the piece is not in the spirit of forecasting doom, but rather to sound an alarm. Translated: Congress, wake up. Pay attention. Weve seen the future and it is a sweaty, pulsing cyber night terror. So please give us money (the word money doesnt appear in the text, but the word resources appears eight times and investment shows up 11 times).

Susan Landau has a more considered response, which is well worth reading. She calls the essay a proposal for a moonshot (which is another way of saying they want money). And she has some important pushbacks on the specifics.

I dont expect the general counsel and I will agree on what the answers to these questions should be. But I strongly concur on the importance of the questions and that the United States does not have time to waste in responding to them. And I thank him for raising these issues in so public a way.

I agree with Landau.

Slashdot thread.

Recent Articles By Author

*** This is a Security Bloggers Network syndicated blog from Schneier on Security authored by Bruce Schneier. Read the original post at: https://www.schneier.com/blog/archives/2019/10/nsa_on_the_futu.html

More here:

NSA on the Future of National Cybersecurity - Security Boulevard

Posted in NSA

Snowden Reveals How He Secretly Exposed NSA Criminal Wrongdoing Without Getting Arrested – Democracy Now!

This is a rush transcript. Copy may not be in its final form.

AMY GOODMAN: This is Democracy Now! Im Amy Goodman, as we continue Part 2 of our conversation with NSA whistleblower Edward Snowden, who has just published his memoir. Its called Permanent Record. Democracy Now!'s Juan Gonzlez and I spoke to him from his home in Moscow last week, where he's lived in exile since 2013. Ed Snowden talked about how he worked at the NSAs Office of Information Sharing an office of one: him.

EDWARD SNOWDEN: What does the Office of Information Sharing do? Well, besides me being way better at that job than the NSA ever thought that I would be, much to their dismay, think about the director of an agency, right? Think about the head of a unit. Think about someone whos supposed to know all the secrets to everything. Theyre not technologists, and these are very technical systems. When they say, I need to know whats going on with this, or, Show me this program, somebody has to get that, right? They dont know how to get it themselves. And that means somebody has all the access as these directors have all of these other things. These people are called systems administrators.

And so, I was sitting, for the first time in my career, really, with absolute awareness, not of the little picture, but the big picture, how all the pieces fit together. And I created a system called the HEARTBEAT. This is a new technological platform, that you can think of it like a news aggregator, the landing page, you know, on Google News, that pulls from all of these different newspapers and says, Heres whats interesting for you, based on who you are, whatever. And it would go, This person works in this office; they should see these kind of programs. And I created a kind of crude proof of concept system to do this.

But a byproduct of this meant that I now was sitting on top of a mountain of secrets. And it turned out that a lot of those secrets were criminal. So now I had to find a way to collect the evidence of wrongdoing, get it out of one of the most highly secured buildings on the planet it was a World War II-era airplane factory that was buried under a pineapple field, that was later converted into a spy base in Hawaii and somehow get it to journalists without getting caught.

JUAN GONZLEZ: And, Ed?

EDWARD SNOWDEN: And this is really where we get into the climax of the book.

JUAN GONZLEZ: Ed, at this point, you also discuss that you had first considered going to WikiLeaks but then changed your mind because of some changes in WikiLeaks policy that also you felt you could not in good conscience participate in. If you could talk about that, as well?

EDWARD SNOWDEN: Right. So, a lot of people misread this and think of it as me sort of denouncing WikiLeaks. And its not. I think some of the reporting that WikiLeaks has done is tremendously important, both for the historic record and also for contemporary politics basically every story theyve run in the last many years. And, of course, this when were talking about is in 2013, its long before the 2016 election has been covered by newspapers around the world.

But what had happened in the wake of the 2009 Manning disclosures this is where WikiLeaks published the Collateral Murder video of U.S. helicopter pilots killing not just a journalist, but also the first responders that came to their aid, and the classified histories of the wars in Iraq and Afghanistan and the State Departments diplomatic cables, that in some ways are argued to have sort of helped spark or at least catalyze the Arab Spring movement. What had happened is, in the early parts of WikiLeaks reporting, they worked in concert with newspapers, with sort of The New York Times, The Washington Post, The Guardian, Der Spiegel major newspapers. But at some point, one of the journalists that they had worked with wrote a memoir, or some kind of book, where they published the password that Julian Assange had given them to the entire archive of data, that only journalists were supposed to have, not the public, because the journalists were supposed to go through this process of deciding what in this archive of material does the public need to know and what is a legitimate secret, that maybe theres no benefit for publishing.

Once this journalist published this, WikiLeaks went well, all of the bad guys in the world, basically, have access to this material, because the archive, encrypted archive, was available to anyone. Its just you needed the password to unlock it. Now this bonehead journalist had published it and basically unlocked Pandoras box. WikiLeaks was in a tough place there. And they basically revised their editorial policy to go, You know what? Were going to publish everything pristine and unredacted, so that everyone is on a common footing, whether youre a good guy or bad guy. At least we all have access to the same information.

Its not my place to agree or disagree with that, say its right or wrong. But what I did want to do was try a different model, go, What happens? Is there a difference? Because Chelsea Manning, of course, was accused of all the same things that I was said, you know, This persons a traitor, said, This person endangered the troops which has never borne out, by the way. Were now more than 10 years on from those activities, and the government, even at Chelsea Mannings trial, after theyve convicted her, the government was invited by the judge to show evidence of harm, and they couldnt show anyone was harmed as a result of the disclosures.

But could these accusations of government be mitigated by the process of whistleblowing? Could we simply be more discriminating? Could we be overly cautious? Could we accommodate, to the maximum extent, what the government thought would be an appropriate process, while still empowering journalists? And this was the model that I set out to try and prove. Can we have myself, any whistleblower right? gather evidence of wrongdoing and trust that to the press under the condition that the journalists agree they will publish no story simply because its newsworthy, simply because its interesting, but only publish stories they are willing to make an institutional judgment are in the public interest to know, and then, as an extraordinary check beyond that, go to the government in advance of publication, warn the government, We are about to publish this story, and give the government and adversarial opportunity to argue against this, say, This will cause harm. Someone will get hurt. Redact this detail? And in all cases Im aware of, that process was followed.

And this is why, in 2019, I think its so obvious that no harm to national security has resulted from this process of disclosure. And yet, the same criticisms, the same allegations are made to me as have been every other whistleblower. And what we need to understand here is not my model of publication is right and WikiLeaks model is wrong, but rather to see you have two very different levels of caution right? of risk mitigation in these publication models. And yet, despite years and years of investigation by the most powerful government in history, in neither case has the government ever established or even offered evidence of harm as a result of this disclosure.

And so, this is the fundamental point that I just want to summarize for people. Whenever the government faces a whistleblower that is revealing some kind of wrongdoing that makes them uncomfortable, that implicates them in some kind of activity they should not be doing, they are going to try and change the conversation from the concrete harms of their actions, of their policies in government, and instead try to have a discussion about the theoretical risks of journalism in a free and open society. And, of course, there are risks to having a free press, but we embrace those risks, because those are the things that guarantee we are truly free.

JUAN GONZLEZ: Your decisions to eventually provide the information to Glenn Greenwald and Laura Poitras, and how those meetings initially went?

EDWARD SNOWDEN: Yeah, so, I have to work with journalists to get them interested in meeting with someone who they dont even know their name right? because if I give the journalists my name and they mishandle it, because the government is spying on everyone I know how the mass surveillance system works the government will have me in jail before anybody knows anything. So I have to go through this elaborate process of trying to reach out to journalists, convince them to use encrypted communications, while protecting myself from mass surveillance, driving around Hawaii with a specialized system, thats basically a GPS magnet that I can attach to the roof of my car, run through the window by wire to a laptop, which has an enormously powerful antenna connected to it, and then basically create a map, using that antenna, of everywhere there are different wireless access points that are either open and unlocked or vulnerable to being unlocked by me, that I can use for this covert communications in a way that wont lead back to me. And then I have to convince them, you know, I know something serious that you need to know about, the public needs to know about. But I cant tell you what it is yet until you do this, then get them online, then begin showing them evidence, and then, ultimately, get them to meet. And this was a tremendously stressful period, thats covered in some detail in the book.

But I think it is extraordinary, and I think these journalists should be all applauded for the risks that they took, because its very likely they could have been meeting with somebody who was saying, Oh, you know, Ive got the biggest secret in the world: The aliens have landed, and they work in the State Department. But they came, and they looked at the documents. They took them seriously. They authenticated them. And eventually they won the Pulitzer Prize for Public Service journalism because of that.

AMY GOODMAN: And after you met with them and you shared your stories, and they were writing them as you were meeting together in Hong Kong, describe what it meant to go underground there and then to ultimately, how you made your way, ended up at the Moscow airport and couldnt leave once you got there.

EDWARD SNOWDEN: Oh, yeah, this is a great question. So, I had been looking at this entire reporting system as a crazy system of a series of challenges, that were becoming increasingly difficult. But the end of it, the finish line, was youve delivered the secret to journalists, that the government has violated the rights of Americans and the Constitution of the United States. They can then publish that information, and that was the end of the process, because I was always planning on getting arrested.

And so, then, when the story comes out and my biggest fear was this was going to be a two-day story that everybody stopped talking about, it just blew over, the government sort of suppressed it it became the biggest story on the planet that year. Suddenly, everybody was interested in me. The government made me public enemy number one. I was the most wanted man in the world. It was a question of: All right, what now? And I didnt really have an idea.

