Donald Trump will no longer tolerate any support to militants: NSA – Economic Times

WASHINGTON: Asserting that President Donald Trump will no longer "tolerate" any support to militants, US National Security Adviser Gen H R McMaster today asked Pakistan to change its "paradoxical" policy of supporting selective terror groups.

US officials have often accused Pakistan of helping the militants, a charge Islamabad denies.

"The president has also made clear that he, that we need to see a change in- in behaviour of those in the region, which includes- those who are providing safe haven and support bases for the Taliban, Haqqani Network and others," the National Security Advisor, McMaster, was quoted by MSNBC as saying.

"This is Pakistan in particular that we want to- that we want to really see a change in and a reduction of their support for these groups," he said, in response to a question on Afghanistan and terrorism in the region.

He said that Trump is making clear that the US will no longer "tolerate" any support for the Taliban or related groups.

"Of course, you know, a very paradoxical situation, right, where Pakistan is taking great losses. They have fought very hard against these groups, but they've done so really only selectively," he said.

Pakistan's two neighbours both India and Afghanistan have accused it of being selective in its war against terrorism.

McMaster said that Trump has lifted restrictions on US armed forces in Afghanistan.

He also defended Trump's strategy on winning the war in Afghanistan by giving unrestricted powers to the US military based in the war-torn country.

"The president has said that, "He does not want to place restrictions on the military that undermine our ability to win battles in combat".

"He has lifted those restrictions, and you are beginning to see the payoff of that as well," the top US national security advisor said.

See original here:

Donald Trump will no longer tolerate any support to militants: NSA - Economic Times

Posted in NSA

Judge: Accused NSA leaker’s lawyers must watch what they say … – Atlanta Journal Constitution (blog)

The federal judge presiding over the case of accused National Security Agency leaker Reality Winner has come down on prosecutors side in a dispute over rules of evidence, which defense attorneys have said could jeopardize her right to a fair trial.

In a ruling Thursday, U.S. Magistrate Judge Brian Epps said defense attorneys cannot talk about classified information in open court, even if it has already been published in the news media. Epps granted prosecutors motion for a protective order designed to keep an alleged leaker from leaking further, and to force those defending her to tread lightly, lest they leak by accident.

Reality Leigh Winner leaves the Augusta federal courthouse after a bond hearing in June. She is charged with leaking a top-secret record to The Intercept, an online news outlet specializing in national security issues. HYOSUB SHIN / HSHIN@AJC.COM

Epps order says prosecutors only want defense attorneys to comply with the Classified Information Procedures Act, which means being hypervigilant. From his order:

Defendant fears there is great peril lurking

Defendant fears her counsel may, for example, forget information within the governments discovery is classified and inadvertently cite a published article discussing the same information. Defense counsels generalized fears of accidentally mishandling classified information is no reason for the Court to relax otherwise strict and well-settled procedures in cases involving classified information.

According to the protective order, an attorney who violates the terms could be subject to a contempt of court charge or referral for prosecution.

In arguing against the order, Winners defense team said it could prevent her from reviewing evidence in the case, including classified information. That, they said, would amount to a violation of the 25-year-old former Air Force linguists Sixth Amendment right to confer with her attorneys.

But prosecutors countered that she will be given access to the records she is entitled to see. Her attorneys just have to ask the court first.

On that point, the judge directed prosecutors to revisit the issue of whether Winner will be given access to all of the classified evidence in the case, and whether her defense attorneys must disclose the identities of any experts they hire to look at the top-secret evidence.

Winners trial is set for Oct. 23.

Winner, who lived in Augusta and worked for the National Security Agency at Fort Gordon, is accused of mailing a top-secret report to an online news outlet detailing the Russian governments attempts to hack into U.S. elections systems last year. With her arrest in June, she became the first person prosecuted for leaking by the Trump administration.

Attorney General Jeff Sessions announced Friday that the Justice Department under Trump is now pursuing three times as many leak investigations as it did under Obama, according to a report in The New York Times.

Previous

Under pressure to reconcile racist past, Wesleyan College joins slavery studygroup

See the rest here:

Judge: Accused NSA leaker's lawyers must watch what they say ... - Atlanta Journal Constitution (blog)

Posted in NSA

Success Story In Groveton:NSA Industries Poised To Surpass 100 New Jobs – Caledonian Record

GROVETON Its a success story by any measure - one of the areas largest employers establishing a satellite location in a North Country town struggling from the loss of its paper mill a decade ago and the hundreds of jobs lost with it.

kAmx? ~4E@36C a_`e[ }$p x?5FDEC:6D x?4][ E96 AC64:D:@? >249:?:?8 2?5 >6E2= 723C:42E:@? 4@>A2?J 7@F?565 😕 $E] y@9?D3FCJ 😕 `hga[ 2??@F?465 :E H:== 36 D6EE:?8 FA D9@A 2E E96 7@C>6C (2FD2F !2A6C >:== 😕 vC@G6E@?]k^Am

kAm(:E9 E92E 2??@F?46>6?E @7 2 ?6H =@42E:@? 42>6 H92E H2D 6IA64E65 E@ 36 a_ E@ b_ ?6H 9:C6D] xE H2D?E =@?8[ 9@H6G6C[ 367@C6 E96 vC@G6E@?32D65 }$p H@C<7@C46 8C6H E@ >@C6 E92? e_]k^Am

kAm%96 DE@CJ[ E9@F89[ 5@6D?E 6?5 E96C6]k^Am

kAm}$p 😀 ?@H 6>32C<:?8 @? 2? 6IA2?D:@? 2E :ED vC@G6E@? D:E6[ 2?5 H:E9 :E 4@>6D >@C6 ;@3D]k^Am

kAm(6 2C6 AC6EEJ 6I4:E65 23@FE E96 @AA@CEF?:EJ 2E E96 724:=:EJ 2?5 😕 E96 2C62[ }$p rt~ y2>6D |@C@?6J D2:5 E9:D H66<] (6 H6C6 8=25 H6 H6C6 8@:?8 E@ 9:C6 a_ A6@A=6[ 2?5 :ED 6I4:E:?8 E92E `a >@?E9D =2E6C H6== AC@323=J 36 C6249:?8 `__]k^Am

kAmuC@> c E@ f A]>] |@?52J[ 2 ;@3 72:C H:== 36 96=5 2E E96 vC@G6E@? =@42E:@?[ 2?5 E96 :?E6?E E@ 9:C6 d_ A6@A=6]k^Am

kAmpD 2 C6DF=E @7 D2=6D 677@CED[ D6G6C2= >2;@C :E6>D }$p 92D 366? H@C<:?8 @? 7@C E96 A2DE J62C 2C6 4@>:?8 E@ 7CF:E:@?[ 96 D2:5]k^Am

kAm%96 4@>A2?J :?G6DE65 23@FE Sb]d >:==:@? 😕 ?6H 6BF:A>6?E 3C@F89E 7C@> $E] y@9?D3FCJ E@ vC@G6E@? 😕 y2?F2CJ 2?5 |@C@?6J 2?E:4:A2E6D 2?@E96C Sb >:==:@? 😕 ?6H 6BF:A>6?E 7@C vC@G6E@? H:== 36 AFC492D65 H:E9:? E96 ?6IE E9C66 >@?E9D]k^Am

kAm$9:7ED 2C6 2=D@ 86EE:?8 3FDJ]k^Am

kAm(6 2C6 :?4C62D:?8 @FC D64@?5 D9:7E 2?5 A@DD:3=J =@@<:?8 2E 2 E9:C5 D9:7E[ 96 D2:5]k^Am

kAm~?6 4@F=5 D2J E96 4@>A2?J 😀 364@>:?8 2 G:4E:> @7 :ED @H? DF446DD]k^Am

kAm(6 2C6 =@@<:?8 2E E96 A@DD:3:=:EJ @7 ?665:?8 >@C6 DA246[ D2:5 |@C@?6J] (6 92G6 fb[___ DBF2C6 766E[ 3FE AC@323=J h_ 52JD 7C@> ?@H :E H:== 36 ``_ A6C46?E 7F==]k^Am

