NSA Ajit Doval met Nizamuddin event organisers, convinced them about threat it poses – MyNation

Bengaluru: The Nizamuddin event, which has become the talk of the town, is being considered as the most powerful tool of spreading the coronavirus.

An FIR has also been filed against the maulana for holding the congregation.

News has now emerged that National Security Advisor (NSA) Ajit Doval rushed to the event and requested the maulana to call off the event.

Reports add that Doval reached around 2.00 am on March 28-29 night and convinced Saad to call off the event as it would be spreading the virus.

It was on March 13 that around 3400 assembled at Nizamuddin Markaz as part of the religious event.

And on March 16, the CM of Delhi announced that there would be no gatherings of more than 50 people. Yet, there was no respect for his words. The event continued.

Four days later, 10 Indonesians who had attended the event test positive in Telangana.

On March 22, the much important event, Janata curfew took place. No gatherings were allowed.

A day later, around 1500 vacated the event.

On March 25, there were around 1000 people still in attendance.

A day later, an Indian preacher dies in Srinagar. This preacher was a part of the event.

On March 30, there were reports that six of those who attended the event died in Telangana.

Delhi CM Arvind Kejriwal has ordered an FIR be filed against the Maulana for holding an event of this magnitude despite the orders.

What makes anyones blood boil is how such congregations take place despite being fully aware that it is an invitation for the virus to spread.

It would be anyones guess that social distancing would have been compromised there and the health requirements not honoured.

Read more from the original source:

NSA Ajit Doval met Nizamuddin event organisers, convinced them about threat it poses - MyNation

Posted in NSA

4 candidates vie to be militarys next spy chief – POLITICO

The officers have since been vetted by Kernans shop and forwarded to Defense Secretary Mark Esper and Joint Chiefs Chairman Gen. Mark Milley, according to one of the people, who spoke on the condition of anonymity.

Esper, after receiving input from the U.S. intelligence community, will then make his choice and share the recommendation with the White House although the exact timeline remains fluid as the Defense Department reels from the coronavirus pandemic.

A DoD spokesperson referred comment about the process and the candidates to DIA, which declined to comment.

The selection will be made as President Donald Trump takes aggressive steps to reshape an intelligence community that he has often openly mocked and warred with, replacing veteran operatives with people considered to be loyalists.

In February, the president replaced acting Director of National Intelligence Joseph Maguire with U.S. Ambassador to Germany Richard Grenell, who previously had not served in any U.S. intelligence agency. The abrupt change set off more personnel moves that have prompted fears among career clandestine officials of a broader loyalty purge.

The Pentagon hasnt been immune. Last month, POLITICO reported that the White House is holding up Kathryn Wheelbargers nomination to become Kernans No. 2 because administration officials believe she hasnt been sufficiently loyal to Trump.

The moves are concerning to current and former defense officials, who believe the selection of a new military spy chief will now have to undergo a political test.

The fact is, ultimately, it's a presidential decision and a presidential appointment, a former senior defense official told POLITICO. I would hope that those advising him, and then the senior officials in DoD and in the intelligence community, focus on best athlete.

You need a professional. You need somebody that understands intelligence, that is experienced in it, and who will speak truth to power.

The next director will be responsible for overseeing an agency with about 17,000 employees spread across 140 countries, and which has been examined by both Pentagon brass and lawmakers over concerns that an accumulated glut of responsibilities has distracted from DIAs mission of providing military intelligence.

Here is more information on the candidates:

Air Force Maj. Gen. Jeffrey Kruse is the director for Defense Intelligence Warfighter Support, an organization under Kernans office. He served as head of intelligence at U.S. Indo-Pacific Command, a role that could help his chances as the Pentagon carries out the administrations strategy against China and Russia.

Another factor that could boost Kruses candidacy is the concept of service equity namely that the armed branches get turns filling significant general officer assignments. DIA hasnt had an Air Force chief since James Clapper from 1992 to 1995.

Marine Corps Maj. Gen. Michael Groen is the deputy chief of Computer Network Operations at the National Security Agency. Prior to joining NSA, he served in two high-profile posts: head of intelligence for the Joint Staff and for the Marine Corps.

Army Lt. Gen. Scott Berrier is the deputy chief of staff for Army intelligence. He has held a variety of intelligence roles during his military career, including multiple stints in Afghanistan.

Navy Rear Adm. Trey Whitworth is the Joint Staffs director of intelligence. His official biography shows a lengthy list of tours at multiple organizations, including U.S. Africa and Central commands, as well as NSA.

Yet while Whitworths assignments are impressive, they dont align well with the administrations great power competition strategy, one person familiar with the process warned.

If I were betting, I would say it would be Kruse, the person told POLITICO, citing his recent regional expertise and his familiarity with the defense intelligence enterprise. The two-star is politically savvy and knows whats needed to modernize.

The former senior defense official declined to guess who might get the nod, calling all four stellar candidates.

They have all led large organizations. They all have a war zone experience. They've all served in combatant commands, the former official said. The intelligence community and DoD are pretty fortunate to be able to have that stiff of competition for a director.

The two people familiar with the process and the former defense official all said they expect Esper to make an announcement later this spring or over the summer though the coronavirus pandemic might end up delaying things, including Ashleys retirement and congressional consideration of his successor.

You want to give enough time for the Senate to do its due diligence and execute its process before the August recess, the former official told POLITICO. If you don't get it by then, you hope when they come back in September that they're able to take up the military nominations. But it being an election year, the Hill turns into a ghost town come early October.

The former official expressed confidence Esper can keep the White House from exerting political influence over the military appointment.

I hope so," this person said.

Originally posted here:

4 candidates vie to be militarys next spy chief - POLITICO

Posted in NSA

Ex-NSA hacker finds new Zoom flaws to takeover Macs all over again, together with webcam, mic, and root obtain – Mash Viral

Zoom, the well-liked video clip connect with service has experienced a range of privacy and security troubles in excess of the decades and weve observed many really not too long ago as Zoom has seen utilization skyrocket all through the coronavirus pandemic. Now two new bugs have been discovered that make it possible for hackers to just take manage of Macs which includes the webcam, microphone, and even total root entry.

Reported by TechCrunch, the new flaws were identified by Ex-NSA hacker Patrick Wardle, nowprinciple protection researcher at Jamf, who thorough his results on his website Goal-See.

Wardle goes as a result of a history of Zooms privacy and security concerns like the webcam hijacking we noticed very last summer months, the calls not basically currently being conclusion-to-end encrypted as the corporation promises, the iOS application sending person knowledge to Fb, and a lot more.

And Wardles newest bug discoveries suggest Macs are susceptible to webcam and mic takeover again, in addition to taking gaining root entry to a Mac. It does have to be a local attack but the bug tends to make it reasonably uncomplicated for an attacker to obtain full regulate in macOS by Zoom.

As these types of, today when Felix Seele also observed that the Zoom installer may possibly invoke the AuthorizationExecuteWithPrivileges API to conduct different privileged installation responsibilities, I determined to get a closer glimpse. Virtually quickly I uncovered numerous concerns, together with a vulnerability that sales opportunities to a trivial and trustworthy area privilege escalation (to root!).

Wardle describes the full process in specialized depth if you are fascinated but the flaw comes down to this:

To exploit Zoom, a community non-privileged attacker can basically substitute or subvert the runwithroot script in the course of an install (or enhance?) to obtain root access.

Then, a 2nd flaw Wardle discovered permits entry for hackers to entry a Macs digital camera and mic and even file the display screen, all without a consumer prompt.

Sad to say, Zoom has (for good reasons unbeknown to me), a precise exclusion that allows destructive code to be injected into its method space, in which stated code can piggy-back again off Zooms (mic and digicam) entry! This give malicious code a way to both file Zoom conferences, or worse, access the mic and digicam at arbitrary instances (devoid of the person obtain prompt)!

Zoom didnt answer to TechCrunch immediately after a ask for for remark. With the hundreds of thousands of folks utilizing Zoom with the latest world wellness disaster, hopefully, we see a deal with genuine speedy!

FTC: We use income earning car affiliate hyperlinks. More.

Check out 9to5Mac on YouTube for additional Apple information:

More here:

Ex-NSA hacker finds new Zoom flaws to takeover Macs all over again, together with webcam, mic, and root obtain - Mash Viral

Posted in NSA

Heres How The National Security Agency Will Protect Itself During A Pandemic – BuzzFeed News

Secret documents sketch out the worst-case scenario for a 1918-like pandemic and no effective response.

Posted on March 13, 2020, at 4:54 p.m. ET

The Department of Health and Human Services has recommended that intelligence community personnel have at least three months worth of food on hand in the event of an uncontrolled pandemic.

The recommendation was contained in an unclassified influenza contingency plan drafted in 2009 by the National Security Agency. It details the sweeping steps the spy agency should take to keep its personnel safe and working on critical intelligence matters in the event of such a crisis.

The 50-page document obtained by BuzzFeed News last July following a six-year Freedom of Information Act battle tracks closely with steps that have now been widely adopted by Americans facing the current coronavirus outbreak, which the World Health Organization officially declared a global pandemic this week. The contingency plan was drafted in response to a 2006 directive from then-president George W. Bush that called upon federal government agencies to implement a "national strategy" for a potential influenza pandemic.

The new coronavirus is a novel virus in the same family as those that caused SARS and MERS. So far it has spread to more than 132,000 people across the globe and killed 4,900 people, mostly in China. While the coronavirus is much more deadly than influenza, a flu pandemic can also have devastating impacts. The 1918 Spanish flu killed almost 50 million people worldwide.

Since 2013, BuzzFeed News has filed more than two dozen public records requests with multiple federal agencies seeking their influenza pandemic plans. Many agencies have refused. As recently as Thursday, the Securities and Exchange Commission cited an exemption under FOIA that applies to "the internal personnel rules and practices of an agency.