So I talked with journalists or, sorry, I talked with lawyers that were introduced to me by the journalists human rights lawyers and tried to plan my next stage. I talked to the United Nations. And ultimately, the United Nations came back and went this is sort of you know, they wouldnt say this publicly, and I wouldnt encourage them to go on the record about this, but they went, Look, practically, the U.S. has enormous sway in our organization. They pay an enormous amount of our budget. And the U.S. gets what the U.S. wants. We probably cant help you. We will try, but its likely to work out to your disadvantage. And so, if the U.N. cant protect you, who can?

And my lawyer, Robert Tibbo, had this idea that I would go underground with the refugee families that he had been representing, that were themselves trying to seek asylum in Hong Kong. And so, suddenly, Ive gone from staying in a five-star hotel with journalists to staying in an apartment shared by five people, where the kitchen is the bathroom, and the entire thing is smaller than most suburban bathrooms. And Im trying to communicate with journalists. And these people were so brave, I still cant believe Im in disbelief that they just welcomed me in, when my face was on the front page of every newspaper. But they knew what it was like to be hunted by a government for having done the right thing. They were escaping violence and persecution. And they were just trying to make their way through the world. And this is the thing that always strikes me. They had nothing. These were the most vulnerable people on the planet. But its the people who have nothing that care about others the most, because all they have are connections.

And so, Ive been an aggressive advocate since then for trying to get them resettled. We have resettled two of them, a mother and her daughter, in Canada, after years and years of effort. But, unfortunately, the Trudeau government is still digging in their heels and trying to prevent the rest of the families from entering into asylum. In Hong Kong, the number of people who have their asylum claims approved is less than 1%, which is actually some of the those are some of the worst figures in the world for that. And even if they get their asylum claims granted, they are forced to be resettled in third countries rather than in Hong Kong itself.

AMY GOODMAN: NSA whistleblower Edward Snowden. He tells his story in his new book, Permanent Record. Back in 30 seconds with Snowden.

[break]

AMY GOODMAN: El Triste by one of Latin Americas most beloved singers, Jos Jos. Known as The Prince of Song, he passed away in South Florida Saturday at the age of 71.

View original post here:

Snowden Reveals How He Secretly Exposed NSA Criminal Wrongdoing Without Getting Arrested - Democracy Now!

Posted in NSA

Former NSA Inspector: Whistleblower Does Not Need Firsthand Information – WBUR

WithMeghna Chakrabarti

We talk with former NSA inspector Joel Brenner about the whistleblower complaint.

"I think everybody in the intelligence community is extremely nervous. The president's been attacking the community, explicitly," he toldOn Point's Meghna Chakrabarti.

Joel Brenner, former inspector general for theNational Security Agency, and later senior counsel to the NSA.Former head of U.S. counterintelligence under the Director of National Intelligence. Senior research fellow at MIT's Center for International Studies.

On President Trumps demands to unmask the whistleblower

I think everybody in the intelligence community is extremely nervous. The president's been attacking the community, explicitly. And, the president's now attacking the norms by which the Congress and the intelligence community have agreed that there ought to be a way to report wrongdoing. This is dangerous. The president's M.O. is to create as much chaos and confusion on all fronts as he can. That's what he's doing here.

On concerns about Trumps desire to reveal the whistleblower's identity

It has to do with the basic trust that people used to have in American institutions. And, even as that trust diminished significantly during my lifetime, there were still basic norms that people observed; ways that they behaved. This is going to make whistleblowers more reluctant to come forward. I'm talking about whistleblowers who are not merely cranky and complaining about not getting promoted and stuff. We saw plenty of that, too. But, people who really saw something that they thought really looked wrong. [Especially] since the president's now saying such nasty things about this person who everybody else says, in a position to know, is following the rules. I mean, this is so beyond the pale. And, of course, people are extremely nervous about it.

On reporting that correspondence, such as the Ukranian phone call, and other information is being kept on highly secret servers at the advice of White House lawyers.

Is that outside of standard operating procedure?

Out of the normal operations of the intelligence community, it's just totally I can't say nobody's ever done it, but it is not according to Hoyle. Let me explain, first, what code word means. There are three classifications only, under our law: confidential, secret, top secret. You don't go higher than that. But, then, we have certain horizontal classifications that have to do with things that are put in compartments, or in [the] Defense Department, called Special Access Programs. That's what this is talking about. This server was to hold information that was compartmented or, sapped as they say. This information was clearly not appropriate, to put this information there.

Now, the president does have the power to classify things however he wants. Which means, his behavior and an ordinary IC [intelligence community] person's behavior, are not the same thing. But, I would remind people, that if you do a lawful act for an unlawful purpose, in the course of conspiring to cover up illegal behavior which I think is demonstrated in the transcript itself then that becomes illegal. That's an act in furtherance of conspiracy. And I think that's what was going on here."

On being astonished that White House lawyers would, reportedly, advise trying to hide Trumps behavior

Yes, I am. You know, when things go wrong, you always want to say, Where were the lawyers? And, if this whistleblower complaint pans out in all respects, it appears that the lawyers were actually guiding the cover-up of this information. And, I think if that is true if they've got problems under criminal law, and they're licensed to practice law they're going to be challenged, at some point, as well.

On whether a whistleblower has to have first-hand information in a complaint

No. And why would you want that to be the case? An investigator whether it's an investigative journalist, or a prosecutor, or an inspector general wants leads. You start with leads, you don't start with admissible evidence for in a courtroom which is what firsthand information is, so it's not hearsay. You want to get information that's credible, that will then guide an investigation to produce firsthand information. So, this is a complete red herring. It's not only not the case, but you wouldn't want it to be the case.

New York Times: "White House Knew of Whistle-Blowers Allegations Soon After Trumps Call With Ukraine Leader" "The White House learned that a C.I.A. officer had lodged allegations against President Trumps dealings with Ukraine even as the officers whistle-blower complaint was moving through a process meant to protect him against reprisals, people familiar with the matter said on Thursday.

"The officer first shared information about potential abuse of power and a White House cover-up with the C.I.A.s top lawyer through an anonymous process, some of the people said. The lawyer shared the officers concerns with White House and Justice Department officials, following policy. Around the same time, the officer separately filed the whistle-blower complaint.

"The revelations provide new insight about how the officers allegations moved through the bureaucracy of government. The Trump administrations handling of the accusations is certain to be scrutinized, particularly by lawmakers weighing the impeachment of the president.

"Lawyers for the whistle-blower refused to confirm that he worked for the C.I.A. and said that publishing information about him was dangerous."

USA Today: "A GoFundMe has raised over $70k to cover legal fees for anonymous Ukraine whistleblower" "Lawyers for an anonymous whistleblower who filed a complaint alleging Donald Trump pressured a foreign government to interfere in the U.S. election have launched a fundraiser to cover the whistleblower's legal aid.

"The fundraiser, organized through GoFundMe, has received over $70,000 from more than 2,000 donors as of Thursday afternoon, as House Democrats pursue an impeachment inquiry.

"The nonprofit Whistleblower Aid partnered with the whistleblower's legal counsel to launch the fundraiser, which was posted on Wednesday, according to the GoFundMe page.

"Whistleblower Aid founder and CEO John Tye told USA TODAY that the organization hopes to protect the anonymous whistleblower's rights including being free from retaliation, in addition to educating the public about the importance of whistleblowing."

Stefano Kotsonisproduced this segment for broadcast. Alex Schroeder and Sydney Wertheim adapted it for the web.

Visit link:

Former NSA Inspector: Whistleblower Does Not Need Firsthand Information - WBUR

Posted in NSA

How The NSA And US Cyber Command Hacked ISIS’s Media Operation – NPR

Neil stands in a room with military cyber operators from Joint Task Force ARES to launch an operation that would become one of the largest and longest offensive cyber operations in U.S. military history. Josh Kramer for NPR hide caption

Neil stands in a room with military cyber operators from Joint Task Force ARES to launch an operation that would become one of the largest and longest offensive cyber operations in U.S. military history.

The crowded room was awaiting one word: "Fire."

Everyone was in uniform; there were scheduled briefings, last-minute discussions, final rehearsals. "They wanted to look me in the eye and say, 'Are you sure this is going to work?' " an operator named Neil said. "Every time, I had to say yes, no matter what I thought." He was nervous, but confident. U.S. Cyber Command and the National Security Agency had never worked together on something this big before.

Four teams sat at workstations set up like high school carrels. Sergeants sat before keyboards; intelligence analysts on one side, linguists and support staff on another. Each station was armed with four flat-screen computer monitors on adjustable arms and a pile of target lists and IP addresses and online aliases. They were cyberwarriors, and they all sat in the kind of oversize office chairs Internet gamers settle into before a long night.

"I felt like there were over 80 people in the room, between the teams and then everybody lining the back wall that wanted to watch," Neil recalled. He asked us to use only his first name to protect his identity. "I'm not sure how many people there were on the phones listening in or in chat rooms."

From his vantage point in a small elevated bay at the back of the Operations Floor, Neil had a clear line of sight to all the operators' screens. And what they contained weren't glowing lines of code: Instead, Neil could see login screens the actual login screens of ISIS members half a world away. Each one carefully preselected and put on a target list that, by Operation Day, had become so long it was on a 3-foot-by-7-foot piece of paper hung on the wall.

It looked like a giant bingo card. Each number represented a different member of the ISIS media operation. One number represented an editor, for instance, and all the accounts and IP addresses associated with him. Another might have been the group's graphic designer. As members of the terrorist group slept, a room full of military cyber operators at Fort Meade, Md., near Baltimore were ready to take over the accounts and crash them.

All they were waiting for was Neil, to say that one word: "Fire."