kAm%96 4@>A2?J 4FCC6?E=J @44FA:6D EH@ 6I:DE:?8 7@C>6C A2A6C >:== 3F:=5:?8D[ @?6 c_[___ DBF2C6 766E 2?5 E96 @E96C bb[___ DBF2C6 766E]k^Am

kAm{@42= 2?5 DE2E6 @77:4:2=D 9@A6 }$p H:== 36 E96 2?49@C E6?2?E E92E H:== 2EEC24E @E96C 4@>A2?:6D E@ E96 >:== D:E6]k^Am

kAm%96 4@>A2?J :?:E:2==J 3682? DEF5J:?8 2? 6IA2?D:@? :?E@ vC@G6E@? 😕 pF8FDE a_`e] xE >256 :ED 564:D:@? D9@CE=J 27E6CH2C5[ 27E6C 2 ;@3 72:C E96 7@==@H:?8 >@?E9 5C6H >@C6 E92? b__ 2C62 C6D:56?ED]k^Am

kAm%96 7@C>6C >:== AC@A6CEJ 😀 @H?65 3J q@3 r92A>2?[ @7 v@C92>[ H9@ 92D DA6?E E96 =2DE D6G6C2= J62CD 56G6=@A:?8 :E 7@C 7FEFC6 E6?2?ED]k^Am

kAm}$p 6?E6C65 :?E@ 2 7:G6J62C =62D6 H:E9 r92A>2?[ H:E9 E96 @AE:@? @7 E9C66 EH@J62C 6IE6?D:@?D]k^Am

kAm(96? (2FD2F !2A6C 4=@D65 😕 =2E6 a__f[ :E AFE 2 E@E2= @7 b_b 2C62 C6D:56?ED @FE @7 H@C<]k^Am

kAmqJ E96 6?5 @7 E96 J62C[ H:E9 E92E >2?J A6@A=6[ 2E =62DE 2 E9:C5 @7 E92E H:== 36 324< H@C<:?8 @? E96 >:== D:E6[ qC6D?292? D2:5 @7 E96 2?E:4:A2E65 }$p ?6H 9:C6D]k^Am

kAm}$p 6>A=@JD 23@FE ab_ A6@A=6 😕 $E] y@9?D3FCJ[ H96C6 :E H2D CF??:?8 FA 282:?DE DA246 4@?DEC2:?ED] {2DE J62C[ :E 3682? D66<:?8 2 =@42E:@? 7@C 6IA2?D:@?]k^Am

kAmv@:?8 7@CH2C5[ E96 4@>A2?J H:== 36 DEC:<:?8 2 32=2?46 :? vC@G6E@?[ @?6 E92E DE2CED H:E9 86?6C2E:?8 D2=6D]k^Am

kAm}$p H:== 2=D@ =@@< 2E E96 2G2:=23=6 =23@C A@@= :? E96 vC@G6E@? 2C62 2?5 9@H E92E 724E@CD :?E@ 2?J A@E6?E:2= 7FEFC6 6IA2?D:@?D :? E96 E@H?]k^Am

kAmxED 23@FE D2=6D 2?5 H96C6 H6 42? 86E E96 H@C<6CD[ D2:5 |@C@?6J]k^Am

kAm&?:BF6 7@C E96 2C62[ E96 H286D @7 }$p ;@3D[ H9:49 😕 vC@G6E@? :?4=F56 H6=56CD >249:?:DED[ >2E6C:2= 92?5=6CD[ =2D6C AF?49 @A6C2E@CD[ 2?5 D9:AA:?8 4=6C:?:>F> H286 2?5 E96 >65:2? D2=2CJ 7@C E96 r@@D r@F?EJ 2C62]k^Am

kAm(6 =:<6 E@ E9:?< E96C6 :D 8C@HE9 @AA@CEF?:EJ 7@C 2== E96 A6@A=6 96C6[ D2:5 |@C@?6J]k^Am

kAm}$pD 6IA2?D:@? 2=D@ 4@:?4:56D H:E9 E96 C646?E AFC492D6 3J |~|$ }@CE9 r@F?ECJ 2 A@H6CDA@CED 4@>A2?J E92E @A6?65 FA 2 {2?42DE6C =@42E:@? 62C=:6C E9:D J62C E@ D6== !@=2C:D D?@H>@3:=6D 2?5 ~w#'D[ AC6@H?65 >@E@C4J4=6D[ A@H6CDA@CED 2AA2C6= 2?5 2446DD@C:6D[ 492:?D2HD 2?5 @FE5@@C A@H6C E@@=D[ 2?5 7:C62C>D 2?5 2>>F?:E:@? @7 E96 7@C>6C t>6CD@? ~FE5@@C ~FE7:EE6CD 3F:=5:?8 😕 vC@G6E@? E92E 92D 366? G242?E 7@C 23@FE 92=7 2 564256]k^Am

kAm%9:D 😀 2 3:8 EFC?2C@F?5 7@C E96 E@H?[ D2:5 qC6D?292?] (6 92G6 4@>A2?:6D A2J:?8 E2I6D E@ E96 E@H? 2?5 255:?8 ?6H =:76 E@ E96 4@>>F?:EJ]k^Am

Excerpt from:

Success Story In Groveton:NSA Industries Poised To Surpass 100 New Jobs - Caledonian Record

Posted in NSA

Columbus State Awarded NSA Grant to Develop Cybersecurity Tool – Government Technology

(TNS) -- Further cementing its ambitions as a national powerhouse in cybersecurity education, Columbus State University announced Tuesday that it received a $174,000 grant from the National Security Agency to develop a new tool for rapid cybersecurity training and curriculum development.

The award makes CSU one of the top universities in the nation in providing technologies for cybersecurity workforce development to universities, government and private sector across the nation, said Shuangbao Wang, a professor in CSUs TSYS School of Computer Science in a press release.

The tool will be internet-based, allowing it to be accessed anywhere in the world. Wang expects it will eventually be used by global Department of Defense installations and other private and public organizations.

A key part of the tool will be the use of visual mapping, a technology developed by researchers at the university to assist in military decision making.

We are building a tool that people across the nation can use to develop cybersecurity training, which guarantees compliance with government and industry standards for cybersecurity workforce development, said Wang.

The grant is the latest in a string of awards the university has received for developing cybersecurity programs. Earlier this month, CSU announced that it had partnered with the Muscogee County School District to develop a yearlong cybersecurity course at Rothschild Leadership Academy with the help of a $50,000 grant from the NSA.

The university also hosted a weeklong cybersecurity summer camp in June with another NSA grant, this one for $28,000.

The investments may well pay off, with worldwide spending on cybersecurity estimated to reach more than $100 billion by 2020, according to research by the International Data Corporation. That spending is butting against an expected shortage of about two million jobs by 2019.

National cybersecurity workforce development is one of the key areas of this action plan, Wang said. Upon completion, universities, government, and private sector across the nation can use the tool to quickly develop training and curriculum that otherwise would not be possible due to lack of experts, knowledge and skills.

2017 the Columbus Ledger-Enquirer (Columbus, Ga.) Distributed by Tribune Content Agency, LLC.

Follow this link:

Columbus State Awarded NSA Grant to Develop Cybersecurity Tool - Government Technology

Posted in NSA

The Curious Case Of Ex-NSA Inspector General George Ellard – Cato Institute (blog)

On August 3, The American Conservative ran a lengthy piece of mine dealing with the whistleblower protection nightmare that is the Department of Defense. One of the subjects of that piece is now former NSA IG George Ellard, and because I had even more on his case than I could fit into the TAC piece, I wanted to share the rest of what I knowand dont knowabout the allegations against Ellard, the final disposition of the case, why the Obama administrations whistleblower retaliation fix is itself broken, and what might be done to actually provide meaningful protections for would-be national security whistleblowers in the Pentagon and elsewhere in the national security establishment.