The NSA did not respond to a request for comment about whether the contingency plan it issued a decade ago has been updated and if it can be applied to the coronavirus pandemic. However, an official with the Office of the Director of National Intelligence, which oversees the intelligence community, told BuzzFeed News the agency intends to implement guidance issued by the Office of Personnel Management to ensure the intelligence communitys mission remains uninterrupted.

The IC has numerous missions requiring a global workforce presence, the official said, referring to the intelligence community. Agencies are developing preparation and response plans consistent with federal guidelines and regulations.

During a pandemic, the NSA's 2009 plan states that every time affiliates civilian or military personnel assigned to work at that agency enter a government building they would be screened for fever or other flulike symptoms, in an area outfitted with special airflow and filtration capabilities. The plan also limits employee travel and requires a physicians clearance to return from work after illness. In a crisis, the plan would give NSA leadership the ability to quarantine individuals, campuses or NSA headquarters.

Some workers would be asked to do jobs they dont normally do to staff critical mission functions for the NSA. During a pandemic, the agency would make evacuation payments to workers so they can reach a safe haven and continue working. The NSA also planned to provide access to psychologists or social workers to address stress.

The plan pointed out that simple steps, such as social distancing and proper hand-washing, are effective at slowing the spread of the virus. And the plan said that the goal of public health officials should be to slow down the rate of infection and limit the burden on medical staff and hospitals.

The plan is supplemented by a PowerPoint presentation titled Pandemic Planning that was written by the Department of Health and Human Services and contains specific recommendations for the intelligence community.

In one slide, HHS made stark predictions about a possible viral outbreak. We dont know when the next pandemic will occur, which influenza virus will cause it, or how severe it will be, the document stated.

A slide titled Pandemic Severity Index ranks threat levels. The top level is at Category 5 at which at least 2% of infected people die. Assuming a 1918-like pandemic and no effective response, the document said, more than 1.9 million Americans would die and 9.9 million others would require hospitalization.

Another slide titled Pandemic Policy to Maintain the IC Mission Objectives suggests that intelligence officers based overseas leave foreign countries early, return home and have enough food for 12 weeks and stockpile masks and medication.

HHS updated its pandemic influenza plan in 2017.

Original post:

Heres How The National Security Agency Will Protect Itself During A Pandemic - BuzzFeed News

Posted in NSA

National Storage Affiliates Trust (NSA) distance from 20-day Simple moving Average is -15.14% : What to Expect? – The InvestChronicle

Lets start up with the current stock price of National Storage Affiliates Trust (NSA), which is $30.37 to be very precise. The Stock rose vividly during the last session to $32.3 after opening rate of $31.08 while the lowest price it went was recorded $28.73 before closing at $29.93.

National Storage Affiliates Trust had a pretty favorable run when it comes to the market performance. The 1-year high price for the companys stock is recorded $38.22 on 02/18/20, with the lowest value was $27.16 for the same time period, recorded on 04/22/19.

Price records that include history of low and high prices in the period of 52 weeks can tell a lot about the stocks existing status and the future performance. Presently, National Storage Affiliates Trust shares are logging -20.53% during the 52-week period from high price, and 11.82% higher than the lowest price point for the same timeframe. The stocks price range for the 52-week period managed to maintain the performance between $27.16 and $38.22.

The companys shares, operating in the sector of financial managed to top a trading volume set approximately around 748525 for the day, which was evidently higher, when compared to the average daily volumes of the shares.

When it comes to the year-to-date metrics, the National Storage Affiliates Trust (NSA) recorded performance in the market was -9.67%, having the revenues showcasing -9.18% on a quarterly basis in comparison with the same period year before. At the time of this writing, the total market value of the company is set at 1.81B, as it employees total of 459 workers.

During the last month, 3 analysts gave the National Storage Affiliates Trust a BUY rating, 2 of the polled analysts branded the stock as an OVERWEIGHT, 3 analysts were recommending to HOLD this stock, 0 of them gave the stock UNDERWEIGHT rating, and 1 of the polled analysts provided SELL rating.

According to the data provided on Barchart.com, the moving average of the company in the 100-day period was set at 34.26, with a change in the price was noted -4.23. In a similar fashion, National Storage Affiliates Trust posted a movement of -12.23% for the period of last 100 days, recording 398,791 in trading volumes.

Total Debt to Equity Ratio (D/E) can also provide valuable insight into the companys financial health and market status. The debt to equity ratio can be calculated by dividing the present total liabilities of a company by shareholders equity. Debt to Equity thus makes a valuable metrics that describes the debt, company is using in order to support assets, correlating with the value of shareholders equity. The total Debt to Equity ratio for NSA is recording 2.19 at the time of this writing. In addition, long term Debt to Equity ratio is set at 2.19.

Raw Stochastic average of National Storage Affiliates Trust in the period of last 50 days is set at 18.91%. The result represents downgrade in oppose to Raw Stochastic average for the period of the last 20 days, recording 18.91%. In the last 20 days, the companys Stochastic %K was 15.94% and its Stochastic %D was recorded 22.01%.

Considering, the past performance of National Storage Affiliates Trust, multiple moving trends are noted. Year-to-date Price performance of the companys stock appears to be encouraging, given the fact the metric is recording -9.67%. Additionally, trading for the stock in the period of the last six months notably deteriorated by -6.35%, alongside a boost of 7.96% for the period of the last 12 months. The shares increased approximately by 1.84% in the 7-day charts and went up by -16.06% in the period of the last 30 days. Common stock shares were lifted by -9.18% during last recorded quarter.

The rest is here:

National Storage Affiliates Trust (NSA) distance from 20-day Simple moving Average is -15.14% : What to Expect? - The InvestChronicle

Posted in NSA

Even With Corona Virus, the Show Must Go On – Wheeling Intelligencer

When I was in Houston recently for our National Speakers Association (NSA) Winter Conference, one of the topics discussed was the corona virus. For professional speakers, it is a big concern since speaking at conventions or conferences is a major source of their income. Canceled meetings mean lost revenues.

A panel of experts told the attendees to expect many meetings to cancel out of caution, especially international meetings. They also gave us hope. Several years ago, one of the panelists had been to the region of China where the virus initiated. He told us the population in that region is over 20 million.

The number of reported virus cases in that region is approximately 200,000.

A person in that high-risk region has a very small chance of getting the virus and an even lower chance of being killed by it. We probably have a higher chance of getting the flu. This doesnt mean we shouldnt be concerned or take common sense precautions.

The panel made the point that speaking is a delivery system. This is a time to be creative. There are other ways to communicate information, such as webinars or video conferences, to name just two. The point is, we cant control the spread of the corona virus and we cant control the decision of an organization or company to cancel a convention or conference.

We cant control the actions of others. We do have control of our own actions and how we react to a problem.

Lynnda and I left Houston on a Sunday and flew to Orlando. We went straight to Epcot at Walt Disney World for a test run. We are both recovering from knee surgery and are coming back to Disney in a month with our youngest son and his family of four children. We wanted to make sure we could navigate the parks and rides without the need of a wheelchair or other assistance.

There is a lot of walking involved. Could we do it? Waiting for Lynnda to get her purse inspected at Epcot security, I got a call from my friend, Ben at IHSMarkit. He told me that out of concern for attendee safety, the World Petrochemical Conference in New Orleans the week of March 23 was canceled. As predicted at NSA, I was impacted by the corona virus.

WPC is a big deal for Shale Crescent USA. We have been preparing for months. We are a major sponsor. We were doing a lunch presentation. Last year our lunch presentation was packed to standing room only. I had meetings set up with six major companies all prospects for coming to our region. Historically WPC has been our best source of prospects and leads. All of this gone with one phone call we had no control over.

The panel of experts told us at NSA that if a conference is canceled, the reasons for people attending remain. That creates opportunity.

Most likely if WPC had been held, attendance would be lower. There would have been an increased risk for us of being infected, especially from a foreign source.

A number of other meetings have already been canceled. Some companies have restricted travel. We were going to meet our son in-law from Baltimore at the Orlando airport hotel. He was flying in for a one- day meeting. It was canceled.

At Shale Crescent USA, we have a choice. We can do nothing and feel sorry for ourselves or we can do something.

The WPC attendees have needs. We can help. We believe the show must go on. We decided to take control and seize the opportunity. We have begun to reschedule our WPC meetings with U.S. companies. We are still working on our presentation to turn it into a webinar or video conference. We can reach out to the same people and companies that would have been in attendance at our luncheon.

Asian companies will be more difficult, since we cant meet individually right now. There is a 12- to 14-hour time difference, so some of our webinars and video conferences could be at some odd night time hours. We may be able to get some of these companies to attend Select USA in June and meet with them at that time. There are always other possibilities we havent considered.

What does this mean to you? Life and business are full of surprises, some of them bad. There are circumstances and people we have no control over.

We have 100% control over our attitude and our actions. Doing nothing or having a personal pity party is not an option if we want to succeed.

We will all be impacted by the corona virus in some way. We are seeing lower gasoline prices due to reduced Chinese demand. We are also seeing lower stock market prices impacting our net worth, 401K or retirement. Business travel is already being restricted. Companies and individuals depending on China for products are impacted. We cant change these macro impacts. We can decide how we choose to react to them.

The corona virus is like any other problem we have no control over. We can choose to take control of our attitude and our actions. We can use our creativity. Some of what we do will fail. We can try something else. We can choose not to quit. I dont know what the result of our actions at Shale Crescent USA will be. The show must go on.

We will move forward.

I do know Lynnda overcame her surgery and I overcame my injury to have three great days without needing a wheelchair at Disney World. The show did go on. We believe we are ready for the grandkids. All things are possible.

Greg Kozera, gkozera@shalecrescentusa.com is the director of marketing and sales for Shale Crescent USA. He is a professional engineer with a masters degree in environmental engineering who has over 40 years experience in the energy industry. Greg is a leadership expert and the author of four books and numerous published articles.

Today's breaking news and more in your inbox

Why are so many public officials rushing to close public schools and ban big gatherings?Why are some companies ...

