Former NSA executive becomes author in Lakewood Ranch – YourObserver.com


YourObserver.com
Former NSA executive becomes author in Lakewood Ranch
YourObserver.com
A line out of his bio says Harb, who worked 39 years with the National Security Agency (NSA), "applied a wide variety of analytic and language skills and techniques to the production of high-value intelligence" and that he "managed large complex ...

See the original post here:

Former NSA executive becomes author in Lakewood Ranch - YourObserver.com

Posted in NSA

Released Documents Show More Section 702 Violations By The NSA – Techdirt

Always lawful and subject to strict oversight. Those are the NSA's defenses any time someone leaks something about its surveillance programs or obtains documents indicating abuse of snooping powers. It gets a little old when it's document after document showing the astonishing breadth of the NSA's surveillance programs or the continual abuse and misuse of these powers.

The Hill has dug through some recently-released documents and memos from the NSA which show long-term abuse of surveillance programs. The NSA recently ditched part of its Section 702 collection because it just couldn't stop hoovering up Americans' communications. This was "incidental," according to the NSA, and supposedly impossible to stop. But the incidents detailed in these documents suggest a lot of over-collection happened because no one noticed and, if anyone did, no one cared.

They detail specific violations that the NSA or FBI disclosed to the Foreign Intelligence Surveillance Court or the Justice Department's national security division during President Obamas tenure between 2009 and 2016. The intelligence community isn't due to report on compliance issues for 2017, the first year under the Trump administration, until next spring.

The NSA says that the missteps amount to a small number less than 1 percent when compared to the hundreds of thousands of specific phone numbers and email addresses the agencies intercepted through the so-called Section 702 warrantless spying program created by Congress in late 2008.

This is about the only place where any American can become part of the "one percent:" as the unwitting subject of NSA surveillance. NSA spokesman Michael Halbig says evidence of misuse is a sign the oversight is working. But oversight is also supposed to aid in prevention, not just detection of past misuse. And the NSA's internal oversight isn't nearly as "robust" as Halbig attempts to portray it.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, the government admitted improperly searching the NSAs foreign intercept data on multiple occasions, including one instance in which an analyst ran the same search query about an American every work day for a period between 2013 and 2014.

The NSA also passed on intel to the FBI and CIA without properly minimizing it and made other dissemination errors. The documents show the NSA was also slow to inform other agencies of its minimization failures. Notification is supposed to made within five days of discovery, but in some cases it took the NSA more than three months to inform intel recipients of the error.

This information has been released at a critical time for the NSA. Section 702 powers are sunsetting this year and could be subject to additional modifications prior to their renewal. The FBI --perhaps even more than the NSA -- is looking for a clean reauthorization of Section 702 programs. This administration favors a clean re-auth, which means complaints about a 1% violation rate aren't likely to change anyone's mind. But 1% of several hundred million yearly searches is still a very large number of violations. If Google or Microsoft suffered a breach affecting the privacy of 1% of its users, it would be a huge problem even if the number of affected accounts amounted to a rounding error.

Former House Intelligence Committee Chair Pete Hoekstra -- a former surveillance state cheerleader -- now worries the NSA's collection powers have increased far past the point of reason. As he points, 1% simply isn't an acceptable failure rate.

One percent or less sounds great, but the truth is 1 percent of my credit card charges dont come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans privacy.

Read more:

Released Documents Show More Section 702 Violations By The NSA - Techdirt

Posted in NSA

Accused NSA leaker’s supporters ask feds to drop charges against her – MyAJC

Reality Winners supporters said they delivered petitions with more than 16,000 signatures to the U.S. Justice Departments headquarters in Washington Thursday, asking the agency to drop its charges against the accused National Security Agency leaker.

Among those delivering the petitions on Whistleblower Appreciation Day were representatives from several groups, including CodePink, Defending Rights & Dissent, RootsAction.org, Whistleblower and Source Protection Program and Stand with Reality, a nonprofit campaign that is supporting Winners case through advocacy and fundraising.

"We should not be charging whistleblowers acting in the public interest, disclosing information responsibly to journalists, as if they were traitors to our country. Anyone who cares about a free press should be concerned about her case, Rainey Reitman, co-founder of Stand with Reality, said in a prepared statement.

The Justice Department declined to comment.

Federal prosecutors have accused Winner of leaking to The Intercept online news outlet a top-secret NSA report about Russias meddling in the 2016 presidential election. The Intercept published the report, which says Russian military intelligence officials tried to hack into the U.S. voting system just before last Novembers election.

A federal grand jury has indicted Winner, 25, on a single count of "willful retention and transmission of national defense information. She faces up to 10 years in prison and $250,000 in fines. Winner, who is being held in the Lincoln County Jail, has pleaded not guilty to the charge.

Meanwhile, federal prosecutors are defending their proposed rules for safeguarding top-secret information during her trial, now set for Oct. 23 in Augusta. Winners defense attorneys have argued those rules could block her from getting a fair hearing. Specifically, they have said the governments proposed protective order could prevent Winner from reviewing evidence in the case, including classified information. That, they said, would amount to a violation of the former Air Force linguists Sixth Amendment right to confer with her attorneys.

RELATED:Accused NSA leakers attorneys push back against proposed secrecy rules for trial

But in a court papers filed this week, the prosecutors said she will be given access to the records she is entitled to see under the Classified Information Procedures Act and as required by due process. But her attorneys must ask the court for her to see such documents, the prosecutors said.

The scope of classified discovery in this case has not yet been determined. It may include, for example, classified information to which the defendant has not previously had access, the government said in its court filing. Given the charge against the defendant, disclosing that information to her could further jeopardize national security. If defense counsel believe that they must disclose specific information provided in discovery to the defendant, that should be the subject of a subsequent motion.

Winners attorneys are also seeking permission to quote from records already in the public domain, including newspaper articles. Prosecutors have pointed to case law that says disseminating classified information that has already been made public could harm government intelligence sources and operations. Further, Winners defense team is objecting to proposed requirements that they identify expert witnesses they ask to review classified evidence, saying that would amount to an unfair advantage for prosecutors.

The government has a legitimate interest in knowing who is accessing classified information, the prosecutors said. The defense has not identified any prejudice that would result from disclosing experts identities to the government. Accordingly, the government should receive advance notice of all personnel for whom the defense seeks access to classified discovery and an opportunity to submit objections to the court if necessary.

Read the original post:

Accused NSA leaker's supporters ask feds to drop charges against her - MyAJC

Posted in NSA

NSA Ajit Doval and Xi Jinping meet but fail to break Doklam logjam – Economic Times

BEIJING: National security advisor Ajit Doval's meeting with Chinese President Xi Jinping did not yield any breakthrough that could end the current standoff in Doklam. Analysts, however, said the cool off in the recent weeks may give leaders enough time to find a solution.

Doval met Chinese President Xi Jinping and other senior officials on Friday at the summit of Brics national security advisers (NSAs) in the Chinese capital.

There has only been a slight improvement of the situation that prevailed after Chinese leaders insisted for weeks that there could be no meaningful dialogue until Indian troops withdraw from their positions at the disputed site in Doklam.

There is little possibility of Xi going back on the demand that Indian troops must withdraw ahead of the celebrations of the 90th anniversary of the People's Liberation Army on August 1, a Chinese analyst said.

"At best, the high level of belligerence can be allowed to taper off, giving leaders enough time to find a solution. But even this is not easy because there are hawkish voices on both sides," a Chinese analyst said, requesting anonymity.

The Chinese leadership got away by imposing an air flight control zone over islands disputed with Japan and creating artificial islands in the disputed South China Sea despite US resistance. This is why it is very is difficult for the government to explain India's refusal to budge an inch in Doklam, he explained.

Doklam row becoming internal crisis for China The Doklam issue is fast becoming a domestic political problem for China's leaders who need to deal with a section of hawkish Communist Party members demanding action to "push back" Indian troops, sources said. This is happening ahead of a crucial party congress that will elect leaders to top positions later this year.

China also faces a risky situation on its border with North Korea and has hugely increased its military presence fearing some dangerous moves from Pyongyang.

In appearances before the media, both Doval and the Chinese leaders stuck to the agenda of the security dialogue of Brics countries that brought together top security officials from the member countries.

Doval also joined other security officials in calling on Xi, who said that Brics should play a bigger role in international affairs.

It was clear that both India and China want to keep the discussion on the Doklam stand-off restricted to the bilateral area instead of making it an issue requiring the attention of Brics. In his speech, Doval said the Brics countries should show "leadership in countering terrorism".

The grouping should also play a key role on "strategic issues of regional and global importance" while focusing on "areas where we have consensus", he said.

The Chinese president said the five countries in Brics were faced with a "complex international political and economic security situation". They should communicate more on financial cooperation, cultural exchanges and security issues.

Go here to see the original:

NSA Ajit Doval and Xi Jinping meet but fail to break Doklam logjam - Economic Times

Posted in NSA

Memos reveal new details of NSA & FBI illegal spying on Americans under Obama – RT

The FBI and National Security Agency improperly searched, stored and distributed raw intelligence on Americans, according to recently declassified documents about the controversial Section 702 surveillance program.

The documents, released earlier this month in response to a lawsuit from the American Civil Liberties Union (ACLU), reveal specific violations that the FBI and NSA disclosed to the Foreign Intelligence Surveillance Court (FISC) or the Justice Department's national security division during President Barack Obamas time in office, between 2009 and 2016.

Reviewing the documents, The Hill found more than 90 incidents that specifically cited an impact on Americans, who are not supposed to be affected by 702 surveillance. Many of the incidents involved multiple people, multiple violations, or extended periods of time, the newspaper noted.

One analyst ran the same search on an American citizen every work day for a period of time in 2013 and 2014.

