Word Games: What the NSA Means by Targeted Surveillance …

We all know that the NSA uses word games to hide and downplay its activities. Words like "collect," "conversations," "communications," and even "surveillance" have suffered tortured definitions that create confusion rather than clarity.

Theres another one to watch: "targeted" v. "mass" surveillance.

Since 2008, the NSA has seized tens of billions of Internet communications. It uses the Upstream and PRISM programswhich the government claims are authorized under Section 702 of the FISA Amendments Actto collect hundreds of millions of those communications each year. The scope is breathtaking, including the ongoing seizure and searching of communications flowing through key Internet backbone junctures,[1]the searching of communications held by service providers like Google and Facebook, and, according to the government's own investigators, the retention of significantly more than 250 million Internet communications per year.[2]

Yet somehow, the NSA and its defenders still try to pass 702 surveillance off as "targeted surveillance," asserting that it is incorrect when EFF and many others call it "mass surveillance."

Our answer: if "mass surveillance" includes the collection of the content of hundreds of millions of communications annually and the real-time search of billions more, then the PRISM and Upstream programs under Section 702 fully satisfy that definition.

This word game is important because Section 702 is set to expire in December 2017. EFF and our colleagues who banded together to stop the Section 215 telephone records surveillance are gathering our strength for this next step in reining in the NSA. At the same time, the government spin doctors are trying to avoid careful examination by convincing Congress and the American people that this is just "targeted" surveillance and doesnt impact innocent people.

PRISM and Upstream surveillance are two types of surveillance that the government admits that it conducts under Section 702 of the FISA Amendments Act, passed in 2008. Each kind of surveillance gives the U.S. government access to vast quantities of Internet communications.[3]

Upstream gives the NSA access to communications flowing through the fiber-optic Internet backbone cables within the United States.[4] This happens because the NSA, with the help of telecommunications companies like AT&T, makes wholesale copies of the communications streams passing through certain fiber-optic backbone cables. Upstream is at issue in EFFs Jewel v. NSA case.

PRISM gives the government access to communications in the possession of third-party Internet service providers, such as Google, Yahoo, or Facebook. Less is known about how PRISM actually works, something Congress should shine some light on between now and December 2017.[5]

Note that those two programs existed prior to 2008they were just done under a shifting set of legal theories and authorities.[6] EFF has had evidence of the Upstream program from whistleblower Mark Klein since 2006, and we have been suing to stop it ever since.

Despite government claims to the contrary, heres why PRISM and Upstream are "mass surveillance":

(1) Breadth of acquisition: First, the scope of collection under both PRISM and Upstream surveillance is exceedingly broad. The NSA acquires hundreds of millions, if not billions, of communications under these programs annually.[7] Although, in the U.S. governments view, the programs are nominally "targeted," that targeting sweeps so broadly that the communications of innocent third parties are inevitably and intentionally vacuumed up in the process. For example, a review of a "large cache of intercepted conversations" provided by Edward Snowden and analyzed by the Washington Post revealed that 9 out of 10 account holders "were not the intended surveillance targets but were caught in a net the agency had cast for somebody else."[8] The material reviewed by the Post consisted of 160,000 intercepted e-mail and instant message conversations, 7,900 documents (including "medical records sent from one family member to another, resumes from job hunters and academic transcripts of schoolchildren"), and more than 5,000 private photos.[9] In all, the cache revealed the "daily lives of more than 10,000 account holders who were not targeted [but were] catalogued and recorded nevertheless."[10] The Post estimated that, at the U.S. governments annual rate of "targeting," collection under Section 702 would encompass more than 900,000 user accounts annually. By any definition, this is "mass surveillance."

(2) Indiscriminate full-content searching. Second, in the course of accomplishing its so-called "targeted" Upstream surveillance, the U.S. government, in part through its agent AT&T, indiscriminately searches the contents of billions of Internet communications as they flow through the nations domestic, fiber-optic Internet backbone. This type of surveillance, known as "about surveillance," involves the NSA's retention of communications that are neither to nor from a target of surveillance; rather, it authorizes the NSA to obtain any communications "about" the target.[11] Even if the acquisition of communications containing information "about" a surveillance target could, somehow, still be considered "targeted," the method for accomplishing that surveillance cannot be: "about" surveillance entails a content search of all, or substantially all, international Internet communications transiting the United States.[12] Again, by any definition, Upstream surveillance is "mass surveillance." For PRISM, while less is known, it seems the government is able to search throughor require the companies like Google and Facebook to search throughall the customer data stored by the corporations for communications to or from its targets.

To accomplish Upstream surveillance, the NSA copies (or has its agents like AT&T copy) Internet traffic as it flows through the fiber-optic backbone. This copying, even if the messages are only retained briefly, matters under the law. Under U.S. constitutional law, when the federal government "meaningfully interferes"with an individuals protected communications, those communications have been "seized" for purposes of the U.S. Constitutions Fourth Amendment. Thus, when the U.S. government copies (or has copied) communications wholesale and diverts them for searching, it has "seized" those communications under the Fourth Amendment.

Similarly, U.S. wiretapping law triggers a wiretap at the point of "interception by a device," which occurs when the Upstream mechanisms gain access to our communications.[13]

Why does the government insist that its targeted? For Upstream, it may be because the initial collection and searching of the communicationsdone by service providers like AT&T on the governments behalfis really, really fast and much of the information initially collected is then quickly disposed of. In this way the Upstream collection is unlike the telephone records collection where the NSA kept all of the records it seized for years. Yet this difference should not change the conclusion that the surveillance is "mass surveillance." First, all communications flowing through the collection points upstream are seized and searched, including content and metadata. Second, as noted above, the amount of information retainedover 250 million Internet communications per yearis astonishing.

Thus, regardless of the time spent, the seizure and search are comprehensive and invasive. Using advanced computers, the NSA and its agents can do a full-text, content search within a blink of an eye through billions, if not trillions of your communications, including emails, social media, and web searches. Second, as demonstrated above, the government retains a huge amount of the communicationsfar more about innocent people than about its targetsso even based on what is retained the surveillance is better described as "mass" rather than "targeted."

So it is completely correct to characterize Section 702 as mass surveillance. It stems from the confluence of: (1) the method NSA employs to accomplish its surveillance, particularly Upstream, and (2) the breadth of that surveillance.

Next time you see the government or its supporters claim that PRISM and Upstream are "targeted" surveillance programs, youll know better.

[1] See, e.g., Charlie Savage, NSA Said to Search Content of Messages to and From U.S., N.Y. Times (Aug 8, 2013) (The National Security Agency is searching the contents of vast amounts of Americans e-mail and text communications into and out of the country[.]). This article describes an NSA practice known as about surveillancea practice that involves searching the contents of communications as they flow through the nations fiber-optic Internet backbone.

[2] FISA Court Opinion by Judge Bates entitled [Caption Redacted], at 29 (NSA acquires more than two hundred fifty million Internet communications each year pursuant to Section 702), https://www.eff.org/document/october-3-2011-fisc-opinion-holding-nsa-surveillance-unconstitutional (Hereinafter, Bates Opinion). According to the PCLOB report, the current number is significantly higher than 250 million communications. PCLOB Report on 702 at 116.

[3] Bates Opinion at 29; PCLOB at 116.

[6] First, the Bush Administration relied solely on broad claims of Executive power, grounded in secret legal interpretations written by the Department of Justice. Many of those interpretations were subsequently abandoned by later Bush Administration officials. Beginning in 2006, DOJ was able to turn to the Foreign Intelligence Surveillance Court to sign off on its surveillance programs. In 2007, Congress finally stepped into the game, passing the Protect America Act; which, a year later, was substantially overhauled and passed again as the FISA Amendments Act. While neither of those statutes mention the breadth of the surveillance and it was not discussed publicly during the Congressional processes, both have been cited by the government as authorizing it.

[11] Bates Opinion at 15.

[12] PCLOB report at 119-120.

[13] See 18 U.S.C 2511(1)(a); U.S. v. Councilman, 418 F.3d 67, 70-71, 79 (1st Cir. 2005) (en banc).

More here:

Word Games: What the NSA Means by Targeted Surveillance ...

Posted in NSA

In midst of Russia probe, NSA chief vows: ‘I will not violate’ my oath to Americans – ABC News

In unusually passionate and stark terms, the head of the nations top spy agency made clear on Saturday in Colorado that he will stand up to anyone -- even the president of the United States -- who asks him to use the U.S. intelligence community as a political prop.

We are not about particular viewpoints. We are not about particular parties. We just cant work that way, National Security Agency Director Mike Rogers said at the Aspen Security Forum in Aspen, Colorado.

Rogers added that the U.S. intelligence community owes U.S. citizens honesty and integrity.

Saturdays remarks come only months after Rogers and at least two other senior U.S. officials were personally asked by President Trump to publicly rebut news reports laying out details of the federal governments probe into Russias alleged efforts to influence the 2016 presidential election.