In August 2015, the NSA and U.S. Cyber Command, the military's main cyber arm, were at a crossroads about how to respond to a new terrorist group that had burst on the scene with unrivaled ferocity and violence. The one thing on which everyone seemed to agree is that ISIS had found a way to do something other terrorist organizations had not: It had turned the Web into a weapon. ISIS routinely used encrypted apps, social media and splashy online magazines and videos to spread its message, find recruits and launch attacks.

A response to ISIS required a new kind of warfare, and so the NSA and U.S. Cyber Command created a secret task force, a special mission, and an operation that would become one of the largest and longest offensive cyber operations in U.S. military history. Few details about Joint Task Force ARES and Operation Glowing Symphony have been made public.

"It was a house of cards"

Steve Donald, a captain in the Naval Reserve, specializes in something called cryptologic and cyber operations, and when he is not in uniform, he is launching cybersecurity startups outside Washington, D.C. He's pale, bespectacled and has the slightly shy demeanor of a computer geek. In the spring of 2016 he received a phone call from the leader of his reserve unit. He needed Donald to come in.

"I said, well, I'm not in uniform [and he said] it doesn't matter if you have a badge come on in," Donald said. "I can't believe I can actually say this but they were building a task force to conduct offensive cyber operations against ISIS."

Donald had to find a team of specialists to do something that had never been done before hack into a terrorist organization's media operation and bring it down. Most of the forces flowed in from Joint Forces Headquarters, an Army cyber operation in Georgia. Donald also brought in experts in counterterrorism who understood ISIS and had watched it evolve from a ragtag team of Iraqi Islamists to something bigger. There were operators the people who would be at the keyboards finding key servers in ISIS's network and disabling them and digital forensics specialists who had a deep understanding of computer operating systems.

"They can say this is good, this is bad, this is where the files are located that we're interested in," he said. He found analysts, malware experts, behaviorialists and people who had spent years studying the smallest habits of key ISIS players. The mission, he explained to them, was to support the defeat of ISIS to deny, degrade and disrupt them in cyberspace.

This was more complicated than it sounded.

The battle against the group had been episodic to that point. U.S. Cyber Command had been mounting computer network attacks against the group, but almost as soon as a server would go down, communications hubs would reappear. The ISIS target was always moving and the group had good operational security. Just physically taking down the ISIS servers wasn't going to be enough. There needed to be a psychological component to any operation against the group as well.

"This cyber environment involves people," Neil said. "It involves their habits. The way that they operate; the way that they name their accounts. When they come in during the day, when they leave, what types of apps they have on their phone. Do they click everything that comes into their inbox? Or are they very tight and restrictive in what they use? All those pieces are what we look at, not just the code."

Neil is a Marine reservist in his 30s, and it wouldn't be an exaggeration to say that Operation Glowing Symphony was his idea. "We were down in the basement at the NSA, and we had an epiphany," he said. He had been tracking ISIS's propaganda arm for months painstakingly tracing uploaded videos and magazines back to their source, looking for patterns to reveal how they were distributed or who was uploading them. Then he noticed something that he hadn't seen before: ISIS was using just 10 core accounts and servers to manage the distribution of its content across the world.

The mission led by a special unit working with U.S. Cyber Command and the NSA was to get inside the ISIS network and disrupt the terrorist organization's media operation. Josh Kramer for NPR hide caption

The mission led by a special unit working with U.S. Cyber Command and the NSA was to get inside the ISIS network and disrupt the terrorist organization's media operation.

"Every account, every IP, every domain, every financial account, every email account ... everything," Neil said. The group's network administrators weren't as careful as they should have been. They took a shortcut and kept going back to the same accounts to manage the whole ISIS media network. They bought things online through those nodes; they uploaded ISIS media; they made financial transactions. They even had file sharing through them. "If we could take those over," Neil said, grinning, "we were going to win everything."

The young Marine ran into his leadership's office at the NSA, grabbed a marker and started drawing crazy circles and lines on a whiteboard. "I was pointing everywhere and saying, 'It's all connected; these are the key points. Let's go," he recalled. "I felt like I was in It's Always Sunny in Philadelphia, when he's doing the mystery investigation for Pepe Silvia. Pictures on the wall and red yarn everywhere and nobody was understanding me."

But as Neil kept explaining and drawing he could see the leaders begin to nod. "I drew this bicycle tire with spokes and all the things that were tied to this one node and then there was another one," he said. "It was a house of cards."

We confirmed this account with three people who were there at the time. And from those scrawls, the mission known as Operation Glowing Symphony began to take shape. The goal was to build a team and an operation that would deny, degrade and disrupt ISIS's media operation.

The cyber equivalent of a surgical strike

The spring and summer of 2016 were spent preparing for attack. And while members of Task Force ARES didn't reveal everything they did to crack into ISIS's network, one thing they used early on was a hacking standby: a phishing email. ISIS members "clicked on something or they did something that then allowed us to gain control and then start to move," said Gen. Edward Cardon, the first commander of Task Force ARES.

Almost every hack starts with hacking a human, cracking a password or finding some low-level unpatched vulnerability in software. "The first thing you do when you get in there is you've got to get some persistence and spread out," Cardon said, adding that the ideal thing is to get an administrator's account. "You can operate freely inside the network because you look like a normal IT person." (ISIS didn't just have IT people; it had an entire IT department.)

Once ARES operators were inside the ISIS network, they began opening back doors and dropping malware on servers while looking for folders that contained things that might be helpful later, like encryption keys or folders with passwords. The deeper ARES got inside ISIS's network, the more it looked like the theory about the 10 nodes was correct.

But there was a problem. Those nodes weren't in Syria and Iraq. They were everywhere on servers around the world, sitting right next to civilian content. And that complicated things. "On every server there might be things from other commercial entities," said Air Force Gen. Tim Haugh, the first deputy commander of JTF ARES working under Cardon. "We were only going to touch that little sliver of the adversary space and not perturb anyone else."

If ISIS had stored something in the cloud or on a server sitting in, say, France, ARES had to show Defense Department officials and members of Congress that U.S. cyber operators had the skill to do the cyber equivalent of a surgical strike: attack the ISIS material on a server without taking down the civilian material sitting right next to it.

They spent months launching small missions that showed they could attack ISIS content on a server that also contained something vital like hospital records. Being able to do that meant they could target ISIS material outside Syria and Iraq. "And I looked at this young Marine and said, 'How big can we go?' and he said, 'Sir, we can do global.' I said, 'That's it write it down, we're going to take it to Gen. Cardon.' "

That Marine was Neil. He began peppering the leadership with ideas. He talked to them about not just hacking one person ... or ISIS in Syria and Iraq, but how to take down the media operation's entire global network. "That's how these attacks work," Neil said. "They start very simple and they become more complex."

There was something else about Task Force ARES that was different: Young operators like Neil were briefing generals directly. "A lot of [ideas] come up that way, like somebody says, 'Well, we could gain access and do this to the files.' Really? You can do that? 'Oh yeah.' Would anyone notice? 'Well, maybe, but the chances are low.' It's like, hmmm, that's interesting, put that on the list."

Cardon said young operators on Joint Task Force ARES understood hacking in a visceral way and, in many respects, understood what was possible in cyberspace better than commanding officers did, so having a direct line to the people making the decisions was key.

"An incredible rush"

By the fall of 2016 there was a team, Joint Task Force ARES; there was a plan called Operation Glowing Symphony, and there were briefings that had gone right up to the president. It was only then that there was finally a go. This account of the first night of Operation Glowing Symphony is based on interviews with half a dozen people directly involved.

After months of looking at static webpages and picking their way through ISIS's networks, the task force starting logging in as the enemy. They deleted files. Changed passwords. "Click there," a digital forensic expert would say. "We're in," the operator would respond.

There were some unintentionally comical moments. Six minutes in there was very little happening, Neil recalls. "The Internet was a little slow," he said without irony. "And then you know minute seven, eight, nine, 10, it started to flow in, and my heart started beating again."

They began moving through the ISIS networks they had mapped for months. Participants describe it like watching a raid team clearing a house, except it was all online. Logging into accounts they had followed. Using passwords they discovered. Then, just as their move through targets started to accelerate, a roadblock: a security question. A standard, "what was your high school mascot"-type security question.

The question: "What is the name of your pet?"

The room quieted down.

"And we're stuck dead in our tracks," Neil said. "We all look to each other and we're like, what can we do? There's no way we're going to get in. This is going to stop the 20 or 30 targets after this."

Then an analyst stood up in the back of the room.

"Sir, 1-2-5-7," he said.

"We're like, what?" Neil says.

"Sir, 1-2-5-7."

"How do you know that? [And he said] 'I've been looking at this guy for a year. He does it for everything.' And we're like, all right ... your favorite pet. 1-2-5-7.

"And boom, we're in."

After that, the momentum started to build. One team would take screenshots to gather intelligence for later; another would lock ISIS videographers out of their own accounts.

"Reset Successful" one screen would say.

"Folder directory deleted," said another.

The screens they were seeing on the Ops floor on the NSA campus were the same ones someone in Syria might have been looking at in real time, until someone in Syria hit refresh. Once he did that, he would see: 404 error: Destination unreadable.

"Target 5 is done," someone would yell.

Someone else would walk across the room and cross the number off the big target sheet on the wall. "We're crossing names off the list. We're crossing accounts off the list. We're crossing IPs off the list," said Neil. And every time a number went down they would yell one word: "Jackpot!"

"We'd draw the line out and I had stacks of paper coming up on the corner of my desk," Neil said. "I knew in about the first 15 minutes that we were on pace to accomplish exactly what we need to accomplish."