In 2015, the NSA issued a report that included the name of an American whose identity was not foreign intelligence, according to one incident report. The agency eventually discovered the error and recalled the information.

There were several other instances where names of Americans were improperly shared with other intelligence agencies without being redacted, violating minimization procedures. The information had to be recalled and purged after the fact, according to The Hill.

CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges, one report said.

The FBI disclosed three instances of improper disseminations of US persons identities between December 2013 and February 2014.

Though the law requires the NSA to notify other intelligence agencies within five days if and when it wrongly disseminates information about Americans, the documents showed that the average notification time was 19 days, and in some cases took as long as 131 business days.

Read more

The NSA says the mistakes amount to less than 1 percent of surveillance intercepts through the Section 702 program, which was established by Congress in late 2008.

The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents, NSA spokesman Michael Halbig told The Hill. Quite simply, a compliance program that never finds an incident is not a robust compliance program.

We believe that, particularly when compared with the overall level of activity, the compliance incident rate is very low, Alexander Joel, head of the Office of Civil Liberties, Privacy and Transparency for the director of national intelligence, told The Hill.

Oversight and compliance procedures intended to safeguard Americans are robust and effective, the FBI said in a statement. Section 702 is vital to the safety and security of the American people. It is one of the most valuable tools the Intelligence Community has, and therefore, is used with the utmost care by the men and women of the FBI so as to not jeopardize future utility.

The ACLU, which obtained the documents on July 11 after filing a Freedom of Information Act (FOIA) lawsuit, is not convinced.

The NSA claims it has rules to protect our privacy, but it turns out those rules are weak, full of loopholes, and violated again and again, said Patrick Toomey, an ACLU attorney in New York who was involved in the FOIA litigation.

What were now seeing is a history of the NSA not being able to police itself, Neema Guliani, ACLU chief legislative counsel, told The Hill. All of this raises questions about whether the procedures the agencies have put forth are really being followed in all cases.

Shortly before the end of his term in office, in January 2017, Obama "eviscerated" the previously existing limits on sharing of raw NSA intelligence with domestic law enforcement agencies. The full effect of that decision will not be known until the next NSA compliance report, due in April 2018.

Go here to read the rest:

Memos reveal new details of NSA & FBI illegal spying on Americans under Obama - RT

Posted in NSA

Accused NSA leaker’s supporters call on feds to drop charges against her – MyAJC

Reality Winners supporters said they delivered petitions with more than 16,000 signatures to the U.S. Justice Departments headquarters in Washington Thursday, asking the agency to drop its charges against the accused National Security Agency leaker.

Among those delivering the petitions on Whistleblower Appreciation Day were representatives from several groups, including CodePink, Defending Rights & Dissent, RootsAction.org, Whistleblower and Source Protection Program and Stand with Reality, a nonprofit campaign that is supporting Winners case through advocacy and fundraising.

"We should not be charging whistleblowers acting in the public interest, disclosing information responsibly to journalists, as if they were traitors to our country. Anyone who cares about a free press should be concerned about her case, Rainey Reitman, co-founder of Stand with Reality, said in a prepared statement.

The Justice Department declined to comment.

Federal prosecutors have accused Winner of leaking to The Intercept online news outlet a top-secret NSA report about Russias meddling in the 2016 presidential election. The Intercept published the report, which says Russian military intelligence officials tried to hack into the U.S. voting system just before last Novembers election.

A federal grand jury has indicted Winner, 25, on a single count of "willful retention and transmission of national defense information. She faces up to 10 years in prison and $250,000 in fines. Winner, who is being held in the Lincoln County Jail, has pleaded not guilty to the charge.

Meanwhile, federal prosecutors are defending their proposed rules for safeguarding top-secret information during her trial, now set for Oct. 23 in Augusta. Winners defense attorneys have argued those rules could block her from getting a fair hearing. Specifically, they have said the governments proposed protective order could prevent Winner from reviewing evidence in the case, including classified information. That, they said, would amount to a violation of the former Air Force linguists Sixth Amendment right to confer with her attorneys.

RELATED:Accused NSA leakers attorneys push back against proposed secrecy rules for trial

But in a court papers filed this week, the prosecutors said she will be given access to the records she is entitled to see under the Classified Information Procedures Act and as required by due process. But her attorneys must ask the court for her to see such documents, the prosecutors said.

The scope of classified discovery in this case has not yet been determined. It may include, for example, classified information to which the defendant has not previously had access, the government said in its court filing. Given the charge against the defendant, disclosing that information to her could further jeopardize national security. If defense counsel believe that they must disclose specific information provided in discovery to the defendant, that should be the subject of a subsequent motion.

Winners attorneys are also seeking permission to quote from records already in the public domain, including newspaper articles. Prosecutors have pointed to case law that says disseminating classified information that has already been made public could harm government intelligence sources and operations. Further, Winners defense team is objecting to proposed requirements that they identify expert witnesses they ask to review classified evidence, saying that would amount to an unfair advantage for prosecutors.

The government has a legitimate interest in knowing who is accessing classified information, the prosecutors said. The defense has not identified any prejudice that would result from disclosing experts identities to the government. Accordingly, the government should receive advance notice of all personnel for whom the defense seeks access to classified discovery and an opportunity to submit objections to the court if necessary.

Originally posted here:

Accused NSA leaker's supporters call on feds to drop charges against her - MyAJC

Posted in NSA

General Dynamics Adds New NSA-certified TACLANE-FLEX Type 1 Network Encryption Platform to Secure Product … – PR Newswire (press release)

"We designed the TACLANE-FLEX to be scalable and customizable to meet the fluid demands of today's missions," said Mike Tweed-Kent, vice president and general manager of the Cyber and Electronic Warfare Systems line of business for General Dynamics Mission Systems. "TACLANE is the most widely deployed HAIPE encryptor in the world, and General Dynamics will continue to invest in and enhance this product family to ensure it addresses customers' requirements today and supports the unforeseen needs of tomorrow."

Built upon the market-leading TACLANE technology, the TACLANE-FLEX is the same form and fit of the TACLANE-Micro (KG-175D), allowing simple swap-out for customers in need of increased data rates and security features in a small form factor. The combination of its low size, weight and power (SWaP) and ruggedized design, provides users with the option to use the TACLANE-FLEX in tactical or strategic environments.

As bandwidth needs grow, and applications and environments change, TACLANE-FLEX offers a cost-effective approach that allows customers to tailor their security solution based on current needs and budget. The innovative design makes TACLANE-FLEX a delivery platform for future software-based capability upgrades, allowing it to scale to meet the dynamics needs customers will face in the years to come.

Customers are able to add functionality to TACLANE-FLEX through two optional software features, TACLANE Trusted Sensor Software and Agile Virtual Local Area Network (VLAN). TACLANE Trusted Sensor Software provides intrusion detection and prevention system capabilities that monitor network traffic, helping customers increase their knowledge of who and what is on their network. Agile VLAN allows users to simultaneously send and receive Layer 2 (Ethernet) and HAIPE traffic, helping to facilitate the flexible deployment of secure networks.

With an expected availability date mid-2017, GEM One, an enterprise-level remote encryptor management solution, enables users to configure and maintain a dispersed network of TACLANE encryptors, easing deployment and increasing network situational awareness. INEs are used extensively in the commercial and government sectors to protect critical networks and infrastructures.

"The diverse mission requirements of our customers warrant flexible products and solutions that address critical needs and are easy to use and deploy," said Paul Pittelli, NSA Chief, Information Assurance Capabilities. "The TACLANE-FLEX encryption platform enables customers to field a single device that allows for various levels of customization including its ability to support layer 2 communications while maintaining interoperability with currently deployed HAIPE devices."

General Dynamics' Customer Investment Protection Program encourages organizations protecting critical networks and infrastructure to maximize their investment and maintain their security posture by using General Dynamics' trade-in programs. A trade-in program will be offered for the TACLANE-FLEX, allowing users of the current HAIPE INEs to take advantage of the new customizable encryption platform's scalable speed and cybersecurity features. Call 888-897-3148 or email our team for additional information.

General Dynamics Mission Systems is a business unit of General Dynamics (NYSE: GD). For more information about General Dynamics Mission Systems, please visit gdmissionsystems.com and follow us on Twitter @GDMS.

View original content with multimedia:http://www.prnewswire.com/news-releases/general-dynamics-adds-new-nsa-certified-taclane-flex-type-1-network-encryption-platform-to-secure-product-portfolio-300495314.html

SOURCE General Dynamics Mission Systems

http://gdmissionsystems.com

Read more:

General Dynamics Adds New NSA-certified TACLANE-FLEX Type 1 Network Encryption Platform to Secure Product ... - PR Newswire (press release)

Posted in NSA

NSA Doval discusses ‘major problems’ with top Chinese diplomat meet in Beijing – Hindustan Times

Indias National Security Adviser Ajit Doval and top Chinese diplomat Yang Jiechi discussed major problems in bilateral relations during a meeting in Beijing on Thursday, the first substantial contact since the two sides became engaged in a military standoff in Doklam (Donglang) area near the Sikkim border in mid-June.

Details of their discussions were not immediately available but a brief readout from the Chinese side said Yang brought up bilateral issues and major problems during the meeting.

Doval is in Beijing to attend a two-day BRICS security summit but the focus has been on his bilateral interactions with the Chinese leadership against the backdrop of the standoff and intense speculation on whether the two sides would begin a conversation to ease tensions, if not resolve the impasse.

Earlier, there was a question mark on whether Doval and Yang would have a one-on-one meeting given that China had set the withdrawal of Indian troops from Donglang as a precondition for a meaningful dialogue on the standoff.

Official Xinhua news agency didnt share details of the meeting between Doval and Yang but gave a broad outline.