At the conclusion of the recent Business and Health Expo, vendors were handed a survey form pertaining to the ...

Its 2020, and while most minds might be on the upcoming elections, theres another way you can have your voice ...

We all need incentive. If we dont have it, everything grinds to a halt in our lives. But if we do have it, it is ...

You may have heard of the butterfly effect. The late Edward Lorenz, an American mathematician and ...

I wasnt afraid. Yet I heard the concern in my parents voice when they talked about it. I was just a ...

Read more here:

Even With Corona Virus, the Show Must Go On - Wheeling Intelligencer

Posted in NSA

Over Objections From Privacy Advocates, Tame Surveillance Bill Sails Through the House – Reason

It took all of a day after the text was released for the House of Representatives to vote for a surveillance reform and reauthorization bill that privacy groups (and some members of Congress) say doesn't go nearly far enough.

On Tuesday evening, Reps. Jerry Nadler (DN.Y.) and Adam Schiff (DCalif.) released the text of the USA Freedom Reauthorization Act. On Wednesday evening, it sailed through the House by a vote of 278136.

The bill renews but revises the USA Freedom Act, which was passed in 2015 after Edward Snowden revealed that the National Security Agency (NSA) had secretly been collecting and storing massive amounts of Americans' phone and internet records. The USA Freedom Act was a compromise between those who pointed out these acts violated Americans' privacy and Fourth Amendment rights and those who insisted the United States needed the info to fight terrorism. The law allowed the NSA and FBI to access these collected records under more strict guidelines and authorized the use of roving wiretaps to keep track of "lone wolf" terrorists.

The USA Freedom Act sunsets this weekend, and privacy activists on both the left and the right have used the opportunity to push for stronger protections from secret surveillance and unwarranted data collection.

Last night's vote suggests we will not see tougher reforms. The bill does include some milder (but nevertheless welcome) changes. It ends the records retention program entirelynot as big a deal as it might sound, since the NSA has already abandoned it. The Foreign Intelligence Surveillance Amendment (FISA) Court will have modestly expanded powers to bring in outside advisers when the feds want a warrant and to review decisions.And the attorney general will have to sign off on any secret surveillance warrant applications that target federal officials or federal candidates for office. But the bill does not grant civil libertarians' demands for limits on how business records can be secretly collected and used, for stronger protections against secret surveillance of First Amendmentprotected activities, and for a stronger role for those outside advisers.

The vote did not follow party lines. There is a consistent group of Democrats and Republicans who support strong privacy and Fourth Amendment protections, even if they don't see eye to eye on most other issues. Among the 60 Republicans who voted against the limper reforms were Louis Gohmert of Texas, Thomas Massie of Kentucky, Jeff Duncan of South Carolina, and Tom McClintock of California. Among the 75 Democrats who voted no were Zoe Lofgren of California, Alexandria Ocasio-Cortez of New York, Ted Lieu of California, Rashida Tlaib of Michigan, and Tulsi Gabbard of Hawaii. Independent Justin Amash of Michigan also voted against the bill.

But they're the minority. The larger, more establishment-minded leadership of Congress seems fine with kicking the can down the road yet again (the law will sunset once more in 2023) and reforming as little as they can get away with.

One of the more notable "yea" votes comes from Rep. Devin Nunes (RCalif.). A vocal defender of the president, Nunes has long insisted that the feds and the FISA Court abused their powers when they snooped on Trump aide Carter Page. (Subsequent investigation shows he was right to be concerned.) Nunes has even gone so far as to call for the entire FISA Court to be dismantled. Yet when it came time to vote, he, like he has done historically, voted to preserve the wider surveillance authorities.

This bill wouldn't have done anything to stop the FBI from wiretapping Page. He was neither a candidate for office nor a federal official at the time. But it will make it harder for the feds to wiretap Nunes.

The legislation heads over to the Senate now, where Rand Paul (RKy.) is trying to use his influence over Trump to stop the bill and demand stronger reforms. A tweet from Trump suggests Paul has the president's ear:

We went through this once before. That time, Trump wound up approving legislation that actually expanded the feds' authority to secretly spy on American citizens. Let's hope this isn't yet another case where the people in power care only about whether they are the ones being surveilled.

Read this article:

Over Objections From Privacy Advocates, Tame Surveillance Bill Sails Through the House - Reason

Posted in NSA

Ensuring the Cybersecurity and Resilience of the Defense Industrial Base – Lawfare

Editors note: This post article is part of a series exploring the findings and recommendations of the U.S. Cyberspace Solarium Commission.

Cyber-enabled intellectual property theft from the Defense Industrial Base (DIB) and adversary penetration of DIB networks and systems pose an existential threat to U.S. national security. The DIB is the [t]he Department of Defense, government, and private sector worldwide industrial

complex with capabilities to perform research and development and design, produce, and maintain military weapon systems, subsystems, components, or parts to meet military requirements. It is a compelling example of a cross-domain challenge that lies at the intersection of cyberspace and conventional domains of warfare. This is because adversary behavior in cyberspace has broader ramifications, such as the potential to erode the United Statess conventional military advantage, undermine deterrence, and provide emerging nation-state competitors with an edge over the U.S. in military contingencies and conflicts. The threat is multifaceted. Intellectual property theft can enable adversaries to replicate cutting-edge U.S. defense technology without comparable investments in research and development. Adversary access to the DIB could inform the development of offset capabilities. It could even provide insights or access points that enable adversaries to thwart or manipulate the intended functioning of key weapons and systems designed and manufactured within the DIB.

As the sector-specific agency for the DIB, the Department of Defense takes the lead within the federal government for working with this critical infrastructure sector. The 2018 Department of Defense Cyber Strategy identifies defense of the DIB as a crucial imperative, noting that the Defense Department will defend forward to halt or degrade cyberspace operations targeting the Department, and collaborate to strengthen the cybersecurity and resilience of [the Defense Department], [Defense Critical Infrastructure], and DIB networks and systems. There are a number of federal entities involved in identifying, prosecuting and thwarting cyber threats to the DIB. These include the recently established Cybersecurity Directorate within the National Security Agency (NSA); the DIB Cybersecurity Program; and law enforcement and counterintelligence entities such as the FBI, the Air Force Office of Special Investigation, the Naval Criminal Investigative Service, U.S. Army Counterintelligence and the Department of Defense Cyber Crime Center.

Nevertheless, vulnerabilities within the DIB persist and there are gaps in existing efforts. Two critical shortcomings are, first, that there is no truly shared and comprehensive picture of the threat environment facing the DIB and, second, that efforts to rapidly detect and mitigate threats to DIB networks and systems are lacking. Adversaries operate in cyberspace across multiple areas and sectors within the defense industry. This means that, while an advanced threat actor may be targeting a number of entities within the DIB, any given target can only observe the adversaryits capabilities, tools, techniques and indicators of compromiseas it operates on its own assets, if at all. However, to gain insight into adversaries as strategic organizations, the Defense Department needs a consistent and coherent picture of where, how and why they are operating.

These gaps drive two important recommendations advocated by the Cyberspace Solarium Commission. First, through legislation, Congress should require companies within the DIB, as part of the terms of their contract with the Defense Department, to participate in a threat intelligence sharing program that would be housed at the department component level. Information sharing programs do exist, but they are insufficient. For example, the departments Cyber Crime Center and the DIB Cybersecurity Program are largely voluntary, although DIB entities have some mandatory reporting requirements. Existing programs also tend to benefit the larger prime contractors, which have the ability to share and consume threat information. But small and sub-prime contractors play vital roles in the supply chain, and vulnerabilities within these entities can have cascading negative implications. Finally, the Defense Department lacks a complete view of its supply chain, which may include non-U.S. companies. There are no mandatory reporting requirements that require prime contractors to disclose to the department the identities of their subcontractors.

The ultimate end state of this information sharing program is to leverage fused, real-time information from DIB network owners and operators, coupled with U.S. government intelligence collection products, to create a comprehensive picture of adversary organizations and an improved understanding of the adversaries own intelligence collection requirements. This would help the Defense Department and the intelligence community anticipate where adversaries will seek to collect against DIB targets. And, importantly, this information would need to be communicated to DIB network owners and operators so that they can proactively defend against impending threats, as well as support the threat-hunting efforts described further below.

The program should contain a number of key elements. First, drawing on the Defense Departments new Cyber Maturity Model Certification (CMMC) regulation, the requirements associated with participation would be tied to a firms level of maturity. In addition, there should be incentives around participation, particularly for small- and medium-sized companies. Second, there should be defined frameworks that guide specifically delineated information sharing, such as incident reporting and reporting on the use of subcontractors. Third, participation in the program should automatically entail consent by DIB entities for the NSA to query in foreign intelligence collection databases on DIB entities and provide focused threat intelligence to them, as well as enable all elements of the Defense Department, including the NSA, to directly tip intelligence to the affected entity. Finally, as it develops, the program should aim to support joint, collaborative, and colocated analytics, as well as drive investments in technology and capabilities to support automated detection and analysis.

The second committee recommendation is that Congress should direct regulatory action that the executive branch should pursue, through the Defense Federal Acquisition Regulation Supplement, to require companies within the DIB to create a mechanism for mandatory threat hunting on DIB networks. This would be as part of the terms of a companys contract with the Defense Department. Threat hunting is the act of proactively searching for cyber threats on assets and networks. This recommendation is meant to address the detection and mitigation of adversary cyber threats to the DIB, going a step beyond the intelligence sharing recommendation described above. As reflected in the new CMMC regulation, companies at different levels of maturity vary in their internal capacity to conduct threat hunting. There are several vehicles to support threat hunting, such as allowing Defense Departmententities to conduct threat hunting on DIB networkswith prior coordination with network owners and operatorsor enabling companies to contract with department-approved third-party entities to conduct threat hunting. Data generated from these activities should be fed back to the department and to the NSAs Cybersecurity Directorate. Threat hunting on these networks, particularly those that are assessed to be of interest to an adversary, enables network owners and operators, as well as the Defense Department, to have increased confidence in the security of such assets. Additionally, if threat activity is identified, it brings all parties attention to the breach so that they can work in concert to contain, remediate, and assess any potential damage and information exposure.