Once they had taken control of the 10 nodes, and had locked key people out of their accounts, ARES operators just kept chewing their way through the target list. "We spent the next five or six hours just shooting fish in a barrel," Neil said. "We'd been waiting a long time to do that and we had seen a lot of bad things happen and we were happy to see them go away."

And there was something else that Neil said was hard to describe. "When you reach through the computer and on the other side is a terrorist organization, and you're that close, and you're touching something that's theirs, that they possess, that they put a lot of time and effort in to to hurt you, that is an incredible rush," he said. "You have the control to take that away."

Enough to drive you nuts

Brig. Gen. Jennifer Buckner was one of the people who took the reins of Task Force ARES after Glowing Symphony had started. And after that first night, the mission shifted into a second phase, one aimed at keeping pressure on ISIS with essentially five lines of effort: Keep the media operation under pressure, make it difficult for ISIS to operate on the Web more generally, use cyber to help forces on the ground fighting ISIS, hobble its ability to raise money, and work with other agencies in the U.S. and allies abroad.

The second phase of Operation Glowing Symphony focused on sowing confusion within ISIS. Joint Task Force ARES operators worked to make the attack look like frustrating, daily-life IT problems: dead batteries, slow downloads, forgotten passwords. Josh Kramer for NPR hide caption

The second phase of Operation Glowing Symphony focused on sowing confusion within ISIS. Joint Task Force ARES operators worked to make the attack look like frustrating, daily-life IT problems: dead batteries, slow downloads, forgotten passwords.

Once the distribution hubs were hamstrung, the second phase of the mission was more creative. Joint Task Force ARES operators started making all those things that drive you crazy about today's technology slow downloads, dropped connections, access denied, program glitches and made it start happening to ISIS fighters. "Some of these are not sophisticated effects, but they don't need to be," Buckner said. "The idea that yesterday I could get into my Instagram account and today I can't is confusing."

And potentially enraging. When you can't get into an email account, what do you do? You think: Maybe I mistyped the login or password. So you put it in again and it still doesn't work. Then you type it in more deliberately. And every time you type it, press enter, and are denied, you get a little more frustrated. If you're at work, you call the IT department, you explain the issue and then they ask you if you're sure you typed your login and password in correctly. It is enough to drive you nuts. It might never occur to you, or to ISIS, that this might be part of a cyberattack.

That's what the follow-on phases of Operation Glowing Symphony were about. Psy-ops with a high-tech twist. A member of ISIS would stay up all night editing a film and ask a fellow ISIS member to upload it. Operators with JTF ARES would make it so it didn't quite land at its destination. The ISIS member who stayed up all night starts asking the other ISIS member why he didn't do what he'd asked. He gets angry. And so on.

"We had to understand, how did all of that work?" Buckner said. "And so, what is the best way to cause confusion online?"

The ideas that flowed up from operators like Neil were endless. Let's drain their cellphone batteries; or insert photographs into videos that weren't supposed to be there. Task Force ARES would watch, react and adjust its plans. It would change passwords, or buy domain names, delete content, all in a way that made it (mostly) look like it was just run-of-the mill IT problems.

"Pinwheels of death; the network's working really slow," Cardon couldn't help smiling as he went through the list. "People get frustrated."

According to three people who were privy to after-action reports, ISIS's media operation was a shadow of its former self six months after Neil said "Fire" to start Operation Glowing Symphony. Most of the media operations servers were down and the group had not been able to reconstitute them.

There were lots of reasons for that, not the least of which is that getting a new server in the middle of a war zone deep inside Syria isn't easy to do. ISIS had plenty of cash but few credit cards, bank accounts or reputable emails that would allow it to order new servers from outside the country. Buying new domain names, which are used to identify IP addresses, is also complicated.

ISIS's popular online magazine, Dabiq, started missing deadlines and eventually folded. The group's foreign-language websites in everything from Bengali to Urdu also never came back up. The mobile app for Amaq Agency, the group's official news service, vanished.

"Within the first 60 minutes of go, I knew we were having success," Gen. Paul Nakasone, director of the NSA, told NPR in an interview. "We would see the targets start to come down. It's hard to describe but you can just sense it from being in the atmosphere, that the operators, they know they're doing really well. They're not saying that, but you're there and you know it."

Nakasone was there because he was the head of Joint Task Force ARES when Operation Glowing Symphony actually launched. Nakasone said that before ARES the fight against ISIS in cyberspace was episodic. JTF ARES ensures it is continuous. "We were going to make sure that anytime ISIS was going to raise money or communicate with their followers, we were going to be there."

Some critics have said that the mere fact that ISIS is still on the Web means Operation Glowing Symphony didn't work. Nakasone, naturally, sees it differently. He says ISIS has had to change the way it operates. It isn't as strong in cyberspace as it was. It is still there, yes, but not in the same way.

"We were seeing an adversary that was able to leverage cyber to raise a tremendous amount of money to proselytize," he said. "We were seeing a series of videos and posts and media products that were high-end. We haven't seen that recently. ... As ISIS shows their head or shows that ability to act, we're going to be right there."

Three years after Neil said "Fire," ARES is still in ISIS networks. Gen. Matthew Glavy is now the commander of Joint Task Force ARES. He says his operators still have a thumb on ISIS's media operations; the group is still having a lot of trouble operating freely on the Web. But it is hard to be sure why that is. While ARES has been hacking into ISIS in cyberspace, forces on the ground have driven the group out of most of Syria and Iraq.

ISIS itself has spread out. It now has fighters in Libya and Mali and even the Philippines. Glavy says his operators are still there. "We cannot have for them to gain the momentum that we saw in the past," he told me. "We have to learn that lesson."

"The whole point of the doomsday machine"

For most of the Obama administration, officials refused to talk about cyberattacks. Now the U.S. has not only confirmed the existence of cyberweapons but is starting to tell journalists, like those at NPR, about how they wield them. Cyberattacks, once taboo to even discuss, are becoming more normalized. In its military authorization bill last year, Congress cleared the way for the defense secretary to authorize some cyberattacks without going to the White House.

But there is a dark side to this new arsenal. The U.S. isn't the only country that has turned to cyber. Consider the case of Washington Post journalist Jamal Khashoggi, who was murdered in a Saudi embassy late last year; cybertools are thought to have been part of that case too. "A lot of the preparation for that and the lead-up to it had to do with Saudi Arabia using offensive weapons," said Ron Deibert, the director of the Citizen Lab at the University of Toronto's Munk School of Global Affairs.

Deibert's researchers found offensive cybertools tracking the journalist and his inner circle. "When we talk about offensive cyber operations, I think it's important to understand that it doesn't always come in one flavor," Deibert said, adding that the Khashoggi case is far from the exception. In Mexico alone, Citizen Lab found 27 cases of this kind of offensive cybertool targeting political rivals, reporters and civil rights lawyers. Six years ago, it rather famously discovered that China had been hacking into the Dalai Lama's computer networks.

Deibert is worried about escalation. "You really create conditions for an escalation of an arms race in cyberspace that really could come back to haunt the United States in the long run," Deibert said. "There's a demonstration effect. The equipment, the software, the methods, the capabilities proliferate." Deibert says U.S. reluctance to use offensive cyber has vanished. "Now ... what we're talking about is something that is more active," he said.

Nakasone made clear things had changed when he talked to NPR a few months ago at the NSA campus at Fort Meade. He uses terms like "persistent engagement" and "defend forward." He says that they are "part of the DOD cyber strategy that talks about acting outside our borders to ensure that we maintain contact with our adversaries in cyberspace."

In other words, you don't wait to be attacked in cyberspace. You do things that would allow you to hack back if there is an attack in the future. That could be deploying a small team in another country that asks for help or "hunting on our networks to look for malware, or it could be as we did in Operation Glowing Symphony, the idea of being able to impact infrastructure worldwide," he said.

All this is important now because you can draw a straight line from Joint Task Force ARES to a new unit from the NSA and U.S. Cyber Command: something called the Russia Small Group. Just as Joint Task Force ARES focused on ISIS, the Russia Small Group is organized in much the same way around Russian cyberattacks.

The mission against ISIS in cyberspace continues, though there is a dark side to fighting with this new arsenal: The U.S. isn't the only country using these kinds of weapons, and experts worry about proliferation. Josh Kramer for NPR hide caption

The mission against ISIS in cyberspace continues, though there is a dark side to fighting with this new arsenal: The U.S. isn't the only country using these kinds of weapons, and experts worry about proliferation.

In June, the New York Times reported that the U.S. had cracked into Russia's electrical power grid and planted malware there. Nakasone wouldn't confirm the Times story, but it isn't hard to see how planting malware in anticipation of needing it later would fit into the Russia Small Group's operations if it is modeled on ARES.

Nakasone said the first thing he did when he became NSA director in 2018 was to review what the Russians had done in the runup to the U.S. presidential election, so U.S. Cyber Command could learn from it and reverse-engineer it to see how it works. "It provided us with a very, very good road map of what they might do in the future," Nakasone said. He said Cyber Command was poised to act if the Russians attempt to hack the 2020 elections. "We will impose costs," he said, "on adversaries that attempt to impact our elections. I think it's important for the American public to understand that as with any domain air, land, sea, or space cyberspace is the same way; our nation has a force."

So why is Nakasone talking about this now?

Deibert thinks this is part of a deterrent justification. "You can't have cyber operations meaningfully deter your adversaries unless they know that you have these capabilities," he said. "But what's not probably being discussed or appreciated is the extent to which there is a systemic effect of the use of these operations. Other countries take notice."

