Congress Asks NSA for Estimate of American Surveillance Before Reauthorization – InsideSources

National Security Agency building at Fort Meade, Md. (AP Photo/Charles Dharapak, file)

Congress is still waiting for an intelligence community estimate of the number of American communications swept up in widespread surveillance programs authorized by law due to expire this year.

Lawmakers blasted the intelligence community Wednesday after a classified briefing from members of the National Security Agency, FBI, Office of the Director of National Intelligence and others. Representatives again failed to respond to a year-old request for an estimate of the number of American communications caught up in electronic surveillance programs.

Representatives have asked repeatedly for the information ahead of Congress reauthorization of FISA (Foreign Intelligence Surveillance Act) Amendments Act Section 702. The law legalizes broad electronic surveillance programs like Prism, revealed by NSA leaker Edward Snowden in 2013. Section 702 expires Dec. 31.

Michigan Democrat Rep. John Conyers said the intelligence community has not so much as responded to another December request for the estimate. He added lawmakers will not simply take the governments word on the size of the so-called incidental collection.

Section 702 authorizes NSAs upstream surveillance programs when the signals intelligence agency taps the physical infrastructure of the internet, such as undersea fiber cables, to surveil the content of foreign communications including emails, instant messages, etc. as they exit and enter the U.S.

It also allows the agency to submit selectors to U.S.-based communications providers, like e-mail addresses, who then provide the agency with any communications relevant to those selectors.

The programs essentially allow NSA to incidentally sweep up unrelated data belonging to Americans in communication with foreigners. Privacy advocates likeElizabeth Goitein, co-director of the Liberty and National Security Program at NYU Laws Brennan Center for Justice, say such incidental collection likely amounts to millions or tens of millions of warrantless interceptions.

I dont mean to imply that this trust was misplaced, Goitein told the House Judiciary Committee during the unclassified half of Wednesdays briefing. In fact, weve seen essentially no evidence of intentional misuse. But what we have seen is mission creep, so that a law designed to protect against foreign threats to the United States has become a major source of warrantless access to Americans data and a tool for ordinary, domestic law enforcement.

NSA can share raw data it collects absent a warrant with CIA and FBI. All three can hold onto data for five years, but encrypted communications, those reasonably believed to contain secret meaning, and any U.S. person information that has foreign intelligence value or is evidence of a crime, can be kept indefinitely. None estimate how many Americans are swept up annually in what privacy advocates have dubbed back door searches.

Goitein said that data can be used to prosecute Americans for crimes unrelated to the original search. Legal requirements for secrecy and national security allow prosecutors in some instances not to reveal how such information was gathered, making it difficult to surmise if its happened already.

She and others at Wednesdays hearing including California Democrat Rep. Ted Lieu say thats a clear Fourth Amendment violation, and Congress should rewrite the law with reforms instead of a blanket reauthorization. Jeff Kosseff, a professor at the U.S. Naval Academy, argued national security gives the intelligence community exception to the Fourth Amendments warrant requirement.

An anonymous White House official told Reuters Wednesday the Trump administration supports renewal without reforms.

We support the clean reauthorization and the administration believes its necessary to protect the security of the nation, the official said.

Follow Giuseppe on Twitter

Subscribe for the Latest From InsideSources Every Morning

Visit link:

Congress Asks NSA for Estimate of American Surveillance Before Reauthorization - InsideSources

Posted in NSA

Jaishankar meets US NSA, Speaker – The Hindu


The Hindu
Jaishankar meets US NSA, Speaker
The Hindu
On his third trip to the United States since the election of Donald Trump, Foreign Secretary S. Jaishankar met U.S. National Security Advisor Lt. Gen. H.R. McMaster, House Speaker Paul Ryan and Under Secretary of State Thomas Shannon on Wednesday.
Foreign Secretary S Jaishankar meets US NSA, discuss bilateral tiesEconomic Times
S Jaishankar holds talks with US Speaker Paul Ryan and NSA McMaster; safety of Indians, counter terrorism ops ...India.com
S. Jaishankar meets US NSA Lt. Gen. HR McMasterBusiness Standard
India Today
all 3,076 news articles »

See the original post:

Jaishankar meets US NSA, Speaker - The Hindu

Posted in NSA

Personal Mini Storage has become NSA’s eighth Participating Regional Operator – Yahoo Finance

ORLANDO, Fla., March 1, 2017 /PRNewswire-iReach/ -- Personal Mini Storage ("Personal Mini"), Central Florida's largest family owned storage operator is pleased to announce they have entered into definitive agreements with National Storage Affiliates Trust ("NSA"). Personal Mini, headed by Marc and Laurie Smith, has become NSA's eighth Participating Regional Operator ("PRO").

"We will continue to retain our management team and operate our management company as a family owned business while at the same time gaining all the benefits of being part of a large public company," said Marc Smith, President of Personal Mini, "Joining NSA as its newest PRO is the best way to accelerate our growth through NSA's attractive capital structure, and at the same time strengthen our operational tools by integrating them into NSA's 'best practices' platform. We expect to see significant growth, both personally and professionally, for our entire team as a result of our affiliation with NSA."

Marc Smith has more than 20 years of first-hand experience in owning and operating self-storage facilities. He is currently completing his term as Chairman of the national Self Storage Association ("SSA"). A licensed real estate broker, building contractor and Orlando philanthropist, Marc previously served as past president and national board member of the Southeast Region of the SSA. Marc specializes in all aspects of the self storage business, including acquisitions, site selection, start-ups, construction management, design, systems analysis and more. The Personal Mini brand continues to grow with the addition of 4 self storage properties on March 1, 2017, bringing the total number under management to forty (40) across mid-Florida.

Arlen D. Nordhagen, NSA's Chief Executive Officer, commented, "We are extremely pleased to introduce Personal Mini, a long-time industry leader, as our eighth PRO. Our new partnership with Personal Mini will significantly strengthen NSA's presence in the Florida market. We look forward to working with the entire Personal Mini team and welcome them to NSA."

About National Storage Affiliates Trust

National Storage Affiliates Trust is a Maryland real estate investment trust focused on the ownership, operation and acquisition of self-storage properties located within the top 100 metropolitan statistical areas throughout the United States. NSA currently holds ownership in and operates 453 self storage properties located in 23 states with approximately 28 million rentable square feet, and is one of the largest operators of self storage properties among public and private companies in the U.S. For more information, please visit the Company's website at http://www.nationalstorageaffiliates.com. NSA is included in the MSCI US REIT Index (RMS/RMZ) and the Russell 2000 Index of Companies.

About Personal Mini Storage

Personal Mini Storage is operated by Laurie & Marc Smith and is Central Florida's largest family owned storage operator. As of March 1, 2017, Personal Mini manages 40 properties with approximately 2.7 million rentable square feet in mid-Florida. To find out more about Personal Mini Storage or to find the storage location nearest to you, visitwww.personalministorage.com.

Media Contact: Cheryl Lewis, Personal Mini Storage, 407-297-3683, cl@personalministorage.com

News distributed by PR Newswire iReach: https://ireach.prnewswire.com

Originally posted here:

Personal Mini Storage has become NSA's eighth Participating Regional Operator - Yahoo Finance

Posted in NSA

Michael Samukai Implicates NSA in ‘Gun Ownership’ – Liberian Daily Observer

Michael Samukai, the son of Defense Minister Brownie Samukai, who is being tried for allegedly shooting Zardee Andrews in the back of his neck, told Criminal Court A yesterday that the gun used during the incident was issued to him by the National Security Agency (NSA).

The agency is expected to appear before the court on Thursday, March 2.

Defendant Samukai, who is on the witness stand, was said to have shot Andrews on September 13, 2016, during a fist fight about the victims extra marital relations with his wife. The incident occurred at the Tropicana Beach on the Robertfiled Highway.

Although, defendant Samukai testified that it was the NSA that issued him the gun, police investigation established that he acquired the weapon illegally. He, however, said the permit for the weapon is still in the possession of the NSA.

Samukai claimed that he is an employee of the NSA with a rank of deputy chief of security assigned at the National Port Authority (NPA). Despite the shooting incident, he still maintains his post.

His explanation came immediately after the prosecution asked him to produce every legitimate document in his possession that authorizes him to carry the arm.

It was due to that information that his lawyer asked the court for the agency to appear before it and to prove whether or not the defendants was authorized by the NSA to carry a firearm.

Further to his testimony, defendant Samukai alleged that he was issued the gun, after he had complained to his bosses that he had been attacked on many occasions, by unidentified persons while performing his duty at the port.