Every major U.S. strategy document frames the current environment as defined by a revival of great power competition. During historical periods of great power competition, strategic outcomes were often driven by advantages and innovation in military weaponry and technology. Therefore, failure to protect and secure the DIB, which drives the United Statess technological edge and military advantage, could have deleterious long-term consequences and is an example of how adversary activities in and through cyberspace on a routine basis can affect strategic outcomes.

See the original post here:

Ensuring the Cybersecurity and Resilience of the Defense Industrial Base - Lawfare

Posted in NSA

To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force – Lawfare

Editors note: This post is part of a series exploring the findings and recommendations of the U.S. Cyberspace Solarium Commission.

The Cyber Mission Force is the locus of the Department of Defenses efforts to counter, disrupt and impose costs for malicious adversary behavior in cyberspace. Three key changes enabled it, under Title 10 authorities, to conduct cyber effects operations more routinely outside of the Defense Departments information network and outside of a defined area of hostilities in support of campaign plans. The first was the debut of the 2018 Department of Defense Cyber Strategy, which introduced the strategic concept of defend forward. The second was the 2019 National Defense Authorization Act (NDAA), which defined cyberspace operations as a traditional military activity. The third was National Security Presidential Memorandum-13 (NSPM-13), which, as described by the Pentagons General Counsel in March 2020, allows for the delegation of well-defined authorities to the Secretary of Defense to conduct time-sensitive military operations in cyberspace. Together, these changes reflect a significant shift in strategic thinking from the 2015 Department of Defense Cyber Strategy, and from operational engagement limited to the kinetic battlefield, such as Joint Task Force ARES. However, while the Cyber Mission Forces operational goals have grown in scope and scale commensurate with the threat environment, its force size and structure have remained constant. Therefore, one of the Cyberspace Solarium Commissions key recommendations is to ensure the Cyber Mission Force achieves the appropriate resourcing, force size and capability mix.

Planning and conducting cyber operations and campaigns demands a significant investment in resources, human capital, access and tool development, and time. Yet, the core component of the cyber force across the joint services is essentially the size of one conventional army brigade. The Cyber Mission Force reached full operational capability in the spring of 2018; this includes 133 teams comprising a total of approximately 6,200 individuals. These teams are responsible for a plethora of diverse missions, including national mission teams that defend the nation by countering malicious adversary activity, combat mission teams that support the missions of the geographic combatant commands, cyber protection teams that defend the Defense Departments information network, and cyber support teams that conduct analysis in support of the national mission teams and combat mission teams.

However, full operating capability requirements were determined in 2013, well before the U.S. experienced or observed key events that subsequently shaped our understanding of the urgency and salience of the threat posed by malicious adversary behavior. Examples of such activity include Russia conducting cyberattacks against Ukraines power grid in 2015, as well as Russian cyber-enabled interference in the 2016 U.S. presidential elections. The full operating capability requirements were also determined prior to the development of the Defense Departments defend forward strategic concept, which broadened the scope of what it means for the Cyber Mission Force to defend the nation in cyberspace short of war.

This raises a number of critical questions. First, is the Cyber Mission Force appropriately sized and resourced given current and future mission requirements? The Cyber Mission Force is tasked with conducting a diverse set of missions, at scale, and must also have sufficient capacity to maintain steady-state operations while surging to respond to an emerging crisis.

Second, is the allocation of resources across teams within the Cyber Mission Force matched to the prioritization of threats? For example, if U.S. strategy identifies the most salient and significant threat to be malicious adversary behavior against the homeland below the threshold of armed attack, it follows that the national mission teams, which make up the Cyber Mission Force and are the operational arm of U.S. Cyber Command, should merit additional teams.

Finally, concurrent with an increase in the size of the Cyber Mission Force, how can the U.S. ensure that supporting entities, particularly the National Security Agency (NSA) in its combat support agency role, are also appropriately resourced? The NSA provides critical intelligence support to cyber operations conducted by Cyber Mission Force teams, particularly at the tactical and operational levels. As the Cyber Mission Forces operations and needs grow, intelligence collection demands corresponding resourcing.

There has been some progress in assessing Defense Department cyber personnel, structure and organizations, particularly in Sections 1652, 1655, and 1656 of the recently passed FY2020 NDAA. However, Congress must also ensure that the Cyber Mission Force, in particular, conducts a force structure assessment and troop-to-task analysis that takes into account the increasing scope and scale of Cyber Mission Force missions compared to previous fiscal years and projected into the future, as well as an assessment of resource requirements for the NSA in support of this aspect of its mission. This is why the commission recommends that Congress should request in the next Cyber Posture Review, and quadrennially thereafter, that the Defense Department provide an assessment of the requirements to grow the Cyber Mission Force, including projected force size and mixture necessary to sustain all Defense Department missions in cyberspace. The results of this assessment should drive resource allocation, force size and mix, and continued congressional oversight of these efforts.

Further, the threat environment and rapid pace of technological change in cyberspace demand speed and agility. These realities drove additional recommendations from the commission. Here, we highlight three in particular that, taken together, would enhance the flexibility of acquisitions and decision-making to enable adaptability, and rapid response and maneuver.

First, Congress should establish a major force program funding category for U.S. Cyber Command. Congress requires the Defense Department, according to 10 U.S.C. 221, as part of the Future Years Defense Program, to annually submit a budget that includes estimated expenditures and appropriations projected over a 5-year period. This program is currently organized into 12 different major force program funding categories that represent a total amount of dollars, manpower and forces appropriated for each category. A new major force program funding category for U.S. Cyber Command, similar to what currently exists for U.S. Special Operations Command, would provide U.S. Cyber Command with acquisition authorities over goods and services unique to the commands needs. It should also provide a process to expeditiously resolve combatant command/service funding disputes.

Second, Congress should request that the Defense Department provide in the next Cyber Posture Review an analysis of, and recommendations for, the conditions under which further delegation of cyber-related authorities is appropriate to U.S. Cyber Command, as well as to other Defense Department components, such as the NSA. The pace of cyberspace operations may require delegated authorities under certain conditions to pursue and deliver effects against adversary targets. This would, when appropriate, remove friction and support rapid response and maneuver. Importantly, this recommendation does not call for new authorities within the scope of Title 10. Rather, it is focused on the cyber-related authorities that already exist within the Defense Department but may be fragmented across different elements (for example, functional combatant commands, geographic combatant commands and the various services). Examples of these authorities include those that support planning and implementing offensive cyber operations, such as information operations-related authorities that include creating, procuring and deploying personas. Relevant authorities to review for delegation to the NSA should include those authorities that enable the agency to rapidly tip relevant foreign intelligence collection to private entities within the Defense Industrial Base and their service providers to support the latters own defensive operations.

Finally, as part of the next Cyber Posture Review, the Defense Department should produce a study that assesses and provides recommendations for amendments as necessary to the Standing Rules of Engagement and Standing Rules for Use of Force for U.S. forces. These rules have not been updated in more than a decade, despite major changes in technology and the strategic environment. The commission, in particular, recommends assessing how these rules apply to activities in cyberspace below the level of war or armed conflict, and how unique aspects of cyberspace (for example, the absence of high seas and the definition of territory) affect their current application. Importantly, this recommendation should not be construed as necessarily calling for a loosening of the rules under all conditions. Rather, updating and clarifying how these apply in cyberspace where U.S. forces are already operating in day-to-day competition is as important for risk mitigation as for reducing operational friction.

Taken together, these recommendations will empower the Cyber Mission Force and U.S. Cyber Command to plan for cyber operations above the level of armed conflict as well as to rapidly maneuver against and engage adversaries below it.

Excerpt from:

To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force - Lawfare

Posted in NSA

Four priorities of the education agenda – The Daily Star

If over the next two decades Bangladesh is to maintain its impressive 6-plus percent annual GDP growth, special policy level attention must be given to educational investment. Higher spending and better accountability of education officials for good management and results should be the focusand four priorities must be on the education agenda.

First, the government should consider spending on universal education as an investment instead of treating schools as cost centres. Recent experience from the Delhi's Legislative Assembly election and the stunning victory of the Aam Admi Party (AAP), defying the political tide, demonstrates that higher spending in public education combined with good school management pays off. It has resulted in better learning outcomes, higher student attendance and improved school infrastructures, which earned the APP political credits. This is a lesson worth noting for Bangladesh.

Second, all providers of primary and secondary educationpublic, non-state and privateshould focus on student learning outcomes, not just enrolment, dropouts and completion. Great strides have been made in Bangladesh in bringing children including girls into schools. A National Student Assessment (NSA) is undertaken every two years on a nationwide sample of grade three and five students and schools by the Directorate of Primary Education. NSA measures student learning in Bangla (the first language) and arithmetic against basic skills specified in the curriculum. NSA showed that more than half of class three and class five students did not perform at grade level in Bangla and arithmetic. In other words, after five years of primary education, the majority of students do not acquire literacy and numeracy at a functional level, handicapping them for further education or vocational skill training.

Education researchers and academics suggest two measures to help children achieve the essential competencies specified in the curriculum: i) Attract and retain enough capable teachers in the system and support and motivate them to perform in classrooms according to set performance standards; and ii) Discontinue the present high stake, nationwide public examinations at the end of grade five and eight which push students to memorise guidebooks and spend time and money on private tutorsand force teachers and parents to aid and abet this distortion of learning.

Testing is not a substitute for good teaching. School-based formative assessment of learners should be emphasised. The assessment of system, school and teacher performance can be better done through an adaptation of the NSA approach, without putting young children in tough competition with their peers.

Third, Bangladesh should consider joining OECD's Programme for International Student Assessment for Development (PISA-D). It is a pilot project that aims to make cross-country assessment more accessible and relevant to a wider range of countries. PISA measures key knowledge and skills that are essential to function in modern societies across countries.