Although Rogers has refused to publicly discuss his private conversations with Trump, he has previously vowed to keep politics out of his agencys work. But his remarks today at the annual gathering of senior officials, reporters and others tied to the U.S. intelligence community were noteworthy in their intensity and passion.

Punctuating each word -- one by one -- the U.S. Navy admiral said, I will not violate the oath that I have taken in the 36 years as a commission officer.

Rogers face hardened and his voice cracked as he added: I wont do that.

He went on to say that he often relays this message to his workforce: We are intelligence professionals. We raise our right hand and we take an oath to defend the citizens of this nation and the values that are embodied in the Constitution he said. Your integrity isnt worth the price of me or anybody else. You stand up and you remember that oath that we take.

Rogers comments drew a round of applause inside the room.

Nevertheless, Rogers added he has never been directed to do anything that I felt was illegal, immoral, unethical or inappropriate. Nor have I felt pressured to do so. Nor would I do so.

Rogers also said hes more than willing to offer Trump his assessment even when he knows the president disagrees.

He has never shut me down, Rogers said. He gives me good, direct feedback, sometimes, Mike I dont agree with that. Mike Im in a different place than you are.

Thats exactly the way this is supposed to work, Rogers insisted.

Rogers joined other senior officials at the Aspen Security Forum in affirming the U.S. governments conclusion that Russia is to blame for a cyber assault on the 2016 election.

No doubt at all, Rogers said.

Read more:

In midst of Russia probe, NSA chief vows: 'I will not violate' my oath to Americans - ABC News

Posted in NSA

China media set much store by NSA visit – The Hindu


The Hindu
China media set much store by NSA visit
The Hindu
The NSA's visit will be key to solving the current dispute and if the two sides failed to reach some agreement on the issue, the China-India ties would be severely damaged, Mr. Ma observed. The daily prefaced the anticipation of Mr. Doval's visit by ...
Doklam standoff: India-China row may continue till November, says former NSAHindustan Times
'NSA Ajit Doval's Beijing visit key to ease Sikkim standoff'Daily News & Analysis
Ajit Doval to visit Beijing for BRICS NSA's meet on July 27-28Yahoo India News
India Samvad
all 185 news articles »

Original post:

China media set much store by NSA visit - The Hindu

Posted in NSA

USA Pride: Local 14U team to compete in NSA North World Series – Huron Daily Tribune

By Seth Stapleton Tribune Sports Writer

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride vs. Millington

USA Pride: Local 14U team to compete in NSA North World Series

SEBEWAING It was a simple doubleheader between two area softball teams, but it served a much bigger purpose.

Tuesday's games between 14U squads USA Pride and Millington were both a tuneup and a fundraiser for a USA team that is on its way to the National Softball Association North World Series.

"It should never surprise me, in the communities of Unionville and Sebewaing, that we would have a good turnout," said USA Pride coach Tom Williamson of the event. "And it was a better turnout than I expected."

Williamson said the initial goal of the friendly matchup Tuesday was to just find a good team to play a doubleheader against. With the help of the community though, it turned into a fundraiser and an opportunity to promote the entire travel program.

Williamson, who has been part of USA's summer travel softball program for many years, said it's the first time a USA team will compete in the NSA World Series.

"Our goal as a program is not to go win tournaments, we want to go compete," Williamson said. "If we win, great, but we just want to play the best competition we can to get better as a program."

In the past, USA travel teams have always played in three or four tournaments throughout the summer. This year, the 14U team decided to try to qualify for the NSA tournament. They played in a qualifier in Midland over Memorial Day weekend and placed second, qualifying them for the big event.

It will take place in Crown Point, Indiana, beginning Tuesday. USA Pride will open the tournament at 9:45 a.m. Tuesday, then play again at 4:45 p.m. that day. From there, the team will be seeded into a double elimination bracket. At minimum, they will play a total of four games.

"They are so excited they can't stand it," Williamson said of the team. "I'm really happy in the fact that we are representing USA travel softball as a whole. We're representing USA and really proud of it."

At the NSA tournament, USA Pride will be competing against around 40 teams from the likes of Michigan, Ohio, Indiana, Pennsylvania, Wisconsin and Kentucky. While the task may seem daunting, Williamson feels his team is playing its best ball of the summer at this point in time, fresh off a title at the Grand Blanc tournament a weekend ago.

"They're hitting the ball really well and we've got three pitchers, which is important to get through a long tournament," Williamson said. "I'm really pleased with the way that we're playing right now. We've gotten better all year long, so we'll see what happens when we go into next week."

Added Williamson: "This team, it is truly like family. Every single one of these kids get along so well. And more importantly, the parents are unbelievable. The amount of help we've received is amazing. As a coach, you can't ask for anything more than that."

Go here to see the original:

USA Pride: Local 14U team to compete in NSA North World Series - Huron Daily Tribune

Posted in NSA

Elite softball teams welcome challenge at NSA world series – The … – Virginia Gazette

An hour before the 9 a.m. first pitch for his team's 16-and-under game Friday at Kiwanis Park, Line Drive Express Softball Club coach Doug Hill glanced across the field at his team's opponent, the Illiana Dream Seams, on day five of the National Softball Association Class A Eastern World Series.

Hill's Gold squad hails from Midland in Central Michigan and the Dream Seams from Martinsville in Eastern Illinois. All Hill knew about the Dream Seams is what he could see through the fence: a team beginning its warmups wearing an ensemble with splashes of black, red and yellow similar to the University of Maryland's often bold getups. The night before, he was not even sure which state they were from. Hill said it is his superstition to not get wrapped up in scouting reports during massive tournaments like these, with 20 teams in their age group and more than 85 overall from 10 different states.

That is part of the fun. That is part of the reason why many of the teams including Hill's group, donning Central Michigan University's burgundy and gold colors, visited the tournament that held games Monday-Friday at Kiwanis, and Quarterpath parks as well as Stoney Run Athletic Complex in Newport News.

After running into the same teams in regular weekend tournaments, a change of scenery and exposure to different philosophies and coaching styles makes events like these attractive for some teams, even to the ones that drove more than 12 hours like Hill's.

"It's really immaterial what they're doing," Hill said. "I always tell them to do our work and don't worry about theirs."

If that sounds at all ruthless, it is because Line Drive Express is used to winning. Hill, who owns the club, is a NSA hall of famer having coached the sport the last 27 years. Prior to that, he played football at Northwood University in Midland and semi-professional softball.

Line Drive Express had 13 state championships and three NSA world series titles to its name entering Friday's competition, when it needed to win five games to take another title back to Michigan. The club had only needed to finish first or second in at least one qualifier to secure a spot in the world series field; but it won four separate qualifying tournaments for good measure.

All but two of Hill's players are committed to play in college including his daughter, Bailey, who said staying pumped up is vital in tourneys like these that are made even more grueling by the extreme heat that accompanied this one.

The dugouts of the Line Drive Express and Dream Seams were blaring music Friday morning before most folks in Williamsburg had ventured out to work.

"When I go out there, I always know I have to give it my all even if I'm dead," said Line Drive Express pitcher Faith Barden, a Western Michigan University recruit. "And I always have the defense behind me to be able to back me up."

Line Drive Express was fortunate to make it to Friday after a tough win Thursday night over Chesapeake's Elite Fastpitch, which had to survive four games on Thursday, one more than Line Drive Express.

The Chesapeake team's exit left the Blue Ridge Sudden Impact the only team from Virginia still standing in the bracket.

Lynch Station, south of Lynchburg, is home for Sudden Impact, which took on the Central Illinois Cyclones in game one on Friday.

New York teams from Long Island and West Seneca rounded out the 16-and-under teams that made it to Friday.

Sudden Impact has traveled as far away as Las Vegas for NSA world series tournaments but set its sights on the Williamsburg tournament because they wanted to play in their home state.

Sudden Impact might have been the defacto home team by Friday but Virginia license plates were outnumbered by ones from Michigan and Illinois in the Kiwanis parking lot.

The Cyclones came from Peoria, having qualified in two previous tournaments including the Illinois NSA event.

"The NSA folks here at Williamsburg have been excellent," said Cyclones manager Aaron Barrington. "They treated us well. We got to go to Busch Gardens and do some things we don't get to do in Illinois."

As Barrington and tournament site director Scott Hinders each noted, the Eastern World Series is the big and final tournament of the season for most of the teams. A few of the Cyclones will go on to play for colleges, Barrington said, while others will choose their post-secondary schools of choice solely for educational reasons, meaning competitive softball at this level ended for them in Williamsburg.

Line Drive Express started its season in November before moving indoors for the winter. While not quite a vacation, the Eastern World Series provided the club a chance to enjoy the conclusion of long travel campaign.

"These guys are here because they earned it," Hill said. "That's what I enjoy about this sport. This is their payback for all the hard work."

Holtzman can be reached by phone at 757-298-5830.