Regarding what little we know about the specifics of Ellards case, I had this to say in the TAC piece:

As the Project on Government Oversight firstreportedin December 2016, a three-member interagency Inspector General External Review Panel concluded in May 2016 that the then-Inspector General of the National Security Agency (NSA), George Ellard, had, according to POGO, himself had previously retaliated against an NSA whistleblower[.] This apparently occurred during the very same period that Ellard hadclaimedthatSnowden could have come to me. The panel that reviewed Ellards case recommended he be fired, a decision affirmed by NSA Director Mike Rogers.

But there was a catch: the Secretary of Defense had the final word on Ellards fate. Outgoing Obama administration Defense Secretary Ash Carter, apparently indifferent to the magnitude of the Ellard case, left office without making a decision.

In the months after Donald Trump became president, rumors swirled inside Washington that Ellard had, in fact, escaped termination. One source, who requested anonymity, reported that Ellard had been seen recently on the NSA campus at Ft. Meade, Maryland. That report, it turns out, was accurate.

On July 21, in response to the authors inquiry, the Pentagon public affairs office provided the following statement:

NSA followed the appropriate procedures following a whistleblower retaliation claim against former NSA Inspector General George Ellard. Following thorough adjudication procedures, Mr. Ellard continues to be employed by NSA.

After Id finished the TAC piece, Ellards attorney, Terrence ODonnell of the Washington mega law firm of Williams & Connolly, sent me the following statement about his client, George Ellard:

The Office of the Assistant Secretary of Defense (ASD) examined and rejected an allegation that former NSA Inspector General, George Ellard, had retaliated against an NSA employee by not selecting that employee to fill a vacancy in the OIGs Office of Investigations.

In a lengthy, detailed, and well-reasoned memorandum, the ASD concluded that Dr. Ellard had not played a role in that personnel decision or, in the terms of the applicable laws and regulations the ASD cited, Dr. Ellard did not take, fail to take, or threaten to take or fail to take any action associated with the personnel decision.

This judgment echoes the conclusion reached by the Department of Defenses Office of the Inspector General. An External Review Panel (ERP) later came to the opposite conclusion, leading to the ASD review. The ASD concluded that the evidence cited in the ERP report as reflective of [Dr. Ellards] alleged retaliatory animus toward Complainant is of a character so circumstantial and speculative that it lacks probity.

In assessing Dr. Ellards credibility and in rendering its decision, the ASD also considered Dr. Ellards distinguished career of public service, spanning more than 21 years of service across the executive, legislative, and judicial branches, culminating in almost 10 years of service as the NSA IG. Dr. Ellard, the ASD noted, has been entrusted to address some of our nations most challenging national security issues; successive NSA Directors have consistently rated Dr. Ellards performance as Exceptional Results and Outstanding; and he has been commended by well-respected senior officials with whom [he has] worked closely over the years for [his] ability and integrity.

Dr. Ellard is serving as the NSA Chair on the faculty of the National War College, a position he held prior to the ERP review.

Quite a bit to unpack in that statement. Lets start with the ASDs decision to overrule the External Review Panel (ERP), a key component of the Obama-era PPD-19, the directive designed to prevent in all government departments or agencies the very kind of thing Ellard allegedly did. Here are the key paragraphs of PPD-19 with respect to ERP recommendations:

If the External Review Panel determines that the individual was the subject of a Personnel Action prohibited by Section A while an employee of a Covered Agency or an action affecting his or her Eligibility for Access to Classified Information prohibited by Section B, the panel may recommend that the agency head take corrective action to return the employee, as nearly aspracticable and reasonable, to the position such employee would have held had the reprisal not occurred and that the agency head reconsider the employees Eligibility for Access to Classified Information consistent with the national security and with Executive Order 12968. (emphasis added)

An agency head shall carefully consider the recommendation of the External Review Panel pursuant to the above paragraph and within 90 days, inform the panel and the DNI of what action he or she has taken. If the head of any agency fails to so inform the DNI, the DNI shall notify the President. (emphasis added)

Taking the ERPs recommendations is strictly optional.

Whats so significant about the ERP recommendation in Ellards case was that the ERP not only apparently believed that the whistleblower in question should be given a fair chance at getting the position he or she originally applied for within the IG itself, but that Ellards actions werein the view of three non-DoD IGs who examined the caseso severe that they recommended he be terminated.

ODonnell quoted from a Pentagon memo clearing Ellard that is not public. The ERPs findings, along with their record of investigation, are not public. Nor do we know how thoroughor cursorythe ASDs review of the Ellard case was prior to the decision to clear Ellard. Given all of that, who are we to believe?

There are some key facts we do know that lead me to believe that the ERPs recommendations were not only likely soundly based, but that the whistleblower retaliation problem inside the Pentagon is deeply entrenched.

ODonnells statement also claimed that the ASDs decision to reverse the ERP and clear Ellard of wrongdoing echoes the conclusion reached by the Department of Defenses Office of the Inspector General. But its the DoD IG itself, as an institution, that is also under a major cloud because of other whistleblower retaliation claims coming from former NSA or DoD IG employeesspecifically former NSA senior executive service member Thomas Drake and for DoD Assistant Inspector General John Crane. As Ive noted previously, the independent Office of Special Counsel found adequate evidence of whistleblower retaliation and document destruction to refer the matter to the Justice Departments own IG; Cranes case is getting a look from the Government Accountability Office (GAO), Congresss own executive branch watchdog.

The DoD and NSA IGs have clear conflicts of interest when employees from within their own ranks are implicated in potential criminal wrongdoing. PPD-19 was supposed to be the answer to such conflicts of interest, but its lack of teeth from an enforcement standpoint renders it a badly flawed remedy for an extremely serious integrity problem.

And what about Congress? PPD-19 speaks to that as well:

On an annual basis, the Inspector General of the Intelligence Community shall report the determinations and recommendations and department and agency head responses to the DNI and, as appropriate, to the relevant congressional committees.

But Congress doesnt need to wait for the IC IG to tell it what is already publicly known about the Ellard, Drake, and Crane cases. It has ample cause to not only investigate these cases, but to take action to replace PPD-19 with a whistleblower protection system that actually protects those reporting waste, fraud, abuse, or criminal conduct and punishes those who attempt to block such reporting. Two options that deserve consideration are 1) empowering OSC to examine these kinds of cases and issue unreviewable summary judgments itself or 2) revive the expired Independent Counsel statute, rewritten with a focus on whistleblower reprisal case investigations.

One thing is beyond dispute. The PPD-19 process is not the answer for protecting whistleblower and punishing those who retaliate against them. We need a credible system that will do both. The only question now is whether anybody in the House or Senate will step up to the task of building a new one.

Excerpt from:

The Curious Case Of Ex-NSA Inspector General George Ellard - Cato Institute (blog)

Posted in NSA

Judge sides with prosecution in Reality Winner NSA leak case | The … – The Augusta Chronicle

A federal judge has sided with prosecutors in the case against former Fort Gordon contractor Reality Winner, finding that her defense team should be muzzled from speaking about any information deemed classified by the government, even if it has been widely reported in local, national and international media publications.

Winner has pleaded not guilty to a single count of violating a provision of the espionage act. She is accused of leaking a classified document to online media news publication, The Intercept.

That document was extensively reported on by The Intercept and numerous other news media organizations in stories on Winner, who is accused of leaking a national security document she allegedly obtained through her job with a NSA contractor on Fort Gordon.

The document is an analysis of the extent of Russias efforts to hack into state election boards. Russian meddling is the subject of U.S. Senate and House intelligence committees investigations and a special prosecutor who is looking into possible collusion between Trump supporters and the Russians during last years presidential campaign.

In his order released Thursday, Magistrate Judge Brian K. Epps wrote that determining what is classified information is a function of the executive branch of government, not the judicial branch.

Just because the defense team has expressed concern of accidentally mishandling classified information is no reason to relax the strict procedures required, Epps wrote. The defense is not prohibited in using classified information in Winners defense, but it must follow the strict procedures, he wrote.

Both sides have until Aug. 16 to weigh in on Epps proposed protective order that describes the closely guarded handling of materials in the case. A classified information security officer is in charge of ensuring such information is handled only by those on the defense team who have obtained security clearance, and only in a secured location.