In today's global world, Bangladesh has to compete in the world market and be at par in skills and competencies with other countries. Up to 700,000 young workers, almost half of all new entrants to the workforce every year, go abroad as migrant workers. These individuals as well as those staying at home must acquire the skills and capabilities necessary to adapt to the changing needs of the global market.

Cambodia, a country facing quality issues similar to Bangladesh, has joined PISA-D in its bid to improve student learning and assessment capacity. Its focus is on equipping young learners with 21st century skills that are in demand globally. Cambodia is being assisted by UNICEF-sponsored Southeast Asia Programme on Learning Metric (SEA-PLM). Bangladesh can benefit greatly by joining PISA-D.

Fourth, school level education planning, budgets, governance and management need to move progressively towards meaningful decentralisation and devolution of authority, where accountability lies with district, upazila and individual institutions. No other education system with the size and scale of Bangladeshwith 40 million students, a million teachers and 200,000 institutionsis run in such a top-down way as it is done here. The decisions that should be taken by the schools or local education authorities are often taken in Dhakafrequently the buck is even passed onto the highest level of the government.

Schools of the 21st century must be responsive and adaptive to the diverse needs and circumstances of students all across the country. Given that Bangladesh wants to join the rich countries club by 2041, it needs to pursue these four strategic steps.

Mohammad Shahidul Islam is an education policy researcher at the University of Toronto, and former Senior Education Adviser of USAID in Bangladesh and Afghanistan.

Link:

Four priorities of the education agenda - The Daily Star

Posted in NSA

Is an *NSYNC Reunion Any Closer to Reality? Weve Been Talking, Says Lance Bass – Variety

What does Justin Timberlake really think about an *NSYNC reunion? And would JC Chasez consider taking the group on the road without him? Those were two burning questions posed by fans on The Daily Popcast With Lance Bass, airing this week and sort of answered.

A return to the *NSYNC original lineup Timberlake, Chasez, Bass, Chris Kirkpatrick and Joey Fatone would be the ideal way to mark 20 years since No Strings Attached was released, selling over 2.4 million copies in its first week, a record for the time.

Weve been talking about it, Bass tells Variety. No plans have been made. If there will even be plans, who knows? I think if we did anything, it would be for the fun of it the world needs something fun to listen to and I think we could bring some positivity to it. Thats what we need right now. It could be something simple to test it out, and if it works, it works and if it doesnt, it doesnt.

Bass, 40, says fans will get clearer answers on where the group stands on the idea when he releases his interviews, one day at a time starting today. One member will also interview Bass for Fridays edition of the Popcast, while Saturdays anniversary special features co-hosts Peachy Keen (Jess Keener) and Giggles (Lisa Delcampo) asking the singers hilarious rapid-fire questions.

Ive done Joey and JC so far and theyre very different interviews, Bass adds. JCs the hardest to nail down and more mysterious, so it was interesting to get into his head. Youll definitely hear his opinion on the reunion and if itll happen.

Bass is also thrilled about getting a rare insight into Timberlakes thoughts on topics the two have never discussed in their 25-year friendship. Hes the only [bandmate] I havent interviewed before, so Im super-excited to delve into what his lifes like now, talk about No Strings Attached and that era, ask what that [solo] transition was like and get his opinions on the future of *NSYNC, says Bass. I want to pull the curtain back and show you who Justin is who my best friend was years ago. He was 14 years-old when I met him. A bond thats incredible. We experienced things most people didnt go through and I love the juxtaposition of what we were then to now, and how weve all grown into who we grew into its all because we influenced each other at such a young age.

Its not surprising how impactful the young singers friendships were given the tumultuous wave they rode together preceding NSAs release. While working on the follow-up to 1997s self-titled debut, the group as well as their peers, the Backstreet Boys became suspicious of their then-manager Lou Pearlmans financial dealings. Both bands took legal action, with *NSYNC successfully cutting ties with Pearlman and RCA, signing with Jive Records and retaining their name.

It was a crazy time because we didnt know where our careers were going and every expert around us said, Your careers over kids, recalls Bass, who produced the film Boy Band Con, a 2019 documentary about Pearlman. That hurts when youre that young and have worked so hard. The last thing you want to hear is the head of the label saying, Guys, you might have one more album in you if you just stick with Lou Pearlman. It was a scary moment. We thought our careers were done. So many crazy thoughts went through our heads, but when we finally got our name back and ended our relationship with Lou, everything started flowing.

NSA spawned two of *NSYNCs biggest hits, Bye Bye Bye and Its Gonna Be Me, which featured writing credits by Max Martin, Andreas Carlsson and the Cheiron Studios team. The album also featured songs by Richard Marx and Diane Warren.

While *NSYNC followed up with 2001s Celebrity, the quintet announced a hiatus in 2002, and in recent years have only reconvened on stage to honor Timberlake and his Video Vanguard Award at the 2013 MTV VMAs. He was absent from Coachella 2019, where the four joined Ariana Grande for a surprise appearance, having just wrapped his Man of the Woods tour.

It was at Coachella where Bass met an artist hed never heard of Lizzo who would become key to one of his biggest 2020 projects, collaborating with Richard Bransons Virgin Fest. Lizzo and A$AP Rocky are headlining the Los Angeles music and environmental awareness event in June.

Richard Branson and myself are big space geeks and tech people, so we wanted to create something that entertained people by bringing in the Lizzos and Anderson.Paaks but also showed the future, Bass elaborates. Its about doing right [for] the environment and what next cool futuristic thing will help our planet. It reminds me of the World Fair, where people used to go to see new stuff, with a little mix of Coachella!

Bass love for podcasts will feature at Virgin Fest, where The Daily Popcast and Bass favorite hosts will broadcast live from the Bubble Tap VIP Area, a nod to his Bubble Tap Trailer mobile wine business. Its one of several boozy endeavors, including his West Hollywood bar Roccos WeHo and upcoming mixers line, J.A.X. (Just Add X X being your favorite spirit), a collaboration with Vanderpump Rules star Jax Taylor, launching at Virgin Fest.

The fun thing has been coming up with J.A.X flavors because theyre unique, taste great, are low-calorie and have vitamins, says Bass, whos also producing a film about *NSYNC superfans who put their lives on hold in order to follow the band on tour. The dangerous part is you cant taste the alcohol. Itll sneak up on you.

As for whether J.A.X or Bubble Tap have been loosening lips in-studio during Bass *NSYNC interviews: I havent done Justin or Chris yet, so maybe Ill bring some in then they can give me testimonials!

More:

Is an *NSYNC Reunion Any Closer to Reality? Weve Been Talking, Says Lance Bass - Variety

Posted in NSA

NSA whistleblower petitions Trump for clemency | TheHill – The Hill

Reality Winner, theNational Security Agency (NSA) whistleblower jailed for leaking classified information on Russias interference in the 2016 election, petitioned President TrumpDonald John TrumpSchiff blasts Trump for making 'false claims' about Russia intel: 'You've betrayed America. Again.' Poll: Sanders leads 2020 Democratic field with 28 percent, followed by Warren and Biden More than 6 in 10 expect Trump to be reelected: poll MORE for clemency Monday.

Winner's attorney Alison Grinter said in a press conference in Dallas that she will submit the petition to the federal office of the pardon attorney, who advises the president on pardons.

She also plans to send 4,500 letters of support, including ones from privacy and free press advocates,according to The Intercept.

Winner was sentenced to five years and three months starting in August 2018 after admitting to giving classified information about Russias attempts to hack local elections before the 2016 election to an investigative news website, The Guardian reported.

Our national healing process cannot begin until we forgive our truth-tellers and begin the job of rebuilding what was taken from us: election security, accountability for those who endeavor to undermine our democracy; and safeguarding the American right to government by and for the people, Grinter said at the conference. None of this can begin in earnest while we are still punishing those who tell us the truth.

The petition alleges that Winner's imprisonment is costly, unnecessary to protect the public, burdensome to her health and wellbeing, and not commensurate with the severity of her offense.

The president previously commented on Winners sentencing in an August 2018 tweet, in which he specifically criticized then-Attorney General Jeff SessionsJefferson (Jeff) Beauregard SessionsOn the Trail: Senate GOP hopefuls tie themselves to Trump Trump looms as flashpoint in Alabama Senate battle Trump tweets test Attorney General Barr MORE and called Winners crimes small potatoes compared to what Hillary ClintonHillary Diane Rodham ClintonSchiff blasts Trump for making 'false claims' about Russia intel: 'You've betrayed America. Again.' The problem with Trump's Middle East peace plan Trump's Intel moves spark Democratic fury MORE did," in an apparent reference to the private email server Clinton kept as secretary of State.

Ex-NSA contractor to spend 63 months in jail over classified information. Gee, this is small potatoes compared to what Hillary Clinton did! So unfair Jeff, Double Standard.

Winner has said in a 2018 interview with CBS News that she cant thank him enough for the tweet.

"I don't like to assume anything as to what's going on in his head, but the 'small potatoes' was a breath of fresh air. It really made me laugh. It reminded me of me and my own family. We try to make a joke out of everything. We laugh every single day no matter how bad things get, and he really gave a whole sense of humor to the thing 'cause it is quite bizarre," she said.

Read more here:

NSA whistleblower petitions Trump for clemency | TheHill - The Hill

Posted in NSA

NSA Offers Suggestions on Restructuring the IRS – CPAPracticeAdvisor.com

The National Society of Accountants (NSA) has responded to anIRS request for comments on the proposed IRS restructuring contained in the Taxpayer First Act (TFA). The suggestions come as a response to the solicitation for industry commentary presented at the Taxpayer First Act discovery meeting held on January 15, 2020 which was attended by NSA and other national organizations.

While given the opportunity to be signatory on a letter drafted by various other industry organizations, the NSA opted to deliver an independent response. NSAs suggestions draw from decades of advocacy and a strong relationship with the IRS, the Office of the National Taxpayer Liaison, IRS Tax Forums, the Electronic Tax Administration Advisory Committee, and the Internal Revenue Service Advisory Council.