See original here:

Elite softball teams welcome challenge at NSA world series - The ... - Virginia Gazette

Posted in NSA

Much Ado About Nothing? Cyber Command and the NSA – War on the Rocks

Last week, word began to spread that the Trump administration was considering granting new powers to U.S. Cyber Command. Lolita Baldor of the Associated Press had the scoop, discussing two related but separate steps under consideration: first, to elevate U.S. Cyber Command to the status of a unified command and second, to break the current dual-hat arrangement with the National Security Agency (NSA), whereby the commander of U.S. Cyber Command is the same individual as the director of the NSA.

It is worth noting, however, four things: First, these two steps (elevation and separation) have been under consideration for years. Second, there were good reasons at the time why the Obama administration didnt act on them. Third, elevation and separation should, in theory, operationally empower U.S. Cyber Command, but in practice Cyber Command may ironically find itself with less capability to offer. And finally, Cyber Command has already quietly amassed non-operational power and authority within the Department of Defense, making it one of the most independent commands, second only to the U.S. Special Operations Command. As such, while this weekends news is a good sign of the continued maturation of Cyber Command (and the acknowledgment of that maturation by the White House), theres less here than meets the eye.

Lets review Cyber Commands origins and its assigned missions before tackling the news. (Please accept my apologies in advance for some acronym salad.) For the short-story long, see chapter 8 of Playing to the Edge by Michael Hayden and the early parts of Jay Healeys Fierce Domain. Long-story short, the NSA had been the nations leading signals intelligence agency for decades. But after 9/11, as new opportunities emerged to create effects against adversaries during declared hostilities, Pentagon leadership became uncomfortable with the notion that the intelligence missions of collection and analysis would be conducted by the same organization that would disrupt or degrade, even destroy, targets through cyber-attacks during an armed conflict. In 2002, U.S. Strategic Command was given responsibility for cyberspace, and two little-known subordinate organizations emerged to manage it: Joint Task Force-Global Network Operations (JTF-GNO) would handle guarding the Defense Departments networks while Joint Functional Component Command-Network Warfare (JFCC-NW) would be responsible for missions wed think of as offense. Because there was so much overlap between the NSA and the emerging JFCC-NW, the Department of Defense created the dual-hat by making the NSA director (then Hayden) the commander of JFCC-NW. As the threats to the Department of Defense in cyberspace increased throughout the 2000s, Secretary of Defense Robert Gates consolidated JTF-GNO and JFCC-NW under a new U.S. Cyber Command in 2010, but it was still subordinate to U.S. Strategic Command and still dual-hatted with the NSA director. Thats more or less where we find ourselves today.

Since then, U.S. Cyber Command has been charged with three missions: defend the Defense Departments networks and systems, provide offensive support to other commands in the event of a contingency, and defend the nation from a cyber-attack of significant consequence (less than two percent of incidents would qualify as significant).

Advocates of more autonomy and authority for U.S. Cyber Command have often bemoaned its subordinate status to U.S. Strategic Command. The theory is that having to work through Strategic Command slows down operational approval, coordination, or whatever else needs to happen. Based on my experience in the Cyber Policy office of the Office of the Secretary of Defense, I am of the view that a stove-piped Joint Staff had more to do with delays and miscommunication than anything else; nor could I ever find a function Cyber Command might be asked to execute that could only be performed by a full, unified command (like Strategic Command) but not by a sub-unified command (like Cyber Command). We looked at this several times during the last administration: If the secretary of defense wanted the sub-unified command to execute, they could and would. It wasnt a problem, so elevating the command wasnt necessary. So, while I dont think there are any big wins to be had by the recent news about the Trump administration wanting to elevate Cyber Command, I dont think it hurts to do it either. And it might not ultimately be up to the White House: The 2017 NDAA requires the administration to elevate Cyber Command.

Breaking the dual-hatted relationship with the NSA is more complicated. There are very good reasons why JFCC-NW was born with the NSA as its commander, as there is a lot of overlap between the organizations. This overlap is intuitive to those whove worked in the business, but hard to explain in brief here. Ill just quote Hayden on this point: [I]n the cyber domain the technical and operational aspects of defense, espionage, and cyberattack are frankly indistinguishable they are all the same thing. Its obviously more complicated than this, but at a high level, I think this was the rationale.

There were studies undertaken about the implications of breaking the dual-hat before the Snowden affair, but his disclosures forced policymakers to confront the issue head-on. At that time, it was thought that breaking the dual-hat could improve perceptions about privacy and civil liberties at the NSA, but in December 2013 the Obama administration decided to maintain the arrangement. Senior leaders felt it was too soon to separate Cyber Command. Its readiness and resources were growing but insufficient, and it was still too reliant on NSA talent and services for its missions.

Working with the two organizations, I found that the relationship between the two was akin to a mix between hostage-taking and Stockholm syndrome except each organization kept mixing up which was the hostage and which was the hostage-taker. One day, U.S. Cyber Command would demand NSA support due to the latters responsibility as a combat support agency. The next day, the command would cave and say that NSA had other, more important priorities. And NSA too would resist a request from Cyber Command, then embrace it, and then fight it. The overlap and dependence was that tight.

For that reason, among others, I understand the argument about needing to separate Cyber Command from NSA so that the former can pursue its missions (especially to defend the nation and to support other commands) with greater independence from signals intelligence. But theres a risk here that would be dangerous to miss: When Cyber Command needs NSA support, the fact that its the same person in charge of both organization can break what might otherwise be a log-jam. Splitting the dual-hat could result in the NSA isolating itself and refocusing on its own core missions (the collection of signals intelligence and providing information assurance) while minimizing its support to Cyber Command.

Just because there are risks does not mean the Trump administration should leave the current arrangement in place. The question is not whether, but when and how, to break the dual-hat. One priority for the White House and Secretary Mattis will be to have a clear understanding with the new NSA director (who may well be a civilian for the first time) about how he or she sees the relationship with Cyber Command, and then how the administration monitors the relationship to ensure the NSA doesnt abandon Cyber Command outright.

The selection of who will next lead Cyber Command will also be a priority. Someone like the current commander of Army Cyber Command, Lt. Gen. Paul Nakasone, is an ideal candidate: He has years of experience in the cyber effects business, time in the Pentagon and the field, and he understands the roles of civilians, fellow military officers, and senior political types. Another name thats been floated is Lt. Gen. William Mayville, currently the Director of the Joint Staff. His time as the Joint Staffs chief information officer and with Joint Special Operations Command would make him a strong leader for Cyber Command as well.

The good news for the future of the U.S. militarys cyber operations is that, regardless of whether or not Cyber Command is elevated as a unified command or separated from the NSA, Congress has quietly been empowering Cyber Command with greater authorities and independence through legislation. My colleague Charley Snyder and I assessed all the additional powers conferred in the 2017 NDAA over at Lawfare, but Id like to single out the authority related to requirements: Being able to set its own requirements for the conduct of cyber operations, as well as validating the requirements of other defense components, matters more than this bland bureaucratic language might suggest. With the independent acquisition authority Congress gave it in a previous NDAA, Cyber Command can now accelerate acquisition and procurement to keep up with new requirements without the usual deliberations chaired by the Joint Staff. Special Operations Command is the only other military outfit with that kind of freedom, and it makes a big difference.

But the big question will be this: Regardless of these crucial authorities and any new command arrangements, what will Cyber Commands role be in protecting the country from threats like Russian information operations? Maybe its time we get away from using cyber as the description of what needs to be done, and instead think about what an Information Warfare Command would look like. How should the United States wage such a fight, and how should it protect itself? I am pleased the Trump administration is considering organizational changes to support a higher profile for cyber operations, but we really need answers to these bigger policy questions.

Michael Sulmeyer is the Director of the Cyber Security Project at the Harvard Kennedy Schools Belfer Center for Science and International Affairs. He also served in the Office of the Secretary of Defense, Cyber Policy, from 2012-2015. Follow him on Twitter @SultanOfCyber.

Image:Airman 1st Class Christopher Maldonado/Shaw Air Force Base

Read more:

Much Ado About Nothing? Cyber Command and the NSA - War on the Rocks

Posted in NSA

Defense in accused NSA leaker case opposes prosecutors proposed order of protection – The Augusta Chronicle

The attorneys for the Fort Gordon contractor accused of leaking national defense information have filed their own proposed order regarding how classified documents are handled in her espionage case.

Reality Leigh Winner, 25, has pleaded not guilty in U.S. District Court to a single count of willful retention and transmission of national defense information.

While the federal prosecutors have proposed an order of protection that prohibits the defense from revealing any classified information, even if it had been included in published reports, Winners attorneys propose not treating any document as classified if it has been the subject of media reports. Violation of the final order of protection can result in sanctions and even criminal prosecution.

The case against Winner, which is tentatively set for trial the week of Oct. 23, is to proceed under the Classified Information Security Act, a law enacted to protect a defendants right to a fair trial while allowing the government to protect classified information on matters of national security.

The federal prosecutors contend it is the executive branch of government that determines what is a classified document.