The defense is to have free access to that location during regular business hours, although other times may be allotted with proper notice and consultation with the U.S. Marshals Service, according to the order.

Any notes or other papers the defense may create using classified information is not allowed outside of the security location. Any document filed with the court that contains or might contain classified information must be filed under seal. Only those portions deemed not classified by the classified information security officer will be unsealed for public review.

At the end of the case any such defense-prepared material will be destroyed by the classified information security officer. The confines of the protective order are a lifetime commitment and any violation is punishable not only by a finding of contempt but criminal prosecution.

The publication of any classified information does not change the classified status unless a member of the executive branch of government with the proper authorization declares the information to be declassified.

Winners trial is tentatively set to begin in October.

Reach Sandy Hodson at sandy.hodson@augustachronicle.com or (706) 823-3226

See original here:

Judge sides with prosecution in Reality Winner NSA leak case | The ... - The Augusta Chronicle

Posted in NSA

It Looks Like HR McMaster Is Cleaning House at the NSA – New York Magazine

Ad will collapse in seconds CLOSE August 2, 2017 08/02/2017 9:54 pm By Jen Kirby Share McMaster. Photo: Nicholas Kamm/AFP/Getty Images

H.R. McMaster, national security adviser and so-called adult in the room, is apparently gaining some ground over the nationalistic forces inside the Trump administration.

On Wednesday, the White House confirmed that the NSCs senior director of intelligence, 30-year-old Ezra Cohen-Watnick has left the NSC. McMaster had allegedly tried to get rid of Cohen-Watnick who was brought on by Flynn, and also worked on the Trump transition soon after taking the NSA job. McMaster reportedly expressed doubts about Cohen-Watnicks qualifications, but advisers Jared Kushner and Steve Bannon intervened on his behalf, and got Trump to step in and overrule McMaster.

Cohen-Watnicks ouster appears to be the latest sign that McMaster isnt done cleaning house of both Bannon and Flynn loyalists at the NSC. (And maybe its also a sign of a new order under chief-of-state John Kelly.) In addition to Cohen-Watnick, Derek Harvey, another Flynn ally and Iran hawk, was removed from his post as NSC Middle East adviser last week.

These personnel changes come amid an Atlantic report that an NSC staffer was fired last month after a troubling memo he wrote arguing that globalists, Islamists, and the deep state are working to undermine President Trumps agenda, and threatening the country.

The NSC-staffer in question is Rich Higgins, formerly director of strategic planning. Through the campaign, candidate Trump tapped into a deep vein of concern among many citizens that America is at risk and slipping away, he wrote in the memo, a portion of which The Atlantic obtained. Globalists and Islamists recognize that for their visions to succeed, America, both as an ideal and as a national and political identity, must be destroyed.

The conspiracy-laced memo reportedly also insinuates that the Russia probe is made-up to hurt Trump and accuses the left of being aligned with Islamist organizations at the local, national and international levels, and:

recognition should be given to the fact that they seamlessly interoperate through coordinated synchronized interactive narratives These attacks narratives are pervasive, full spectrum and institutionalized at all levels. They operate in social media, television, the 24-hour news cycle in all media and are entrenched at the upper levels of the bureaucracies

Higgins apparently wrote the memo in May, though warning about the Maoist insurgency being co-opted by Islamists was shockingly outside his job description. Its not clear how the memo came to the attention of NSC higher-ups or why it took so long but sources told the Atlantic that the memo had been circulating around the White House and may have landed on the presidents desk. Finally, on July 21, McMasters deputy NSA Ricky Waddell (who himself replaced Trump appointee K.T. McFarland when McMaster took the job after Michael Flynns firing) relieved Higgins from his duties.

In July, former Breitbart writer Tera Dahl also left the NSC, rounding out a string of dismissals for the Bannonesque populists. However, its unclear if some of ex-NSCers will leave the Trump orbit for good, or be reshuffled to new posts within the administration. Which means McMaster may have an edge now, but the battle against the fever swamp is far from over.

Whats New on Netflix: August 2017

Kidd Creole of Grandmaster Flash and The Furious Five Arrested for Murder

Maybe Dont Expect a Dark Tower Sequel

Dave Chappelle Unsuccessfully Tackles Trump and Trans Issues at Radio City

The Real Housewives of New York City Recap: Hook, Line, and Stinker

John Kelly Is Destined to Fail

Mitch McConnell Tricked Into Admitting He Just Wants to Cut Taxes for the Rich

Teens Explain Their Obsession With Sarahah, Summers Hottest Anonymous-Gossip App

Why Doesnt Cerseis Hair Ever Grow?

The Sinner Is a Superbly Executed Murder Mystery

After repeatedly pushing off major undertakings like tax reform and raising the debt ceiling, theyre in for a truly hellish fall.

He suggested replacing the top general, but experts say the issue is he hasnt approved a new strategy.

A few high-profile firings of Flynn and Bannon allies including one who wrote a bizarre memo warning against globalists are out in recent weeks.

Despite Governor Cuomos assurances that wouldnt happen, the Board of Elections complied though it wont turn over Social Security numbers.

The GOPs plans to use the budget process for health care and tax legislation are already half-ruined. The worst could be yet to come.

The Statue of Liberty doesnt mean what you think it does, Miller says.

Sanders, Biden, or Warren may run in 2020 and clear the field of pretenders. If not, Democrats could have the kind of field the GOP sported in 2016.

Yous guys should give him some credit.

Trump said an executive from the organization called him to say his speech was the greatest. Turns out, no such call was ever placed.

After defeat, wild, pointless anger.

Well have to wait for Scaramuccis inevitable book deal to get the real tea.

If the prospects of vulnerable 2018 GOP candidates get much worse, and the chaos in D.C. doesnt improve, an anti-Trump rebellion is a possibility.

The retired general may have had early success in ousting Scaramucci and instilling some order. But this is Trumps White House were talking about.

In a signing statement, Trump says that provisions limiting his power to alter the sanctions are unconstitutional.

This complex in the Rockaways was rebuilt and is clean, well-maintained, and safe.

Two senators, alongside Trump, will propose halving the rate over the next ten years.

After Kellys first 48 hours on the job, even Trump is on his best behavior for his new chief of staff.

She only reports real (a.k.a. positive) stories about the White House.

The civil-rights division is preparing to tackle discrimination against white people.

The Trump administration and Ed Butowsky, the conservative commentator at the center of a new lawsuit, cant seem to agree.

Excerpt from:

It Looks Like HR McMaster Is Cleaning House at the NSA - New York Magazine

Posted in NSA

In Abusing NSA Intelligence, Did Obama White House Commit A Crime? – Investor’s Business Daily

Then-Deputy Security Advisor Ben Rhodes, shown talking to the White House press corps in December 2016, joins a growing list of former Obama officials under subpoena from the House Intelligence Committee. (Cheriss May/Zuma Press/Newscom)

'Unmasking' Scandal: Day by day, the scandal of the Obama administration's abuse of domestic intelligence gathered by the National Security Agency grows. Forget the phony Russia-Trump collusion charges the Obama White House looks increasingly to have committed a crime by using U.S. intelligence for political purposes.

The NSA's insatiable gathering of data and conversations on Americans make it a potentially highly dangerous enemy of Americans' freedoms. Who would want to have a federal government spy shop that knows almost everything you do in public, on the phone, by email, or by computer?

That's why the super-secret NSA, which is much bigger than the better-known CIA, has always operated under strict guidelines for how its intel could be used. In its reports, Americans who are surveilled without a warrant while speaking to a foreign citizen are routinely "masked" that is, their identity is kept secret unless there's an overwhelming national security interest in that person being "unmasked."

Unfortunately, like a child with a dangerous new toy, the Obama administration apparently seems to have believed that the NSA could be used for narrow, political purposes.

As a result, a number of administration officials and Obama supporters, including former National Security Advisor Susan Rice, former U.N. Ambassador Samantha Power and former CIA chief John Brennan, have been subpoenaed by the House Intelligence Committee to answer some questions.