Chinese State Councilor Yang Jiechi Thursday met separately with senior security representatives from South Africa, Brazil and India, Xinhua reported.

Yang also separately exchanged views with the three senior representatives on bilateral relations, international and regional issues and multilateral affairs, and set forth China's position on bilateral issues and major problems, it added.

Earlier this month, Prime Minister Narendra Modi had briefly met president Xi Jinping where they reportedly discussed a range of issues during an informal gathering of BRICS leaders in Hamburg.

China has blamed India for the standoff at Donglang or Doklam, accusing Indian soldiers of trespass and preventing Chinese soldiers from building a road in the area. The region is under the control of China but claimed by Bhutan.

India said it acted in coordination with Bhutan to oppose the road construction, which would represent a significant change of status quo with serious security implications.

Foreign minister Wang Yi told reporters Bangkok earlier this week the problem was very straightforward and even Indian officials publicly said that Chinese soldiers didnt enter the Indian territory. In other words, (the) Indian side admitted (crossing) into Chinese territory.

The resolution of the problem is very simple, he said: Indian troops have to go out.

Doval and Yang are also the officials currently leading the talks under the special representatives mechanism between India and China to resolve the boundary issue. As many as 19 rounds of talks have been held under the mechanism.

Link:

NSA Doval discusses 'major problems' with top Chinese diplomat meet in Beijing - Hindustan Times

Posted in NSA

Newly declassified memos detail extent of improper Obama-era … – The Hill

The National Security Agency and FBI violated specific civil liberty protections during the Obama administrationby improperly searching and disseminating raw intelligence on Americans or failing to promptly delete unauthorized intercepts, according to newly declassified memos that provide some of the richest detail to date on the spy agencies ability to obey their own rules.

The memos reviewed by The Hill were publicly released on July 11 through Freedom of Information Act litigation by the American Civil Liberties Union.

They detail specific violations that the NSA or FBI disclosed to the Foreign Intelligence Surveillance Court or the Justice Department's national security division during President Obamas tenure between 2009 and 2016. The intelligence community isn't due to report on compliance issues for 2017, the first year under the Trump administration, until next spring.

Quite simply, a compliance program that never finds an incident is not a robust compliance program, said Michael Halbig, theNSAs chief spokesman. The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.

But critics say the memos undercut the intelligence communitys claim that it has robust protections for Americans incidentally intercepted under the program.

Americans should be alarmed that theNSAisvacuuming up their emails and phone calls without a warrant, said Patrick ToomeyPat ToomeyNewly declassified memos detail extent of improper Obama-era NSA spying Overnight Tech: FCC won't fine Colbert over Trump joke | Trump budget slashes science funding | Net neutrality comment period opens Appeals court decision keeps lawsuit against NSA surveillance alive MORE, an ACLU staff attorney in New York who helped pursue the FOIA litigation.TheNSAclaims it has rules to protectour privacy, but it turns out those rules are weak, full of loopholes, andviolated again and again.

Section 702 empowers the NSA to spy on foreign powers and to retain and use certain intercepted data that was incidentally collected on Americans under strict privacy protections. Wrongly collected information is supposed to be immediately destroyed.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, thegovernment admitted improperly searching the NSAs foreign intercept data on multiple occasions, including one instance in which ananalyst ran the same search query about an American every work day for a period between 2013 and 2014.

There also were several instances in which Americans unmasked names were improperly shared inside the intelligence community without being redacted, a violation of the so-called minimization procedures that Obama loosened in 2011that are supposed to protect Americans' identity from disclosure when they are intercepted without a warrant.Numerous times improperly unmasked information about Americans had to be recalled and purged after the fact, the memos stated.

CIA and FBI received unminimized data from many Section 702-tasked facilities and at times are thus required to conduct similar purges, one report noted.

NSAissued a report which included the name of a United States person whose identity was not foreign intelligence, said one typical incident report from 2015, which said theNSAeventually discovered the error and recalled the information.

Likewise, the FBI disclosed three instances between December 2013 and February 2014 of improper disseminations of U.S. persons identities.

TheNSAalso admitted it was slow in some cases to notify fellow intelligence agencies when it wrongly disseminated information about Americans. The law requires a notificationwithin five days, but some took as long as 131 business days and the average was 19 days, the memos show.

U.S. intelligence officials directly familiar with the violations told The Hill that the memos confirm that the intelligence agencies have routinely policed, fixed and self-disclosed to the nation's intelligence court thousands of minor procedural and more serious privacy infractions that have impacted both Americans and foreigners alike since the warrantless spying program was created by Congress in late 2008.

Alexander Joel, who leads the Office of Civil Liberties, Privacy and Transparency under the director of national intelligence, said the documents chronicle episodes that have been reported to Congress and the Foreign Intelligence Surveillance Court for years in real time and are a tribute to the multiple layers of oversight inside the intelligence community.

We take every compliance incident very seriously and continually strive to improve compliance through our oversight regime and as evidence by our reporting requirements to the FISC and Congress, he told The Hill. That said, we believe that, particularly when compared with the overall level of activity, the compliance incident rate is very low.

The FBI said it believes it has adequate oversight to protect Americans' privacy, while signaling it will be pushing Congress hard this fall to renew the Section 702 law before it expires.

"The FBIs mission is to protect the American people and uphold the Constitution of the United States," the bureau said in a statement to The Hill. "When Congress enacted Section 702, it built in comprehensive oversight and compliance procedures that involve all three branches of government. These procedures are robust and effective in identifying compliance incidents. The documents released on July 11, 2017 clearly show the FBIs extensive efforts to follow the law, and to identify, report, and remedy compliance matters.

"Section 702 is vital to the safety and security of the American people. It is one of the most valuable tools the Intelligence Community has, and therefore, is used with the utmost care by the men and women of the FBI so as to not jeopardize future utility. As such, we continually evaluate our internal policies and procedures to further reduce the number of these compliance matters."

The new documents show that theNSAhas, on occasion, exempted itself from its legal obligation to destroy all domestic communications that were improperly intercepted.

Under the law, theNSAis supposed to destroy any intercept if it determines the data was domestically gathered, meaning someone was intercepted on U.S. soil without a warrant when the agency thought they were still overseas. The NSA, however, has said previously it created destruction waivers to keep such intercepts in certain cases.

The new documents confirm theNSAhas in fact issued such waivers and that it uncovered in 2012 a significant violation in which the waivers were improperly used and the infraction was slow to be reported to the court.

In light of related filings being presented to the Court at the same time this incident was discovered and the significance of the incident, DOJ should have reported this incident under the our immediate notification process, then-Assistant Attorney General Lisa Monaco wrote the FISA court in Aug. 28, 2012, about the episode, according to one memo released through FOIA.

TheNSAdeclined to say how often destruction waivers are given. But Joel, of the Office of the Director of National Intelligence, said the Foreign Intelligence Surveillance Court has supervised such waivers and affirmed they are consistent with the Fourth Amendment of the Constitution and the statutory requirements of Section 702.

Other violations cited in the memos:

In annual and quarterly compliance reports that have been released in recent years, U.S. intelligence agencies have estimated the number of Section 702 violations has averaged between 0.3 percent and 0.6 percent of the total number of taskings. A tasking is an intelligence term that reflects a request to intercept a specific phone number or email address.

The NSA now targets more than 100,000 individuals a year under Section 702 for foreign spying, and some individual targets get multiple taskings, officials said.

The actual number of compliance incidents remains classified but from the publicly available data it is irrefutable that the number is in the thousands since Section 702 was fully implemented by 2009, said a senior U.S. official with direct knowledge, who spoke only on condition of anonymity.

The increasing transparency on Section 702 violations is having an impact on both critics and supporters of a law that is up for renewal in Congress at the end of this year. Of concern are the instances in which Americans data is incidentally collected and then misused.

Retired House Intelligence Committee Chairman Pete Hoekstra, a Republican who strongly supported the NSA warrantless spying program when it started under President George W. Bush, said he now fears it has now become too big and intrusive.

If I were still in Congress today, I might vote with the people today to shut the program down or curtail it, Hoekstra, who has been tapped by Trump to be ambassador to the Netherlands, said in an interview.

One percent or less sounds great, but the truth is 1percent of my credit card charges dont come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans privacy.

This story was updated at 10:38 a.m.

Here is the original post:

Newly declassified memos detail extent of improper Obama-era ... - The Hill

Posted in NSA

Cain: President Trump is reasserting results; Declassified memos reveal Obama admin. NSA privacy violations – Fox News

This is a rush transcript from "Hannity," July 25, 2017. This copy may not be in its final form and may be updated.

SEAN HANNITY, HOST: This is a "Fox News Alert." And we are broadcasting from the swamp in Washington, D.C. And welcome to "Hannity."

A brand-new bombshell from The Hill's John Solomon reveals the depth of the Obama era NSA spying and civil liberties violations. John Solomon, along with Circa News's Sara Carter -- they will join us tonight on this explosive story.

Also, the president has just landed at Joint Base Andrews. And earlier tonight, he took his message directly to you, the American people. He had a rally in Youngstown, Ohio, where he pushed his agenda and took on his critics. And that is the subject of tonight's very important transitional "Opening Monologue."

All right, during tonight's massive rally in Ohio, President Trump issued an urgent call, pushing Congress to finally get rid of ObamaCare and to replace it with something that actually works for you, the American people. It's time for these guys in the swamp, in the sewer here in D.C. to get to work. Take a look.

(BEGIN VIDEO CLIP)

PRESIDENT DONALD TRUMP: We're now one step closer to liberating our citizens from this ObamaCare nightmare!