In Winners case, the document suspected as being the one sent anonymously to the online news publication The Intercept was the subject of an June 5 article. It was an analysis of the Russian governments meddling in the presidential election. Since Winners arrest, the subject has been reported on extensively, especially in light of the investigations by the independent special counsel, and the Senate and House intelligence committees.

Winners defense attorneys also seek a provision in the order of protection that allows her to review the discovery material, confer with attorneys about it and to assist in her defense.

The defense team also wants the proposed order to allow defense experts with the prosecutors security clearance to review the discovery material without any pre-clearance by the prosecution.

U.S. Magistrate Court Judge Brian K. Epps will determine what the final order of protection will contain. The government, however, has the right to appeal, under the Classified Information Security Act.

Winner has had a top security clearance since serving for six years in the Air Force. In February, she began working for the National Security Agency contractor, Pluribus International Corp. at Fort Gordon.

She is accused of taking a classified document in May and mailing it to The Intercept.

Federal agents allegedly followed clues to Augusta and to Winner after an Intercept reporter showed an intelligence source the document to determine its authenticity.

Reach Sandy Hodson at (706) 823-3226 or sandy.hodson@augustachronicle.com.

Read more:

Defense in accused NSA leaker case opposes prosecutors proposed order of protection - The Augusta Chronicle

Posted in NSA

NSA sued for details of ‘unmasking’ skullduggery – WND.com

Former National Security Adviser Susan Rice

In the waning days of the Obama administration, bureaucrats ensconced in their posh Washington offices were resting in the prospect ofa Hillary Clinton victory that would protectObamas legacy and their positions.

But then-National Security Adviser Susan Rice may have had some doubts. Or maybe she was just curious. Or maybe there was another motive. Regardless,she unmasked a number of Trump campaign individuals who were caught up in various federal surveillance tactics.

That means they were recorded talking on the phone or meeting with someone who was under surveillance by the Obama administration.

Normally, the identity of American citizens in such situations is withheld.

But not so in this case. In fact, Rice gave the identifications to the National Security Council, the Defense Department, the Director of National intelligence Office and the CIA, according to media reports citing illegal leaks.

Its been part of the flood of leaks of secret or protected information bythe Obama-leaning Washington bureaucracy, dubbed by some as the deep state, apparently in an effort to undermine the agenda of the president chosenby American voters.

Now theres an organization that thinks the people should know what went on who did the surveillance, who unmasked the names of American citizensand who spread the names around Washington.

What to todays top authors have to say about Washington? Find out at the WND Superstore in Socialism: A Clear and Present Danger, Throw Them All Out, Inside the Beltway, Capitol Punishment and many more.

The American Center for Law and Justice has sued the National Security Agency for refusing to respond to itsquestions submitted under the Freedom of Information Act.

ACLJsaid the lawsuit seeks to enforce its demandsfor government records that will shed light on the Susan Rice unmasking scandal that rocked the intelligence community.

The questions were submitted under FOIA, but the NSA has refused to follow the law.

Fox News explained the big picture: Susan Rice, former national security adviser under then-President Barack Obama, requested to unmask the names of Trump transition officials caught up in surveillance. The unmasked names, of people associated with Donald Trump, were then sent to all those at the National Security Council, some at the Defense Department, then-Director of National Intelligence James Clapper and then-CIA Director John Brennan essentially, the officials at the top, including former Rice deputy Ben Rhodes.

TheACLJ said the only way we even know about the Obama administrations apparent politically motivated unmasking is because this raw intelligence information classified national security secrets was illegally leaked to the media.

Its formal request asked for records pertaining to any and all requests former National Security Adviser Susan Rice made to National Security Agency officials or personnel regarding the unmasking of the names and/or any other personal identifying information of then candidate and/or President-elect Donald J. Trump, his family, staff, transition team members, and/or advisers who were incidentally caught up in U.S. electronic surveillance.

The request was acknowledged by the NSA and even granted expedited processing status.

But the answers never came.

So we filed a critical lawsuit and we will force the NSA to answer to a federal court for its blatant disregard for the law, ACLJ announced.

It is seeking an order to release any and all non-exempt records.

This is not our first time weve taken the NSA to federal court, ACLJ explained. We filed a lawsuit earlier this year to force the NSA to produce government records that could expose the people and purposes behind the Obama administrations eleventh hour rule change that dramatically expanded access to raw signal intelligence signed by the Obama administration officials on their way out the door.

It was these changes that have [led] to an unprecedented avalanche of dangerous national security leaks, the group explained.

The deep state shadow government bureaucracy must not be allowed to endanger the national security of the American people as it carries out a vicious vendetta against the current administration.

The lawsuit states, Plaintiff is being irreparably harmed by reason of defendants unlawful withholding of requested records, and plaintiff will continue to be irreparably harmed unless defendant is compelled to conform their conduct to the requirements of the law.

WND reported only weeks ago that some of the key documentation may be under lock and key now and kept their for five years at the former presidents library.

It was another watchdog on government, Judicial Watch, that said its National Security Council denied Freedom of Information Act requests for documents related to Rices alleged unmasking of the identities of any U.S. citizens associated with the Trump presidential campaign or transition team.

The NSC said the documents have been transferred to the Barack Obama Presidential Library, while pointedly adding you should be aware that under the Presidential Records Act, presidential records remain closed to the public for five years after an administration has left office.

It was unclear what was in the statement and what that would mean for the members of Congress who are investigating, the FBI, or even special counsel Robert Mueller.

The Wall Street Journal reportedthe House Intelligence Committee issued seven subpoenas recently, a sign that its investigation into alleged Russian meddling in the 2016 election is ramping up in scope and intensity.

Three of the subpoenas specifically addressed how and why the names of associates of President Donald Trump were unredacted and distributed within classified reports by Obama administration officials during the transition between administrations.

Back in April, WND reported Rice, speaking to MSNBC, did not deny unmasking the names of Trump associates.

She implicitly acknowledged and explicitly defended unmasking: It was not uncommon. It was necessary at times to make those requests.

But weeks earlier, speaking to PBS, Rice denied any knowledge of such unmasking after it was revealed by House Intelligence Committee Chairman Devin Nunes, R-Calif.

She told PBS, I know nothing about this and, I was surprised to see reports from Chairman Nunes on that count today.

What to todays top authors have to say about Washington? Find out at the WND Superstore in Socialism: A Clear and Present Danger, Throw Them All Out, Inside the Beltway, Capitol Punishment and many more.

See the original post here:

NSA sued for details of 'unmasking' skullduggery - WND.com

Posted in NSA

Security Researcher Publishes NSA Exploit Capable of Affecting Newer Windows Versions – The Merkle

Recent NSA exploits were partially responsible for multiple major ransomware outbreaks. In most cases, these NSA exploits could only be leveraged against older versions of the Windows operating system. It now appears that a security researcher has successfully made the ETERNALSYNERGY exploit applicable to newer versions of the popular OS. If researchers canmake this happen, criminals couldcertainly do so as well.

The NSA has built many different exploits to take advantage of weakened protocol found in the Windows operating system. In most cases, these exploits relate to the SMB protocol, which can be exposed to external connections. Ever since the Shadow Brokers unveiled these exploits to the public, we have seen multiple global ransomware campaigns leveraging them. WannaCry is just one of those examples.

ETERNALSYNERGY is one of the NSA exploits exposed by The Shadow Brokers several months ago. At the time of this reveal, thisexploit would only work on older versions of the Windows operating system. All versions up to and including Windows 8 were prone to this SMB exploit. Most security-aware computer users have switched to newer versions of the operating system, but there are plenty of vulnerable machines running older Windows versions right now.

Microsoft has always claimed that the technique used by ETERNALSYNERGY would not work with newer versions of Windows due to several security improvements found in the Windows kernel. Unfortunately, that does not appear to be the case any longer. Worawit Wang, a Thai security researcher, has successfully ported the exploit to newer versions ofWindows. Theported version targets the exact same vulnerabilityusing a different technique.

The new ETERNALSYNERGY exploit will not crash a Windows system. This exploit affects a long list of Windows versions, including Windows 8.1, Windows 2016, and many others. Users of Windows 10remain safe from harm for the time being, but that could change.

About75% of all Windows PCs in the world are now vulnerable to this new attack. These vulnerable computers are actually susceptible to three different exploits, including the original ETERNALSYNERGY and ETERNALROMANCE. Some form of solution needs to be found before more damage is done. Protecting ones computer should be onestop priority, and upgrading to Windows 10 seems to be the best course of action.

Wang also made his own exploit public, which couldhave some interesting consequences. There is also a step-by-step guide on how people can leverage this exploit against vulnerable computers. Any user not implementing the MS17-010 security update soon will remain vulnerable to these attacks. It will be interesting to see if more NSA exploits will be ported to Windows 10 in the future.