After I was physically attacked on many occasions as deputy chief of security at the port, it was when I thought that I needed protection and it was how the NSA gave me the weapon for protection, the defendant alleged.

He added that the NSA did not give him the permit for the weapon.

Explaining about the shooting incident, Samukai denied any knowledge as to who actually carried out the act.

The gun was in my jacket and while we were fighting, he spotted it and we together took it out of my clothes (jacket) and it went off, so, I do not know how he was shot, Samukai alleged.

He claimed that after the incident he immediately reported the weapon to the headquarters of the LNP, where the Police Inspector General, Gregory Coleman, advised him to leave it there because nothing was going to happen to me.

He is charged with multiple crimes, including aggravated assault, criminal attempt to commit murder and illegal possession of firearm.

Follow this link:

Michael Samukai Implicates NSA in 'Gun Ownership' - Liberian Daily Observer

Posted in NSA

Congress can reform the NSA to protect our rights without putting us in danger – Washington Examiner

Say you're a senior national security adviser on a campaign and part of your job is to speak to foreign ambassadors. You know the United States government often has such foreign officials under electronic surveillance, but you also know that, as an American citizen, you're still protected by the Fourth Amendment. Unfortunately for you, the FBI can collect your communications emails, texts, chats, or calls with those foreign officials and look at them without a warrant.

How is that possible? Nearly 10 years ago, Congress gave the NSA broad authority to intercept Internet communications, as long as it was for foreign intelligence purposes. That authority, known as Section 702, has played a valuable role in disrupting terrorist plots and gathering foreign intelligence, but it has always had two serious flaws.

First, its drafters did not carefully consider what protections should exist for U.S. persons whose communications would be reviewed by law enforcement. Second, the drafters did not foresee what having a statute that allowed for broad collection against foreigners would mean for U.S. companies operating overseas. But now, Congress has an opportunity to fix these two flaws before this statute expires at the end of the year.

According to government officials, Section 702 has played a crucial role in disrupting terrorist plots. A group commissioned by President Barack Obama to review the statute concluded that information obtained through it had "contributed in some degree" to the success of 53 terrorism investigations. In particular, intelligence agencies have highlighted that Section 702 helped disrupt a plot to bomb the New York subway system and a terrorism financing scheme operating out of Missouri. Successes like these have led intelligence officials to describe it as their "most significant tool" for the "detection, identification, and disruption of terrorist threats."

But while Section 702 is a powerful tool in the fight against terror, it raises serious concerns in the law enforcement context.

Section 702 allows the NSA to collect the communications of foreign persons from U.S. tech companies like Microsoft and Google and from U.S. telecom firms' networks. This collection, though targeted at potentially dangerous foreigners, inevitably sweeps up the communications of innocent Americans and non-Americans. These communications can be accessed by the FBI when investigating not only national security matters, but any crime. Because Section 702 information is not obtained pursuant to a warrant, this allows the FBI to evade the requirements of the Fourth Amendment and unconstitutionally invade the privacy of Americans.

American tech companies are also affected by Section 702. After particulars of 702 surveillance were leaked to the press, foreign governments, anxious about being surveilled by the NSA, denied contracts to U.S. tech firms like Microsoft and Verizon. More destructive was a 2015 ruling by the European Court of Justice which cited concerns about Section 702 when striking down a framework known as the Safe Harbor, which protected American tech companies from certain European data regulations.

Without Safe Harbor, U.S. companies could have been required to locate Europeans' data on servers in the European Union, with this seriously increasing companies' costs and proving especially prohibitive for start-ups. Although EU and U.S. authorities quickly implemented a replacement for Safe Harbor known as Privacy Shield, that agreement is already being challenged in EU courts. If it is struck down, the commerce-killing requirements that were predicted in the aftermath of Safe Harbor could become a reality, bringing transatlantic data flows and trade to a screeching halt.

Congress should reauthorize Section 702, but it should also amend it to protect Americans' rights and empower U.S. companies to push back against government surveillance that hurts their bottom lines. As lawmakers do this, they can ensure that Americans are safe, their rights are respected, and our companies continue to compete in the global marketplace.

Also from the Washington Examiner

The quieter and more removed from my life the commander in chief is, the better.

03/01/17 12:26 AM

Mieke Eoyang (@MiekeEoyang) is the vice president for the National Security Program at Third Way and previously served as a subcommittee staff director on the House Permanent Select Committee on Intelligence. Gary Ashcroft (@ashcroftgm) is a national security fellow at Third Way.

If you would like to write an op-ed for the Washington Examiner, please read our guidelines on submissions here.

Here is the original post:

Congress can reform the NSA to protect our rights without putting us in danger - Washington Examiner

Posted in NSA

NSA, Cyber Command structure should remain the same – The Hill (blog)

As if not troubled enough by President Trumps attacks, a new debate is heighteningtensions in the intelligence community. The Pentagon has started to assess whether it is time todivide the leadershipof the National Security Agency and U.S. Cyber Command.Such a move is dubious: Is change necessary? Can the IC tolerate another shock?

A look overseas to the Israeli case could provide some insight.

According to that plan, the new directorate would absorb responsibilities and resources from both Unit8200(the IDFs signals intelligence or SIGINT unit, equivalent to the NSA), as well as the Computer Service Directorate (equivalent to the Joint Staff J6). A fierce internal debate has emerged, with several (including the head of AMAN, the Intelligence Directorate) arguing that all cyber activities should remain under AMANs responsibility, while others insist that there is an acute need for a dedicated cyber directorate.

In early 2017, Lt. Gen. Eizenkot announced that the establishment of the Cyber Directorate would be postponed until further notice, and declared that AMAN would handle offensive and information collection elements in cyber space, while the Cyber Administration would come under the Computer Service Directorate, focusing mainly on defensive activities.

The reasons that led Lt. Gen. Eizenkot, who is considered a level-headed officer, to reverse his 2015 decision are highly relevant to the American case.

From a strategic standpoint, the implications of the cyber domain on present and future battlefields are still ambiguous and constantly changing; so too are their effects on traditional kinetic challenges. The inter-relations between the physical and virtual domains are still in flux, with grave ramifications on the nature of threats, and the measures needed to cope with them.

These changes are highly relevant to the way the IC reacts and adapts. The vast majority of the NSAs current collection activities are most likely executed through and with the cyber domain. Though traditional methods (such as phone tapping) are not dead, it is safe to assume that cyber is more dominant than ever, and will only continue to grow over more traditional domains and methods. Furthermore, given the specific characteristics of the cyber domain, it is difficult to distinguish between types of cyber activities (e.g., collection vs. attack). Separating those in charge of SIGINT and those in charge of cyber doesnt make sense.

as the last few years have taught us, the Wests adversaries have themselves transitioned to the cyber domain. With Russias (alleged)interventionin the U.S. elections, theSnowden affair, HAMAS and Irans extensive use ofcyber-related techniques, Chinesetheftof F-35 plans, and ISISssophisticated useof the virtual domain, this may not be the right time for radical changes.

Separating the NSA and the Cyber Command would inevitably create a long transition period, during which U.S. cyber capabilities would be negatively affected. Disputes over missions and responsibilities, coordination issues, transition of manpower, and lack of sufficient resources in one or both entities would jeopardize U.S. cyber resilience in the short term at the very least.

Finally, with Trump trying to aggressivelyredefinerelations between the IC and the executive branch, the last thing the community needs at this moment is another shock. A decision to separate the NSA and Cyber Command would create an all-out war within the IC and the Department of Defense, since no sane commander would agree to surrender responsibilities and resources to another organization.

The NSA itself would lose not only prestige but also relevancy, and presumably try to torpedo the move. If any change is needed at all, it would require a different approach: the cyber component should gain supremacy over any other type of SIGINT activity, as this will be the not-too-distant future reality. Until then, NSA-Cyber Command relations should remain untouched.

Shay Hershkovitz, Ph.D., is chief strategy officer at Wikistrat, Inc. and a political science professor at Tel Aviv University specializing in intelligence studies. He is also a former IDF intelligence officer whose book, "Aman Comes To Light," deals with the history of the Israeli intelligence community.

The views expressed by contributors are their own and are not the views of The Hill.

Follow this link:

NSA, Cyber Command structure should remain the same - The Hill (blog)

Posted in NSA

Product Support – SonicWALL NSA Series

Customizations policy for SonicWall Software products

A customization indicates functionality and configurations added to a product that are not provided as part of the core product release and, as such, would be outside the scope of normal support and maintenance. Customizations may take the form of new or modified scripts used within or alongside our products, as well as additional functionality such as custom reports, dashboards, rules, automated actions, etc. developed by you, your partners, or our Professional Services Organization.