NSAs suggestions included:

NSAs membership of tax and accounting professionals appreciates the opportunity to provide input in the process and we welcome the open dialogue environment the IRS has established. We are committed to assisting the agency in any way possibleto achieve the requirements of the TFA, wrote NSA CEO John Rice. We stand ready to help.

Download a copy of NSAs response to the IRS here: https://www.nsacct.org/viewdocument/irs-suggestions-for-irs-restructuri

More here:

NSA Offers Suggestions on Restructuring the IRS - CPAPracticeAdvisor.com

Posted in NSA

Advice crucial, but not the only source of truth: NSA – Professional Planner

Retirees primarily use financial advisers as their source of information but look at a wide range of sources for their financial management needs, according to the 130,000-strong National Seniors Australia group.

In a 2017 study involving over 5,000 NSA members, Seniors more savvy about retirement income, 59 per cent reported getting information on retirement from their financial adviser but only 12 per cent used it as a single source, with the complexity of the retirement system forcing people to use their super fund, Centrelink, their bank or family and friends for guidance.

Advisers need to be far more aware of how their advice is part of an ecosystem, says NSA chief advocate Ian Henschke.

In its recent submission to the Retirement Income Review, the NSA referred to their earlier report to highlight the complexity of the retirement system and the value of financial advice to retirees.

National Seniors believes most people would not have sufficient knowledge and understanding of the retirement income system without some form of help, the submissions stated, before noting that retirees would be unlikely to achieve desired outcomes without formal financial advice.

Yet advisers are rarely seen as the single source of truth by retirees.

Sites like ours, government information sites such as Centrelink, their super funds, as well as family and friends all were cited as sources used to inform their decisions, Henschke says.

The NSA argue in its submission that third party expertise is particularly important in Australia because our retirement system privatises responsibility. As the superannuation system matures, this reliance will only grow, hence the importance of advisers working together with other information providers cater to these needs.

Nine per cent of respondents in the 2017 report said they didnt need financial information for retirement, and 25 per cent said they only used a single source of information. The majority of those that only used a single source used a financial adviser.

The average age among member participants was 68. Most were retirees, Henschke explains, but retirement is not a pre-requisite for NSA membership, which costs $45 annually.

Only a handful of respondents relied on any one of the other sources as their sole source of financial information about retirement, indicating that older Australians are weighing their options and doing research before making major decisions, the report stated.

It went on to compare financial advisers to medical professionals, saying NSA members chose these types of authoritative intermediaries as sources of health and lifestyle information.

The use of financial advisers remains high and their ability to deal with changing retirement benefits and rules is critical, not just in finance matters but in care choices which are also complex and dependent on good financial advice, it states.

A separate January 2020 NSA report, Retirement income worry: Who worries and why, took a deeper look into the mindset of retirees in terms of their retirement income. Comments on financial advice were mixed, the report states, but indicated broad satisfaction.

Looking closer at the impact of the sources and sufficiency of advice, we can see that respondents thought that financial advisers made a positive impact.

*To register for the 2020 Retirement Conference in Sydney on March 31, presented by Investment Magazine, Professional Planner and the Financial Planning Association of Australia, visit here.

Tahn Sharpe is a Sydney-based financial services journalist with a background in financial planning. He writes on advice, superannuation, investment, banking and insurance issues, is a certified SMSF Adviser and holds an Advanced Diploma of Financial Planning.

More here:

Advice crucial, but not the only source of truth: NSA - Professional Planner

Posted in NSA

Dont distract COAS, Buratai over Buharis NSA/Chief of Staff face-off, former CP cautions – Vanguard

Chief of Army Staff, Gen. Tukur Buratai

Following a much-celebrated report, online newspaper, Premium Times, has been warned against dragging Chief of Army Staff (COAS), Lieutenant General Tukur Buratai, into the middle of an alleged feud between National Security Adviser (NSA) Gen. Babagana Monguno (rtd) and the Chief of Staff (CoS) to the President, Alhaji Abba Kyari.

Former Commissioner Public Complaints Commission, CP Abubakar Tsav (rtd), gave this warning in an open letter to Premium Times Editor on Sunday.

After initially claiming that Monguno accused Abba Kyari of undue interference on matters bordering on national security, the online portal went further to allege that the COAS took sides with the latter.

Tsav said this is only well-crafted mischief with highly inciting contents, provocative to the sensibilities of Nigerians, and bears elements of compromising national security.

According to the ex-CP, issues of redeployment and postings of Army personnel are routine administrative procedures exclusively at the discretion of the Army leadership guided by the service needs of personnel in specific areas.

Unlike claimed, Tsav added that the Army Chief does not take directives from the office of NSA but the President.

Even though the COAS may not be aware of this artificial war of attrition, Tsav cautioned Premium Times and other mischief makers to allow him fully concentrate on his giant strides in the counter-insurgency campaign.

Read full letter below:

Please, do not drag the Chief of Army Staff into your campaign of attrition:

An open letter.

I send you affectionate greetings together with members of your editorial team. May God continue to bless and guide all of you on the path of truth and accuracy as watchdogs and the true conscience of society.

May you kindly refer to your online publication dated February 21, 2020; which had the screaming caption: Exclusive: Abba Kyari-Monguno War: Army Chief Buratai Moves Against NSA.

In the said publication, your medium perniciously dragged the office, duties and personality of the COAS and leader of counter-insurgency operations in Nigeria, Lt.Gen. TY Buratai into the imaginary feud, between the office of the National Security Adviser (NSA) Gen. Babagana Monguno (rtd) and the Chief of Staff (CoS) to the President, Alhaji Abba Kyari, which is widely celebrated on social media platforms.

I was fascinated by its mendacity and carefully crafted mischief. Its contents are also highly inciting, provocative to the sensibilities of Nigerians, and bears elements of compromising national security.

I elect upon myself to dispel or denounce explicitly the baseless, disjointed, malicious and provocative gerrymandering as reflected by the medium targeted at the top echelon of Nigerias security leadership solely based on conjecture. But it is more significant to draw your attention to its resistant link to the COAS in a presumed altercation, which he is not aware and has no nexus to it whatsoever.

In the desperation to smoothen the campaigns of this agenda, the publication delved into puerile arguments and recanted itself at several points. Let me clear your doubts that the issues of redeployment and postings of Army personnel are routine administrative procedures exclusively at the discretion of the Army leadership guided by the service needs of personnel in specific areas.

And your report cannot admit that all the agencies attached to the NSA have the powers to make changes to their respective personnel serving there, and simultaneously, scrub extraneous reasons to deny the Nigerian Army such lawful institutional powers. This is after it is also submitted to the cumbersome process of selecting and posting Army personnel to the office of the NSA as deemed fit by the Army leadership.

For the sake of records, the Army Chief does not take directives from the office of NSA, as the report carelessly insinuated. The COAS strictly takes directives from the President and Commander-in-Chief of the Nigerian Armed Forces who wields the final authority on all national security Heads.

I have absolute trust in Lt. Gen TY Buratai as a professional soldier, loyal and patriotic leader to his country. And by his antecedents known to me over the years, the Gen. Buratai I know; and Nigerians can vouch for his integrity and sterling leadership qualities, he is very busy in the trenches, coordinating troops in the war against insurgency, angling and itching for results.

Let the campaigners of the fabricated and incipient animosity in the ranks of top government appointees spare him of the orchestrated campaigns of widening the imaginary lines of attrition between the NSA and CoS to the President.

The COAS is neither involved in this artificial war of attrition nor has any knowledge of it. The COAS is more concerned and devotes attention to deliver excellent results on the duties assigned to him and his office by Mr President. He will not compromise his official responsibilities for any personal interest and should not be distracted now.

Nigerians who are celebrating the imaginary animosity and perhaps, fervently praying for a crack in Mr Presidents national security leadership, should redirect their idle selves elsewhere, but certainly not in the direction of Lt. Gen. Buratai. He is a soldier with impeccable credentials and a leader per excellence.

Vanguard

Related

More here:

Dont distract COAS, Buratai over Buharis NSA/Chief of Staff face-off, former CP cautions - Vanguard

Posted in NSA

PSA to honor ABAP as NSA of the Year – ABS-CBN Sports

The Association of Boxing Alliances in the Philippines will be honored as the National Sports Association of the Year during the annual PSA Awards.

The Association of Boxing Alliances in the Philippines (ABAP) punched its way to the honor roll list of the SMC-PSA (Philippine Sportswriters Association) Annual Awards Night, claiming the title National Sports Association of the Year.

Led by Nesthy Petecio, the Filipino pugs stamped their class everywhere in 2019 which saw them winning golds from the Asian to the world levels.

The feat earned for ABAP yet another NSA of the Year award from the countrys oldest media organization, which will honor and recognize the top sports personalities and entities from last year during its annual gala night on March 6 at the Centennial Hall of the Manila Hotel.

Team Philippines is going to be accorded with the coveted Athlete of the Year honor in the event presented by the Philippine Sports Commission, MILO, the Philippine Basketball Association, AirAsia, and Rain or Shine.

Petecio, 27, was at the forefront of ABAPs successful campaign, finally scoring a breakthrough gold medal in the AIBA Womens World Boxing Championships in Ulan-Ude, Russia after beating hometown bet Liudmila Vorontsova by split decision in ruling the featherweight division.

Eumir Felix Marcial just fell short of matching Petecios gold medal feat as he settled for the silver in the same world tournament for men held in Yekaterinburg, Russia. Nonetheless, the 24-year-old native of Lunzuran, Zamboanga City became just the third Filipino who finished runner-up in the prestigious award after light-flyweight Roel Velasco (1997) and Harry Taamor (2007).

Not to be left out was former world champion Josie Gabuco.

The 32-year-old veteran fighter went home with the gold in the ASBC (Asian Boxing Confederation) Elite Boxing Championships held in Bangkok, Thailand, defeating North Koreas Kim Hyang Mi in the finals of the womens light-flyweight category.