(CHEERS AND APPLAUSE)

TRUMP: And delivering great health care for the American people. We're going to do that, too. The Senate is working not only to repeal ObamaCare but to deliver great health care for the American people. Any senator who votes against repeal and replace is telling America that they are fine with the "Obama care" nightmare! And I predict they'll have a lot of problems.

(END VIDEO CLIP)

HANNITY: And I predict he's right. But repealing and replacing "Obama care" is not the only urgent task on the president's agenda. Now, listen to the president earlier tonight reassuring the American people that building the wall on our southern border is not just an empty campaign promise. Watch this.

(BEGIN VIDEO CLIP)

TRUMP: After spending billion dollars defending other nations' borders, we are finally defending our borders!

(CHEERS AND APPLAUSE)

TRUMP: Don't even think about it. We will build the wall.

(CHEERS AND APPLAUSE)

TRUMP: Don't even think about it.

I watch the media as they say, Well, he just had some fun during the campaign on the wall. That wasn't fun, folks! We're building that wall. And walls do work. And we're going to have great people come into our country, but we're not going to put ourselves through the problems that we've had for so many years!

(END VIDEO CLIP)

HANNITY: Is Congress listening? Now, the president also promised to drive out violent cartel-linked gangs and to put an end finally to sanctuary cities once and for all. Take a listen.

(BEGIN VIDEO CLIP)

TRUMP: The predators and criminal aliens who poison our communities with drugs and prey on innocent young people, these beautiful, beautiful innocent young people, will find no safe haven anywhere in our country. And that is why my administration is launching a nationwide crackdown on sanctuary cities!

(CHEERS AND APPLAUSE)

TRUMP: American cities should be sanctuaries for law-abiding Americans, for people that look up to the law, for people that respect the law, not for criminals and gang members that we want the hell out of our country!

(CHEERS AND APPLAUSE)

(END VIDEO CLIP)

HANNITY: Now, the president also spoke about lowering taxes in tonight's speech. Please lower taxes. Please stop burdening us! Watch this.

(BEGIN VIDEO CLIP)

TRUMP: My administration is working every single day to heed and honor the will of the voters. That includes working on one of the biggest tax cuts in American history. And actually, if I get what I want, it will be the single biggest tax cut in American history!

(CHEERS AND APPLAUSE)

TRUMP: We have the highest taxes anywhere in the world, and this will really bring them down to one of the lowest. And we really have no choice. We will have growth. We will have everything that we've dreamed of having. It's time to let Americans keep more of their own money. It's time to bring new companies to our shores and to create a new era of growth, prosperity and wealth!

(END VIDEO CLIP)

HANNITY: What a great idea. Let's get Americans back to work, back in the labor force, and of course, out of poverty and off of food stamps. Republicans, what do you stand for?

Now, the president's rally didn't just include plans for the future. He also touted a long list of accomplishments. Now, despite what the left- wing mainstream establishment media is reporting -- well, the president -- he has been very busy the last six months, working on trying to push through his bold agenda despite pretty much zero help from any Democrats, and frankly, weak Republicans.

And here's the president talking about what he has accomplished so far these last six months.

(BEGIN VIDEO CLIP)

TRUMP: Our 2nd Amendment is very, very sound again. That would have been gonzo. It would have been gone.

We've eliminated burdensome regulations at record speed, and many, many more are coming off. And boy, have we put those coal miners and coal back on the map. You've seen that, huh?

(CHEERS AND APPLAUSE)

TRUMP: We've achieved a historic increase in defense spending to get our troops the support they so richly deserve. We have signed new legislation to hold federal workers accountable for the care they provide to our great, great veterans!

(CHEERS AND APPLAUSE)

TRUMP: To protect American jobs and workers, I withdrew the United States from both the Trans-Pacific Partnership potential disaster...

(CHEERS AND APPLAUSE)

TRUMP: ... and the job-killing Paris climate accord. Believe me.

Unemployment last month hit a 16-year low. Since my election, we've added much more than one million jobs!

(END VIDEO CLIP)

HANNITY: Believe it or not, you're never going to hear that in mainstream media. And what you just heard is only a fraction of what the president has actually accomplished.

Also tonight, in true Trump fashion, the president fought back against his critics, the best part of the speech. Watch this.

(BEGIN VIDEO CLIP)

TRUMP: Sometimes they say, He doesn't act presidential.

(BOOS)

TRUMP: And I say, Hey, look, great schools, smart guy. It's so easy to act presidential, but that's not going to get it done. In fact, I said it's much easier, by the way, to act presidential than what we're doing here tonight! Believe me. And I said...

(CHEERS AND APPLAUSE)

TRUMP: And I said, with the exception of the late, great Abraham Lincoln, I can be more presidential than any president that's ever held this office! That I can tell you.

(END VIDEO CLIP)

HANNITY: Do we really want a president who just acts? Now, tonight, the president sent a very important message that will reverberate across America and into the swamp and sewer that is Washington, D.C., where I am tonight.

And the president's not going to sit idly by and watch Congress fumble his agenda. He's going to take his message again and again directly to you, the American people. It's time to put pressure on lawmakers to finally do their job and get something done.

Here with reaction, author of the book "Putin's Gambit," Fox Business host, our sister network, Lou Dobbs is with us.

You know, every time the president goes directly to the American people, you see the reaction. There is not one iota's difference before the campaign. And every agenda item he has, which helped a lot of these senators and congressmen get elected, is supported by those crowds. What is Washington not getting? What are Republicans not getting?

LOU DOBBS, FOX BUSINESS: Just about everything, as you know, Sean. The president today was -- you know, as you say, this rally today was just like every rally that he carried out as a candidate for president. The love in the room for the president was palpable.

He is watching -- he doesn't need any extra energy, but he's drawing great energy from these people who are his supporters. They are also the people for whom he is working, not K Street, the lobbyists, the billion-dollar donors that expect to have the federal government heel and certainly the leadership of the Republican Party. They're so accustomed to them heeling to their every order and beck and call.

He is frustrating the establishment. That's what we're watching, is a conflict between this president, the status quo, and frankly, the defenders of the status quo, whether they're Republicans or Democrats. And he is winning, winning and winning. And the people in that room in Youngstown, Ohio, all 7,000 of them, know that very well, as do tens of millions of other Americans.

HANNITY: But Lou, if the Republicans don't do their part -- this is a seven-year promise to replace, replace "Obama care." They needed Mike Pence for the motion to proceed today...

DOBBS: Right.

HANNITY: ... which doesn't give me a whole lot of confidence that they're going to get this whole thing done or done in a way that they had promised for seven years. And think I think you got an economic plan so we can get Americans...

DOBBS: Right.

HANNITY: ... out of poverty, off of food stamps...

DOBBS: No, you're right.

HANNITY: ... back to work and get the border built and funded. And I don't think Congress realizes they will pay the price if they don't get the job done.

DOBBS: That is the sub-text here. You're exactly right again, Sean. This is -- this threat that is looming is for every one of those congressmen who are hesitant and hesitating to support this president and his agenda, and particularly the leadership, the speaker and the majority leader of the Senate, Ryan and Mitch McConnell. They had better deliver this time because it will be fundamentally a question of the survival of the Republican Party.

Donald Trump is -- what he was saying in Youngstown, Ohio, in my opinion, in addition to everything else that was so terrific about the economy, about turning this country around, he's serving notice that those are Trump Democrats in Youngstown, Ohio, which he lost by 3 points. But four years earlier, Barack Obama won that county by 27 points!

These are his people. And you heard Gino (ph), the man he brought up on the stage, and the chants for Gino from the crowd because he was talking about how much this president is loved by the forgotten man and woman. And all of those people in Youngstown represent much of the bread basket, where they've lost a third of the population of Youngstown, Ohio, their factories once one of the top steel producing cities in the country. And it's -- it's remarkable the notice that he served. And I guarantee you -- I don't know whether McConnell and Ryan got it, but I can guarantee you Schumer and Pelosi get it, and they're worried to death.

HANNITY: Yes. And by the way, a better way...

DOBBS: Oh, yes.

HANNITY: They -- there's no way for them, and especially after eight years of failure. Lou Dobbs, I know you stayed late for us tonight. As always, thanks you for being with us.

DOBBS: Great to be with you, Sean. Thanks.

HANNITY: And here now with more reaction to the president's rally in Youngstown, Ohio, we have Fox News contributor Herman Cain. One of the things -- I noticed that Chuck Grassley in the Senate is saying, Wait a minute. If outside interference from a foreign country is a big deal -- Russia, Russia, Russia -- OK, we've got evidence of collusion with Ukraine and influence in the election, as well. Also, we have the Uranium One deal. And then I look at House conservatives. They're pushing for a probe of Comey and Clinton and I know others are talking about Loretta Lynch.

The part of me is torn, Herman Cain, Mr. 999, positive ideas -- it's torn because it's not fair what we've been seeing, but the agenda the president talked about, repeal, replace and schools and borders and listing his accomplishments and Gorsuch -- at the end of the day, I suspect if he succeeds, that will push Republicans over the top in 2018 and 2020. I'm torn what to do.

HERMAN CAIN, FOX NEWS CONTRIBUTOR: But many of them don't realize that. Sean, that speech in Ohio reminded me of the three rallies I attended in Georgia, where I helped to introduce this president. He is re-asserting results, results, results. That's why he got the reaction from the crowd that he got. The Democrats are all about resist, resist, resist, and it's not resonating with people.

Hip, hip, hooray that he's taking his message directly to the people because the mainstream media's not going to do it. So he's doing it himself. And I think that helps to re-energize those people that voted for him because of exactly the things he is able to do, even despite the pushback by RINOs, Republicans in name only, and Democrats.