Support and Customizations

We do not perform or maintain customizations. The design and development of customizations to our products is your responsibility. Assistance from Support will be limited to helping ensure that the product's functionality which enables the addition of customizations is functioning as expected. Alternatively, you may obtain guidance through product specific community sites or the Support Knowledge Base.

Advanced Assistance

If more thorough and detailed assistance is needed to design and develop customizations, we recommend that you engage our Professional Services Organization or fully certified partners to assist. Their expertise in designing customized solutions will ensure customers receive maximum value and product adoption. In addition to providing post-implementation expert services, Professional Services also offers a variety of pre-packaged customizations for some products which may meet your specific requirements.

Training & Certification

We recommend that you obtain the appropriate product training before attempting to design, develop, and implement any customization to our products. Our training courses will equip you with the necessary knowledge and ability to design and implement effective changes to our products. For more detail on the training services available, please refer to Training & Certification Services .

Maintaining Customizations

Careful consideration should be given to all customizations during future migration or upgrade exercises to new product and platform versions. Customizations could inhibit the upgrade itself and may require a level of re-work to continue functioning properly. Support does not take ownership for any customizations. We strongly encourage you to document and maintain records on any implemented customization work. These records can be useful in isolating problems that may be attributable to the customization or a defect in the core product.

See the article here:

Product Support - SonicWALL NSA Series

Posted in NSA

NSA Deputy Director: Why I Spent the Last 40 Years In National Security – TIME

The headquarters of the NSA in Fort Meade, Maryland.Courtesy of the NSA

Ideas

Ledgett is the deputy director of the National Security Agency

In 1977 I was finishing my sophomore year of college, working two jobs to put myself through school, and thought, There has to be a better way. So I enlisted in the U.S. Army as a Signals Intelligence/Electronic Warfare Morse Intercept Operator, which didnt tell me much but would let me earn money toward college through the GI Bill . My plan was to do my 3 years, get out, and finish college. That plan didnt work out; I ended up staying in the Army almost eleven years and then transitioned to the National Security Agency as a civilian for 29 more, and am retiring this April after 40 years in the business. I did end up finishing my degree after hours, and went on to get a masters degree, just not in the way Id planned. What happened along the way was that I discovered the fulfillment that comes from serving the nation and its allies, working with some of the most amazing people on the planet, on the most challenging problems we face.

For someone like me who is motivated by understanding how things work, the signals intelligence business is fascinating. Theres the challenge of understanding the communications technology that the target (in my early days, principally the Soviet Union ) uses, and how to intercept those communications. Then theres the need to understand the internal plumbing of how the intercepted data flows through our complicated architecture, and the multiple transformations that happen along the way. After that, analysts need to figure out what the data actually means the so what? of the intercept. Thats not as easy as it sounds, as the targets will work to hide their activities through cover names, and make references to shared information and experience that we dont have. And they rarely communicate in English, which requires a very high degree of expertise in the relevant foreign languages, to include slang and argot specific to functions and sub-cultures. This one is especially important to get right the difference between launch at noon and lunch at noon is consequential.

Its a complicated puzzle that requires multiple domains of expertise, all applied in the right way at the right time, to achieve success. But success in what we do isnt enough success has to translate into a good outcome for the users of our material, whether thats a policy maker planning a diplomatic negotiation with a foreign country, or a military commander assessing the threat to our forces. That means we need to understand their plans, and the way they work, well enough to know the best place for us to inject our information yet another level of complexity. But a successful outcome whether thats providing key information at the right point in a negotiation, or warning a military unit of an ambush so they can avoid it is hugely motivating, because we can see how the application of our hard-earned technical and operational knowledge resulted in a good outcome for the nation, and in those cases where we actually save lives, the individuals. There is a satisfaction that comes from knowing the story behind the headlines, and the fact that we had a part in how that played out even if we cant tell anyone about it.

The cyber domain is relatively new, adding some layers of complexity, but having the same foundational characteristics. In fact, the principal reason NSA is so skilled in the cyber domain is that weve been operating in it since its inception. The global telecommunications environment, where NSA works its signals intelligence mission to produce foreign intelligence, is also cyberspace, and we are expert denizens. Our complementary mission of information assurance, where we protect national security-related networks and information, requires us to have detailed insights into U.S. government networks. In both domains, our people need to have extraordinarily deep technical knowledge of networks, devices, and software, which quite often exceeds that of the people who built or programmed those products. When applied to the cybersecurity mission, it gives the nation a strategic advantage. And from a motivational point of view, what could be more satisfying than using ones expertise to defeat a foreign hacker threat to the country?

The personal and professional rewards of working in the intelligence business have been remarkable. Ive had the opportunity to travel to 39 different countries, and made lifelong friends in some of them. Ive seen what went on behind the headlines of everything from the Soviet invasion of Afghanistan , to the North Korean destructive attack on Sony , to the Russian cyber exploitation of the Democratic National Committee. More importantly, Ive seen the unsung heroes of the intelligence community, and especially at NSA, who work incredibly hard applying their formidable intellects and energy to protect us. They work countless hours at great personal cost, from missing milestones in their childrens lives to turning down lucrative jobs outside government because of their deep love for the mission. They deploy with our forces forward in war zones to ensure our military is protected, sacrificing time with their loved ones. Unfortunately, some of them have made an even greater sacrifice. The NSA/CSS Cryptologic Memorial Wall names the 176 individuals who have given their lives performing signals intelligence and information assurance missions around the globe.

Thats what kept me in this business for 40 years the combination of the intellectual challenge, the chance to develop and apply technical and operational expertise to things that matter, the joy of working with incredibly intelligent and motivated people, and the feeling that Im part of something bigger than myself. Im a little envious of the people coming into the workforce right now, as they have limitless opportunities to contribute, to serve, and to get the same kind of satisfaction from working in this completely digital, connected world. In 25 years or so, one of them will be sitting in the seat that I am now, and I hope she gets as much enjoyment from the journey as I have.

Ledgett is the Deputy Director of the National Security Agency. He will retire in April.

Read more here:

NSA Deputy Director: Why I Spent the Last 40 Years In National Security - TIME

Posted in NSA

Pentagon mulling split of NSA, Cyber Command – The Hill

The Pentagon is beginning to assess whether its time to split up the leadership of the National Security Agency and U.S. Cyber Command.

Right now, the two organizations share a leader Adm. Mike Rogers, who is director of the NSA and also the commander of the cyber unit.

But lawmakers have debated ending that dual-hat arrangement as the United States moves into a new era of expanded cyber warfare.

Separating the leadership of the NSA and Cyber Command would create a new vacancy for President Trump to fill.

Were looking at the issue, Pentagon spokesman Capt. Jeff Davis told The Hillon Wednesday, pointing to a newmemoissued by Defense Secretary James Mattis asking for an initial plan to better support information management and cyber operations.

Congress in December passed a bill that elevated Cyber Command to a unified combatant command. That change made Cyber Command its own war fighting unit, spinning it out from under Strategic Command.

But that legislation also pumped the breaks on splitting the NSA from Cyber Command, requiring the Pentagon to conduct a full assessment first.

Experts and former security officials regard it as inevitable that the NSA and Cyber Command will someday be separated but fear that split could be damaging if done too quickly.

Thats because Cyber Command wasnt established at NSA headquarters until 2009 and remains dependent on the agency to function.

If you split them off and give them separate bosses, you run the risk of potential personality conflicts between those two that might then cause a lessoning of the sharing and cooperation as it is occurring now, said Steve Bucci, a former Army Special Forces officer and Pentagon official who is now a visiting fellow at the conservative Heritage Foundation. Thats probably the biggest danger that I see.

Tensions already exist between NSA and Cybercom over professional overlap, and if duties and boundaries arent very clearly delineated in any split, these matters will worsen as they both fight for mission and resources, said John Schindler, a former NSA analyst and counterintelligence officer.

Alexandra Sander, a research associate at the Center for a New American Security, feared that the split could produce stove piping of intelligence information a term used to describe information that gets bottled up in agencies rather than shared in the government.

Elevating Cyber Command to its own unified command, and then if you had a split with the NSA on top of that, especially in a domain like cyber which should be integrated across the board with other functional and geographic commands and military operations if you had increased stove piping, I think that would have a negative effect on our capabilities, Sander said.