At the end of Stanley Kubrick's film Dr. Strangelove there is an iconic scene in which the doomsday bomb is seen as the ultimate deterrent, but it only works as a deterrent if people know it exists. If you don't tell anyone about it, what good is it? "The whole point of the doomsday machine is lost if you keep it a secret," Peter Sellers concludes in the movie.

You could say the same thing about American offensive cyber operations. They have been so stealthy for so long, maybe people don't realize we have them.

We hear all about Russia's influence campaigns and Chinese intellectual property thefts and Iranian hackers trolling American infrastructure, but we rarely hear in any detailed way about the American response. Nakasone appears to be starting to address that.

The irony is that offensive cyber's richest target is us. "The United States is the country most highly dependent on these technologies," Deibert said. "And arguably the most vulnerable to these sorts of attacks. I think there should be far more attention devoted to thinking about proper systems of security, to defense."

That would mean trying to find a way to harden soft targets across the country, getting private companies to beef up their cybersecurity, getting the U.S. government to mandate standards. Offensive cyber, at this point anyway, may seem easier.

NPR's Adelina Lancianese contributed to this story.

See the original post here:

How The NSA And US Cyber Command Hacked ISIS's Media Operation - NPR

Posted in NSA

The FISA Oversight Hearing Confirmed That Things Need to Change – EFF

Section 215, the controversial law at the heart of the NSAs massive telephone records surveillance program, is set to expire in December. Last week the House Committee on the Judiciary held an oversight hearing to investigate how the NSA, FBI, and the rest of the intelligence community are using and interpreting 215 and other expiring national security authorities.

Congress last looked at these laws in 2015 when it passed the USA FREEDOM Act, which sought to end bulk surveillance and to bring much-needed transparency to intelligence agency activities. However, NSA itself has revealed that it has been unable to stay within the limits USA FREEDOM put on Section 215s Call Detail Records (CDR) authority. In response to these revelations, weve been calling for an end to the Call Details Records program, as well as additional transparency into the governments use of Section 215. If last weeks hearing made anything clear, its this: there is no good reason for Congress to renew the CDR authority.

Chairman Nadler began the hearing by asking Susan Morgan of the NSA if she could point to any specific instance where the CDR program helped to avert any kind of an attack on American soil. Morgan pushed back on the question, telling Chairman Nadler that the value of an intelligence program should not be measured on whether or not it stopped a terrorist attack, and that as an intelligence professional, she wants to make sure the NSA has every tool in the tool box available.

However, the NSA previously reported it had deleted all the information it received from the 215 program since 2015. Morgan confirmed that part of the reason the NSA chose to mass delete all the records was because not all the information was accurate or allowed under the law.

In other words, the NSA wants Congress to renew its authority to run a program that violates privacy protections and collects inaccurate information without providing any way to measure if the program was at all useful. The agencys best argument for why it wants to renew the legal authorization to use the CDR provision is because it might be useful one day.

Rep. Steve Cohen asked the panel if they could reassure his liberal friends that there have been meaningful reforms to the program. The witnesses cited some of the reforms from USA FREEDOM, passed in 2015, as evidence of post-Snowden reforms and safeguards.

However, their answer did not meaningfully address recent incidents where the NSA discovered that it had improperly collected information. Documents obtained by the ACLU include an assessment by the NSA itself that the overcollection had a significant impact on civil liberties and privacy, which is putting it mildly.

Fortunately, the committee did not appear to be convinced by this line of reasoning. As Rep. Sylvia Garcia told Morgan, If I have a broken hammer in my toolbox, I dont need to keep it.

We agree. No surveillance authority should exist purely because it might someday come in handy, particularly one that has already been used for illegal mass surveillance.

In addition to the CDR program, Section 215 also allows the government to collect business records or other tangible things related to a specific order. Despite the innocuous name, the business records provision allows intelligence agencies to collect a vast range of documents. But we dont have a sense of just what kinds of sensitive information are collected, and on what scale.

Rep. Pramila Japayal pressed the witnesses on whether Section 215 allows the collection of sensitive information such as medical records, drivers license photographs, or tax records. Reading from the current law, Brad Wiegmann, Deputy Assistant Attorney General, responded that while the statute does contemplate getting these records, it also recognizes the sensitive nature of those records and requires the requests to be elevated for senior review.

In other words, the DOJ, FBI and NSA confirmed that under the right circumstances, they believe that the current authority in Section 215 allows the government to collect sensitive records on a showing that they are relevant to a national security investigation. Plus, as more and more of our home devices collect information on our daily lives, all the witnesses said they could easily envision circumstances where they would want footage from Amazons Ring, which EFF has already argued is a privacy nightmare.

In addition, Rep. Hank Johnson and Rep. Andy Biggs pressed the witnesses on whether the government collects geolocation information under Section 215, and if there has been guidance on the impact of the Supreme Courts landmark Carpenter decision on these activities. Wiegmann acknowledged that while there may be some Fourth Amendment issues, the committee would need to have a classified session to fully answer that question.

Additionally, when asked about information sharing with other federal agencies, none of the witnesses were able to deny that information collected under Section 215 could be used for immigration enforcement purposes.

Both of these revelations are concerning. Carpenter brought on a sea change in privacy law and it should be highly concerning to the public and to overseers in Congress that the intelligence community does not appear to be seriously consider its effect on national security surveillance.

As it considers whether or not to renew any of the authorities in Section 215, Congress must also considering what meaningful privacy and civil liberties safeguards to include. Relying on the NSA to delete millions of inaccurate records collected over many years is simply insufficient.

In 2015, in the wake of Edward Snowdens revelations about the NSA mass spying on Americans, Congress passed USA FREEDOM to modify and reform the existing statute. One of the provisions of that bill specifically requires government officials to conduct a declassification review of each decision, order, or opinion issued by the FISC that includes a significant construction or interpretation of any provision of law.

Both the text of the bill and statements from members of Congress who authored and supported it make clear that the law places new, affirmative obligations on the government to go back, review decades of secret orders and opinions, and make the significant ones public.

However, the DOJ has argued in litigation with EFF that this language is not retroactive and therefore only requires the government to declassify significant opinions issued after June 2015.

It also remains unclear how the government determines which opinions are significant or novel enough to be published, as well as how many opinions remain completely secret.

Allowing the Foreign Intelligence Surveillance Court (FISC) to interpret the impact of that decision on Section 215 programs in secret means that the public wont know if their civil liberties are being violated.

Releasing all significant FISC opinions, starting from 1978, will not only comply with what Congress required under USA FREEDOM in 2015, it will also help us better understand exactly what the FISC has secretly decided about our civil liberties. Adding a new provision that requires the FISC to detail to Congress how it determines which opinions are significant and how many opinions remain entirely secret would provide additional and clearly needed transparency to the process of administering secret law.

Despite repeated requests from the members of the panel to describe some way of measuring how effective these surveillance laws are, none of the witnesses could provide a framework. Congress must be able to determine whether any of the programs have real value and if the agencies are respecting the foundational rights to privacy and civil liberties that protect Americans from government overreach.

Back in March, EFF, along with the ACLU, New America's Open Technology Institute, EPIC and others, sent a letter to the U.S. House Committee on the Judiciary, detailing what additional measures are needed to protect individuals rights from abuses under the Patriot Act and other surveillance authorities. Hearing members of the Intelligence Community speak before the Judiciary Committee reconfirmed just how essential it is that these new protections and reforms be enacted.

We look forward to working with the US House Committee on the Judiciary to end the authority for the Call Details Records program once and for all and to ensure that there are real transparency mechanisms in the law to protect civil liberties.

Visit link:

The FISA Oversight Hearing Confirmed That Things Need to Change - EFF

Posted in NSA

Snowden’s Former NSA Boss, Steven Bay, Headlines IEEE Computer Society’s Cybersecurity Awareness Campaign with Talk on "Edward Snowden: The…

IEEE Computer Society's cybersecurity awareness activities include the following:

Webinar: October 23 at 11:00am PDTEdward Snowden: The Ultimate Insider Threat - Steven Bay, Security On-Demand"Strict data control systems could have stopped Snowden," explains Bay. "My missing employee, Edward Snowden, revealed himself to be the person behind the Top Secret NSA leaks that rocked the country in the proceeding days." In this presentation you will hear the inside story of the Snowden affair from his former boss and the lessons we learn from it. You will develop a better understanding of who insiders are, why they do what they do, and strategies you can deploy to better protect yourself from them. Secure your spot today.

Podcasts: Software Engineering Radio (SE Radio): The Podcast for Professional Software Developers

October 8:Securing Your APINeil Madden, author of theAPI Security in Actionbook and Security Director of ForgeRock, discusses the key technical features of securing an API.

October 22: Zero-Trust NetworksEvan Gilman and Doug Barth, authors of Zero-Trust Networks: building secure systems in untrusted networks discuss zero-trust networks.

"Our October Cybersecurity campaign is an extension of our long-standing dedication to the promotion and education of cybersecurity awareness and proactive efforts" said Melissa Russell, IEEE Computer Society's Executive Director. "Our related publications such as IEEESecurity and Privacy, as well as our technical conferences that include IEEE Symposium on Security and Privacy, and International Symposium on Hardware Oriented Security and Trust (HOST), are integral parts of the Computer Society's continuing commitment to sharing important security research and developments to our members and the computing community."

Held every October, National Cybersecurity Awareness Month (NCSAM) is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity and to ensure that all Americans have the resources they need to be safer and more secure online.

Register for the webinar, sign up for tips, and access all cybersecurity awareness information at IEEE Computer Society's Cybersecurity Awareness Campaign.