On Wednesday, the panel announced another subpoena had been issued for a former Obama official, this for former Deputy National Security Advisor Ben Rhodes. Our guess is it won't be the last.

This mega-scandal, by the way, has been building for months, though you would hardly know by the near-silence it's been treated with in the media.

But there are exceptions. Back on May 24, the online journal Circa reported that the scandal was far more serious than it first appeared.

"The National Security Agency under former President Barack Obama routinely violated American privacy protections while scouring through overseas intercepts and failed to disclose the extent of the problems until the final days before Donald Trump was elected president last fall, according to once top-secret documents that chronicle some of the most serious constitutional abuses to date by the U.S. intelligence community," wrote Circa investigative reporter Sara A. Carter.

Now, this week, Carter reports that the scandal is much bigger than suspected. A review of government documents found that "government officials conducted 30,355 searches in 2016 seeking information about Americans in NSA intercept meta-data, which include telephone numbers and email addresses," Carter wrote.

She notes that the election-year searches by Obama's political aides and other government officials jumped 27.5% from 2015, tripling the "9,500 such searches" in 2013."In 2016 the administration also scoured the actual contents of NSA intercepted calls and emails for 5,288 Americans, an increase of 13% over the prior year and a massive spike from the 198 names searched in 2013."

Before the Obama administration, under rules propagated by former President George H.W. Bush, "unmasking" incidental intelligence targets was strictly limited and frowned upon. Even after 9/11, despite increased surveillance of people with potential terrorist ties, the rules stayed in place. The potential for abuse, they knew, was too great.

But that ended in 2011 as Obama, using the pretense of fighting a War on Terror that he never even believed in, loosened the rules. As the Washington Examiner reported earlier this week, in 2013 National Intelligence Director James Clapper formally loosened the rules on "unmasking" the names of congressional staffers, elected officials and others.

That major violations occurred under this program seems clear. Last week, House Intelligence Committee Chair Devin Nunes in a letter to Director of National Intelligence Dan Coats noted that "the total requests for Americans' names by Obama political aides numbered in the hundreds during Obama's last year in office and often lacked a specific intelligence community justification," according to The Hill.

In particular, Nunes pointed out that "one official, whose position had no apparent intelligence related function, made hundreds of unmasking requests" in 2016. Speculation is that the official was U.N. Ambassador Samantha Power.

Is this a crime? We do know that the FISA Court, in a closed-door hearing last October, already censured White House officials for their violations of Americans' email privacy, citing an "institutional lack of candor" that had become a "very serious Fourth Amendment issue."

As a reminder, the Fourth Amendment states flatly that "the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated ..." Spying on, and then unmasking, hundreds if not thousands of Americans would seem to us to be a brazen violation of the Constitution.

Remember how the media ridiculed and shamed Donald Trump for tweeting out that he had been "wiretapped" by Obama? It's starting to look like that, or something like it, was very much the case.

If it turns out, as some suspect, that the "unmasking" was used for domestic spying on political foes such as Trump, it would constitute a serious crime and would require a special counsel to investigate it.

The immense size of the spying operation and the clear attempt to use the U.S.' intelligence apparatus for questionable personal purposes seems to be at minimum a violation of the law. If it further turns out that there was a coordinated effort by Obama and his aides to use the information in the 2016 presidential campaign, it will be a crime and scandal larger than even Watergate.

Yes, people will go to prison.

Is that what we have here, the political crime of the still-young 21st century? It would be nice if the mainstream media seemed at all interested in answering that question.

RELATED:

Did Obama Spy On Trump? It Sure Looks That Way

Real Scandals The Trump-Obsessed Media Are Ignoring

Is Susan Rice The Missing Piece In Obama Spy Scandal?

Reality Winner Is A Loser, And So Is U.S. Security

The rest is here:

In Abusing NSA Intelligence, Did Obama White House Commit A Crime? - Investor's Business Daily

Posted in NSA

Should NSA and CyberCom split? A watchdog weighs in — FCW – FCW.com

Defense

As the status of the dual-hat leadership structure of the National Security Agency and U.S. Cyber Command remains under review, the Government Accountability Office teamed up with Pentagon officials to identify the advantages and disadvantages of such a change in a new report.

The benefits of the current arrangement, as identified by officials from the Department of Defense, involve collaboration, faster decision making and resource efficiency.

But the big downside is that wider access to NSA's toolkit of exploits increases the risk that destructive bugs will get loose as has been seen recently.

GAO was directed to conduct the review in the report language of a recent defense bill.

Auditors found that because one officer calls the shots for two organizations, senior leaders from each organization have visibility into the procedures of the other, allowing for natural coordination on capability development, testing and business processes.

"In the absence of the dual-hat, [NSA] and CyberCom would need to formalize these internal processes in order to maintain them," auditors write.

Another advantage is that the single leader for both organizations allows for faster decision-making because it doesn't require building consensus across commands.

Officials from several DOD components, including NSA and CyberCom, told GAO that the structure allows the two organizations to make efficient use of their resources by sharing digital and physical infrastructure and by combining employee training sessions.

DOD officials also detailed the disadvantages of the dual-hat approach.

Officials reported concerns about preferential prioritization of one organization's requests for support over the other's, concerns that may only be exacerbated as CyberCom is set to receive the authorities of a unified combatant command.

And, as previously noted, CyberCom's use of NSA's tools and infrastructure increases the risk those tools being leaked or exposed.

Because of the wide range of responsibilities of the two organizations, and as CyberCom is elevated to become a full combatant command, DOD officials expressed concerns that the duties may be too broad for a single officer to realistically handle.

Although they both operate in cyberspace, the missions of CyberCom and NSA also have an inherent tension. CyberCom focuses primarily on conducting military operations, while NSA's mission is primarily intelligence-based.

DOD officials also told auditors that while the sharing of resources is efficient, the resource allocation between the two entities is sometimes unclear. They stated that DOD does not have an official position on the advantages and disadvantages of the dual-hat structure.

The report also includes actions that could limit potential risks of splitting the leadership.

While there is broad support from current and former officials, including former President Barack Obama, for elevating Cyber Command to the level of an independent combatant command, the idea of splitting the agencies has received some pushback.

Legislatively, 2017 National Defense Authorization Act stated that the dual-hat role, which dates back to CyberCom's creation in 2009, will remain in place until an assessment is conducted about the potential security risks of splitting the current structure.

The 2018 bill submitted by the House Armed Services Committee includes a $647 million boost to support the elevation of U.S. Cyber Command to a full combatant command level, but omits new language about an eventual split of the NSA and CyberCom.

About the Author

Chase Gunter is a staff writer covering civilian agencies, workforce issues, health IT, open data and innovation.

Prior to joining FCW, Gunter reported for the C-Ville Weekly in Charlottesville, Va., and served as a college sports beat writer for the South Boston (Va.) News and Record. He started at FCW as an editorial fellow before joining the team full-time as a reporter.

Gunter is a graduate of the University of Virginia, where his emphases were English, history and media studies.

Click here for previous articles by Gunter, or connect with him on Twitter: @WChaseGunter

See the original post:

Should NSA and CyberCom split? A watchdog weighs in -- FCW - FCW.com

Posted in NSA

Report: NSA Illegally Spied on Kim Dotcom in New Zealand – Breitbart News

Documents reveal that the NSA and New Zealands Government Communications Security Bureau surveilled Dotcom in a joint operation officially until 2012. The NSA then reportedly continued to use New Zealand technology to spy on Dotcom after 2012.

GCSB claimed that it turned off all surveillance systems targeting Dotcom and others butfound out more than a year later that surveillance continued without its knowledge, reportedthe New Zealand Herald. The details in the documents have led Dotcom to state that there is now evidence the United States National Security Agency was carrying out surveillance on him.

Dotcom, who should have been protected from GCSB surveillance as a New Zealand resident, said the GCSB did not know because its equipment was being used by the NSA, which was directly involved, the report claims.

In a series of tweets, Dotcomcalled GCSB consistent liars and claimed they were aware of the continued surveillance of him by the NSA.