Under the law passed by Congress last year, Mattis and Joint Chiefs of Staff Chairman Gen. Joseph Dunford have to conduct a joint assessment into what would happen if the NSA and Cyber Command were separated.

They must ensure that the termination of the dual-hat arrangement will not pose risks to the military effectiveness of the United States Cyber Command that are unacceptable to the national security interests of the United States, the law states.

The military leaders are required to evaluate the dependence of Cyber Command on the NSA and how well the organizations could carry out their duties independently.

The legislation also prevents the split from happening until Cyber Command has achieved full operational capability, which isntexpectedto happen until the end of fiscal 2018.

The nonpartisan Government Accountability Office is also studying the dual-hat leadership of the two organizations; the office expects to complete that review in June, according to a spokesman.

Sen. John McCainJohn McCainWhy the GOP cannot sweep its Milo scandal under the rug New York Knicks owner gave 0K to pro-Trump group Hannity apologizes for sharing 'inaccurate' story about McCain MORE (R-Ariz.), who chairs the Senate Armed Services Committee, has staunchly opposed a premature separation of the two organizations. Other lawmakers have been less vocal, adopting a wait-and-see approach pending assessments by the Pentagon and GAO.

We want to make the right decision. Im undecided, Sen. Mike Rounds (R-S.D.), who chairs the newly formed Armed Services Subcommittee on Cybersecurity.

When you separate that out, you have to make sure that you have really good lines of communication, coordination and so forth. There are positives to either way, and we know right know that we have something we think is working; the question is at what point does it become so big that it needs to be changed? Rounds said.

President Obamaspokein favor of ending the dual-hat nature of the role late last year after he was reportedlypressedto do so by his Defense secretary and director of national intelligence.

Read more:

Pentagon mulling split of NSA, Cyber Command - The Hill

Posted in NSA

NSA Head: Russian Interference in US Election, ‘Hey, This Happened’ – USNI News

Adm. Michael S. Rogers, commander, U.S. Cyber Command (USCYBERCOM) and head of the National Security Agency. US Navy Photo

SAN DIEGO, Calif. The head of the National Security Agency reiterated that Russia engaged in cyber actions to influence the result of the U.S. presidential election and said the Moscow-directed interference is changing the way the NSA thinks about U.S. critical infrastructure.

We have been very public particularly if I put on my NSA hat in categorizing the behaviors we saw, from a cyber perspective, the Russians engaged in terms of our election process. We were very confident that, hey, this happened. What does that mean? said Adm. Rogers, who also heads U.S. Cyber Command, said on Thursday at the West 2017 conference.

It highlights to us that we need to rethink what critical infrastructure means in the digital age. We tended to view historically critical infrastructure as something associated with an output. Hey, air traffic. Hey, pipelines. The financial world. Power distribution. Generally, we thought a very industrial set of processes that generated some sort of output.

What the Russians did to influence the U.S. election adds a new dimension to what the U.S. should work to protect from influence from a cyber action or attack, he said.

What about information, data and fundamental processes like the ability to ensure high confidence that in a Western democracy the electoral outcome is actually reflective of the majority of our citizens, which is at the heart of the democratic system? he said. We have to think of it in a different way, and data increasingly has a value all of its own.

Rogers cited the attacks on the Office of Personnel Management in which the personal data of more than 21. 5 million people who had undergone the U.S. security clearance process was breached and the Russias hack of Democratic National Committee emails and subsequent distribution on Wikileaks as new types of threats.

You saw that in OPM, you saw that with the Russians the way they penetrated systems, moved data and then provided that in very public, unaltered format, he said. So we have to work through that. We need to work with a broader set of nations to clearly signal that this is unacceptable, and we need to drive the calculus in a different way.

Separately during the conference event, Rogers said the Trump administration has made cyber security a priority and predicted administration-level action soon.

The discussions moderator, retired Adm. James Stavridis, former NATO supreme commander and U.S. Naval Institute chairman, said that a Trump executive order on cyber was in the works and asked Rogers on the status.

Theres an ongoing dialogue that the administration I dont want to speak for them but if you take their statements, theyve been very upfront about the desire to make this a priority and a focus area in the early stages of the administration, Rogers said. I expect it to play out sometime in the immediate near term. The process always takes longer than you would like, but I think this would play out. The biggest input Ive tried to provide and Im just one voice take this opportunity to step back and look at this with a new set of eyes and say, if you were creating this from the ground up, how would you do this?

Continued here:

NSA Head: Russian Interference in US Election, 'Hey, This Happened' - USNI News

Posted in NSA

Self-Storage REIT: National Storage Announces 8th ‘PRO’ Prior To Earnings – Seeking Alpha

The growth needle is once again shifting into high gear at National Storage Affiliates (NYSE: NSA).

Source: image - 123RF

The newest publicly traded self-storage REIT continues to demonstrate that its unique business model resonates with large private self-storage operators.

This is especially true when it comes to family-run businesses, where management is looking to stay active and continue building upon a life's work.

After the bell, on Feb. 23, 2017, NSA announced the latest PRO to join its ranks, Personal Mini Storage of Orlando, a brand the Shader family has used to grow its self-storage business in Central Florida for several decades. NSA typically targets top industry operators with 20 or more properties located in larger US markets.

The Shader Brothers Corp. owned and operated portfolio contains 36 properties in a high-growth region of Florida. In the case of Personal Mini Storage, the Shader family has been an industry leader in Central Florida since the early 1980s. This acquisition will bring a portfolio of 36 well-seasoned self-storage properties to the table for NSA.

While the terms of the deal were not announced, (NSA reports Q4/FY'16 results on February 28th), NSA has the flexibility to issue OP/SP units in addition to cash for acquisitions. The OP units eventually convert 1:1 to NSA common shares. However, the SP units incentivize the new PRO with a formula that rewards strong performance, and protects existing shareholders in the event operating results are below par.

This optionality can give NSA a leg up versus its larger and better-known peer group, which includes: REIT blue-chip Public Storage (NYSE: PSA), Extra Space Storage (NYSE: EXR), CubeSmart (NYSE: CUBE) and Life Storage (NYSE: LSI).

The chart shows that National Storage delivered solid results compared with its peer group and the broader equity REIT sector.

Read more: Why Self-Storage REIT NSA's $630 Million iStorage JV Is A Big Deal

If you are not familiar with NSA, the article above provides background and links to previous articles.

Self-Storage - Bigger Picture

The recent self-storage sector underperformance is an anomaly. However, self-storage REITs had become a victim of their own success over the past few years. After piling up a couple of years of record high occupancy and blistering same-store NOI growth each quarter, same period result comparisons get tougher.

After the Great Recession, there were about five or so years of muted new supply, which contributed to the strong industry fundamentals and record performance. Notably, during the past few quarters, some local markets have seen notable increases in new supply. This can create a headwind for both street rates and occupancy. Since new self-storage properties open 100% vacant, operators typically use incentives to attract customers until occupancy becomes stabilized.

By late January, the pendulum of pessimism appeared to have swung too far, which I pointed out last month for SA readers in Self-Storage REITs In Full Retreat - Time To Buy?

Mr. Market's relentless selloff created an opportunity for investors to once again initiate positions in the desirable self-storage REIT sector.

During the past month, the sector has slowly begun to come out of its funk. Recent results by CubeSmart seemed to trigger a bit of optimism and helped bring buyers back. Extra Space Storage also has led the February upswing.

Adding PROs Pays Dividends

CEO Arlen Nordhagen has assured analysts and investors that NSA will only bring a new PRO aboard if it makes sense strategically, culturally, and adds to the bottom line. This discipline may have slowed the growth a bit, but it has resulted in a steadily rising dividend since the NSA IPO in 2015.

It is in both the NSA shareholders' and OP unit holders' (NSA PROs) interest that any major acquisition is immediately accretive to earnings. Management incentives are clearly aligned with shareholders.

Source: NSA irwebsite - Feb. 23, 2017

Once a new PRO joins National Storage, implementing a revenue management program, the national call center, and an advertising program, can help drive better operating results. It is also a given that NSA as a publicly traded REIT has a much lower cost of capital.

New PROs are a source of local market knowledge, and they can sharpshoot one-off "bolt-on" acquisitions for NSA. PROs can also be instrumental in convincing other privately owned self-storage operators to take a long look at the NSA value proposition. The industry profile of Marc Smith of Personal Mini Storage, is a perfect example:

"Marc M. Smith, President of Personal Mini, is currently completing a six-year term on the national Self Storage Association ("SSA") board, where he has served in various executive roles, including Board Chairman for the 2016 term. Marc has also served as past President and National Board Member of the Southeast Region of the SSA. He is a licensed Florida real estate broker and a licensed Florida building contractor. Marc has a B.S. in real estate and finance from The University of Texas, a M.S. in building construction from The University of Florida and is a graduate of the Owner President Management Program at Harvard Business School."