Before Petecio, Gabuco was an AIBA world womens champion back in 2012.

The three would later banner the Filipinos productive stint in the 30th Southeast Asian Games in which the Philippine boxing team emerged overall champion.

Petecio, Gabuco, and Marcial made up part of the seven gold medals the national team won to beat perennial rival Thailand for the sports overall title.

Incidentally, the Philippine team failed to win a medal in just one of the 13 boxing events competed in the SEA Games.

Like in the world meet, the gold Petecio won was his first ever in the biennial meet after previously ending up with just a silver medal from 2011 to 2015.

For Marcial, it was his third SEA Games gold medal, while Gabuco now has a record five gold medals.

View post:

PSA to honor ABAP as NSA of the Year - ABS-CBN Sports

Posted in NSA

Congress set for clash over surveillance reforms | TheHill – The Hill

Congress is gearing up for a high-profile fight over reauthorizing a handful of controversial surveillance programs months before the 2020 election.

After punting late last year to give themselves more time to negotiate, lawmakers now have 15 working days to figure out whether and how to reauthorize expiring provisions of the USA Freedom Act by the March 15 deadline.

The policy battle comes as tensions are already running high in Washington after a weeks-long firefight emanating from the Justice Department which will also be at the center of the surveillance discussion and with the November election injecting a higher dose of politics into any discussion involving Congress and President TrumpDonald John TrumpSchiff blasts Trump for making 'false claims' about Russia intel: 'You've betrayed America. Again.' Poll: Sanders leads 2020 Democratic field with 28 percent, followed by Warren and Biden More than 6 in 10 expect Trump to be reelected: poll MORE.

Attorney GeneralWilliam BarrWilliam Pelham BarrBill Barr is trying his best to be Trump's Roy Cohn Hillicon Valley: Facebook, Twitter split on Bloomberg video | Sanders briefed on Russian efforts to help campaign | Barr to meet with Republicans ahead of surveillance fight Sanders says he was briefed on Russian effort to help campaign MORE will meet with Senate Republicans during a closed-door policy lunch on Tuesday, his first face-to-face with most senators since the controversy over the departments handling of the case involving Trump associate Roger StoneRoger Jason StoneBill Barr is trying his best to be Trump's Roy Cohn Roger Stone moves to disqualify judge Roger Stone deserves a new trial MORE.

But two sources confirmed to The Hill that the lunch was planned weeks before the current flare-up between the Justice Department and the White House. The topic, according to the two sources, is expected to be expiring surveillance provisions.

Reauthorization of these certain programs is a priority for both Leader [Mitch] McConnell and AG Barr, a source said.

Among the expiring provisions that Congress needs to make decisions on is a controversial records program, known as Section 215, that gathered metadata on domestic text messages and phone calls.

They'll also need to make decisions on two other provisions one authorizing roving wiretaps and the other on lone wolf surveillance authority.

The biggest sticking point will be the metadata program that will put a spotlight on divisions between privacy hawks and leadership, the House and Senate and even GOP lawmakers and the White House.

Though the National Security Agency (NSA) shuttered the program, and advised the White House to officially end it, then-director of National Intelligence Dan CoatsDaniel (Dan) Ray CoatsTrump's Intel moves spark Democratic fury Russian interference reports rock Capitol Hill Hillicon Valley: Facebook, Twitter split on Bloomberg video | Sanders briefed on Russian efforts to help campaign | Barr to meet with Republicans ahead of surveillance fight MORE urged Congress to reauthorize it.Barr is expected to stick with that position when he speaks with senators.

Coats noted that the NSA had suspended the program and deleted call records, saying the decision was made after balancing the programs relative intelligence value, associated costs, and compliance and data integrity concerns."

"However, as technology changes, our adversaries tradecraft and communications habits will continue to evolve and adapt," he added. "In light of this dynamic environment, the Administration supports reauthorization of this provision."

But Sens. Richard BurrRichard Mauze BurrTrump's new intel chief makes immediate changes, ousts top official Intel officials warned House lawmakers Russia is interfering to get Trump reelected: NYT Pelosi joins pressure campaign on Huawei MORE (R-N.C.) and Mark WarnerMark Robert WarnerTrump's Intel moves spark Democratic fury Where do we go from here? Conservation can show the way Hillicon Valley: Facebook, Twitter split on Bloomberg video | Sanders briefed on Russian efforts to help campaign | Barr to meet with Republicans ahead of surveillance fight MORE (D-Va.), the chairman and ranking member of the Senate Intelligence Committee, quietly introduced legislation that would end the phone metadata program going against the administrations request.

In addition to terminating that program as soon as the bill is enacted it would provide an eight-year reauthorization of the other two programs.

The bill was sent to the Senate Judiciary Committee, where Chairman Lindsey GrahamLindsey Olin GrahamSunday shows preview: 2020 candidates look to South Carolina Where do we go from here? Conservation can show the way Barr to attend Senate GOP lunch on Tuesday MORE (R-S.C.) has described himself as torn on whether or not to reauthorize Section 215.

A Democratic aide, asked if they had gotten guidance on if Judiciary or leadership would move the Burr-Warner bill in committee or on the floor by March 15, told The Hill: Not really.

The panel includes privacy hawks like Sen. Mike LeeMichael (Mike) Shumway LeeThe Hill's Morning Report AG Barr, GOP senators try to rein Trump in Overnight Defense: Senate votes to rein in Trump war powers on Iran | Pentagon shifting .8B to border wall | US, Taliban negotiate seven-day 'reduction in violence' The 8 Republicans who voted to curb Trump's Iran war powers MORE (R-Utah). Lee and Leahy are working on reforms related to the Foreign Intelligence Surveillance Act (FISA). A spokesman for Lee said that ideally their forthcoming ideas could be included as part of the debate over reauthorizing the USA Freedom provisions.

Surveillance debates have spotlighted fierce clashes among Senate Republicans in recent years.

When the Senate debated the USA Freedom Act, and the Patriot Act measures that pre-dated it, in 2015, Sen. Rand PaulRandal (Rand) Howard PaulSenate braces for fight over impeachment whistleblower testimony Pelosi names first-ever House whistleblower ombudsman director The Hill's Morning Report AG Barr, GOP senators try to rein Trump in MORE (R-Ky.) used the chambers procedural levers to force a brief lapse of the surveillance programs.

He also successfully blocked multiple efforts by Senate Majority Leader Mitch McConnellAddison (Mitch) Mitchell McConnellSanders is a risk, not a winner Buttigieg sounds alarm after Sanders wins Nevada Where do we go from here? Conservation can show the way MORE (R-Ky.) to clear a short-term extension of the Patriot Act, a tactic Paulquickly used to rack in fundraising cashfor his 2016 presidential bid. McConnell has not yet taken a public position on the upcoming USA Freedom debate, something hes likely to be quizzed on after Tuesdays lunch.

As Republicans are set to meet with Barr, the House Judiciary Committee has put reauthorization of the USA Freedom provisions on its business meeting agenda for Wednesday.

House Judiciary Committee Chairman Jerrold NadlerJerrold (Jerry) Lewis NadlerTrump adviser presses House investigators to make Bezos testify Nadler demands answers from Barr on 'new channel' for receiving Ukraine info from Giuliani Trump predicts Ocasio-Cortez will launch primary bid against Schumer MORE (D-N.Y.) hasnt yet unveiled what the committee will be voting on, and spokesmen didn't respond to multiple requests for comment. But a House Intelligence Committee aide noted that staff on the two panels are continuing to work on potential legislation.

The aide declined to say if the forthcoming legislation would end the metadata program, even as leadership is under pressure from progressives to take a hard line.

Twenty House progressives sent a letter to Nadler last year warning that they would oppose a reauthorization measure that does not completely repeal the call records program and also called for additional civil liberties protections to be built into the law.

"Any meaningful reform must repeal the [call detail records] program, which is an unnecessary violation of the rights of people in the United States and a threat to our democracy," the lawmakers wrote.

Further complicating calculations for passing a bill in roughly two weeks, some Republicans are saying they want to use the reauthorization debate to work in changes to the Foreign Intelligence Surveillance Act (FISA) courts.

The FISA court, authorized under the Foreign Intelligence Surveillance Act of 1978, is made up of 11 judges who serve seven-year terms and are selected by the chief justice of the Supreme Court. The judges are responsible for signing off on or rejecting warrant applications submitted as part of intelligence gathering and national security operations.

The courts jumped into the spotlight late last year when Justice Department inspector general Michael Horowitz found a total of 17 "significant inaccuracies and omissions" in the applications to monitor Trump campaign aide Carter Page, taking particular issue with applications to renew the FISA warrant and chastising the FBI for a lack of satisfactory explanations for those mistakes.

Reps. Doug CollinsDouglas (Doug) Allen CollinsSunday shows preview: 2020 candidates look to South Carolina Overnight Defense: Seven day 'reduction in violence' starts in Afghanistan | US, Taliban plan to sign peace deal Feb. 29 | Trump says top intel job has four candidates Trump says he is considering four candidates for intelligence chief MORE (R-Ga.) and Devin NunesDevin Gerald NunesJudge dismisses Nunes' lawsuit against Fusion GPS Trump's new intel chief makes immediate changes, ousts top official Overnight Energy: EPA moves to limit financial pressure on 'forever chemical' manufacturers | California sues Trump over water order| Buttigieg expands on climate plan MORE (R-Calif.) the top Republicans on the Judiciary and Intelligence Committees, respectively sent a letter to Nadler over the recess pitching the USA Freedom debate as a vehicle for making FISA changes.

Any legislation devoid of necessary reforms to address the abuse of the intelligence community against a presidential campaign and even our sitting president, including lies and fraud engaged in by top-level FBI officials, misses that mark, they wrote.

There have been bipartisan calls for FISA reformsafter the Horowitz report, but inserting it into the middle of the surveillance debate could inject another political angle into what will already be a contentious debate.