HANNITY: We learned that in spite of, what, 60 to 68 votes, repeal and replace -- Herman, we're on the radio. We were telling our audience those are showboats because if they really wanted to repeal and replace in those votes, they would have used the constitutional authority and the power of the purse, and they never did it. And the one guy that tried to use it, Ted Cruz, was excoriated by the Republican Party. So we knew they were showboats.

But on repeal and replace now, we learned 100 House Republicans had no intention of keeping that promise. And now you see the Senate just for the motion to proceed needing Mike Pence. This does not bode well, in my mind.

CAIN: You're right, Sean. Here's the deal. They thought that the American people were going to have very short memories. That's what they still think. What this president is doing is reminding the American people of what these Republicans promised.

And I got to tell you, last night on your show, you challenged your viewers to do exactly what I challenge my listeners to do, send e-mails, make phone calls and let them know that you are paying attention. That's the only thing that gets their attention. That's what gets results.

And with the president giving the kind of patriotic, pressable (ph) results-oriented speech that he's given today, it reminds people that, Yes, if I send that e-mail, if I make that phone call to my representative or to my senators, it will make a difference. I think this is great for the direction that this president is trying to go.

HANNITY: All right, Herman Cain, always good to see you. We appreciate it.

All right, we got...

CAIN: Thank you.

HANNITY: ... a busy breaking news night tonight here. "Hannity" in D.C. In a mini monologue, we will lay out the scandals Congress and the DOJ should be investigating and we'll get reaction, Monica Crowley, Geraldo Rivera.

And also tonight...

(BEGIN VIDEO CLIP)

TRUMP: I'm here this evening to cut through the fake news filter and to speak straight to the American people!

(END VIDEO CLIP)

HANNITY: President Trump calling out the fake news media at tonight's rally in Ohio. Mercedes Schlapp, Lanny Davis, Larry Elder will join us with reaction.

And tonight, a "Hannity" investigation. An explosive new report by The Hill's John Solomon. It is about the Obama administration's NSA spying and civil liberties violations you need to know about. John Solomon, Sara Carter join us as we continue from the sewer and the swamp that is Washington, D.C.

(COMMERCIAL BREAK)

(BEGIN VIDEO CLIP)

TRUMP: Your future is what I'm fighting for each and every day. Here is just a small sample what have we accomplished in just our first six months in office. And I'll say this, and you know, they always like to say, Well, I don't know. But I think that with few exceptions, no president has done anywhere near what we've done in his first six months.

(CHEERS AND APPLAUSE)

TRUMP: Not even close.

Read more:

Cain: President Trump is reasserting results; Declassified memos reveal Obama admin. NSA privacy violations - Fox News

Posted in NSA

New Docs Show Obama-Era NSA Spied On Americans Without Warrants – The Daily Caller

TheNSA and the FBI under the Obama administration infringed upon foundational civil liberties manytimes over several years, according to recently declassified documents reviewed by The Daily Caller News Foundation.

The memos which were originally obtained by the American Civil Liberties Union (ACLU) through Freedom of Information Act litigation detail the improprieties, specifically the massive, indiscriminate surveillance of peoples communications. They were first reported on by The Hill.

The NSA intercepted hundreds of thousands of peoples personal information, including email addresses and phone numbers, throughout then-President Barack Obamas tenure. It was ostensibly empowered by Section 702 of the Foreign Intelligence Surveillance Act (FISA), which allows federal intelligence agencies to collect data on foreigners without a warrant. Due to the broad powers enumerated in the law and the inherent makeup of surveillance, the electronic communications of law abiding Americans are often picked up as well. Operators of the surveillance are required to immediately destroy any information that isnot part of the intended target, but often fail to do so. They are also officiallyobligated to keep the scope of the interception to a fewpieces of data, not a haphazardamount, and to ensure that a person who is inappropriatelyswept up in a warrant isnt identified.

According to section 3(b)(5) of NSAs Section 702 minimization procedures, computer selection terms used for scanning, such as telephone numbers, key words or phrases, or other discriminators, will be limited to those selection terms reasonably likely to return foreign intelligence information,' reads a formerly top secret NSA quarterly FISA compliance report from March 2015.

NSA reported that on [redacted] 2014, an analyst conducted an overly broad search against data acquired from multiple authorities including Section 702. NSA advises that the analyst realized his error immediately, canceled the query, and deleted the corresponding results, the memo reads, adding that the analyst was once again reminded of the FISA requirements. This specific outlined incident wasjust one of many listedin just one of the many quarterly reports issued by the NSA, signifying the extent of violations.

Several consequential improper disclosures have occurred in recent months, including the unmasking of elected officials like former national security adviser Mike Flynn, subsequently causing morelawmakers to question its validity than before.(RELATED: Will The GOP Remake Surveillance Laws After Trump Leaks?)

Our countrys founders required the government to get a warrant before searching Americans private papers, ACLU Staff Attorney Patrick Toomey told TheDCNF. The same holds true for Americans phone calls, emails, and internet browsing today, whether a person is communicating with a friend around the corner or a family member around the world. The NSA should not be spying on us.

The agency claims that of course some incidental surveillance will occur, and errors only happenless than 1 percent of the time.

Quite simply, a compliance program that never finds an incident is not a robust compliance program, said Michael T. Halbig, the NSAs chief spokesman, according to The Hill. The National Security Agency has in place a strong compliance program that identifies incidents, reports them to external overseers, and then develops appropriate solutions to remedy any incidents.

Stewart Baker, the first assistant secretary for policy at the U.S. Department of Homeland Security under President George W. Bush, told TheDCNF that its difficultto authorize Section 702 without enablingthe collection of Americans communications. He provides a telling example of a hypotheticalemail address like [emailprotected] in whichit doesnt explicitly show if Mahmoud, who may be conversing with nefarious Yemeni nationals, is an American or not.

Baker asserts that if the NSA knew that Mahmoud was an American, it would usually mask' his email address with some label like USPerson No. 1 email address.

Section 702 is an effective program that cant really work if we try to exclude Americans communications, Baker continued, adding that the unmasking provisions could be tightened up and they were effectively loosened as part of the sharing imperative arising from 9/11.

OneNSA analyst, for example, conducted the same search query about a particular American every work day for months.

The NSA announced in April that it stopped the practice of scooping communications American citizens have with foreign surveillance targets. But it is not clear how it will do so if it continues implementing surveillance under Section 702 of FISA, which is set to expire at the end of the year.

The content of our emails and texts contains incredibly personal information about our work, our families, and our most intimate thoughts, Michelle Richardson of the Center for Democracy Technology, a nonprofit, said in a statement provided toTheDCNF. The NSA should never have been vacuuming up all of these communications, many of which involved Americans, without a warrant. While we welcome the voluntary stopping of this practice, its clear that Section 702 must be reformed so that the government cannot collect this information in the future.

Not everyone is interested in reforming the surveillance measure, though. Spearheaded by Sen. Tom Cotton of Arkansas, a large group of Republican senators introduced legislation in Juneto indefinitely extend the statute for national security purposes.

Follow Eric on Twitter

Send tips to [emailprotected].

Content created by The Daily Caller News Foundation is available without charge to any eligible news publisher that can provide a large audience. For licensing opportunities of our original content, please contact [emailprotected].

View post:

New Docs Show Obama-Era NSA Spied On Americans Without Warrants - The Daily Caller

Posted in NSA

NSA Ajit Doval in Beijing amid standoff as China demands Indian troop withdrawal – Hindustan Times

Indias National Security Adviser Ajit Doval arrived in Beijing on Wednesday afternoon for a multilateral security meet but the focus will be on his bilateral interactions with the Chinese leadership against the backdrop of the military standoff near the Sikkim border.

Doval will meet President Xi Jinping with his counterparts from BRICS (Brazil, Russia, India, China, South Africa) countries on Friday. Security officials from BRICS states are meeting to discuss issues such as counter-terrorism and cyber-security in the run-up to the groupings summit to be held in Chinas Xiamen city in September.

But the focus will be on whether Dovals meetings with Chinese officials, including state councillor Yang Jiechi, will help to resolve or at least ease - the tensions in Donglang, where the standoff is now into its second month.

The BRICS-related meetings, including the meeting with Xi, are slated for Friday but Chinese and Indian officials here were tight-lipped about Dovals schedule.

Beijing on Wednesday repeated its precondition for any dialogue with India to resolve the standoff: New Delhi has to withdraw its troops from Donglang, which is under Beijings control but claimed by Thimphu.

Chinese foreign minister Wang Yi has blamed India for the face-off and importantly chose a foreign country, Thailand, to air his strong views on the situation. Wang told reporters in Bangkok this week the problem was very straightforward and even Indian officials publicly said that Chinese soldiers didnt enter the Indian territory.

This meant, he indicated, the Indian side admitted (crossing) into Chinese territory. The resolution of the problem is very simple, he said: Indian troops have to go out.

India has said it acted in coordination with Bhutan to block the construction of a road by Chinese troops at Donglang as it would alter the status quo and have serious implications for national security.

On Monday, Chinas foreign ministry spokesperson Lu Kang indicated Doval is likely to meet Yang in Beijing but ruled out a discussion on the Donglang standoff.

As far as we know, in previous meetings, usually it is arranged for the heads of delegations to hold (bilateral) meetings to exchange views on bilateral relations and other international issues, Lu had said.

He had added: The crux now is Indian border troops illegally stayed on Chinas territory. Once again, we urge India to pull back to the Indian side of the boundary. I want to stress that this is the precondition for any meaningful talks between the two sides.

Dovals visit is part of the build-up for the BRICS Summit to be held in Xiamen city in the first week of September, which will be attended by Prime Minister Narendra Modi.

If the standoff between India and China isnt resolved by then, it will cast a shadow of uncertainty over the summit and might put a question mark on the idea of BRICS.

For now, the multilateral element of the BRICS security summit will be on display this week.