NSA will be able to leverage the relationships of a veteran self-storage industry team, Marc Smith and his wife Laurie Shader Smith, who grew up with the business in Orlando. On a personal note, I was privileged to get to know Laurie and her family back in the mid-1980s, and they are top-notch folks.

FAST Graph - Valuation Analysis

It's time to use the F.A.S.T. Graphs tool to check under the hood. The black line is price. It is a visual comparison relative to the blue line, which is "normal" P/FFO for the selected number of years. The red line corresponds to the dividend yield on the far right of the chart.

The NSA double-digit FFO growth potential can support the current valuation. In fact, the lack of consensus 2019 estimates for this relatively young REIT actually understates the growth. Meanwhile, investors are being paid an attractive 4% yield, backed by a solid history of dividend increases since the National Storage IPO.

Investor Takeaway

National Storage has been one of my top picks since the end of 2015. Last year, NSA shares returned over 30% to shareholders.

Read more: My REIT Small-Cap Gems 2016 Performance Update: 30%-Plus Returns

Notably, NSA shares are trading near their all-time high. However, that is not unusual for this top performer.

During the past 52 weeks, NSA shares have traded in a range of $17.10-$24.32 per share.

The challenge with most REITs which are fully valued is to find a catalyst to send the shares on the next leg up. However, the unique NSA business model has accretive portfolio acquisitions baked into the cake. Self-storage operators can cash in on high current valuations for their stabilized storage properties and remain active running the business. It is a way for them to diversify and obtain liquidity, to essentially have their cake and eat it too.

I fully expect management to raise FY 2017 guidance metrics to reflect the latest PRO acquisition. Additionally, NSA has been rolling out its revenue management program across the portfolio and this should bode well for same-store NOI results.

These "PROs," or preferred regional operators, can diversify and achieve some liquidity while still being able to participate in the upside of their life's work. NSA gives shareholders the opportunity to invest side by side with entrepreneurs who have a vested interest in the continued success of their legacy businesses.

If NSA does a secondary share offering in conjunction with the acquisition of the Central Florida portfolio, it could provide an opportunity for investors to initiate a position. I previously have suggested ~$20.00 as an acquisition target price. I think bumping that up closer to $22.00 per share would now be reasonable for new investors looking for an entry point.

I am contemplating whether to launch a Seeking Alpha Marketplace Premium subscription service. I would appreciate any feedback from readers who may be interested. Feel free to share them in the comment thread below, or send me an Inbox message.

I relentlessly hunt for diamonds in the rough and rising stars, in addition to closely following data centers, covering REIT blue-chips, and breaking news. Please consider following me as a Seeking Alpha author if you would like to be notified when my future articles are published.

Disclosure: I/we have no positions in any stocks mentioned, but may initiate a long position in NSA, EXR, CUBE, LSI, PSA over the next 72 hours.

I wrote this article myself, and it expresses my own opinions. I am not receiving compensation for it (other than from Seeking Alpha). I have no business relationship with any company whose stock is mentioned in this article.

Additional disclosure: Members of my household are long NSA.

See the rest here:

Self-Storage REIT: National Storage Announces 8th 'PRO' Prior To Earnings - Seeking Alpha

Posted in NSA

Our View: McMaster a good NSA choice – NUjournal

Army Lt. Gen. H.R. McMaster, named by President Donald Trump to be his new national security adviser, has been described as a prominent military strategist known as a creative thinker. That is precisely what the nation needs.

McMaster replaces Gen. Mike Flynn, who lost his job because he was not candid with Vice President Mike Pence regarding a discussion with a Russian diplomat. There is no reason to believe McMaster will make the same mistake.

One indication Trump made the right choice was the reaction on Capitol Hill. Lawmakers of both parties expressed pleasure with the decision.

McMaster is an excellent pick for several reasons. One is that Trumps foes have made much of his inexperience in both foreign and military affairs. Pointing to his outspokenness, they also warn darkly he may get the United States into military trouble. McMaster in the national security post does much to dispel such concerns.

On a practical basis, it would have been difficult to do better. McMaster can offer balanced, informed, calm guidance on threats to U.S. security.

Perhaps even more important, forward-looking intellect is just what the defense establishment needs. The Pentagon often is accused of preparing to fight the last war at a time when threats, weapons, tactics and strategies are changing dramatically. McMasters can help advise Trump in a manner calculated to have the United States prepared to fight the next war.

Sadly, both history and human nature make it clear that, no matter how hard we try to avoid it, there will be a next war.

The Minnesota House took a historic vote, according to House Speaker Kurt Daudt. "This historic vote brings ...

Twelve years ago federal law created the enhanced state ID card known as Real ID. The idea was developed after the ...

Pro-abortion activists want women to think the 1973 Supreme Court ruling known as Roe v. Wade is, without question, ...

President Donald Trump gave a 77-minute press conference on Thursday that still has people talking. He derided ...

Several presidents have treated their vice presidents notoriously and sometimes irresponsibly badly. The late ...

Help for German Park is welcome THUMBS UP: State Sen. Gary Dahms has introduced legislation to add the German Park ...

Read more:

Our View: McMaster a good NSA choice - NUjournal

Posted in NSA

When the NSA Feared Psychics Could Make Cities Lost in Time and Space – Atlas Obscura

Not what this might look like. Public Domain image adapted by Eric Grundhauser

A versionof this storyoriginally appearedonMuckrock.com.

A classified government document opens with an odd sequence of events relating to parapsychology has occurred within the last month and concluded with an alarming question about psychics nuking cities so that they became lost in time and space. If this sounds like a plot out of science fiction, it is - but its also a NSA memo from 1977.

The first event raised by the NSA note is a CIA report which mentioned KGB research into parapsychology. According to this, the KGB used hobbyists and non-governmental researchers to talk to western scientists. This allowed the KGB to collect useful information without putting themselves into a position to accidentally leak confidential information to westerners. According to the NSA note, this tactic yielded high grade western scientific data.

The next event described by the NSA note was what appeared to be a Russian provocation, though exactly what sort was a matter of some debate. In June 1977, an American journalist was detained in Russia for receiving a Soviet paper on parapsychology. The paper allegedly documented PSI (i.e. psychic) particles within the living cell, allegedly providing a physical basis for parapsychology.

This struck American intelligence as being a form of entrapment, though the goal was uncertain. Some thought it was an effort to provoke radio chatter which the Soviets could trace to get a better idea of the U.S.s interest and activities. Another theory was that it was simply a warning to the West to stay away from sensitive Soviet research. A third theory was that it was a double-think ploy to pretend interest in a clumsy manner to make us think that this was really just a deception to trick the West into believing there was interest when there really was none. While this last theory might sound paranoid, this is how denial and deception operate - and its something that Russian counterintelligence has long excelled at.

The section concluded with a note that there had supposedly been a successful demonstration of telekinetic power in a Soviet military sponsored research lab, and the alleged discovery of a new type of energy perhaps even more important than that of Atomic energy.

The third event was the apparent postulation by some physicists along with the famous evolutionist, Teilhard de Chardin that the universe was more of a great thought than a great machine. According to this view, the unified field on ground of reality is awareness. The note cited telekinetic experiments and postulated that awareness focusing could produce a new form of energy that moves or perhaps alters matter.

The report cited British scientists experiencing poltergeist phenomena after testing Uri Geller. Objects allegedly left the room, some of which apparently reappeared later. Supposedly, this didnt surprise unnamed scientists who found it no harder to believe that objects could disappear and reappear than it was to believe in the detected particles emerging from energy and dissolving or disappearing back into energy.

From these premises, two types of telekinetic weapons were hypothesized: a telekinetic time bomb and the equivalent of a psychic nuke that could dislodge a city in time and space.

The first involved a member of the command and control staff being kidnapped and subjected to trauma that would allow him to be suggestively programmed to develop telekinetic effects under stress at work. The theory was that when an emergency situation arose and the officer was subjected to stress, objects would begin to move and disappear independently and communications would become impossible.

The second hypothetical weapon was even more elaborate and potentially terrifying. Citing a prediction of a massive change which will alter the direction, time, space and energy-matter relationship of our world, the note wondered what would happen if a group of psychics were brought together. If ten people who were evidencing disruptive telekinetic phenomena were brought into one area, would it cause a chain reaction, causing much matter to reverse direction and sink back into a sea of energy or be displaced in time and space? The memo concluded by wondering if such an event reach a critical mass and affect an entire city.