Read more:

Security Researcher Publishes NSA Exploit Capable of Affecting Newer Windows Versions - The Merkle

Posted in NSA

Columbus State University Partners With Local School System on NSA Grant for Middle School Cybersecurity Education – Newswise (press release)

Newswise COLUMBUS, GA --- In what may be a first for Georgia, Columbus State University is partnering with the Muscogee County School District on a National Security Agency (NSA) grant to develop and implement a course in cybersecurity education specifically designed for middle school students.

The $50,000 NSA grant allows Columbus State University's TSYS School of Computer Science and its developing TSYS Center for Cybersecurity to work with Rothschild Middle School Leadership Academy to develop and implement a course in cybersecurity education specifically designed for 7th and 8th grade middle school students.

We do not think that a cybersecurity curriculum of this magnitude has been attempted at the middle school level in Georgia, said Tom Hackett, chair of the university's Department of Counseling, Foundations, and Leadership and executive director P-12/University Partnerships. This STEM project is expected to raise interest in cybersecurity and will encourage students to continue learning about cybersecurity, a field very much in-demand by todays workforce.

The course will be structured on the National Security Agency (NSA) Cybersecurity First Principles but will be broken down into age-specific topics understandable by 7th- and 8th-grade students, Hackett said. The NSA Cybersecurity First principles include: domain separation, process isolation, resource encapsulation, least privilege, modularity, layering, abstraction, data hiding, simplicity and minimization.

He said the course will facilitate a learner-centered classroom with numerous hands-on exercises that provide opportunities for middle school students to apply their newly gained knowledge of cybersecurity education.

This program is just one example of what will be many developing partnerships between the Muscogee County School District (MCSD) and Columbus State University. Hackett, Columbus State University (CSU) President Chris Markwood and MCSD Superintendent David Lewis are working on more ways to develop programs and education goals to benefit P-12 students, university students and the local businesses that will be hiring these graduates.

We are proud of this unique partnership with CSU and excited for the opportunities it will afford our students as they begin exploration in this high-demand field, said David F. Lewis, superintendentof the Muscogee County School District.

About 140 7th and 8th grade students at Rothschild Middle School will have the appropriate prerequisite to take the year-long elective course on cybersecurity education during the 2017-2018 school year.

Whether you are 6 or 60 years old, cybersecurity is important to us all, said Wayne Summers,professor and Distinguished Chairperson of CSUs TSYS School of Computer Science. Byteaching the elements of cybersecurity in middle school, we will encourage safe computing practice as well as expand the pool of candidates for future cybersecurity professionals. Based on a comprehensive study supported by the National Initiative for Cybersecurity Education, there are nearly 13,000cybersecurity job openings in Georgia and nearly 350,000 openings nationally.

The TSYS School of Computer Science, its TSYS Center for Cybersecurity and Muscogee County School District will ensure the cybersecurity education course will provide age-appropriate and performance based cybersecurity education in a safe environment for middle school students and will meet Georgia curriculum standards.

Hackett said the course curriculum will be available for download on the projects website and the course can be replicated in other middle schools across the nation.

The Rothschild teacher developing this falls course to be called Business Principles & Computer Science is enrolled at CSU this summer in the Information Security course in the TSYS School of Computer Science, which is designated by NSA as a National Center of Academic Excellence in Information Assurance Education. Additionally, CSU is part of aconsortium of seven University System of Georgia (USG) institutions to develop the USGs capabilities in IT and cyber security as well as significantly increase the number of IT and cyber security industry qualified graduates coming from USG institutions.

Read the original post:

Columbus State University Partners With Local School System on NSA Grant for Middle School Cybersecurity Education - Newswise (press release)

Posted in NSA

The US is reportedly close to separating military-focused Cyber Command from the NSA – The Verge

After a long debate, the United States is reportedly moving forward with plans to separate its military-focused Cyber Command branch from the National Security Agency. The changes could be announced in the coming weeks, according to the Associated Press.

The two roles have caused tension

Since Cyber Commands 2009 inception, it has been under the same command as the NSA, but the two operate in different ways: Cyber Command has focused on digital warfare, while the NSA has focused on electronic intelligence gathering. According to the AP, those two roles have caused tension, especially in the battle against ISIS.

Under a new division of authority, Army Lt. Gen. William Mayville would reportedly be nominated to lead Cyber Command, replacing Admiral Michael Rogers, who also leads the NSA. Leadership of the NSA could be turned over to a civilian, according to the AP.

Last year, then-Defense Secretary Ash Carter reportedly sent a plan to President Obama proposing the split, and it seems the Trump administration is prepared to move ahead with those plans. The mechanics of the split including what the AP describes as Cyber Commands reliance on the NSA are still reportedly being worked out.

See more here:

The US is reportedly close to separating military-focused Cyber Command from the NSA - The Verge

Posted in NSA

ACLJ Files Federal Lawsuit Against NSA Whatever it Takes to Get to the Bottom of the Dangerous Susan Rice … – American Center for Law and Justice

Today, the American Center for Law and Justice (ACLJ) just filed its second lawsuit against the National Security Agency (NSA).

We made lawful demands for government records that will shed light on the Susan Rice unmasking scandal that rocked the intelligence community. The NSA failed to comply with the law. So, today, we took the NSA to federal court.

Heres what Fox News reported back in April:

Susan Rice, former national security adviser under then-President Barack Obama, requested to unmask the names of Trump transition officials caught up in surveillance. The unmasked names, of people associated with Donald Trump, were then sent to all those at the National Security Council, some at the Defense Department, then-Director of National Intelligence James Clapper and then-CIA Director John Brennan essentially, the officials at the top, including former Rice deputy Ben Rhodes.

The only way we even know about the Obama Administrations apparent politically motivated unmasking is because this raw intelligence information - classified national security secrets - was illegally leaked to the media.

The ACLJ went to work in our effort bring these secret and unlawful actions to the forefront. Our Government Accountability Project prepared a series of Freedom of Information Act (FOIA) requests designed to get to the bottom of this disturbing revelation.

Our FOIA Request sought:

records pertaining to any and all requests former National Security Advisor Susan Rice made to National Security Agency (NSA) officials or personnel regarding the unmasking of the names and/or any other personal identifying information of then candidate and/or President-elect Donald J. Trump, his family, staff, transition team members, and/or advisors who were incidentally caught up in U.S. electronic surveillance.

The NSA acknowledged our FOIA request and even granted expedited processing which means the NSA acknowledged the time-sensitive urgency behind our requests. But, even though expedited processing means the NSA is bound to process the request faster than other requests, we have heard nothing from them since.

So, today, we filed a critical lawsuit and we will force the NSA to answer to a federal court for its blatant disregard for the law. Among other things, we asked the Court for [a]n Order enjoining Defendant from continuing to withhold any and all non-exempt records responsive to Plaintiffs FOIA request.

This is not our first time weve taken the NSA to federal court. We filed a lawsuit earlier this year to force the NSA to produce government records that could expose the people and purposes behind the Obama Administrations eleventh hour rule change that dramatically expanded access to raw signal intelligence signed by the Obama Administration officials on their way out the door. It was these changes that have lead to an unprecedented avalanche of dangerous national security leaks.

Both of these lawsuits are part of our ongoing effort to aggressively combat the dangerous national security leaks that have been plaguing the federal government. The deep state shadow government bureaucracy must not be allowed to endanger the national security of the American people as it carries out a vicious vendetta against the current Administration. We will not stop fighting until we defeat and expose the shadow government leaks.

You can be part of our effort. We need your voice. Sign our petition today.

Link:

ACLJ Files Federal Lawsuit Against NSA Whatever it Takes to Get to the Bottom of the Dangerous Susan Rice ... - American Center for Law and Justice

Posted in NSA

CSU Partners with School District to Earn NSA Grant for Middle School Cybersecurity Education – Colombus State News

COLUMBUS, Ga. In what may be a first for Georgia, Columbus State University is partnering with the Muscogee County School District on a National Security Agency (NSA) grant to develop and implement a course in cybersecurity education specifically designed for middle school students.

The $50,000 NSA grant allows CSUs TSYS School of Computer Science and its developing TSYS Center for Cybersecurity to work with Rothschild Middle School Leadership Academy to develop and implement a course in cybersecurity education specifically designed for 7th and 8th grade middle school students.

We do not think that a cybersecurity curriculum of this magnitude has been attempted at the middle school level in Georgia, said Tom Hackett, chair of CSUs Department of Counseling, Foundations, and Leadership and executive director P-12/University Partnerships. This STEM project is expected to raise interest in cybersecurity and will encourage students to continue learning about cybersecurity, a field very much in-demand by todays workforce.

The course will be structured on the National Security Agency (NSA) Cybersecurity First Principles but will be broken down into age-specific topics understandable by 7th- and 8th-grade students, Hackett said. The NSA Cybersecurity First principles include: domain separation, process isolation, resource encapsulation, least privilege, modularity, layering, abstraction, data hiding, simplicity and minimization.

He said the course will facilitate a learner-centered classroom with numerous hands-on exercises that provide opportunities for middle school students to apply their newly gained knowledge of cybersecurity education.