On Friday, the five heads of security delegations from the BRICS states will meet to discuss global governance, counter-terrorism, cyber security, energy security, international and regional hotspots, and national security and development.

Besides Doval and Yang, minister of state security David Mahlobo of South Africa, Minister Sergio Etchegoyen of the Office of Institutional Security of the Presidency of Brazil and Russias Security Council Secretary Nikolai Patrushev will attend the meeting.

Visit link:

NSA Ajit Doval in Beijing amid standoff as China demands Indian troop withdrawal - Hindustan Times

Posted in NSA

Should NSA and CYBERCOM Split? The Legal and Policy Hurdles as They Developed Over the Past Year – Lawfare (blog)

In light of Michael Sulmeyers excellent recent piece on splitting NSA and CYBERCOM, which ran at War on the Rocks last week, I want to pull together some of the key legal and policy developments of the past year in a single narrative. My aim is to put them in context with each other in a way that will provide useful background for those new to this issue, while also putting a spotlight on the deconfliction-of-equities issue that the split proposal raises. My apologies that this is a longer-than-normal post (I did not have time to be shorter!).

1. July 2016 Reports of DOD frustration over pace of anti-ISIS cyber operations

In July 2016, the Washington Post (Ellen Nakashima & Missy Ryan) reported on CYBERCOMs efforts to disrupt the Islamic States online activities (internal communications, external propaganda, financing, etc.), emphasizing the view of DOD leadership that CYBERCOM was underperforming:

An unprecedented Pentagon cyber-offensive against the Islamic State has gotten off to a slow start, officials said, frustrating Pentagon leaders and threatening to undermine efforts to counter the militant groups sophisticated use of technology for recruiting, operations and propaganda.

But defense officials said the command is still working to put the right staff in place and has not yet developed a full suite of malware and other tools tailored to attack an adversary dramatically different from the nation-states Cybercom was created to fight.

Although officials declined to detail current operations, they said that cyberattacks occurring under the new task force might, for instance, disrupt a payment system, identify a communications platform used by Islamic State members and knock it out, or bring down Dabiq, the Islamic States online magazine.

The report is an excellent snapshot of several distinct challenges the military use of computer network operations can pose.

One such challenge is operational capacity. The story suggests that CYBERCOM simply did not have the right personnel and the right exploits on hand for this particular mission, at least at the start. Thats a problem that can be fixed, and the report details the steps DOD began taking in 2016 to do just that.

Another challenge is the need to have an effective process for deconfliction between intelligence-collection and operational-effect equities. As the article summarized the issue:

Whenever the military undertakes a cyber-operation to disrupt a network, the intelligence community may risk losing an opportunity to monitor communications on that network. So military cybersecurity officials have worked to better coordinate their target selection and operations with intelligence officials.

This is not a novel tension, in the abstract. For as long as there has been signals intelligence, there have been tensions of this kind. When one side has access to the others communications, there will always be tension between the temptation to exploit that access for operational effect (with the opportunity cost of risking loss of that access going forward as the enemy realizes it has been monitored) and the temptation to instead exploit it for indirect intelligence advantage (with the opportunity cost of forgoing direct operational advantage in at least some cases). World War II provides famous examples. And so one might fairly ask: is there anything really different about computer network operations, warranting special attention to the topic in this setting?

Perhaps. In this domain there is much more overlap between the means of collection and the means of carrying out a disruptive operations. Indeed, those means often will be the exact same: a particular exploit providing access to an enemy device, network, etc. It seems to me that this ensures that the tension between collection and operational equities will arise with greater frequency, and less room for workarounds, than in more familiar settings.

Having mentioned both the operational capacity concern and the competing-equities concern, now is a good time to emphasize the significance of the status-quo for NSA and CYBERCOM: the dual-hatted commander. Whereas more familiar, traditional scenarios involving tension between collection and operational equities usually involve distinct underlying institutions and commanders, the status quo with respect to computer network operations has always (well, the past seven years) involved the dual-hatting of NSAs director and CYBERCOMs commander.

This model in theory ensures that neither institution has a home-field advantage, and maximizes the chance that the key decisionmaker (yes, there can be important decisions both below and above the dual-hat, but the dual-hat is obviously in the key position) fully buys into and fully grasps the importance of each institutions mission.

Of course, it is possible that the dual-hat might tilt one direction to an unfair or undesirable degree. And it is possible that some might perceive such a tilt even when there isnt one. As 2016 wore on, questions of this kind began to appear in public, and by September the media was reporting that DNI Clapper and SecDef Carter both were in favor of splitting up the dual-hat. It was not the first time this topic had come up, to be sure; President Obama had considered ordering a split in 2013 (during the aftermath of the Snowden controversy), but had not taken that step at least in part out of concern about CYBERCOMs independent operational capacity. Now the idea appeared to have momentum.

A report from Ellen Nakashima in the Washington Post that same month suggested that this momentum was in part a product of CYBERCOMs operational maturation, but also in significant part driven by the perception that Admiral Rogers, the current dual-hat, favored collection equities to an undue extent:

Whether or not its true, the perception with Secretary Carter and [top aides] has become that the intelligence agency has been winning out at the expense of [cyber] war efforts, said one senior military official.

(See also this report by the New York Times, stating that frustration along these same lines contributed to the effort to get President Obama to remove Admiral Rogers in late 2016.)

The Washington Post report also highlighted concerns that splitting NSA and CYBERCOM at the leadership level might actually weaken rather than empower CYBERCOM, as NSA inevitably would become free to withhold from CYBERCOM at least some exploits or other forms of access so that sources would not be lost:

Cyber Commands mission, their primary focus, is to degrade or destroy, the former official said. NSAs is exploit [to gather intelligence] only. So without having one person as the leader for both, the bureaucratic walls will go up and youll find NSA not cooperating with Cyber Command to give them the information theyll need to be successful.

2. December 2016 Congress puts on the brakes

Against this backdrop, Congress intervened in late 2016 to slow down the Obama administrations move to split the dual-hat. Section 1642 of the NDAA FY17, enacted in late December, provides that NSA and CYBERCOM must continue to share a dual-hatted director/commander unless and until the Secretary of Defense and the Chairman of the Joint Chiefs of Staff jointly certify to certain Congressional committees (SASC & HASC; SSCI & HPSCI; and the Appropriations Committees) that separation will not pose unacceptable risks to CYBERCOMs effectiveness, and that the following six conditions are met:

(i) Robust operational infrastructure has been deployed that is sufficient to meet the unique cyber mission needs of the United States Cyber Command and the National Security Agency, respectively.

(ii) Robust command and control systems and processes have been established for planning, deconflicting, and executing military cyber operations.

(iii) The tools and weapons used in cyber operations are sufficient for achieving required effects.

(iv) Capabilities have been established to enable intelligence collection and operational preparation of the environment for cyber operations.

(v) Capabilities have been established to train cyber operations personnel, test cyber capabilities, and rehearse cyber missions.

(vi) The cyber mission force has achieved full operational capability.

Section 1642(b)(2)(C) (emphasis added). President Obamas signing statement criticized Congress for imposing this requirement, but did not include a claim that it was unconstitutional. It remains the law at this time.

3. Early 2017 Complications in the War Against the Islamic State

While lawmakers and policymakers wrestled with the pros and cons of splitting NSA and CYBERCOM, computer network operations against the Islamic State continued to accelerate.

Along the way, however, new problems emerged.

As Ellen Nakashima of the Washington Post reported in May 2017, CYBERCOM by late 2016 had encountered a new set of challenges in its enhanced effort to shut down ISIS sites and platforms: third-country effects.

A secret global operation by the Pentagon late last year to sabotage the Islamic States online videos and propaganda sparked fierce debate inside the government over whether it was necessary to notify countries that are home to computer hosting services used by the extremist group, including U.S. allies in Europe. Cybercom developed the campaign under pressure from then-Defense Secretary Ashton B. Carter, who wanted the command to raise its game against the Islamic State. But when the CIA, State Department and FBI got wind of the plan to conduct operations inside the borders of other countries without telling them, officials at the agencies immediately became concerned that the campaign could undermine cooperation with those countries on law enforcement, intelligence and counterterrorism. The issue took the Obama National Security Council weeks to address

This article highlights a third significant challenge associated with computer network operations: attacking the enemys online presence often requires, or at least risks, some degree of impact on servers located in other countries. Third-country impact involves both legal and policy challenges, and as the quote above illustrates it also brings into play otherwise-unrelated equities of other agencies. Thus, the competing-equities tension is not just a clash between collection and operational equities, but in some cases many others as well. The dual-hat command structure is primarily an answer only to the former, not the latter.

Meanwhile, a sobering reality about the utility of cyberattacks on Islamic State communications began to become clear: the effects often did not last. This was the thrust of an important piece by David Sanger and Eric Schmitt in the New York Times in June 2017:

[S]ince they began training their arsenal of cyberweapons on internet use by the Islamic State, the results have been a consistent disappointment, American officials say. [It] has become clear that recruitment efforts and communications hubs reappear almost as quickly as they are torn down. In general, there was some sense of disappointment in the overall ability for cyberoperations to land a major blow against ISIS," or the Islamic State, said Joshua Geltzer, who was the senior director for counterterrorism at the National Security Council until March. "This is just much harder in practice than people think..."

This suggested that the military equities that some felt had been undervalued by Admiral Rogers in the past were less weighty than proponents had assumed. Nonetheless, momentum towards separationand concern that the dual-hat unduly favors collection equitiescontinues.

In mid-July, reports emerged that the Pentagon had submitted to the Trump administration a plan for effectuating the split, with some of the accompanying commentary continuing to advance the argument that NSA holds CYBERCOM back to an improper extent:

The goal, [unnamed U.S. officials] said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world a responsibility that can sometimes clash with military operations against enemy forces.