By an interesting coincidence, the Philadelphia Experiment hoax bears some superficial resemblance to the theorized weapon in the NSA note. According various versions of the hoax, the USS Eldridge was temporarily rendered invisible or transported through time and space. The incident is even listed on NSAs webpage of paranormal topics that they dont have records on. However, there were other papers prepared on the perceived potential of weaponizing psychic abilities, some of which will be explored later. For now, you can read the NSA note here.

Originally posted here:

When the NSA Feared Psychics Could Make Cities Lost in Time and Space - Atlas Obscura

Posted in NSA

NSA denies ‘blanket’ spying on spectators and athletes at the 2002 Olympics in Salt Lake City – Washington Post

The National Security Agency has denied it indiscriminately spied on spectators, athletes and others who attended the Salt Lake City Olympics in 2002.

The denial came in a document filed last week in a U.S. District Court in Utah, where a group of Salt Lake City residents filed a complaint in 2015 alleging the U.S. government engaged in widespread, indiscriminate communications surveillance, interception, and analysis, without warrants and without probable cause during the Games that took place just months after the 9/11 terrorist attacks.

At issue, specifically, is how the Presidents Surveillance Program, or PSP, was implemented during the Games. PSP made headlines after 2013 when the government admitted to collecting a type of information known as metadata in bulk following the publication of classified materials leaked by Edward Snowden.

[New study: Snowdens disclosures about NSA spying had a scary effect on free speech]

In the court document, the NSA and other intelligence authorities admit that the activities actually carried out under the PSP were conducted without warrant or court order or judicial findings of probablecause, but rather, under Presidential and statutory authority, NSA attorney James Gilligan wrote in the filing on Friday.

He added, however, To the extent the allegations of this paragraph exceed the scope of or are inconsistent with the foregoing admissions, they are denied, including, specifically, the allegation that the PSP involved indiscriminate surveillance, interception, or analysis of communications.

Gilligan wrote neither the PSP nor any other NSA intelligence activity involved or evolved into blanket, indiscriminate surveillance of the contents of every email and text message and the metadata of every telephone call sent or received in Salt Lake City, or the vicinity of Olympic venues, during the 2002 Salt Lake City Winter Olympic Games.

Gilligan concluded the filing by asking the court to dismiss the complaint.

The NSAs latest request for dismissal comes just a month after U.S. District Court Judge Robert Shelby refused to dismiss the complaint that was filed by former Salt Lake City Mayor Ross Rocky Anderson on behalf a bipartisan group of individuals. The individuals are not seeking monetary damages.

Because the allegations in the [complaint] are not legal conclusions, bare assertions of the elements of standing, or sufficiently fantastic on their face as to defy reality, the law requires the court to accept them as true when evaluating the NSAs Motion to Dismiss, Shelby wrote in a court filing last month. Though these allegations will undoubtedly be tested as this case proceeds, the court concludes at this early stage that the Plaintiffs have plausibly alleged injury and redressability as required (H/t: Fox 13)

Continue reading here:

NSA denies 'blanket' spying on spectators and athletes at the 2002 Olympics in Salt Lake City - Washington Post

Posted in NSA

Can NSA Pick McMaster Bring Ethics to the White House? – Newsweek

This article first appeared on the Just Security site.

On Monday, Lieutenant General H.R. McMaster agreed to serve as national security advisor to the president.

McMaster has written and spoken extensively on a range of topics, from grand strategy to ground force maneuver. McMaster also appears to have strong views about military ethics that may influence the advice that he provides on matters of war and peace.

Try Newsweek for only $1.25 per week

While I have not found a systematic presentation of his moral worldview, there are a number of striking and potentially revealing statements that readers may find of great interest.

Indeed, McMasters statements over the years suggest a moral outlook that may positively influence national security policy, or lead to conflict with others in the administration who do not share his values.

First, I should note that, while commanding the U.S. Armys 3rd Armored Cavalry Regiment in Iraq, McMaster reportedly

forbade his soldiers from using dehumanizing and derogatory language when referring to Iraqis: both because such behavior is inconsistent with the shared values that define a soldiers moral identity, and because such behavior is potentially a verbal foot in the door leading to more serious forms of abuse.

As commander of the regiment, McMaster also reportedly ordered detainees be treated humanely, and even polled detainees on how well the regiment followed through. Such reports suggest that McMaster may be a practitioner of military ethics, not simply a theorist.

Speaking at the Carnegie Council for Ethics in International Affairs in 2014, McMaster offered the following remarks:

If you see, for example, what ISIL [ISIS] is doing today, you would think, Okay, how do you deal with an enemy like this, an enemy that operates in this way, and then is intermingled with civilian populations? Maybe to defeat this kind of enemy you have to be equally brutal. Maybe you have to lower your standards, but I would say that exactly the opposite is the case.

. . . We have to defeat them in a way thats consistent with our values that reflect our society and whats expected of our military, for our Army forces, and of course whats been expected since at least the time of St. Thomas Aquinas and St. Augustine, taking it back even further.

So what does that mean? It means that we have to fight them applying the principles of just war theory, which means distinction. We distinguish between our enemies and civilian populations.

Every day in Afghanistan today, every day across the wars in Iraq, our soldiers and Marines place themselves at a higher level of risk to protect innocents. I think thats something thats very important to understand about these kind of conflicts. Our soldiers are warriors, but our soldiers are also humanitarians.

National Security Advisor H.R. McMaster at the Trump Mar-a-Lago estate in Palm Beach, Florida, February 20. Adil Ahmad Haque writes that McMaster's distinguishing between civilians and combatants and accepting higher risk to avoid harming civilians seem incompatible with targeting the families of our enemies or simply bomb[ing] the shit out of them, in the words of President Trump. Kevin Lamarque/reuters

Needless to say, distinguishing between civilians and combatants and accepting higher risk to avoid harming civilians seem quite incompatible with targeting the families of our enemies or simply bomb[ing] the shit out of them, in the words of President Trump.

McMaster sounded the same theme years earlier, in a 2010 speech, Moral, Ethical, and Psychological Preparation of Soldiers and Units for Combat:

Because our enemy is unscrupulous, some argue for a relaxation of ethical and moral standards and the use of force with less discrimination because the endsthe defeat of the enemyjustifies the means employed. To think this way would be a grave mistake. The war in which we are engaged demands that we retain the moral high ground despite the depravity of our enemies.

McMaster then made the following observation:

Ensuring ethical conduct goes beyond the law of war and must include a consideration of our valuesour ethos. The Law of War codifies the principal tenets of just war theory, especially jus in bello principles of discrimination and proportionality. However, individual and institutional values are more important than legal constraints on immoral behavior; legal contracts are often observed only as long as others honor them or as long as they are enforced.

In this passage, McMaster suggests that principles that protect civilians during the conduct of hostilitiesdiscrimination and proportionalityare, fundamentally, moral principles codified into law. Accordingly, they bind soldiers categorically, irrespective of any expectation of reciprocity or fear of punishment.

The relationship between the law of war and the morality of war may be particularly relevant today, as a recentpresidential memorandum directs the secretary of defense to recommend changes to any United States rules of engagement and other United States policy restrictions that exceed the requirements of international law.

If the morality of war prohibits what the law of waras understood by the U.S. governmentdoes not, then it may prove quite fortuitous that the incoming national security advisor seems committed to the former as well as to the latter.

In a 2014 Veterans Day speech at Georgetown University entitled, The Warrior Ethos at Risk, McMaster offered the following thoughts:

I thought that we might consider two ways of honoring our veterans. First, to study war as the best means of preventing it; and second, to help the American military preserve our warrior ethos while remaining connected to those in whose name we fight.

It was Aristotle who first said that it is only worth discussing what is in our power. So we might discuss how to prevent particular conflicts rather than eliminate all conflict, and when conflict is necessary, how to win. And in the pursuit of victory, how to preserve our values and make war less inhumane.

Similarly, in a 2016 speech at Norwich University, McMaster warned against the tendency in our country to confuse military studies with militarism, arguing instead that the study of war is important to the preservation of peace.

These statements suggest that we should aim, above all, to prevent and avoid war. When we fail, we should fight the wars we cannot avoid as effectively and ethically as possible. This view seems consistent with the just war tradition, which seeks a middle path between realism and pacifism.