The tech entrepreneur also called the incident a sellout of NZ sovereignty, before referencing the Five Eyes surveillance alliance between New Zealand, the United States, the United Kingdom, Australia, and Canada.

Im not a terrorist or a national security threat. Im not even a criminal, declared Dotcom on Twitter. Im an innovator, a nerd, I play video games. Fuck you NSA!

Charlie Nash is a reporterforBreitbart Tech. You can follow himon Twitter@MrNashingtonorlike his page at Facebook.

P.S. DO YOU WANT MORE ARTICLES LIKE THIS ONE DELIVERED RIGHT TO YOUR INBOX?SIGN UP FOR THE DAILY BREITBART NEWSLETTER.

See original here:

Report: NSA Illegally Spied on Kim Dotcom in New Zealand - Breitbart News

Posted in NSA

NSA illegally spied on Kim Dotcom in New Zealand – BetaNews

Kim Dotcom has been of interest to the US government and law enforcement agencies for some time, and it was ruled that the Mega and Megaupload founder could be extracted to the US. But now it seems that the NSA was spying on the internet entrepreneur after surveillance was supposed to have stopped.

New Zealand's Government Communications Security Bureau (GCSB) had been working with the NSA on a joint surveillance operation called Operation Debut. While surveillance was supposed to have stopped in January 2012, it has emerged that the NSA continued to use GCSB's technology without its knowledge.

According to a report in the New Zealand Herald, GCSB "lost control of its surveillance technology" and later discovered that it had been used to continue to spy on Dotcom for at least an additional two months. The information has come to light in new documents released by the GCSB to the High Court.

The admission is being used as evidence that the NSA was illegally spying on Dotcom while he was resident in New Zealand, using GCSB equipment. It is not clear how this surveillance operation could have been continued by the NSA without GCSB's knowledge, but Dotcom has issued a warning:

New Zealanders must know how much power a foreign state holds over their private information. The NSA has unrestricted access to GCSB surveillance systems. In fact, most of the technology the GCSB uses was supplied by the NSA. If the GCSB was aiding and abetting the NSA to spy directly on New Zealanders then the seriousness of the situation has changed dramatically and a truly independent inquiry and a new criminal investigation will be unavoidable.

The documents show that GCSB systems were also used to illegally spy on an additional 88 people.

Photo credit: Kim Dotcom

Read the original here:

NSA illegally spied on Kim Dotcom in New Zealand - BetaNews

Posted in NSA

What do DoD officials think of splitting NSA/CYBERCOM dual hat? – Federal Times

For the past few years, there has been much discussion regarding the separation of these two agencies as CYBERCOM was co-located with NSA at its standing up to help get the organization on its feet. As their capabilities and capacities mature, there has arisen a heated argument between some in the executive branch and in Congress to split the two, something that was always envisioned with no clear timeline indicated.

According to officials, DoD does not have an official position on the advantages and disadvantages of the dual-hat leadership arrangement of NSA/CSS and CYBERCOM, GAOs report said. As of March 2017, DoD officials informed us that DoD had not determined whether it would end the dual-hat leadership arrangement and was reviewing the steps and funding necessary to meet the requirements established in the law.

Advantages include more in-depth coordination and collaboration, faster decision-making and more efficient use of resources.

Disadvantages, meanwhile, citing comments from officials canvased, include:

Congress has stipulated a series of measures the government must meet prior to severing the dual-hat, one of which is the cyber mission force must reach full operational capability, something that is not slated to occur until September 2018.

The GAO report also outlined, based on conversations with DoD officials, efforts to mitigate risks associated with ending the dual-hat. They include:

See more here:

What do DoD officials think of splitting NSA/CYBERCOM dual hat? - Federal Times

Posted in NSA

Columbus State awarded $174000 from NSA to develop cybersecurity tool – Columbus Ledger-Enquirer


Columbus Ledger-Enquirer
Columbus State awarded $174000 from NSA to develop cybersecurity tool
Columbus Ledger-Enquirer
Further cementing its ambitions as a national powerhouse in cybersecurity education, Columbus State University announced Tuesday that it received a $174,000 grant from the National Security Agency to develop a new tool for rapid cybersecurity training ...

See more here:

Columbus State awarded $174000 from NSA to develop cybersecurity tool - Columbus Ledger-Enquirer

Posted in NSA

Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers – InsideSources

From left, National Intelligence Director Dan Coats, National Security Agency director Adm. Michael Rogers and acting FBI Director Andrew McCabe, arrive for the Senate Intelligence Committee hearing about the Foreign Intelligence Surveillance Act, on Capitol Hill, Wednesday, June 7, 2017, in Washington. (AP Photo/Carolyn Kaster)

A Senate Democrat on the Intelligence Committee is pressing the nations top spy chief to clarify whether FISA Section 702, an expiring law used by the National Security Agency to conduct broad international surveillance, can be used to domestically target Americans.

Oregon Democratic Sen. Ron Wyden asked Director of National Intelligence (DNI) Dan Coats in June ifthe government [can] use FISA Act Section 702 to collect communications it knows are entirely domestic.

Section 702 of the 2008 Foreign Intelligence Surveillance Amendments Act authorizes NSA to tap the physical infrastructure of internet service providers, like fiber connections, to intercept foreign emails, instant messages, and other communications belonging to foreign nationals as they exit and enter the U.S.

Unlike domestic NSA surveillance programs that largely collect metadata information like when a message was sent and received, but not the message itself Section 702 includes the actual content of intercepts.

Not to my knowledge, Coats responded during a congressional oversight hearing. It would be against the law.

Privacy advocates suspect Section 702 creates a loophole for NSA to incidentally collect data belonging to Americans that couldamount to millions of warrantless intercepts. Wyden, who as a member of the Senate Intelligence Committee is privy to classified briefings from Coats and other intelligence agencies, seems to have suspicions of his own.

After the hearing reporters sought clarity from Coats, to which the Office of the Director of National Intelligence (ODNI) responded in a letter.

Section 702(b)(4) plainly states we may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States. The DNI interpreted Senator Wydens question to ask about this provision and answered accordingly, the letter from ODNI reads.

Wyden cryptically responded to the ODNI letter, saying [t]hat was not my question, and asked Coats to provide a public response to my question, as asked during the hearing.

Coats has so far declined to provide that response. In a letter to Coats Monday Wyden again asked the DNI to respond publicly to the original question.

As I noted in my previous letter, following the hearing, your office responded from inquiries to reporters by answering a different question, Wyden wrote.

The episode is eerily reminiscent of a March 2013 exchange between Wyden and then-DNI James Clapper, when the senator famously asked the Obama administrations spy chief whether NSA collects any type of data at all on millions or hundreds of millions of Americans.

No sir, Clapper answered. Not wittingly.

Months later Americans found out Clappers answer was untrue when former NSA contractor Edward Snowden leaked the existence of widespread agency surveillance programs intercepting data belonging to millions of Americans. Clapper later claimed he thought Wyden was asking a different question: whether NSA was listening to Americans phone conversations.

I thought, though in retrospect, I was asked when are you going to startstop beating your wife kind of question, which is, meaning not answerable necessarily, by a simple yes or no, Clapper later told NBC. So I responded in what I thought was the most truthful or least untruthful manner, by saying, No.

Going back to my metaphor, what I was thinking of is looking at the Dewey Decimal numbers of those books in the metaphorical library, he continued. To me collection of U.S. persons data would mean taking the books off the shelf, opening it up and reading it.

Wyden, who knew Clappers answer was untrue from Senate intelligence briefings, recently said hed spent six months teeing it up to ask that question, and that hes been just as careful with the question he asked Coats, suggesting theres more to the answer than Coats provided in June.

Im not dropping this, Wyden said in July. And to say, Oh, he responded to something different, Ill let you draw your own conclusions on that.

Snowden in a March interview said using Section 702 to surveil Americans comes down to little more than word games.

These intelligence agenciestheyre saying to them, collect doesnt mean that we copied your communications, that we put it in the bucket, that we saved it in case we want to look at it, he told The Intercept. To them, collect means that they take it out of the bucket, and actually look at it and read it.