This program is just one example of what will be many developing partnerships between the Muscogee County School District (MCSD) and Columbus State University. Hackett, CSU President Chris Markwood and MCSD Superintendent David Lewis are working on more ways to develop programs and education goals to benefit P-12 students, university students and the local businesses that will be hiring these graduates.

We are proud of this unique partnership with CSU and excited for the opportunities it will afford our students as they begin exploration in this high-demand field, said David F. Lewis, superintendent of the Muscogee County School District.

About 140 7th and 8th grade students at Rothschild Middle School will have the appropriate prerequisite to take the year-long elective course on cybersecurity education during the 2017-2018 school year.

Whether you are 6 or 60 years old, cybersecurity is important to us all, said Wayne Summers, professor and Distinguished Chairperson of CSUs TSYS School of Computer Science. By teaching the elements of cybersecurity in middle school, we will encourage safe computing practice as well as expand the pool of candidates for future cybersecurity professionals. Based on a comprehensive study supported by the National Initiative for Cybersecurity Education, there are nearly 13,000 cybersecurity job openings in Georgia and nearly 350,000 openings nationally.

The TSYS School of Computer Science, its TSYS Center for Cybersecurity and Muscogee County School District will ensure the cybersecurity education course will provide age-appropriate and performance based cybersecurity education in a safe environment for middle school students and will meet Georgia curriculum standards.

Hackett said the course curriculum will be available for download on the projects website and the course can be replicated in other middle schools across the nation.

The Rothschild teacher developing this falls course to be called Business Principles & Computer Science is enrolled at CSU this summer in the Information Security course in the TSYS School of Computer Science, which is designated by NSA as a National Center of Academic Excellence in Information Assurance Education. Additionally, CSU is part of a consortium of seven University System of Georgia (USG) institutions to develop the USGs capabilities in IT and cyber security as well as significantly increase the number of IT and cyber security industry qualified graduates coming from USG institutions.

Link:

CSU Partners with School District to Earn NSA Grant for Middle School Cybersecurity Education - Colombus State News

Posted in NSA

US to create the independent US Cyber Command, split off from NSA – PBS NewsHour

An undated aerial handout photo shows the National Security Agency headquarters building in Fort Meade, Maryland. Photo by NSA via Reuters

WASHINGTON After months of delay, the Trump administration is finalizing plans to revamp the nations military command for defensive and offensive cyber operations in hopes of intensifying Americas ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

Under the plans, U.S. Cyber Command would eventually be split off from the intelligence-focused National Security Agency.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials werent authorized to speak publicly on the matter so requested anonymity.

The goal, they said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world a responsibility that can sometimes clash with military operations against enemy forces.

Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space. The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces ever-widening fears about Russian hacking following Moscows efforts to meddle in the 2016 American election.

The U.S. has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions. But as other nations and foes expand their use of cyberspying and attacks, the U.S. is determined to improve its ability to incorporate cyber operations into its everyday warfighting.

Experts said the command will need time to find its footing.

Right now I think its inevitable, but its on a very slow glide path, said Jim Lewis, a cybersecurity expert with the Center for Strategic and International Studies. But, he added, A new entity is not going to be able to duplicate NSAs capabilities.

The NSA, for examples, has 300 of the countrys leading mathematicians and a gigantic super computer, Lewis said. Things like this are hard to duplicate.

He added, however, that over time, the U.S. has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.

The two highly secretive organizations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Commands creation in 2009.

But the Defense Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyberwarfare, particularly after the Islamic States transformation in recent years from an obscure insurgent force into an organization holding significant territory across Iraq and Syria and with a worldwide recruiting network.

While the military wanted to attack IS networks, intelligence objectives prioritized gathering information from them, according to U.S. officials familiar with the debate. They werent authorized to discuss internal deliberations publicly and requested anonymity.

Then-Defense Secretary Ash Carter sent a plan to President Barack Obama last year to make Cyber Command an independent military headquarters and break it away from the NSA, believing that the agencys desire to collect intelligence was at times preventing the military from eliminating IS ability to raise money, inspire attacks and command its widely dispersed network of fighters.

Carter, at the time, also pushed for the ouster of Adm. Mike Rogers, who still heads both bodies. The Pentagon, he warned, was losing the war in the cyber domain, focusing on cyberthreats from nations such as Iran, Russia and China, rather than on countering the communications and propaganda campaigns of internet-savvy insurgents.

Officials also grew alarmed by the growing number of cyberattacks against the U.S. government, including several serious, high-level Defense Department breaches that occurred under Rogers watch.

NSA is truly an intelligence-collection organization, said Lauren Fish, a research associate with the Center for a New American Security. It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect.

After President Donald Trumps inauguration, officials said Defense Secretary Jim Mattis endorsed much of the plan. But debate over details has dragged on for months.

Its unclear how fast the Cyber Command will break off on its own. Some officials believe the new command isnt battle-ready, given its current reliance on the NSAs expertise, staff and equipment. That effort will require the department to continue to attract and retain cyber experts.

Cyber Command was created in 2009 by the Obama administration to address threats of cyber espionage and other attacks. It was set up as a sub-unit under U.S. Strategic Command to coordinate the Pentagons ability to conduct cyberwarfare and to defend its own networks, including those that are used by combat forces in battle.

Officials originally said the new cyber effort would likely involve hundreds, rather than thousands, of new employees.

Since then, the command has grown to more than 700 military and civilian employees. The military services also have their own cyber units, with a goal of having 133 fully operational teams with as many as 6,200 personnel.

Its proposed budget for next year is $647 million. Rogers told Congress in May that represents a 16 percent increase over this years budget to cover costs associated with building the cyber force, fighting IS and becoming an independent command.

Under the new plan being forwarded by the Pentagon to the White House, officials said Army Lt. Gen. William Mayville would be nominated to lead Cyber Command. Leadership of the NSA could be turned over to a civilian.

Mayville is currently the director of the militarys joint staff and has extensive experience as a combat-hardened commander. He deployed to both Iraq and Afghanistan, leading the 173rd Airborne Brigade when it made its assault into Iraq in March 2003 and later heading coalition operations in eastern Afghanistan.

More here:

US to create the independent US Cyber Command, split off from NSA - PBS NewsHour

Posted in NSA

Military cyberoperations headed for revamp after long delay – Minneapolis Star Tribune

Adm. Mike Rogers heads both the NSA and Cyber Command, which would separate under a White House plan.

Jacquelyn Martin - Associated Press

By LOLITA C. BALDOR , Associated Press July 15, 2017 - 5:46 PM

WASHINGTON After months of delay, the Trump administration is finalizing plans to revamp the nation's military command for defensive and offensive cyber operations in hopes of intensifying America's ability to wage cyberwar against the Islamic State group and other foes, according to U.S. officials.

Under the plans, U.S. Cyber Command would eventually be split off from the intelligence-focused National Security Agency.

Details are still being worked out, but officials say they expect a decision and announcement in the coming weeks. The officials weren't authorized to speak publicly on the matter so requested anonymity.

The goal, they said, is to give U.S. Cyber Command more autonomy, freeing it from any constraints that stem from working alongside the NSA, which is responsible for monitoring and collecting telephone, internet and other intelligence data from around the world a responsibility that can sometimes clash with military operations against enemy forces.

Making cyber an independent military command will put the fight in digital space on the same footing as more traditional realms of battle on land, in the air, at sea and in space. The move reflects the escalating threat of cyberattacks and intrusions from other nation states, terrorist groups and hackers, and comes as the U.S. faces ever-widening fears about Russian hacking following Moscow's efforts to meddle in the 2016 American election.

The U.S. has long operated quietly in cyberspace, using it to collect information, disrupt enemy networks and aid conventional military missions. But as other nations and foes expand their use of cyberspying and attacks, the U.S. is determined to improve its ability to incorporate cyber operations into its everyday warfighting.

Experts said the command will need time to find its footing.

"Right now I think it's inevitable, but it's on a very slow glide path," said Jim Lewis, a cybersecurity expert with the Center for Strategic and International Studies. But, he added, "A new entity is not going to be able to duplicate NSA's capabilities."

The NSA, for examples, has 300 of the country's leading mathematicians "and a gigantic super computer," Lewis said. "Things like this are hard to duplicate."

He added, however, that over time, the U.S. has increasingly used cyber as a tactical weapon, bolstering the argument for separating it from the NSA.

The two highly secretive organizations, based at Fort Meade, Maryland, have been under the same four-star commander since Cyber Command's creation in 2009.

But the Defense Department has been agitating for a separation, perceiving the NSA and intelligence community as resistant to more aggressive cyberwarfare, particularly after the Islamic State's transformation in recent years from an obscure insurgent force into an organization holding significant territory across Iraq and Syria and with a worldwide recruiting network.

While the military wanted to attack IS networks, intelligence objectives prioritized gathering information from them, according to U.S. officials familiar with the debate. They weren't authorized to discuss internal deliberations publicly and requested anonymity.