In a 2013 interview with McKinsey, McMaster volunteered the following (Ill let these passages speak for themselves):

The human dimension of war is immensely important for the Army as well; we need leaders who are morally, ethically, and psychologically prepared for combat and who understand why breakdowns in morals and ethics occur. I think there are usually four causes of breakdowns in moral characterignorance, uncertainty, fear, or combat trauma.

It is important to understand the effects of those four factors on an organization and then educate soldiers about what we expect of them. We need leaders who have physical and mental courage on the battlefield, of course, but also the courage to speak their minds and offer respectful and candid feedback to their superiors. Our leaders cant feel compelled to tell their bosses what they want to hear.

In addition to the fundamentals of combat, our soldiers really have to live the Armys professional ethics and values. They must be committed to selfless service, to their fellow soldiers, to their mission, and to our nation. That also involves, obviously, respect for and protection of our Constitution and understanding their role in that context.

Finally, McMaster seems to view the wars we are currently waging through a moral lens that differs quite dramatically from that of his immediate predecessor and of some of his new colleagues in the administration.

In his speech at Norwich University, McMaster called for soldiers and civilians alike to understand and develop empathy, empathy for the cultures and historical experience of the peoples among whom wars are fought and to promote moral conduct by generating empathy for others in an effort to prevent war or at least make war less inhumane.

In his Carnegie Council remarks, McMaster repeatedly describes ISIS, the Taliban and similar groups as irreligious groups seeking to impose a political order on local populations who are their primary victims:

This is an irreligious ideology in which you have these so-called imans who have third and fourth grade educations. Theyre thugs and criminals. Theyre misogynistic. They are wanting to impose on a huge population and territory an order that is medieval and rejects humanity, I think.

Theyre criminals. We ought to make sure we criminalize their behavior. What religious standard justifies this? No religious standard. These are irreligious people.

What we must do is we must defeat these enemies, who are enemies of all civilized people, along with our partners and allies in the region, the people who are suffering the most, who are in these regions in Afghanistan and Iraq and so forth.

Similarly, at Georgetown, McMaster said:

we will defeat these enemies who cynically use a perverted interpretation of religion to incite hatred and violence. . . .

Enemy organizations like Al Qaeda and ISIL [ISIS] seek to perpetuate ignorance, foment hatred and use that hatred as justification for the murder of innocents. They entice masses of undereducated, disaffected young men with a sophisticated campaign of propaganda, disinformation and brainwashing.

McMaster made similar remarks last May at the Center for Strategic & International Studies.

McMaster seems to understand that groups like ISIS and the Taliban do not represent Islam or the worlds Muslims. They seek to rule by violence and terror precisely because they cannot rule by consent. Accordingly, the United States should fight alongside Muslim communities against a common enemy rather than treat all Muslims as the enemy.

Will McMasters views prevail in the National Security Council, and shape the administrations foreign policy? Time will tell.

Adil Ahmad Haque is Professor of Law and Judge Jon O. Newman Scholar at Rutgers Law School.

More:

Can NSA Pick McMaster Bring Ethics to the White House? - Newsweek

Posted in NSA

NSA gives grant to Augusta University Cyber Institute – WRDW-TV

News 12 NBC 26 @ 6:00 / Wednesday, Feb. 22, 2017

AUGUSTA, Ga. (WRDW/WAGT) -- Augusta University's Cyber Institute is getting a big boost. A week after Governor Deal signed the Cyber Center's budget, now the school is seeing a grant from the NSA.

If it wasn't clear already Augusta University is becoming the place to be for cyber.

"So what' I'm telling you is the institute is working, what we're doing is working," Augusta University Cyber Institute Director Joanne Sexton said.

They've already expanded their reach into downtown Augusta and now they're reaching further, globally.

"We're in the right place at the right time, making things happen so we're very very fortunate," Sexton said.

Last week the NSA gave the school nearly a grant for nearly 300,000 dollars. The money could help students take a trip to see NATO's cyber security headquarters, but it's also helping add more cyber courses here.

"One thing is if you look at our name, it's the Cyber Institute, we didn't call it Cyber Security. And that was on purpose because cyber touches all of us. It's across all of the curriculum," she said.

That means cyber security, cyber terrorism, cyber in health care, and more. There's something to learn for every student.

"Federal to private to state, whatever, everyone needs this kind of work," Augusta University Cyber student Matthew Tennis said.

It's making students like Matthew ideal job candidates.

"I'm looking at either going into federal work in the intelligence industry or into private work in intelligence," he said.

"When you talk about cyber security, it's zero unemployment as long as you have the skills," Sexton said.

They're adding to the skills by adding graduate programs in intelligence analysis and security studies. And the cyber school has already doubled in size, more than 300 Augusta University students are in cyber programs. This is another way the school and the city area are virtually growing.

"Augusta University has a piece, our local community has been really supportive, but really it's about the whole team working together," she said.

More here:

NSA gives grant to Augusta University Cyber Institute - WRDW-TV

Posted in NSA

Welcome to NSA 2017! | 2017 Annual Conference & Exhibition

Join us in Reno, NV on June 23-28, 2017 for the Annual Education and Technology Expo!

The NSA Annual Conference and Exhibition is one of the largest of its kind and displays products and equipment relevant to every facet of police work, jails, prisoner transport, and courtroom security. Exhibitors, therefore, contribute in large measure to the overall success of the conference. There are also over 60 seminars and workshops covering all aspects of the duties and responsibilities for sheriffs offices, including, but not limited to law enforcement, jail operations, service of process, transportation of prisoners, and court & judicial security.

NSA 2017 News

Call for Submissions: Seminars We invite you to submit a seminar proposal for the 2017 Annual Conference in Reno. The deadline for submissions is October 31. If you have any questions about presenting a seminar, feel free to contact Hilary Burgess at hburgess@sheriffs.orgor 703-838-5320.

Call for Submissions: Award Nominations[CLOSED] We are now accepting nominations for the prestigious NSA Awards for Ferris E. Lucas Sheriff of the Year, Charles "Bud" Meeks Award for Deputy Sheriff of the Year, Chaplain of the Year, Law Enforcement Explorer Post Advisor Award, Corrections/Jail Innovation of the Year Award, the NEW Reserve Deputy of the Year Award, as well as several other awards.

Exhibit at NSA 2017 Bring your products and services to the NSA Exhibit Hall. Sheriffs, their appointed purchasing agents, and other qualified buyers will gather in Reno to see thecurrent products for law enforcement, criminal justice, and corrections personnel that you have to offer.

Sponsor NSA 2017 Take advantage of this once-a-year marketing opportunity and become a sponsor. There are many exclusive sponsorship opportunities available to you at our annual conference. Increase your exposure be a sponsor.

We understand that our exhibitors and sponsors have been inundated with phone calls and emails from fraudulent companies claiming to represent the National Sheriffs Association. We are making changes to the way we publish our exhibiting companies information to help reduce those unwanted contacts. Please be assured that the following are the only currently approved vendors with regard to our annual conferences. If you are contacted by any other company claiming to represent the National Sheriffs Association, please check with us before doing business with them.

Tradeshow Logic Exhibit Sales The YGS Group Advertising, Sponsorship & Corporate Partnership Voice Hive Registration Contractor Orchid Event Solutions Housing Contractor Brede Exposition Service General Service Contractor Convention Strategy Group Lead Retrieval Contractor Liberty CFS NV, Inc. Official Freight Carrier Projection Video Services, Inc. Official Audio Visual Contractor Convention Plant Designs Official Plant-Flower Contractor

More here:

Welcome to NSA 2017! | 2017 Annual Conference & Exhibition

Posted in NSA

Software vulnerability disclosures by NSA will continue under Trump, officials say – CyberScoop

The disclosure processthat governs how and when federal agencies should tell tech firms about flawed computer code is in no immediate danger of termination under the Trump administration, current and former U.S. officials said.

Flawed code by its very nature offers vulnerabilities that can be targeted by hackers. Knowledge of these vulnerabilities especially those never publicly reported is valuable to a wide array of actors, including law enforcement and intelligence services. In the past the default hasbeen to err on the side of disclosure, even by the super-secretive National Security Agency, according to a comprehensive research reported conducted by Columbia University.For now, that isnt likely to change, saidNeil Jenkins, director of the Homeland Security Departments Enterprise Performance Management Office, or EPMO.

It is not within our national interest to build up a stockpile of vulnerabilities to hide behind and to use for intelligence or law enforcement purposes. We have to get those out to make sure that systems are secure, Jenkins told a room full of cybersecurity industry insiders while speaking on a panel at the 2017 RSA conference. But the process does recognize that there are some vulnerabilities that we need to keep, that we need to use for national security purposes.