About IEEE Computer Society

The IEEE Computer Society is the world's home for computer science, engineering, and technology.A global leader in providing access to computer science research, analysis, and information, the IEEE Computer Society offers a comprehensive array of unmatched products, services, and opportunities for individuals at all stages of their professional career. Known as the premier organization that empowers the people who drive technology, its unparalleled resources include membership, international conferences, peer-reviewed publications,a unique digital library, standards, and training programs. Visitwww.computer.orgfor more information.

SOURCE IEEE Computer Society

http://www.computer.org

More here:

Snowden's Former NSA Boss, Steven Bay, Headlines IEEE Computer Society's Cybersecurity Awareness Campaign with Talk on "Edward Snowden: The...

Posted in NSA

Edward Snowden Weighs the Option of asylum in Germany – Modern Tokyo Times

Edward Snowden Weighs the Option of asylum in Germany

Horace C. White

Modern Tokyo Times

American whistleblower Edward Snowden has once again declared his interest to accept a political asylum offer from the German authorities. He, however, warned that if he mysteriously passes away, his death is nowhere a case of suicide. In an exclusive interview, the former US National Security Agency (NSA) contractor, nevertheless, doubted the possibility of Germany granting him such an offer, noting that the United States would perceive it as a breach of bilateral ties. Speaking with Germanys Die Welt newspaper, Snowden, 36, raked the German and French authorities for their seemingly lackadaisical disposition toward his ordeal.

Snowden sheds more light

Apparently disappointed at the turnout of his whistleblowing saga, the computer guru reinstated that the information he revealed didnt jeopardize peoples lives, wondering why he was subjected to such cruel treatment. Before now, the controversial whistleblower had unsuccessfully sought asylum in a number of countries, including Germany. Ever since Snowden leaked some documents belonging to the NSA, he has been in political exile in Russia.

The former NSA contractor also granted another exclusive interview to The Guardian to commemorate the publication of his memoir, Permanent Record. Speaking to The Guardian, Snowden argued that the world had become better today thanks to his revelations. He stated that his disclosure would have had disastrous consequences, if he had not had the guts to spill the beans, adding that the world has become safer and freer, as a result of his whistleblowing debut.

Background Information

Snowdens travails are no longer new to most ardent followers of cybersecurity news. For the benefit of those who dont know one of the worlds most popular whistleblower, Snowden is an American computer security consultant who came to the media spotlight in 2013 when he divulged highly classified information belonging to the American secret agency, NSA. Much as the whistleblower said that he did it for the right reason, the NSA declared him an enemy of the state for exposing its top-secret documents.

More Details

Ever since he divulged the information, Snowden has become one of the most wanted people in the United States. Hence, Snowden faces jail time in the U.S. because the Department of Justice (DoJ) has already slammed two count charges on him for violating the Espionage Act of 1917. The computer nerd, who would rarely discuss his private life, in 2017 got married to Lindsay Mills, a lady he describes as the love of my life. The wedding, which took place in Moscow, was top-secret. The NSA hired Snowden given that he had stints at the CIA. However, he would abandon his job at the NSA to fly to Hong Kong, where he divulged the content of important documents.

Content of the classified files

The content of the confidential documents described how the U.S. government is increasingly expanding its information-gathering capabilities around the world. During the interview, Snowden told The Guardian that the U.S. authorities are secretly collaborating with tech giants in order to build a robust database that will maintain the dossier on every human being living on planet Earth in likeness to Chinas SkyNet system.

Modern Tokyo News is part of the Modern Tokyo Times group

DONATIONS to SUPPORT MODERN TOKYO TIMES please pay PayPal and DONATE to sawakoart@gmail.com

http://moderntokyotimes.com Modern Tokyo Times International News and Japan News

https://www.pinterest.co.uk/moderntokyotimes/ Modern Tokyo Times is now on PINTEREST

http://sawakoart.com Sawako Utsumi personal website and Modern Tokyo Times artist

https://moderntokyonews.com Modern Tokyo News Tokyo News and International News

PLEASE JOIN ON TWITTER

https://twitter.com/MTT_News Modern Tokyo Times

PLEASE JOIN ON FACEBOOK

https://www.facebook.com/moderntokyotimes

Please follow and like us:

Here is the original post:

Edward Snowden Weighs the Option of asylum in Germany - Modern Tokyo Times

Posted in NSA

NSA | Define NSA at AcronymFinder

NSANational Security Agency (US government)NSANational Speakers AssociationNSANo Strings AttachedNSANaval Support ActivityNSANaczelny Sad Administracyjny (Polish: Supreme Administrative Court)NSANetwork Security Appliance (Sonicwall)NSANotary Signing AgentNSANational Security AdvisorNSANot Seasonally AdjustedNSANational Security ArchiveNSANon-Stand Alone (5G solution)NSANational Security ActNSANon-Standard Auto (insurance)NSANational Society of AccountantsNSANational Sheriffs' Association (Alexandria, VA, USA)NSANetwork Systems Administrator (various organizations)NSANational Security AffairsNSANational Snow Analyses (US NOAA)NSANational Sports Academy (various locations)NSANetwork Security AdministratorNSANetwork Storage Appliance (computing)NSANo Sugar AddedNSANational Space AgencyNSANational Stuttering AssociationNSANational Supervisory Authority (EU)NSANational Stroke AssociationNSANetwork Spinal AnalysisNSANational Spiritual Assembly (Institution of the Baha'i Faith)NSANational Survey of AdolescentsNSANorwegian Shipowners AssociationNSANorth Slope of AlaskaNSANational Sheep Association (Malvern, Worcestershire, UK)NSANew Small Airplane (Boeing)NSANational Safety AssociatesNSANational Scrabble AssociationNSANon-State Actor (international relations)NSANippon Surfing Association (Japan)NSANational Student AssociationNSANorth Star AcademyNSANeed Special AssistanceNSANational Smokejumper AssociationNSANew Saint Andrews College (Moscow, Idaho)NSANational Sunflower AssociationNSANetwork Security AgreementNSANew Student Ambassadors (various schools)NSANational Stone Association (Washington, DC)NSANative Speakers of ArabicNSANational Stereoscopic AssociationNSANegative Security AssurancesNSANational Steeplechase AssociationNSANational Sound ArchiveNSANational Security AreaNSANATO Standardization AgencyNSANational Smokers AllianceNSANebraska Statewide ArboretumNSANon Standard Ammunition (munitions)NSANational Statistical Authorities (EU)NSANordic Securities Association (est. 2008)NSANegotiated Service Agreement (US postal service)NSANational Security Agents (gaming clan)NSANo Secrets AssociationNSANon-Standard AnalysisNSANew Settlement Apartments (New York, NY)NSANeil Stewart Associates (UK)NSANational Seniors Australia (est. 1976)NSANuclear Science AbstractsNSANormalized Site AttenuationNSANashville School of the Arts (Tennessee)NSANational Storytelling AssociationNSANatural Systems AgricultureNSANetwork Simplex AlgorithmNSANational Slag Association (Alexandria, VA)NSANon-Self-AlignedNSANorthern Study AreaNSANavy Support ActivityNSANational Skateboard AssociationNSANoise Sensitive AreaNSANikkei Stock AverageNSANational Shipping AuthorityNSANational School of Administration (China)NSANon-surgical Sperm AspirationNSANunavut Settlement AreaNSANew Statistical Account (Reports on the conditions of Scotland, with reports on each parish, in the 1830s)NSANouvelle Substance Active (French: New Active Substance; Canada)NSANational Supers Agency (fictional from the movie The Incredibles)NSANational Safety AssociationNSANational Security Anarchists (hacker group)NSANational Sprint Association (UK)NSANatuurwetenschappelijke Studievereniging Amsterdam (University of Amsterdam Physics Department student organization)NSANebraska Soybean AssociationNSANational Scrapbooking AssociationNSANaperville Soccer AssociationNSANippon Software Industry Association (Japan)NSANo Smoking AreaNSANetwork Supported Account (Cisco)NSANever Standing AloneNSANippon Steel AustraliaNSANational Softball Association, Inc.NSANorcross Soccer Association (Georgia)NSANaval Supervising ActivityNSANational Singles Association (Atlanta, Georgia)NSANavy Stock AccountNSANight Stalker AssociationNSANational Success AssociationNSANational Shuffleboard AssociationNSANational Software AllianceNSANo Significant Abnormalities (disease assessment)NSANorthern Slope of AlaskaNSANational Service Alliance, LLCNSANon Semi Auto (concealed handgun license; Texas)NSANon Standard Area (of a database)NSANantucket Shellfish Association (Nantucket, MA)NSANational Scout AssociationNSANational Standard ApplicationNSANarrow-Slot ApproximationNSANational Sentinel AuditNSANet Sales AreaNSANode Switching AssemblyNSANikkei Student AssociationNSANetwork Search AlgorithmNSANuclear Support AgencyNSANaval Systems AnalysisNSANet Sellable Area (real estate)NSANational Sex AuthorityNSANetwork South Australia (Adelaide, Australia)NSANeutron Source AssemblyNSANichiren Shosu of AmericaNSANippon Supporters Association (Japan)NSANorwegian Security ActNSANet Server AssistantNSANabelschnurarterie (German: Umbilical Cord Artery)NSANarrow Slot ApertureNSANikkei Siam Aluminium Limited (Pathumtani, Thailand)

Read more from the original source:

NSA | Define NSA at AcronymFinder

Posted in NSA

NSA Spying | Electronic Frontier Foundation

The US government, with assistance from major telecommunications carriers including AT&T, has engaged in massive, illegal dragnet surveillance of the domestic communications and communications records of millions of ordinary Americans since at least 2001. Since this was first reported on by the press and discovered by the public in late 2005, EFF has been at the forefront of the effort to stop it and bring government surveillance programs back within the law and the Constitution.