Meanwhile, however, Congress is in the midst of producing the next NDAA, and it may impose a further hurdleone that wont prevent the split, but may well slow it down considerably.

4. Congress reengages

In mid-July, the House passed H.R. 2810, which includes a section addressing the potential NSA/CYBERCOM split. Section 1655 requires the SecDef to provide SASC, HASC, SSCI, and HPSCI with a report on DODs progress in addressing the issues that must be certified to Congress before NSA and CYBERCOM may be split (under the terms of section 1642 of NDAA FY17). That report must address:

(1) Metrics and milestones for meeting the conditions described in subsection (b)(2)(C) of such section 1642.

(2) Identification of any challenges to meeting such conditions.

(3) Identification of entities or persons requiring additional resources as a result of any decision to terminate the dual-hat arrangement.

(4) Identification of any updates to statutory authorities needed as a result of any decision to terminate the dual-hat arrangement.

Meanwhile, the Senates NDAAFY18 draft (S.1519) has begun its trek through that chamber, and it includes a requirement (section 1627) that the commander of CYBERCOM report to SASC and HASC on the costs associated with meeting the conditions needed to enable NSA and CYBERCOM to split. As the SASC Committee Report accompanying the bill explains:

The committee believes any decision to separate Cyber Command and the National Security Agency should be conditions-based. The committee also believes that the funding associated with separating the dual-hat arrangement will be a multiyear sustained effort. The committee notes that the fiscal year 2018 budget request failed to include the funding necessary to resource the separation of the dual-hat arrangement. The committee looks to Cyber Command to estimate the funding required to meet the conditions identified in section 1642(b) of the National Defense Authorization Act for Fiscal Year 2017 (Public Law 114328) and intends to closely monitor future budget submissions and the cost, schedule, and performance of key cyber programs to ensure that Cyber Command is appropriately resourced prior to any decision to end the dual-hat arrangement.

5. What is the bottom line in light of all this?

* The statutory obstacles to a split of the dual-hat, from the current NDAA, are not onerous. The certifications required by section 1642 of NDAA FY17 can be dealt with easily enough given the high level of generality with which they are framed, once the political will is there to carry out the separation. It sounds as if the will is there, and that the only real hurdle is specifying something realistic in terms of the requirement that the cyber mission force reach full operational capacity.

* Deconfliction and Competing-Equities Tensions remain a significant issue that needs to be addressed very carefully. Yes, section 1642 of NDAA FY17 requires a certification on deconfliction, but as just noted the requirement is framed at a high-level of generality. People need to focus on the fact that a main driver of the effort to split NSA and CYBERCOM has been the perception that Admiral Rogers gives collection equities too much weightbut that he may well have been quite right to do so. And people also need to focus on the converse risk: that NSA might pull back on cooperation with CYBERCOM to an undesirable degree, post-split, in order to preserve the means of its collection. All of this can be managed, and its not obvious that the current dual-hat solution is the only way to do it. But there needs to be a credible process of some kind, if not the dual-hat. Its not clear that the certification requirement under section 1642 actually will compel sufficient consideration of this issue.

* Section 1627 of NDAA FY18, if it is enacted as SASC has proposed, will be a more serious hurdle. Budgets matter, and it is likely that the correct answer to the budget question posed by that section will involve a substantial need. That money then needs to be found and appropriated. Probably it should be and no doubt it will be. But it will take time for all this to grind out. Possibly this delay would track the time needed in any event to produce a credible claim that the cyber mission force has reached full operational capacity.

View original post here:

Should NSA and CYBERCOM Split? The Legal and Policy Hurdles as They Developed Over the Past Year - Lawfare (blog)

Posted in NSA

Former prosecutors join accused NSA leaker’s legal defense team – MyAJC

A former top U.S. Justice Department official and a former federal prosecutor have joined Reality Winners legal defense team in the National Security Agency leak investigation.

Joe Whitley, who served as the acting associate U.S. attorney general during the Reagan and George H.W. Bush administrations, is a partner with the Atlanta law firm of Baker Donelson. He also worked as the U.S. Department of Homeland Securitys general counsel and served as a federal prosecutor in Georgia. Joining Whitley is Matthew Chester, a former assistant U.S. attorney who works for the same law firm in New Orleans.

They are teaming up with John Bell and Titus Nichols of Bell & Brigham in Augusta. The attorneys joined the case after First Look Media, the parent company of The Intercept online news outlet, announced this month that it would help Winners legal defense. First Look said its Press Freedom Defense Fund would provide $50,000 in matching funds to Stand With Reality, a nonprofit campaign to support Winners case through advocacy and fundraising.

RELATED:Owner of The Intercept assisting accused NSA leakers legal defense

The U.S. Justice Department has accused Winner of leaking to The Intercept a top-secret NSA report about Russias meddling in the 2016 presidential election. The Intercept published the report, which says Russian military intelligence officials tried to hack into the U.S. voting system just before last Novembers election.

A federal grand jury has indicted Winner, 25, on a single count of "willful retention and transmission of national defense information. She faces up to 10 years in prison and $250,000 in fines. Winner, who is being held in the Lincoln County Jail, has pleaded not guilty to the charge.

Winners mother, Billie Winner-Davis, released a statement to Stand With Reality about the new attorneys joining her daughters defense team.

I am very excited about Mr. Whitley joining Realitys defense team, she said, as he appears to have extensive experience. His background with homeland security should be helpful.

See more here:

Former prosecutors join accused NSA leaker's legal defense team - MyAJC

Posted in NSA

Two new attorneys join accused NSA leaker’s defense team | The … – The Augusta Chronicle

Two additional attorneys have joined Reality Leigh Winners defense team in the espionage prosecution in U.S. District Court in Augusta.

U.S. Magistrate Court Judge Brian K. Epps granted Joe Dally Whitley and Matthew Scott Chester permission to to be admitted to practice in the Southern District of Georgia to help defend Winner, 25.

Winner has pleaded not guilty to a single count of willful retention and transmission of national defense information. She is accused of copying a secret document while at work for National Security Agency contractor Pluribus at Fort Gordon and sending it anonymously to online news publication The Intercept. She has been held without bond since her arrest June 3.

Two days later, The Intercept published an in-depth article about a NSA analysis of Russias attempts to meddle in the presidential election, a subject now under scrutiny by the Senate and House intelligence committees and a special prosecutor investigating possible collusion between Russia and people supportive of Trumps campaign.

A tentative trial date for Winner is the week of Oct. 23.

The newest members of the defense team are both former federal prosecutors with the national law firm Baker Donelson.

Whitley of Atlanta served in the Department of Justice under Presidents Reagan and George H.W. Bush, serving as the acting associate attorney general, the number three position at the DOJ for a time. After 9/11, George W. Bush selected Whitley to serve as the first general counsel for the U.S. Department of Homeland Security. Whitley also previously served as the U.S. Attorney in the Northern District of Georgia. At Baker Donelson, Whitley specializes in complex civil and criminal cases, according to the firms website.

Chester works in the Baker Donelson office in New Orleans. He previously served as an assistant U.S. attorney in the New Orleans office where he prosecuted white collar crimes and public corruption cases.

In 2015, he was awarded the Department of Justices Superior Performance in Litigation award for his work on the prosecution team that helped convict New Orleans Mayor Ray Nagin of charges that included bribery, wire fraud and tax evasion. Nagin is serving a 10-year prison term. Chester now also serves as an adjunct faculty member at Tulane University School of Law where he graduated cum laude in 2004.

Reach Sandy Hodson at (706) 823-3226 or sandy.hodson@augustachronicle.com.

Original post:

Two new attorneys join accused NSA leaker's defense team | The ... - The Augusta Chronicle

Posted in NSA

UP: Police to invoke NSA against rape accused – The Indian Express

Written by Sarah Hafeez | Allahabad | Published:July 25, 2017 4:25 am (Representational Image)

Allahabad police have decided to invoke the stringent National Security Act (NSA) against an accused facing charges of rape and attempt to murder. The accused, Sanjay Hela, was arrested three days ago. The alleged rape and murder attempt took place in the Civil Lines area on July 20. The victim was a 20-year-old domestic help.

A senior police officer said the case does not have the features necessary for invoking NSA. There is no law and order problem and neither is there public disaffection as a result of this incident, the officer said. However, he added, invoking the NSA is the sole discretion of the SSP and the DM of the district.

SSP Sureshrao A Kulkarni said: The crime, committed during the day, has triggered a scare among local residents. It might also spark a protest. So we are going to invoke NSA when the accused applies for bail. We feel he might pose a threat to public safety.

The act, usually invoked by central or state governments in cases whereby security, defence or foreign relations of the country are compromised, also applies to cases where maintenance of public order is disrupted.

For all the latest Cities News, download Indian Express App

Continue reading here:

UP: Police to invoke NSA against rape accused - The Indian Express

Posted in NSA

Labor Dept partners with NSA in St Johnsbury to find workers – Vermont Biz

Vermont Business Magazine The Vermont Department of Labor has partnered with NSA Industries, LLC in St. Johnsbury in an effort to fill the companys available positions with skilled, available talent. On Wednesday, July 26, 2017, NSA will open its doors from 4 pm 7 pm for an onsite recruitment event for the general public. NSAs facility is located at 210 Pierce Road, St Johnsbury.

Founded in 1982, NSA specializes in machining, sheet metal fabrication, engineering and logistics. The company currently employs over 200 individuals and is looking to hire machine operators, assemblers, testers/inspectors and welders, as well as a variety of other positions.

This event displays our desire to actively work with employers to assist them in finding the talent they need to be competitive in todays economy. Additionally, this job fair provides another opportunity for the displaced workers in the Northeast Kingdom to find meaningful employment, said Michael Harrington, Deputy Commissioner for the Vermont Department of Labor.