In most cases, though, the government has incentive to report flawed code, U.S. officials say.

The process is still in use, it is in regular use, and we are having meetings about these things on a pretty regular basis. And I would say, as of right now, we are still in the mode of responsible disclosure under the current administration, Jenkins said at RSA.

Known as the Vulnerabilities Equities Process, or VEP, the guidelines were only recently made public. The government first began releasing limited information about the process during the Obama administration.

We made an agreement early on that we would err on the side of the defense of this nation and if we didnt put it out the capability, if it were ever found then we would put it out there. And we stuck to that. It makes your job harder, but it was the right thing for the country, former NSA Director Keith Alexander said in December during a University of Maryland event. We put out more than 90 plus percent of those things that we saw. Some people criticized it [the VEP] but nobody changed.

In the run-up to President Donald Trumps inauguration, however, some feared that a new White House would reverse courseand offer intelligence and law enforcement agencies greater leeway to keep vulnerabilities secret.

Where we are in 2017, if you look at the sort of arc of cyber policy today, coming out of the Trump campaign and then out of the then president-elects office, it was very offense-oriented, explained Rob Knake, a former director for cybersecurity on the National Security Council at the White House. So I think there was this sense that the gloves were coming off, that the [VEP] would be thrown out the window That was my fear.

But what we have seen since then I think is a growing recognition that we revived this policy, that this is a policy from the Bush administration, this started in 2008 and came out of the CNCI and one which [current White House homeland security adviser] Tom Bossert had a heavy hand in, said Knake.

Though the VEP offers renewed transparency in its current form over what has largely been a clandestine decision-making process, the panel of experts also agreed that more can be done.

Greater coordination and shared oversight, Knake explained, should be instituted between the multiple federal agencies that share a vested interest in either disclosure or keeping software flaws secret. Until today, each federal agencies has approached the VEP in a slightly different manner.

We agree that it is time for this process to be codified in law just to make sure that it continues, that there is are clear considerations around the risk and potential for operational use and for regular review of what youre not disclosing, said Heather West, a senior policy manager for Mozilla.

I think ultimately there could be a lot more transparency around [the VEP], one of the things we noticed as we have gone through and researched this process is that it works reasonable well and the government could build a lot of trust with industry; saying this is what we have and are doing. And then we can have this collaborative relationship that we dont normally have in the cybersecurity space, West said.

At the moment, there are no penalties in place for agencies or U.S. officials that decide to keep software vulnerabilities out of the VEP process.

Read the rest here:

Software vulnerability disclosures by NSA will continue under Trump, officials say - CyberScoop

Posted in NSA

Kredo Tells OAN: Obama Officials Pushed Flynn Out As NSA – Washington Free Beacon

BY: Nick Bolger February 21, 2017 1:16 pm

Adam Kredo, senior writer for the Washington Free Beacon, appeared on One America News Network Monday to discuss the secret campaign to oust former National Security Advisor Michael Flynn.

Kredo discussed his recent report with Liz Wheeler.The piece reports that Obama Administration holdovers waged a campaign of leaks to force Flynn's resignation.

"It is quite an accusation," Kredo said. "And from at least half a dozen sources both inside and outside of the White House that I spoke to, it happens to be a fact."

Obama's former Deputy National Security Advisor, Ben Rhodes, created a "pro-Iran echo chamber" and used his allies to create an echo chamber outside of the White House to combat Trump on foreign policy, Kredo explains.

Kredo reports that Flynn's resignation was forced in an attempt to keep hidden side deals surrounding the Iran nuclear deal.

Flynn resigned from his post on February 13 following reports that he had lied to Vice President Mike Pence over his contact with Russia.

View original post here:

Kredo Tells OAN: Obama Officials Pushed Flynn Out As NSA - Washington Free Beacon

Posted in NSA

Trump Picks HR McMaster, Army Strategist, As National Security Adviser – New York Magazine

Ad will collapse in seconds CLOSE February 20, 2017 02/20/2017 4:23 p.m. By Adam K. Raymond

Share

President Donald Trump has found his national security adviser and once again, its a general. On Monday, Trump named Lieutenant General H.R. McMaster as his replacement for former NSA Michael Flynn and called the 54-year-old a man of tremendous talent and tremendous experience.

Trump made the announcement while sitting on a golden couch at his Mar-a-Lago club in Palm Beach, Florida, where he also said that acting NSA Keith Kellogg, a retired lieutenant general, will serve under McMaster as chief of staff. Additionally, Trump said that former U.N. ambassador John Bolton, a candidate for the NSA job, will be asked to work with us in a somewhat different capacity.

A career Army officer, McMaster previously served as the director of the Army Capabilities Integration Center, described by USA Today as an internal think tank that looks at future threats and how to deal with them. In 2014, he was named to Time magazines 100 most influential list and called the architect of the future U.S. Army. In the magazine, retired Lieutenant General Dave Barno described McMaster as an iconoclast who repeatedly bucked the system and survived to join its senior ranks.

The West Point graduate also has a Ph.D. from the University of North Carolina at Chapel Hill. His dissertation was turned into the 1997 book Dereliction of Duty, which CNN said in 2006 is considered the seminal work on militarys responsibility during Vietnam to confront their civilian bosses when strategy was not working.

While McMasters academic bona fides may stand in contrast with Trumps the Times says hes seen as one of the Armys leading intellectuals he shares the presidents opinion that the U.S. military is too small. We are outranged and outgunned by many potential adversaries, he said at a 2016 hearing of the Air-Land subcommittee of the Senate Armed Services Committee. Our army in the future risks being too small to secure the nation.

McMaster, who has been described as a blunt-spoken bulldog, joins Defense Secretary James Mattis, whose nickname is Mad Dog, and Homeland Security head John Kelly, a no-nonsense pragmatist, as one-time generals who have signed up to work in the Trump administration.

CPAC Blasted for Milo Yiannopoulos Invite After Pedophilia Remarks Resurface

John McCain the Republican vs. John McCain the Patriot

Airplane Passenger Reportedly Called Police After Feeling Not Comfortable Sitting Next to Mykki Blanco

The White House Mole

The Blacks for Trump Guy Is a Former Member of a Murderous Cult Who Thinks Obama Is the Devil

CPAC Yanks Milo Yiannopoulos Invitation After Offensive Video

Report: Putins Psychological Profile of Trump Calls Him Nave

For a Black Artist to Win Album of the Year, They Have to Make an Album of the Decade

Report: Trumps Lawyer Involved With Secret Plan to Lift Russian Sanctions

Did Lena Dunham Shade the Wing on Girls?

Most Popular Video On Daily Intelligencer

It took the TSA two hours to report the accidental security breach to Port Authority police.

Ivanka Trump and the White House issued statements, but the president has not discussed the incidents specifically.

The company is moving fast following harassment allegations from a former employee.

The silly-sign makers were out in full force on Monday.

He was previously in charge of designing the Army of the future.

The right-wing provocateur came under fire for a video in which he defends relationships between younger boys and older men.

The Kremlin is trying to better understand Trump as worries reportedly grow in Moscow about his ability to lift sanctions.

The Defense Secretary arrives in Baghdad as a part of his world tour of walking back Trump statements.

Many opposed giving the right-wing provocateur a speaking slot even before seeing his defense of relationships between younger boys and older men.

The other two people involved with the plan were a pro-Putin Ukrainian lawmaker and a Trump business associate with links to the mafia.

Trumps fake Swedish news reflects a misleading right-wing narrative about refugee-perpetrated crime.

He warned that suppressing the media is how dictators get started, though he mostly avoided direct references to the president.

Trump has already chosen his 2020 opponents: the press and any version of reality that doesnt come from him.

Meanwhile, Trump is still looking for his next national-security adviser.

But the White House insists nobody is getting enhanced access to the president.

The senator (ambivalently, agonizingly) takes on the president.

An elite school allegedly had to cancel a field trip to the Central Parks Trump-affiliated Wollman Rink.

The Associated Press has a draft of a memo that suggests deploying as many as 100,000 National Guard troops.

Scott Pruitt will spearhead the Trump administrations efforts to increase water pollution and accelerate man-made climate change.

Michels displacement by Newt Gingrich is widely seen as a landmark on the road to partisan polarization. The path continues ever downward today.

The rest is here:

Trump Picks HR McMaster, Army Strategist, As National Security Adviser - New York Magazine

Posted in NSA