Section 702 expires at the end of December unless Congress renews the law.

Follow Giuseppe on Twitter

Subscribe for the Latest From InsideSources Every Morning

View post:

Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers - InsideSources

Posted in NSA

Shadow Brokers investigation is focusing on former NSA insider – CyberScoop

}ro*01IQ^Y=|[5X [U[o_<}=3$qvss"<=i:$d`R)K~:QN1VRA?ds_'4`U#:cy,Tzt:%^G<4OC6dF, NM2N 9:4i4s4,Od.XX$3N83+SN7AeJ$qMxD.w"eubE %+pm/.`Oxw^;gKD3H|2J8 C>aVB+ MB?K.4$ @J.' 0 Y]Lfa 9MZBR%8[eQ"F"%DB*$,X>D&l1,j^Rja{s*g8Lg,b"FTL??]Ugtg{uNME^N> SO.gVjUg#<,@tJP5mPMvf'3,R1JGm>'A_Uvf,2qHT>BAQ`w!tN7"' 6CIkBX}sovo=nNI74_rBMi=|x+bQx=png/zyoO_>z0b:v$z6`^ > uD]zu](u]jZ"L2z9N~pRju(80hk:Pm%up? R $_%x !&)b9kAh

Continue reading here:

Shadow Brokers investigation is focusing on former NSA insider - CyberScoop

Posted in NSA

ShadowBrokers leak probe looking at NSA insiders: report – The Hill

Investigators believe the ShadowBrokers leaks were from a National Security Agency insider, thewebsite CyberScoop reports.

Since August of last year, the ShadowBrokers have leaked files apparently stolen from the NSA, primarily source code for NSA hacking tools along with some additional files.

One set of files leaked by the group contained tools to hack into the Windows operating system. Those tools were eventually used in the devastating international ransomware attacks known as WannaCry and NotPetya.

WannaCry infected between hundreds of thousands and millions of systems, causing such damage to the United Kingdoms hospitals that some patients were turned away. NotPetya caused significant damage to a major Russian energy firm and the U.S.-based pharmaceutical giant Merck.

Citing multiple sources familiar with the investigation, CyberScoop reports that ex-NSA employees have been contacted by investigators concerning how the ShadowBreakers obtained their cache of files.

The report claims that the leadingtheory is that an inside actor was at the helm but that other theories are still in the mix, including a foreign hacker.

Sources also told CyberScoop that the investigation "goes beyond" Harold Martin, the NSA contractor arrested for hoarding classified documents at his home last year.

The ShadowBrokers claim to have leaked files to raise interest for a planned sale of the remaining cache of documents. Currently, the group is offering a subscription, leak-of-the-month service.

See the original post:

ShadowBrokers leak probe looking at NSA insiders: report - The Hill

Posted in NSA

NSA whistleblower Snowden: VPN ban makes Russia ‘less safe and less free’ – ZDNet

NSA whistleblower Edward Snowden argues that Russia's decision to outlaw VPNs is a "tragedy of policy".

Edward Snowden has laid into the Russian government for banning the use of virtual private networks (VPNs) and other tools that people can use to circumvent censorship and surveillance.

Russian president Vladimir Putin signed the law on Sunday, prompting a Twitter tirade from Snowden, the US National Security Agency (NSA) whistleblower who has been sheltering in Moscow since 2013.

Snowden called the decision a "tragedy of policy" that would make Russia "both less safe and less free". He also linked the government's move to China's crackdown on VPN technology, which led Apple to pull dozens of VPN apps from its Chinese App Store over the weekend.

"Whether enacted by China, Russia, or anyone else, we must be clear this is not a reasonable 'regulation,' but a violation of human rights," Snowden wrote, arguing that: "If the next generation is to enjoy the online liberties ours did, innocuous traffic must become truly indistinguishable from the sensitive."

He also appeared to urge tech industry workers to push back against the anti-VPN trend.

Linking Russia's move to China's crackdown on VPN technology, Snowden urged tech workers to be vigilant.

Snowden is these days the president of the Freedom of the Press Foundation. In line with his 2013 decision to expose the NSA's mass-surveillance activities, he has long been an advocate of individuals being able to protect their communications and online activities.

However, he has previously warned against people relying too much on VPNs, because their operators may be vulnerable to hacks or subpoenas that could expose users.

The former NSA contractor originally fled from the US to Hong Kong, where he famously started working with newspapers to expose the agency's activities.

Then, while apparently trying to fly to Latin America, Snowden found himself stranded at a Moscow airport because the US had cancelled his passport. The Russians granted him asylum, which was extended for "a couple more years" in January this year.

During his stay there, Snowden has occasionally voiced strong criticism of Russia's surveillance policies.

In mid-2016, when the Russian government introduced a data-retention law and forced communications providers to help decrypt people's messages, the American said the legislation was "an unworkable, unjustifiable violation of rights that should never have been signed".

In 2014, he also denounced the so-called Blogger's Law, which imposed restrictions on what bloggers can write.

The latest law, banning VPNs, will come into effect in November this year. It is mainly intended to stop Russians viewing websites that are on the official state blacklist.

Continue reading here:

NSA whistleblower Snowden: VPN ban makes Russia 'less safe and less free' - ZDNet

Posted in NSA

Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull – ABC Online

Updated August 01, 2017 07:34:44

The Federal Government's bid to force tech companies to reveal terrorists' secret conversations could be unachievable, according to the former deputy director of the US National Security Agency (NSA).

Chris Inglis had a 28-year career with the NSA and now advises private companies on how to detect Edward Snowden-style leakers within their ranks.

He told the ABC the Turnbull Government's bid to access encrypted messages sent by terrorists and other criminals is to be admired, but the technology may prove problematic.

"I don't know how feasible it is to achieve the kind of access the Government might want to have under the rule of law, the technology is tough to get exactly right," Mr Inglis told the ABC.

"But the Government is honour-bound to try to pursue both the defence of individual rights and collective security."

Encrypted messages affect close to 90 per cent of ASIO's priority cases and the laws would be modelled on Britain's Investigative Powers Act, which obliges companies to cooperate.

Technology experts, like adjust professor at the Centre for Internet Safety Professor Nigel Phair, have questioned how these laws would really work.

"From a technical perspective we are looking at very high-end computing power that makes it really, really difficult to decrypt a message on the fly, it's just not a simple process," he said.

Facebook has already indicated it will resist the Government's laws, saying weakening encryption for intelligence agencies would mean weakening it for everyone.

"Because of the way end-to-end encryption works, we can't read the contents of individual encrypted messages," a spokesman said.

But Mr Inglis said technology companies would not need to create a so-called backdoor to messages, but rather allow intelligence agencies to exploit vulnerabilities.

The NSA was criticised in May after it was revealed it knew about a vulnerability in Microsoft's system, but exploited it rather than reporting it to the company.

"Here's the dirty little secret: most of these devices already have what might be technically described as a backdoor their update mechanisms, their patch mechanisms," he said.

"My read on what you are trying to do is to put that issue on the table and say, 'we are not going to create backdoors, but we are going to try and use the capabilities that already exist'."

Mr Inglis said the Australian Government was pushing for legal powers the US Government had not called for.

"We have not had as rich a debate as what I sense is going on in Australia," he said.

"The Government by and large has not stepped in and directed that we are either going to seek a solution, we are still trying to find a voluntary way forward."

When Prime Minister Malcolm Turnbull announced the legislation, he noted strong libertarian tendencies of US-based technology companies.

Mr Inglis said Australia was "in the middle of the pack" when it came to cyber security planning.

"You are currently working through how to balance individual privacy the defence of liberty as well as we would say in the states and the pursuit of collective security," he said.

"No-one is exempt from the threats that are traversing across the cyber space at this moment in time."