History of NSA Spying Information since 2005 (See EFFs full timeline of events here)

News reports in December 2005 first revealed that the National Security Agency (NSA) has been intercepting Americans phone calls and Internet communications. Those news reports, combined with a USA Today story in May 2006 and the statements of several members of Congress, revealed that the NSA is also receiving wholesale copies of American's telephone and other communications records. All of these surveillance activities are in violation of the privacy safeguards established by Congress and the US Constitution.

In early 2006, EFF obtained whistleblower evidence (.pdf) from former AT&T technician Mark Klein showing that AT&T is cooperating with the illegal surveillance. The undisputed documents show that AT&T installed a fiberoptic splitter at its facility at 611 Folsom Street in San Francisco that makes copies of all emails web browsing and other Internet traffic to and from AT&T customers and provides those copies to the NSA. This copying includes both domestic and international Internet activities of AT&T customers. As one expert observed, this isnt a wiretap, its a country-tap.

Secret government documents, published by the media in 2013, confirm the NSA obtains full copies of everything that is carried along major domestic fiber optic cable networks. In June 2013, the media, led by the Guardian and Washington Post started publishing a series of articles, along with full government documents, that have confirmed much of what was reported in 2005 and 2006 and then some. The reports showed-and the government later admittedthat the government is mass collecting phone metadata of all US customers under the guise of the Patriot Act. Moreover, the media reports confirm that the government is collecting and analyzing the content of communications of foreigners talking to persons inside the United States, as well as collecting much more, without a probable cause warrant. Finally, the media reports confirm the upstream collection off of the fiberoptic cables that Mr. Klein first revealed in 2006. (See EFFs How It Works page here for more)

EFF Fights Back in the Courts

EFF is fighting these illegal activities in the courts. Currently, EFF is representing victims of the illegal surveillance program in Jewel v. NSA,a lawsuit filed in September 2008 seeking to stop the warrantless wiretapping and hold the government and government officials behind the program accountable. In July 2013, a federal judge ruled that the government could not rely on the controversial "state secrets" privilege to block our challenge to the constitutionality of the program. On February 10, 2015, however, the court granted summary judgment to the government on the Plaintiffs allegations of Fourth Amendment violations based on the NSAs copying of Internet traffic from the Internet backbone. The court ruled that the publicly available information did not paint a complete picture of how the NSA collects Internet traffic, so the court could not rule on the program without looking at information that could constitute state secrets. The court did not rule that the NSAs activities are legal, nor did it rule on the other claims in Jewel, and the case will go forward on those claims.This case is being heard in conjunction with Shubert v. Obama, which raises similar claims.

In July, 2013, EFF filed another lawsuit, First Unitarian v. NSA, based on the recently published FISA court order demanding Verizon turn over all customer phone records including who is talking to whom, when and for how longto the NSA. This so-called metadata, especially when collected in bulk and aggregated, allows the government to track the associations of various political and religious organizations. The Director of National Intelligence has since confirmed that the collection of Verizon call records is part of a broader program.

In addition to making the same arguments we made in Jewel, we argue in First Unitarian that this type of collection violates the First Amendment right to association. Previously, in Hepting v. AT&T,EFF filed the first case against a cooperating telecom for violating its customers' privacy. After Congress expressly intervened and passed the FISA Amendments Act to allow the Executive to require dismissal of the case,Hepting was ultimately dismissed by the US Supreme Court.

In September of 2014, EFF, along with the American Civil Liberties Union (ACLU) and the American Civil Liberties Union of Idaho, joined the legal team for Anna Smith, an Idaho emergency neonatal nurse, in her challenge of the government's bulk collection of the telephone records of millions of innocent Americans. In Smith v. Obama, we are arguing the program violated her Fourth Amendment rights by collecting a wealth of detail about her familial, political, professional, religious and intimate associations. In particular, we focus on challenging the applicability of the so-called third party doctrine, the idea that people have no expectation of privacy in information they entrust to others.

First Unitarian v. NSA: EFFs case challenging the NSAs phone metadata surveillance

Jewel v. NSA: EFFs case challenging the NSAs dragnet surveillance

Hepting v. AT&T: EFFs case that challenged AT&Ts complicity in illegal NSA spying

Smith v. Obama: EFF's appeal with the ACLU of an Idaho nurse's challenge to the NSA's phone metadata surveillance.

More here:

NSA Spying | Electronic Frontier Foundation

Posted in NSA

Its Time to End the NSAs Metadata Collection Program | WIRED

If it aint broke, dont fix it, the adage goes. But for the sunset of Patriot Act authorities later this yearincluding Section 215, a controversial provision that allows the National Security Agency to collect records, including those about Americans phone callsthe more applicable phrase may be If it keeps breaking, throw it out.

Jake Laperruque is senior counsel for the Constitution Project at the Project on Government Oversight.

In 2015, Congress passed the USA Freedom Act to reform Section 215 and prohibit the nationwide bulk collection of communications metadata, like who we make calls to and receive them from, when, and the call duration. The provision was replaced with a significantly slimmed-down call detail record program, known as CDR. Rather than gathering information in bulk, CDR collects communications metadata of specific surveillance targets and individuals with one or two degrees of separation (called two hops) from targets. But this newer system appears to be no more effective than its predecessor and is highly damaging to constitutional rights. Given this combination, its time for Congress to pull the plug and end the authority for the CDR program.

Its unsurprising that just last week a bipartisan group in Congress introduced a bill to do so. Last month, The New York Times reported that a highly placed congressional staffer had stated that the CDR program has been out of operation for months, and several days later, NSA director Paul Nakasone issued comments responding to questions about the Times story by saying the NSA was deliberating the future of the program. If accurate, this news is major but not shocking; this large-scale collection program has been fraught with problems. Last year, the NSA announced that technical problems had caused it to collect information it wasnt legally authorized to, and that in response, the agency had voluntarily deleted all the call detail records it had previously acquired through the CDR programwithout even waiting for a court order or trying to save some of the dataindicating that the system was unwieldy and the data being collected was not important to the agency.

Since its inception, we have not seen a single publicized instance of the program providing any unique security valueand in fact, the program has damaged privacy significantly. In its most recent transparency report, the NSA announced that it collected a staggering 534,396,285 call detail records during the 2017 calendar year; the agency said that number includes duplicates, but it provided no information on how significant the duplication issue is. Without knowing that or the average number of CDRs per person, its hard to say how many Americans this affects. The NSA claims it is unable to determine thisdespite statutory requirement to do so and publicly disclose itbut the number is certainly enormous. Our communications metadata can be highly sensitive and can reveal intimate details of our lives. Americans should not be subject to this type of surveillance absent suspicion, particularly if the program conducting it has not yielded any demonstrated value in preventing or investigating terrorism.

When the issues are taken togethersevere costs to privacy, no evidence of security value, technical flaws, the NSAs willingness to broadly discard data it has collected, and a recent media report that the program has been shut downthey indicate that we are better off without this program.

But its important that Congress does more than just end the CDR program. Many in the privacy and civil liberties community worry that if the Section 215 metadata collection authority is no longer in use, the CDR program could still be active but justified with a different legal provision, and out of the publics view. The public can only have confidence that congressional reforms are effective and not a meaningless game of whack-a-mole if lawmakers and the Privacy and Civil Liberties Oversight Board conduct rigorous oversight to find out whether such a shift happened with the CDR program. And if Congress does end the program, it should build in legal restrictions to ensure that the program cannot be restarted under a different authority.

The problems with the CDR program seem to be a continuation of the governments misplaced faith in the nationwide bulk collection program that the CDR program replaced. After the governments vehement defense of the need for bulk collection, the Presidents Review Group on Surveillance, the Privacy and Civil Liberties Oversight Board, and eventually even the intelligence communitys top-ranking official stated that it had not provided unique value and was not necessary to fulfill counterterrorism goals.

As the December sunset approaches for several Patrior Act authorities, including Section 215, it is clear that the failed experiment of large-scale metadata collection needs to end. Prohibiting nationwide bulk collection received strong bipartisan support in 2015 during the USA Freedom Act debate. In the House, 196 Republicans and 142 Democrats voted for the billand most of those who voted against it did so because they felt the bills reforms did not go far enoughwhile over two-thirds of US senators also supported the bill. Further limiting mass surveillance of communications metadata is likely to receive bipartisan support again, especially given the lack of evidence that it aids security.

Congress should also go beyond ending the CDR authority to take on additional critical reforms. In the wake of the Snowden disclosures, public faith in the intelligence community and the Foreign Intelligence Surveillance Court that rules on data-collection efforts under Section 215 has degraded. And more recent inaccurate and unsubstantiated criticisms of these entities have harmed trust further. The USA Freedom Act took important steps toward restoring that faith by requiring that significant FISA court opinions be declassified, and creating a special advocate to represent privacy concerns in the courts proceedings. But these provisions should be strengthened. For years, the Constitution Project has advocated for creating a more robust special advocate; strengthening provisions for FISA court declassifications would be a critical change as well.

Congress should also consider a range of other reforms during this years Patrior Act debate, relating to minimizing data retention of non-targets, civil rights, and transparency. But the first problem to address, and the one with the clearest solution, is authority for the CDR. Its long past time to pull the plug.