Then-Defense Secretary Ash Carter sent a plan to President Barack Obama last year to make Cyber Command an independent military headquarters and break it away from the NSA, believing that the agency's desire to collect intelligence was at times preventing the military from eliminating IS' ability to raise money, inspire attacks and command its widely dispersed network of fighters.

Carter, at the time, also pushed for the ouster of Adm. Mike Rogers, who still heads both bodies. The Pentagon, he warned, was losing the war in the cyber domain, focusing on cyberthreats from nations such as Iran, Russia and China, rather than on countering the communications and propaganda campaigns of internet-savvy insurgents.

Officials also grew alarmed by the growing number of cyberattacks against the U.S. government, including several serious, high-level Defense Department breaches that occurred under Rogers' watch.

"NSA is truly an intelligence-collection organization," said Lauren Fish, a research associate with the Center for a New American Security. "It should be collecting information, writing reports on it. Cyber Command is meant to be an organization that uses tools to have military operational effect."

After President Donald Trump's inauguration, officials said Defense Secretary Jim Mattis endorsed much of the plan. But debate over details has dragged on for months.

It's unclear how fast the Cyber Command will break off on its own. Some officials believe the new command isn't battle-ready, given its current reliance on the NSA's expertise, staff and equipment. That effort will require the department to continue to attract and retain cyber experts.

Cyber Command was created in 2009 by the Obama administration to address threats of cyber espionage and other attacks. It was set up as a sub-unit under U.S. Strategic Command to coordinate the Pentagon's ability to conduct cyberwarfare and to defend its own networks, including those that are used by combat forces in battle.

Officials originally said the new cyber effort would likely involve hundreds, rather than thousands, of new employees.

Since then, the command has grown to more than 700 military and civilian employees. The military services also have their own cyber units, with a goal of having 133 fully operational teams with as many as 6,200 personnel.

Its proposed budget for next year is $647 million. Rogers told Congress in May that represents a 16 percent increase over this year's budget to cover costs associated with building the cyber force, fighting IS and becoming an independent command.

Under the new plan being forwarded by the Pentagon to the White House, officials said Army Lt. Gen. William Mayville would be nominated to lead Cyber Command. Leadership of the NSA could be turned over to a civilian.

Mayville is currently the director of the military's joint staff and has extensive experience as a combat-hardened commander. He deployed to both Iraq and Afghanistan, leading the 173rd Airborne Brigade when it made its assault into Iraq in March 2003 and later heading coalition operations in eastern Afghanistan.

Read the rest here:

Military cyberoperations headed for revamp after long delay - Minneapolis Star Tribune

Posted in NSA

How many Americans are swept up in the NSA’s snooping programs? – The Hill (blog)

Former Director of National Intelligence James Clapper famously (or infamously) told Congress the National Security Agency did not wittingly collect data on Americans. That turned out to be false.

More recently, Sen. Ron WydenRon WydenHow many Americans are swept up in the NSA's snooping programs? Overnight Finance: Yellen pushes back on GOP banking deregulation plan | Trump dodges on Russia sanctions bill | Trump floats tariffs on steel imports | Budget director touts MAGAnomics Dems on tax reform outreach: Talk is cheap MORE (D-Ore.) asked the current director of national intelligence, Dan CoatsDan CoatsHouse moves to bar Pentagon contracts with firms backing North Korean cyberattacks How many Americans are swept up in the NSA's snooping programs? Granting NSA permanent bulk surveillance authority would be a mistake MORE whether the government could use Section 702 of the Foreign Intelligence Surveillance Act to collect communications it knows are entirely domestic.

Not to my knowledge. That would be illegal, Coats responded.

However, a subsequent letter from Coats office to Wydens office suggests the directors answer was incomplete. The Office of the Director of National Intelligence clarified that section 702(b)(4) plainly states we may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States. The DNI interpreted Senator Wydens question to ask about this provision and answered accordingly.

FISA Section 702 authorizes two major NSA snooping programs. One is upstream collection, a process in which the NSA collects digital communications through the internets backbone undersea cables that process large volumes of internet traffic, which internet service providers send to the government. The government attempts to sort the data for foreign targets information and then is supposed to discard the rest.

We know some Americans information is retained when they communicate with a target, though minimization procedures are in place to protect their identities. Until recently, the information also could be swept up if they communicated about a target. The NSA recently announced it was ending about collection in the wake of a series of compliance incidents and privacy concerns. Some other Americans data may be swept up due to technological limitations that affect scope of collection. In other words, the NSA hasnt invested in infrastructure that can narrow their collection.

The problem is that we do not know how many Americans are swept up in 702 surveillance. We do not even have a rough estimate. A recent letter from privacy groups admonished Coats for refusing to provide information on the number of Americans swept up in 702 collection information that both he and his predecessor had promised to deliver.

Coats intransigence follows a familiar pattern of the NSA promising transparency and then reneging on those promises. Indeed, for the past six years the agency has flummoxed congressional oversight, with its reluctance to give the public hard data on this matter. When a powerful bureaucracy ignores both civil-society groups and its constitutional overseers, what is the solution?

Congress should step in and do its job, which requires going beyond public reprimands from a handful of members. The first branch has the power to legislate and write laws requiring the executive branch to reveal the number of Americans swept up in 702 collection. The letter from privacy groups recommended such a deep dive, but the intelligence community argued it would be counterproductively invasive. A clear legal mandate from Congress could outline how the search would be conducted, with accurate protections for Americans who potentially could be unmasked.

As to why the NSA would be so reluctant to answer such a simple request, privacy blogger Marcy Wheeler recently detailed a culture of ignorance that has emerged within the NSA in the wake of an July 2010 ruling by Foreign Intelligence Surveillance Court Judge John Bates concerning the deliberate collection of domestic content via upstream collection. In Wheeler's characterization, Bates said that if the government knew it had obtained domestic content, it had to delete the data, but if it didnt know, it could keep it. A perfect catch-22.

These instructions cultivate a practice of willful ignorance, which probably explains the hesitance of the intelligence community to answer Wyden's question publicly. A new law would nip this habit in the bud and place heavy incentives for transparency. Until a new law is passed, privacy advocates will be at the mercy of the NSAs mood.

Civil-society groups have nobly tried to fill the gap where Congress has been lacking in its oversight and lawmaking role. It is imperative then that Section 702 be updated substantially, before it is reauthorized at the end of the year. Both Americans privacy rights and the intelligence community stand to benefit from clearer legal boundaries. It is Congress job to hold the executive branchs feet to the fire the very notion of the separation of powers, of checks and balances and of a free democracy depend on it.

Jonathan Haggerty (@RplusLequalsJLH) is a research assistant at the R Street InstituteandArthur Rizer (@ArthurRizer) is the national security and justice policy director.

The views expressed by contributors are their own and are not the views of The Hill.

Link:

How many Americans are swept up in the NSA's snooping programs? - The Hill (blog)

Posted in NSA

Moscow board to reconsider NSA permit Tuesday – Moscow-Pullman Daily News

It has been almost three months since the Moscow Board of Adjustment approved a conditional use permit allowing New Saint Andrews College to expand into the former Cadillac Jack's building on North Main Street.

After appeals and City Council review, the board will make a decision on the CUP again at 7 p.m. Tuesday at City Hall's council chambers.

Mike Ray, assistant community development director, said the board will reconsider all the information previously presented to them in addition to reviewing a new survey of the availability of public parking in the area that city staff conducted at the direction of the City Council. After considering all the information, Ray said the board can approve the CUP with or without conditions, reject it or table the matter for a future meeting.

The board voted 3-2 to approve the CUP April 25 but five people appealed the board's decision during a 10-day appeal period in early May.

While the board approved the CUP in late April, it said NSA must provide 47 off-street parking spaces within about half a mile of the former CJ's property, subject to the approval of the zoning administrator. The other condition was NSA would be allowed to phase in the off-street parking requirement by providing 50 percent of it on occupancy of the building and the remainder when NSA's enrollment reaches 150 students, or five years from the date of occupancy, whichever comes first.

The City Council listened to the five appellants June 5. It upheld Ryanne Pilgeram's appeal and remanded the CUP decision to the board.

At the June 5 council meeting, the City Council directed city staff to conduct an additional survey of parking use within 600 feet of the proposed educational institute. City staff had conducted a parking survey over a five-day work week in April to assess the average availability of public parking spaces within 600 feet of the property. Counts were taken at 9 a.m. and 2 p.m.

Ray said city staff conducted new counts at 9 a.m., 12:30 p.m. and 2 p.m, and those results will be presented to the board Tuesday night.

Ray said the City Council also wanted the board to consider studying the parking mitigation calculation, which determined that 47 off-street parking spaces be required within roughly half of a mile of the former CJ's building.

The City Council further directed the board to reconsider its decisions that "the location, design and size of the proposed use will be adequately served by existing streets, public facilities and services" and "will not be in conflict with the Comprehensive Plan."

Although Tuesday's public hearing is open to the public, no public comment will be allowed at the direction of the City Council.