Wednesdays job fair is open to all interested individuals, and the Vermont Department of Labor will be onsite to provide support services, including application assistance.

For a complete list of jobs available at NSA or across the State, visit: http://www.nsaindustries.com or http://www.vermontjoblink.com.

Source: Vermont Department of Labor 7.24.2017

Read more:

Labor Dept partners with NSA in St Johnsbury to find workers - Vermont Biz

Posted in NSA

NSA Ajit Doval in Beijing this week: Amid Sikkim stand off, all eyes on BRICS NSA summit which begins on 27 July – Firstpost

As the ongoing India-China standoff in the Doka La region in Northeastern part of the country continues for the second month,National Security Advisor Ajit Doval is all set to travel to Beijing to attend a BRICS NSA summit on 27 and 28 July. "As far as visit of the National Security Advisor to China for the meeting of BRICS NSAs is concerned, I can confirm that he will be visiting. The visit will take place on 27 and 28 July," External Affairs Ministry spokesperson Gopal Baglay said.

Asked whether Doval will have any bilateral meeting with any Chinese leader or the Special Representative for boundary talks on the sidelines of the meeting of NSAs from BRICS (Brazil, Russia, India, China and South Africa), Baglay did not give a direct reply. "We will keep you informed as and when there are developments," Baglay said.

The visit comes days after external affairs minister Sushma Swaraj addressed the Monsoon Session of the Parliament over the ongoing border stand-offin the Doka La area of the Sikkim sector, which began over two months ago after Indian troops stopped the Chinese army from building a road in the disputed area.

A file image of National Security Advisor Ajit Doval with his Chinese counterpart Yang Jiechi. Reuters

Expounding upon the issue, Swaraj added that the status quo on Sikkim border was not altered by India, but China."China has unilaterally tried to change the status quo at the tri-junction and that is a threat to our security. We are willing to talk, but both sides should take back their armies tothe original position. We are involved in a tri-junction this time and it's directly related to us, if China will change that...that is threat to our security," Swaraj said.

"Saare desh humare saath hain aur sabhi desh samjh rahe hain ki bharat ne jo apna mat rakha hai woh galat nahi hai(All countries are supporting us and they understand that Indias viewpoint on the issue is not incorrect)," Swaraj said.

Chinese welcome visit

Chinese analysts have welcomed the Doval's meeting with his counterpart Yang Jiechi, claiming that the meeting may help ease prevailing tensions on the border. Ma Jiali, a research fellow at the China Reform Forum thinktank, said Doval's visit may be key and would serve as an opportunity to ease India-China tensions.

"China would lodge solemn representation with the Indian side during Doval's visit, hoping it could take measures to ease the tension. India may make some requests as a bargaining chip for its pulling out troops," Ma, who specialises in India-China studies, told Global Times on Sunday.

Doval-Yang already into resolving issue

Both Doval and Yang are also the Special Representatives for India-China boundary talks. The two sides have held 19 rounds of boundary talks to resolve their differences.

Chinese officials say Doval and Yang may have informal talks to resolve the standoff in Dokalam in the Sikkim sector.Analysts, however, cautioned that if the two sides failed to reach an agreement on the issue, the China-India ties would be severely damaged.

Doval doctrine and China

While Doval's visit to China is being welcomed in China, the NSA's hardline stance on China may come to haunt him during the talks.

His rare public interactions, since he assumed office of NSA, have revealed that Doval prefers depending on military solutions over ceding ground in compromises. When India's traditional policy in handling border disputes with its neighbours has propagated a defensive approach, it was Doval who pitched the concept of defensive-offensive and offensive foreign policy.

Doval's stance over border disputes with neighbouring nations can be gauged through his Nani Palkiwala Memorial Lecture, 2014 and the Lalit Doshi Memorial Lecture, 2015.

Answering a question about tackling China's growing might, Doval conceded that China's military is much more stronger than India, even as the former Intelligence Bureau director hailed India's missile technology. He said that it was tough for India to match China's might in the next fifty years, but he advocated ramping up missile technology to target China's economic installations, which he said were the Dragon's only vulnerable spot.

Doval's past comments on China's 'bottomless territorial hunger' assumes importance in these times, as the NSA's visit to Beijing could be a make-or-break situation on India-China border stalemate.

India-China relations right now

While the border stand-off continues, bilateral relations between India and China have not deteriorated as much as it is being described in the national media of both the nations. As this Firstpostarticle argued, after the Doka La crisis, none of the bilateral visit have been cancelled. In fact, while the border standoff ensued, media reported five senior BJP leaders visited China during that time.

However, the article also noted that there is always the possibility that things could turn uglygiven China, as a neighbour, is more powerful and assertive than it was ten or twenty years ago. Pressure by the US government for both nations to resolve the dispute quickly through talks will not make much of a difference as both consider this a strategic issue, the article added.

With inputs from agencies

Continued here:

NSA Ajit Doval in Beijing this week: Amid Sikkim stand off, all eyes on BRICS NSA summit which begins on 27 July - Firstpost

Posted in NSA

NSA World Series expected to bring 10000 visitors to the Region – nwitimes.com

MUNSTER -- More than 10,000 visitors are expected to be in Northest Indiana this week.

The National Softball Association Northern World Series comes to the Region for the third time in the past decade. More than 190 teams will compete in multiple age groups hoping to be crowned champions Friday.

Munster, Crown Point, Highland, Hobart, Michigan City and LaPorte will host games, with tonight's opening ceremony being held in downtown Crown Point.

Munster parks director Greg Vitale has known about this honor to host for several months. But he got some icing on the softball cake when he learned his daughter's team, the Munster Mayhem 10-and-under All-Stars, were invited to see what they could do against the best in the midwest.

"It takes a lot of coordination," Vitale said on Saturday at Community Park. "With 10,000 people coming to the area that's going to be an economic boom for the businesses around here. Finding out our all-star team was invited was awesome. I knew we would be hosting it and we've done a lot of work to get our fields ready.

"But I didn't know my daughter and her team would get to play, too. The kids are very excited for this opportunity."

The Mayhem is coached by Brandon Siurek. Two weeks ago, his team competed in a travel tournament in Michigan City and finished second against teams that had been playing at a higher level for much of the summer. And last week in Highland, in a traditional all-star tournament, his team won it all.

They will be competing in Munster in the C division again local teams from St. John, C.P. and Hobart, along with some teams from Wisconsin, Missouri and Michigan.

"This is going to give our girls some great memories," Siurek said. "When they heard this was a 'World Series' to them it doesn't get much bigger than that.

"We have a talented team. We work to have the girls lift and back each other up. We want them all to have a positive mentality about the game."

The Mayhem team was competing in a tournament in Munster on Saturday and a smile came to the faces of all the girls when the subject of the NSA World Series came up.

Emily Siurek is a pitcher for the Mayhem. While the parades and gift exchanges are going to be fun, she is looking forward to one thing.

"The competition," she said. "There's going to be a lot of good teams. I can't wait to compete against them."

Kara Vitale has spent a lot of time at softball fields watching her dad work. And, of course, play the game. Vitale is a catcher and pumped to be a part of this.

"Its going to be exciting to see teams from other states," Kara Vitale said. "And also to see players from other states. When I heard we got to play in this I was very excited. Everyone on the team was, too."

Cece Mason is one of five pitchers on the Mayhem. She expressed emotions surely shared by all of these youngsters competing in the NSA World Series.

"I was nervous and excited when I heard," Mason said. "We all can't wait to see how we do against all these teams."

Originally posted here:

NSA World Series expected to bring 10000 visitors to the Region - nwitimes.com

Posted in NSA

NSA director: ‘Now is probably not the best time’ for US-Russia cyber unit – KNWA

Related Content

(CNN) - Adm. Mike Rogers, the director of the National Security Agency, said Saturday that "now is probably not the best time" to pursue a joint cybersecurity initiative with Russia -- an idea that President Donald Trump floated following his meeting with Russian President Vladimir Putin earlier this month.

"I would argue now is probably not the best time to be doing this," Rogers told an audience at the Aspen Security Forum, a gathering of U.S. national security leaders in Colorado.

Senior Trump administration officials, including Secretary of State Rex Tillerson and Treasury Secretary Steve Mnuchin, touted a proposal to cooperate with Russia on cybersecurity as one of the key wins that came out of Trump's meeting with Putin on the sidelines of the G20 in Hamburg, Germany.

But fewer than 24 hours later, amid bipartisan criticism of the idea due to the intelligence community's assessment that Russia meddled in the 2016 election, Trump appeared to reverse course on the proposal.

"The fact that President Putin and I discussed a Cyber Security unit doesn't mean I think it can happen. It can't - but a ceasefire can,& did!" Trump tweeted July 9.

Rogers acknowledged Saturday that any move to cooperate with Russia would be a policy decision, saying he was "not a policy guy, you got to talk to somebody else, that's not what we do."

The NSA director said he stood by the intelligence assessment that Russia used hacking in an attempt to influence last year's election, something Moscow has repeatedly denied.

"I stand behind the intelligence, intelligence community assessment that we produced in January," he said.

Speaking alongside Rogers, Robert Hannigan, the former director of the UK's NSA equivalent, the Government Communications Headquarters, said that Russia's recent actions in the U.S. election were different from previous activity due to the "brazen recklessness" of it.

But Rogers did say cooperation with Moscow on cybersecurity could be possible in the future should Russia alter its behavior.

"Perhaps this is something that you could hold out, that we might want to build to over time were we to see changes in behavior," he said.

Read the rest here:

NSA director: 'Now is probably not the best time' for US-Russia cyber unit - KNWA

Posted in NSA