WIRED Opinion publishes pieces written by outside contributors and represents a wide range of viewpoints. Read more opinions here. Submit an op-ed atopinion@wired.com

View post:

Its Time to End the NSAs Metadata Collection Program | WIRED

Posted in NSA

Director of the National Security Agency – Wikipedia

The Director of the National Security Agency (DIRNSA) is the highest-ranking official of the National Security Agency, which is a Defense Agency within the U.S. Department of Defense. The Director of the NSA also concurrently serves as Chief of the Central Security Service (CHCSS) and as Commander of U.S. Cyber Command (USCYBERCOM). As DIRNSA/CHCSS the officeholder reports through the Under Secretary of Defense for Intelligence, and as CDRUSCYBERCOM, to the Secretary of Defense.

According to 10 U.S.C.201 of the United States Code, the Director of the NSA is recommended by the Secretary of Defense and nominated for appointment by the President. The nominee must be confirmed via majority vote by the Senate. In accordance with Department of Defense Directive 5100.20, dated 23 December 1971, the Director of the NSA must always be a commissioned officer of the military services. Because the assignment is currently part of a tri-hatted position, the Director of the NSA is appointed to the grade of a four-star general or admiral during the period of his incumbency. The Deputy Director is always a technically experienced civilian.[1]

The Armed Forces Security Agency was the predecessor to the National Security Agency and existed from 1949 to 1952.

Original post:

Director of the National Security Agency - Wikipedia

Posted in NSA

National Storage Affiliates Trust (NSA) – Yahoo Finance

Markityesterday

National Storage Affiliates Trust NYSE:NSAView full report here! Summary * ETFs holding this stock are seeing positive inflows * Bearish sentiment is low * Economic output in this company's sector is expanding Bearish sentimentShort interest | PositiveShort interest is low for NSA with fewer than 5% of shares on loan. The last change in the short interest score occurred more than 1 month ago and implies that there has been little change in sentiment among investors who seek to profit from falling equity prices. Money flowETF/Index ownership | PositiveETF activity is positive. Over the last month, ETFs holding NSA are favorable, with net inflows of $2.47 billion. Additionally, the rate of inflows is increasing. Economic sentimentPMI by IHS Markit | PositiveAccording to the latest IHS Markit Purchasing Managers' Index (PMI) data, output in the Financials sector is rising. The rate of growth is strong relative to the trend shown over the past year. Credit worthinessCredit default swapCDS data is not available for this security.Please send all inquiries related to the report to score@ihsmarkit.com.Charts and report PDFs will only be available for 30 days after publishing.This document has been produced for information purposes only and is not to be relied upon or as construed as investment advice. To the fullest extent permitted by law, IHS Markit disclaims any responsibility or liability, whether in contract, tort (including, without limitation, negligence), equity or otherwise, for any loss or damage arising from any reliance on or the use of this material in any way. Please view the full legal disclaimer and methodology information on pages 2-3 of the full report.

See the rest here:

National Storage Affiliates Trust (NSA) - Yahoo Finance

Posted in NSA

NSA New York City Chapter

Striving for excellence is an important part of any industry, any business and any career. It requires putting quality into everything we do, molding new ideas and putting them into action, stepping out of our comfort zones and being committed to hard work and dedication. A commitment to excellence separates high achievers, who make rapid strides in their career and businesses from others. Same is true for our industry. No matter if you reach your audiences as a keynoter, trainer, humorist, facilitator, consultant, coach, podcaster, author or virtual instructor, if you strive for excellence in your business NSA NYC is THE place to be.

We are one of the largest independently run chapters of the National Speakers Association in the US, dedicated to serving every expert who uses the spoken word to present to an audience, in person or virtually. The members of our community, reaching from Hall of Fame Speakers to Certified Speaking Professionals and from advanced to aspiring speakers, are all committed to transform, educate, engage and elevate our association, our industry and our profession.

This is an invitation to you to join this community, to stop by at one of our events, to learn from some of the best speakers, to gain insights of the speaking profession, to identify opportunities to grow your business, to find your own voice, to leave a mark, to share your expertise with us and to aim for higher levels of excellence for your business. Because excellence can only be achieved if you care more, risk more, learn more, grow more, expect more and provide more. There is no shortcut to excellence.

Welcome to a year of excellence at NSA NYC!

Read the original here:

NSA New York City Chapter

Posted in NSA

NSA California

DateLocationTournament NameDirectorFeb 9-10MercedMerced Valentine's WarmupStan HansenFeb 16-17TracyTracy Spring ClashStan HansenFeb 23-24BakersfieldBakersfield Early Bird SpecialStan HansenFeb 23-24MercedThe Merced KickoffStan HansenMar 2-3HanfordHanford Spring Blast TournamentStan HansenMar 9-10TurlockTurlock's Spring ForwardStan HansenMar 9-10LancasterSwing into SpringStan HansenMar 16-17Santa MariaSanta Maria Spring OpenerStan HansenMar 16-17MercedNo Mercy in MercedStan HansenMar 16-17Elk GroveBaden Spring Fever ClassicAndy PearsonMar 23-24HanfordHanford No Foolin'Stan HansenMar 30-31ModestoModesto's Spring Play DayStan HansenMar 30-31PalmdaleBest of the WestStan HansenApr 6-7FresnoFresno Softball FrenzyStan HansenApr 6-7Elk GroveElk Grove's SmashAndy PearsonApr 13-14MantecaManteca 12 ClassicStan HansenApr 13-14TracyTracy Spring ClassicStan HansenApr 13-14TulareTulare Young at HeartsStan HansenApr 20MercedThe Easter FriendlyStan HansenApr 27-28TurlockTurlock Spring Classic Fastpitch TournamentStan HansenApr 27-28BakersfieldBakersfield Fastpitch FeverStan HansenMay 4-5MantecaManteca Mother's Day TournamentStan HansenMay 4-5FresnoFresno May MayhemStan HansenMay 11MercedThe Mother's Day FriendlyStan HansenMay 18-19LancasterNSA's Return to LancasterStan HansenMay 18-19TurlockTurlock's Forget School FinalsStan HansenMay 18-19Yuba CityCystic Fibrosis Benefit TournamentAndy PearsonMay 25-26HanfordHanford Out of School BlowoutStan HansenMay 25-26SonoraMemorial Day ClassicLani ConklinJun 1-2TulareTulare Summer RoundupStan HansenJun 1-2MercedThe Merced Fastpitch ChallengeStan HansenJun 1-2Elk GroveKick off the SummerAndy PearsonJun 8-9BakersfieldSweat it out in BakersfieldStan HansenJun 8-9ModestoRainbow Fields 10 ClassicStan HansenJun 8-9Elk GroveTouch 'em all in Elk GroveStan HansenJun 8-9MercedNSA's League All-Star TournamentStan HansenJun 8-9Sparks, NVSierra ShootoutAndy PearsonJun 15-16PalmdalePalmdale SlugfestStan HansenJun 15-16TurlockEaston Fathers Day Classic XIStan HansenJun 22-23TulareTulare Summer SlamStan HansenJun 29-30FresnoGet Ready for State!Stan HansenJul 6-7ModestoNSA Northern California State ChampionshipStan HansenJul 13-14SonoraMountain BlastLani ConklinJul 13-14PalmdaleNSA Southern California State ChampionshipStan HansenJul 20-21Elk GroveElk Grove's World Series WarmupStan HansenJul 20-21MercedThe 18 ClassicStan HansenJul 20-21FresnoThe Fresno InvitationalStan HansenJul 24-28Modesto and Surrounding CitiesNSA Pacific Coast World SeriesStan HansenAug 3-4ModestoModesto's Back to School BashStan HansenAug 10-11TurlockWounded Warrior Benefit TournamentStan HansenAug 10-11Santa Maria"Catch the Spirit" in Santa MariaStan HansenAug 17-18TulareTulare's Hot Summer DaysStan HansenAug 17-18Elk GroveEnd of Summer BashAndy PearsonAug 24-25MantecaManteca's Dog Days of SummerStan HansenAug 24-25BakersfieldKalie Boyer Memorial TournamentStan HansenAug 31-Sep 1ModestoRainbow's Labor Day TournamentStan HansenAug 31-Sep 1HanfordThe Hanford Softball QuestStan HansenSep 7-8TurlockNSA's End of Summer ShootoutStan HansenSep 7-8Yuba CityStrike Out CancerAndy PearsonSep 14-15FresnoSliding Out of SummerStan HansenSep 21-22TracyFor the Love of SoftballStan HansenSep 21-22TulareTulare Fall ShowdownStan HansenSep 28-29Elk GroveCollege ScholarshipAndy PearsonSep 28-29MercedThe 14 ClassicStan HansenSep 28-29Bakersfield"Pretty in Pink" Cancer Awareness TournamentStan HansenOct 4-5HanfordPlay for the Pride Cancer Awareness TournamentStan HansenOct 12-13BakersfieldNSA's Border Wars - California, Nevada, and ArizonaStan HansenOct 12-13ModestoThink Pink Cancer Awareness TournamentStan HansenOct 19-20Hanford/TulareGhost and Goblins BashStan HansenOct 19-20Yuba CityHalloween EventAndy PearsonOct 26-27Turlock/ModestoCentral Valley's Halloween ClassicStan HansenNov 2-3HanfordHanford Team Appreciation Scholarship EventStan HansenNov 2-3ReddingRedding Fall ClassicAndy PearsonNov 9-10ModestoFall West Pac ChampionshipStan HansenNov 16-17BakersfieldBakersfield Last Chance TournamentStan HansenNov 16-17TurlockTurlock's Thanksgiving Turkey TrotStan HansenNov 23-24ModestoModesto's End of Year BlowoutStan HansenNov 30-Dec 1MercedNSA's Holiday SpecialStan HansenDec 7MercedReindeer Games Canned Food DriveStan HansenDec 7Yuba CityToys for TotsAndy Pearson

Here is the original post:

NSA California

Posted in NSA