Topics: science-and-technology, defence-and-national-security, security-intelligence, information-and-communication, turnbull-malcolm, government-and-politics, australia, united-states

First posted August 01, 2017 04:44:23

View post:

Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull - ABC Online

Posted in NSA

Online site backing defense of accused NSA leaker founded to promote fearless journalism – The Augusta Chronicle

The founders of the online news publication that will help in the defense of a Fort Gordon contractor accused of leaking a classified document were among the first to report on the National Security Agency surveillance of citizens in other countries and at home in 2013, using thousands of documents leaked by a former NSA contractor, Edward Snowden.

While the document published by The Intercept which the government says came from NSA contract employee Reality Leigh Winner of Augusta is still considered classified by prosecutors, it allegedly concerns the NSA analysis of Russias efforts to infiltrate a voting software company and infect computers used by state election officials. The Intercept published a story based on the analysis, and Winner was arrested June 3.

According to The Intercepts site, journalists Glenn Greenwald, Laura Poitras and Jeremy Scahill founded the online publication dedicated to fearless, adversarial journalism. EBays founder Pierre Omidyar provided the funding in 2013 for First Look Media in 2013, a non-profit, which launched The Intercept.

The Intercept has an average of 5 million visitors a month, said Vivian Siu, director of communications for First Look.

The online publication has a lot of readers in and outside of the U. S., said Rick Edmonds, media business analysis with the Poynter Institute, a nonprofit school for journalism. The Intercept began as a site for leaked documents but has expanded into other areas, Edmonds said. Non-profit, online publications are definitely a growing part of journalism and investigative reporting, he said.

The non-profit, online publication ProPublica has been publishing significant investigative work, Edmonds noted. There is also the International Consortium of Investigative Journalists that won a Pulitzer Prize for the Panama Papers investigation into the finances of Pakistani Prime Minister Nawaz Sharif, which led to his resignation Friday. The new form of journalism has a significant presence, Edmonds said.

I believe that great journalism boils down to a few key principles, Scahill wrote in an article asking for readers support for investigative journalism. Hold those in power accountable, regardless of their political or corporate affiliations; give voice to the voiceless; provide people with information they can use to make informed decisions; be transparent with your readers about how you know what you know; (and) make sure your facts are straight.

Scahill won a George Polk Award for his reporting in war zones and for his 2008 report about Blackwater, the private armed security force. Greenwald is a journalist and attorney who wrote four New York Times best-sellers on politics and law. He also wrote No Place to Hide about the U.S. surveillance and his experience in reporting on the Snowden documents. In 2013 he was awarded a George Polk award and several others for his reporting on the Snowden documents.

Poitras was also awarded a George Polk award and shared the 2014 Pulitzer Prize for public service with The New York Times. Poitras left The Intercept for Field of Vision, which is also part of First Look Media. She was awarded an Academy Award for best documentary in 2015.

The Intercept has won a number of national journalism awards. It focuses on national security, politics, civil liberties, the environment, international affairs, technology, criminal justice, the media and more, according to its website. And it seeks whistleblowers, providing an email site and online drop box.

In Winners case, the Press Freedom Defense Fund of the First Look Media is giving $50,000 in matching funds to Stand with Reality, a fundraising campaign. First Looks attorney Baruch Weiss, a former U.S. attorney with experience in NSA investigations, will support Winners local defense team.

Winner is in custody without bond. She has pleaded not guilty to one count of willful retention and transmission of national defense information.

Reach Sandy Hodson at sandy.hodson@augustachronicle.com or (706) 823-3226

Read the original here:

Online site backing defense of accused NSA leaker founded to promote fearless journalism - The Augusta Chronicle

Posted in NSA

Mid Range | Firewalls | SonicWall

_productName NSA 6600 NSA 5600 NSA 4600 NSA 3600 NSA 2600 Deep Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Stateful Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Unlimited File Size Protection TotalSecure Firewall Overview S S S S S Protocols Scanned TotalSecure Firewall Overview S S S S S Application Intelligence and Control Threat Prevention Services Available S S S S S Intrusion Prevention Service Threat Prevention Services Available S S S S S Gateway Anti-Virus and Anti-Spyware Threat Prevention Services Available S S S S S Content & URL Filtering (CFS) Threat Prevention Services Available S S S S S SSL Inspection (DPI SSL) Threat Prevention Services Available S S S S S Content Filtering Client (CFC)1 Threat Prevention Services Available O O O O O Analyzer Reporting1 Threat Prevention Services Available O O O O O Capture Advance Threat Protection1 Threat Prevention Services Available O O O O O Enforced Client Anti-Virus and Anti-Spyware (McAfee or Kaspersky) Threat Prevention Services Available O O O O O 24x7 Support Threat Prevention Services Available S S S S S Interfaces Firewall General 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 8x1 GbE, 1GbE Management, 1 Console Management Firewall General CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS Nodes Supported Firewall General Unrestricted Unrestricted Unrestricted Unrestricted Unrestricted RAM Firewall General 4 GB 4 GB 2 GB 2 GB 2 GB Visual Information Display (LCD Display) Firewall General N N N N N Site-to-Site VPN Tunnels Firewall General 6000 4000 1500 1000 75 Global VPN Clients (Maximum) Firewall General 2000 (6000) 2000 (4000) 500 (3000) 50 (1000) 10 (250) SSL VPN NetExtender Clients (Maximum) Firewall General 2 (1500) 2 (1000) 2 (500) 2 (350) 2 (250) VLAN Interfaces Firewall General 500 400 256 256 256 SonicPoints Wireless Controller Firewall General S S S S S WWAN Failover (4G/LTE) Firewall General S S S S S Network Switch Management Firewall General S S S S S Firewall Inspection Throughput2 Firewall/VPN Performance 13 Gbps 9 Gbps 6 Gbps 3.4 Gbps 1.9 Gbps Full DPI Performance (GAV/GAS/IPS) Firewall/VPN Performance 3 Gbps 1.6 Gbps 800 Mbps 500 Mbps 300 Mbps Application Inspection Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps IPS Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps Anti-Malware Inspection Throughput Firewall/VPN Performance 3 Gbps 1.7 Gbps 1.1 Gbps 600 Mbps 400 Mbps IMIX performance Firewall/VPN Performance 3.5 Gbps 2.4 Gbps 1.6 Gbps 900 Mbps 600 Mbps SSL DPI Performance Firewall/VPN Performance 1.3 Gbps 800 Mbps 500 Mbps 300 Mbps 200 Mbps VPN Throughput4 Firewall/VPN Performance 5 Gbps 4.5 Gbps 3 Gbps 1.5 Gbps 1.1 Gbps Latency Firewall/VPN Performance 16 s 24 s 17 s 38 s 45 s Maximum Connections5 Firewall/VPN Performance 750K 750K 400K 325K 225K Maximum DPI Connections Firewall/VPN Performance 500K 500K 200K 175K 125K DPI-SSL Connections Firewall/VPN Performance 6000 4000 3000 2000 1000 New Connections/Sec Firewall/VPN Performance 90000 60000 40000 20000 15000 Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Network Traffic Visualization Features S S S S S Netflow/IPFIX Reporting Features S S S S S SNMP Features S S S S S Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database Dynamic Routing Features BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP Single Sign-on (SSO) Features S S S S S Voice over IP (VoIP) Security Features S S S S S Interface to Interface Scanning Features S S S S S PortShield Security Features S S S S S Port Aggregation Features S S S S S Link Redundancy Features S S S S S Policy-based Routing Features S S S S S Route-based VPN Features S S S S S Dynamic Bandwidth Management Features S S S S S Stateful High Availability Features S S S S S Multi-WAN Features S S S S S Load Balancing Features S S S S S Object-based Management Features S S S S S Policy-based NAT Features S S S S S Inbound Load Balancing Features S S S S S IKEv2 VPN Features S S S S S Active/Active Cluster Features S S S S S Terminal Services Authentication/Citrix Support Features S S S S S TLS/SL/SSH decryption and inspection Features S S S S S SSL Control for IPv6 Features S S S S Easy VPN Features S S S S Biometric Authentication Features S S S S DNS Proxy Features S S S S Hardware Failover Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Multi-WAN Failover Failover S S S S S Automated Failover/Failback Failover S S S S S

See the original post:

Mid Range | Firewalls | SonicWall

Posted in NSA