Ray said it is a public hearing only to accept the new parking count information that the City Council requested the board to consider.

"The City Council did not intend for additional public comment to be considered since there was already three, four hours of public comment at the initial hearing," Ray said.

The NSA's proposed expansion would include a maximum enrollment of 300 full-time equivalent students with up to an additional 44 faculty and staff.

The roughly 15,900 square-foot facility would include five classrooms/studios, nine offices, a multi-purpose room, a student lounge and a music conservatory with seating for 680 occupants.

Read the original here:

Moscow board to reconsider NSA permit Tuesday - Moscow-Pullman Daily News

Posted in NSA

Huggan retires, hands over command of NSA Panama City – The News Herald

Cmdr. Douglas Huggan, who has a long and illustrious career with the Navy, serving on three continents in five countries and six states, had led NSA Panama City since July 2015.

NAVAL SUPPORT ACTIVITY I relieve you sir.

With those words, command over Naval Support Activity Panama City passed from Cmdr. Douglas Huggan, known as Huggie to friends and associates, to Cmdr. Jay Sego in a simple but tradition-steeped ceremony Friday morning.

Huggan, who has a long and illustrious career with the Navy, serving on three continents in five countries and six states, had led NSA Panama City since July 2015. Capt. Stephen Barnett, the chief of staff for the Navys Southeast Region, and retired Navy Capt. Dennis Warren were among a dozen military and local officials on hand to wish Huggan fair winds on his retirement and return to Oklahoma, where he attended the University of Oklahomaand met his wife, Inge, more than 20 years ago.

Huggie has made a really big impact on the community during his command, Barnett said, adding that Huggans name is synonymous with pride in the community.

Warren, who has known Huggan for 17 years after they met at Tinker Air Force Base in Oklahoma, said the Navy and the country as a whole are better because of Huggans service. From a hockey-playing kid from Boston to safely landing a Cessna aircraft with his family on board when its engine seized, to turning a small naval air operation in Japan into a major international airport after the 2011 earthquake and tsunami, Warren commended Huggan for his lifetime of dedication and service.

Doug, Warren said, you will now be known as Skipper by those who served with you for the rest of your life.

Sego, who like Huggan is a graduate of the University of Oklahoma, hails originally from Fayetteville, Ark. He comes to Panama City from Duke University, where he was a public policy fellow at the Triangle Center on Terrorism and Homeland Defense. He has worked at the Pentagon with the Joint Chiefs of Staff, and with legislators developing defense policy. He also has completed numerous deployments during Operation Enduring Freedom and Operation Iraqi Freedom, as well as a deployment in the South China Sea.

Im truly and extremely blessed with this opportunity to join Naval Support Activity Panama City, Sego said. Im dedicated to giving you my all.

Sego said he was extremely excited to start working with the talented team at NSA Panama City, saying the bases stellar reputation is well known throughout the country.

Here is the original post:

Huggan retires, hands over command of NSA Panama City - The News Herald

Posted in NSA

Civil Libertarians Seek Intelligence Sharing Agreement From NSA – JD Supra (press release)

On Wednesday, July 5, British nonprofit Privacy International filed suit in U.S. District Court for the District of Columbia against the National Security Agency (NSA), the Office of the Director of National Intelligence (ODNI), and other U.S. agencies under the Freedom of Information Act. The suit seeks a copy of the current agreement governing sharing of signals intelligence among the Five Eyes alliance of the United States, the United Kingdom, Canada, Australia, and New Zealand. If successful, this request could provide new insight to domestic and overseas privacy advocates on how intercepted information is shared and could influence regulators already wary of the United States practices in this area.

Privacy Internationals suit arises from the long history of signals intelligence sharing between the United States and United Kingdom. In 1946, the countries executed an informal document, titled the United Kingdom-United States Communication Intelligence Agreement (the UKUSA Agreement), committing to share both signals intelligence itself and the techniques used to gather it. In 1955, the parties proposed a restatement of the UKUSA Agreement (which had by that time been joined by Canada, Australia, and New Zealand), and the NSA declassified records from those negotiations in 2010. These documents represent the most recent version of the UKUSA Agreement available to the public.

In its complaint, Privacy International seeks to compel the NSA, the ODNI, the State Department, and the National Archives and Records Administration to provide the text of the UKUSA Agreement now in effect, as well as records on the defendants rules and policies governing their sharing of intelligence gathered from operations relating to foreign communications.The 1955 UKUSA Agreement defines foreign communications to include communications of the Government of a foreign country, or of any person or persons acting or purporting to act therefor, and [redacted] communications originated by nationals of a foreign country which may contain information of value.

Of course, the rise of the Internet has given the NSA and its overseas partners opportunities to gather intelligence in ways not anticipated in 1955, and these new technologies create new difficulties in determining whether participants in a communication are indeed foreign nationals. The same difficulty prompted the enactment of the of the Protect America Act of 2007 and the FISA Amendments Act of 2008, each of which require the United States to take measures to minimize the chance of intercepting communications from U.S. persons. (The complaint likewise requests records describing these minimization procedures.) Privacy International argues that requiring the disclosure of any privacy safeguards mandated by, or implemented under, the current UKUSA Agreement will aid the public in understanding their rights and advocating for any needed improvements.

Updated information on the UKUSA Agreement, if released, could add to the international debate on privacy protections and surveillance. For example, in 2015, the European Court of Justice invalidated the U.S.-EU Safe Harbor, which had permitted the processing of European personal data in the United States due to NSA surveillance programs publicized by Edward Snowden. The Safe Harbors replacement, the Privacy Shield, is itself subject to at least two similar challenges under European law, and the European Commission will conduct its first annual review of the new regime later this year. Even the publicity accompanying Privacy Internationals initial filing could draw attention to the U.S.surveillance practices, which could in turn threaten the Privacy Shields continued viability.

To view a copy of the complaint, click here.

Excerpt from:

Civil Libertarians Seek Intelligence Sharing Agreement From NSA - JD Supra (press release)

Posted in NSA

Maddow Fake NSA Documents Alleging Trump-Russ | The Daily Caller

MSNBC host Rachel Maddow gave a heads up to other news organizations on Thursday after she was sent what she believes are faked National Security Agency documents alleging collusion between a member of the Trump campaign and Russian government.

Somebody, for some reason, appears to be shopping a fairly convincing fake NSA document that purports to directly implicate somebody from the Trump campaign in working with the Russians in their attack in the election, Maddow said in a lengthy segment on her show.

She suggested that the unidentified muckraker who sent her the fake documents hopes to undermine news organizations in general and deflate the Trump-Russia collusion investigation, which has been going on for nearly a year.

This is news, because: why is someone shopping a forged document of this kind to news organizations covering the Trump-Russia affair? Maddow asked.

On June 7, an unidentified person sent documents to an online tip line for Maddows show, she said.

That was two days after The Intercept published legitimate NSA documents that were stolen by Reality Winner, a contractor for the agency.

Maddow said that the documents sent to her show appeared to have used The Intercepts published documents as a template. Secret ID markings on The Intercept reports appeared on the documents passed to Maddow.

WATCH:

She said that metadata from the set of documents sent to her show preceded the publication of the documents published in The Intercept. Maddow suggested that it was possible that whoever sent her the forgeries had access to The Intercept documents. But she also theorized that whoever sent her the fake documents could have changed the metadata somehow.

The documents Maddow received appeared legitimate at first glance, she said, butseveral clues suggested that they were forgeries.

Typos and spacing issues raised eyebrows, but it was secret markings on the documents as well as their contents that convinced Maddow and her staff that the records were fakes.

But Maddow said that that the big red flag for her and her team was that the document she was given named an American citizen a specific person from the Trump campaign who allegedly cooperated with the Russians during the presidential campaign.

We believe that a U.S. citizens name would not appear in a document like this, asserted Maddow, who said that her team consulted national security experts on the matter.

And so, heads up everybody, Maddow warned.

The host pointed to two recent retractions one at CNN and the other at Vice News and suggested that they were the result of a similar scheme to undermine news outlets covering Trump.

In the case of CNN, three reporters were fired after the network retracted an article alleging that Trump transition team official Anthony Scaramucci was under investigation for ties to a Russian investment fund.

CNN said that the three reporters were fired because of shortcomings in their reporting process, but the network has been tight-lipped about what those shortcomings were.

Vice retracted two articles about a Trump robot display at Disney World.

One way to stab in the heart aggressive American reporting on [the subject of Trump-Russia collusion] is to lay traps for American journalists who are reporting on it, said Maddow.

And then after the fact blow that reporting up. You then hurt the credibility of that news organization. You also cast a shadow over any similar reporting in the futureeven if its true.

Maddow did not provide details about who sent her team the faked NSA documents.

But she concluded her segment saying, We dont know whos doing it, but were working on it.

Follow Chuck on Twitter

Read the original post:

Maddow Fake NSA Documents Alleging Trump-Russ | The Daily Caller

Posted in NSA