But Collins and Nunes argued that FISA reforms should be a bipartisan line in the sand, and urged Nadler to not ignore historic abuses directed against the campaign of a president you don't support.

Read the original here:

Congress set for clash over surveillance reforms | TheHill - The Hill

Posted in NSA

Ivanka Trump, Jared Kushner and NSA among Trump`s high-level delegation to India – WION

US President Donald Trump will head to India for a two-day visit with a high-level delegation that will include his senior advisors - daughter Ivanka Trump and son-in-law Jared Kushner.

Sources say US National Security Advisor Robert O' Brien, Commerce Secretary Wilbur Ross, Secretary of Energy Dan Brouillette and Secretary of the Treasury Steve Mnuchin will also be part of the delegation. However, US Trade Representative Robert Lighthizer who skipped his meeting with the Indian Commerce Minister Piyush Goel last week will not be visiting.

Also read: Trump in India - Hiding the poor and shantytown of Ahmedabad for US president's visit

Although neither side expects a trade deal to be signed, 5 Memorandum of Understandings (MOUs) will be signed during the US president's visit. Nuclear cooperation, homeland security, intellectual property, trade facilitation, space and science technology are likely to be on the agenda.

The government yesterday said that the relationship had to be seen not just in the context of immediate deliverables from this visit. Adding, ''Over the years, the canvas of our relationship has expanded to include several new areas. We enjoy a broad level of support from the executive branch as well as bipartisan support by the Congress.''

Also read: From Namaste Trump event to visit to Agra - Trump's jam-packed India schedule

The two sides have expanded their defence ties signing agreements like Logistics Exchange Memorandum of Agreement (LEMOA), Communications Compatibility and Security Agreement or COMCASA as well as initiating a joint tri-services HADR exercise named Tiger Triumph as an Annual exercise. The US is Indias largest trading partner in goods and service. We have bought 18 billion dollars worth of defence equipment from the US.

Also read: Focus on reviewing bilateral ties, strengthening global partnership - MEA on Trump's visit

Reports say, ahead of the visit, the cabinet committee on security(CCS) has approved a deal to procure a batch of 24 Lockheed Martin MH60 Romeo helicopters - this will boost India's naval capacity.

This is the eighth meeting between the two leaders since 2017 and the fifth this year alone. Donald Trump, like President Obama, is making a standalone visit to India, skipping neighbour Pakistan.

More here:

Ivanka Trump, Jared Kushner and NSA among Trump`s high-level delegation to India - WION

Posted in NSA

Statement on the Firing of Oakland Police Chief Kirkpatrick – SF Bay Area Indymedia

Oakland Police Commission Fires the Chief

Passage of Measure LL in 2016 with an 83% support of Oakland residents, resulted in creation of one of the most powerful police oversight bodies in the US. Since its inception, Oaklands Police Commission has had a profound positive impact on increasing transparency and accountability within the Oakland Police Department (OPD).

Among its notable accomplishments is a revision of the stop and search policy that requires evidence of criminal activity-not just the probation/parole status of the driver-which had often resulted in harassment of law abiding residents. And remarkably, the Commission disagreed with the Police Chiefs findings and fired four officers involved in the police officer involved shooting of Mr. Joshua Pawlik who was found asleep in an alley and aroused, only to be killed by OPDs use of lethal force.

However, it is the Police Commissions most recent action of terminating Chief Kirkpatrick that has focused a bright light on the commissions crucial role in holding the City of Oakland accountable for its failure to bring OPD into compliance with the terms of the Negotiated Settlement Agreement (NSA) that went into effect over 17 years ago. In fact, when questioned by Judge Orrick about the set-backs in compliance, and asked about her greatest challenge, she responded that is was, the narrative!

Those who question the reason for the firing should know that, had the Commission taken this action, the cause would have had to be publicly disclosed. But because the Mayor joined (she has the ability to fire at will) and declared the firing as not for cause it allows her to conceal the failures of the Chiefs leadership. From Fox on 2

During her tenure, it became abundantly clear that Chief Kirkpatrick was unable to correct OPDs deficiencies which have prolonged federal oversight for so long. In fact, OPDs own Inspector Generals report cited numerous problems-and the plaintiffs attorneys-Burris and Chanin have issued repeated citations of the failures of Kirkpatricks leadership.

Unfortunately, the Oakland Police Officers Association (OPOA) President, Sgt. Barry Donelans claim that OPD is lauded for professionalism and innovation outside of Oakland, ignores the fact that OPD is the only police department in the country that has remained under federal oversight for 17 years.

But, instead of embracing the need to complete the NSA tasks, he continues to deflect responsibility for problems to the elected City leaders, in effect disputing voters awareness, judgment, and intelligence. Mr. Donelan should consider attending Police Commission meetings to gain a firsthand knowledge of the concerns expressed by the people of Oakland and work closely with City Council to formulate viable, enduring, and measurable steps to end OPDs racially biased practices and bring NSA to a rapid end.

The Coalition for Police Accountability (CPA), working with City Council members, will offer a ballot measure in November to ensure that the Police Commission has independent legal counsel as well as staff that reports to them, not the city administrator.

This body needs the resources it has been denied thus far to carry out its duties and ensure that OPD, whose expenses represent nearly half of the Citys general fund, begins to practice equitable and constitutional policing that utilizes current best practices and earns the trust of all of Oaklands residents.

Go here to see the original:

Statement on the Firing of Oakland Police Chief Kirkpatrick - SF Bay Area Indymedia

Posted in NSA

National Storage Affiliates Trust (NSA) overbought Stock to Bite? We have reviewed it – News Welcome

The stock now we are analyzing at is National Storage Affiliates Trust (NSA) which is now in overbought queue as the Relative Strength Index has been observed at 73.3. As commonly stock is overbought when RSI goes above 70 (look further in the section of technical indicators).

There are a lot of factors to determine whether trading of National Storage Affiliates Trust (NSA) stock is going to end in profit or not but one of the most commonly known important factors has remained the overbought and oversold conditions. So, identifying oversold and overbought stocks is an important skill for every investor or trader. Commonly, traders use technical indicators for oversold and overbought stocks while investors use fundamental factors. Most common Technical indicator that is used to identify overbought and oversold stocks is the Relative Strength Index or called RSI. While most common fundamental indicator that Investors cognize to identify overbought and oversold stocks is P/E Ratio.

How much NSA Stocks is Volatile?

Now we will look for the boiling points and excitability of NSA stock. Last weeks volatility stood at 1.65% and last months volatility marked at 1.51%. Volatility of a stock indicates how tightly the price of a stock is constellated around the mean or moving average. A Stocks volatility is generally associated with investment risk; however, traders can also use it to lock in superior returns. Volatility is also measured by ATR which is an exponential moving average (14-days) of the True Ranges. The stocks ATR value pointed at 0.55.

At this moment, Stocks beta measure is 0.3. Beta is also one of the most popular indicators to measure risk of stock trading. It is a measure of a stocks volatility in relation to the market. Analysts also use it often when they need to determine risk profile of a stock. If beta is higher than 1 then risk is higher and if beta is lower than 1, then risk will be low.

Now here, we will be looking at the trend of NSA stocks performance for different time intervals in order to evaluate the companys share value step by step.

National Storage Affiliates Trust Stock Performance:

Traders shown interest in National Storage Affiliates Trust (NSA) as it recorded negotiations of 284168 shares while stock maintained an average volume of 356.05K shares. It has a market capitalization of $2.16B. NSA stock recognized return of 4.50% over last weekly trading activity and showed performance of 7.08% over monthly period. Shares are now at 12.81% for the quarter and 13.26% for the last six months. The company is driving a 24.78% of return over the course of past one year and is now with performance of 8.45% so far this year. National Storage Affiliates Trust traded with move of 1.39% at $36.46 per share on Tuesday trading session. Shares of company positioned at 0.83% from its 52-week high price while it has been noted 34.24% away from low price over the last 52-weeks.

National Storage Affiliates Trust Stock Look at Technical Side:

Most commonly used indicator to identify overbought and oversold conditions is Relative Strength Index (RSI). RSI is actually a range bound oscillator which is scaled mainly from 0 to 100. RSI from 30 to 70 are considered as a normal state but a RSI indicates the oversold situation when it comes below 30 and If RSI of a stock goes above 70 then it indicates the overbought situation. So as Currently Relative Strength Index (RSI-14) reading of National Storage Affiliates Trust (NSA) stock is 73.3, technically its an overbought stock.

Though, occasionally stocks can indicate an opposite short-term movement then it becomes important to look for trades in direction of a bigger trend. Like when bigger trend of prices stayed down when RSI was over 70 and bigger trend of stock price stayed up while RSI is below 30 then a 14-day RSI can be considered as a short-term indicator. So, in that situation a Simple Moving Average (SMA) can be crucial to look.

Simple Moving Average calculated as an average of the last N-periods (20-Day, 50-Day, 200-Day). A Simple Moving Average is one of the most flexible as well as most-commonly used technical analysis indicators. It is highly popular among traders, mostly because of its simplicity. It works best in a trending environment. Any type of moving average can be used to generate buy or sell signals and this process is very simple. National Storage Affiliates Trust (NSA) stock price is above from its 20 days moving average with 4.37% and trading above from 50 days moving average with 7.14%. The stock price is performing along above from its 200 days moving average with 13.20%.

NSA Stock Under Profitability Spotlight

Net profit margin of the company is -7.30% that shows how much the company is profiting by every dollar of sales. Operating Margin is noted at 32.10%.

Return on Assets (ROA) shows that how much the company is profitable as compared to its total assets which is -0.90% for stock. On the other hand, Return on Equity (ROE) is -3.80%. ROE actually measures financial performance and could be thought of as the return on net assets. It is considered a measure of how effectively management is using a companys assets to create profits. Return on Investment (ROI) is 5.00%. ROI measures the efficiency of investments. It helps to directly evaluate the amount of return on a specific investment, relative to the total investments cost.

Forward price to earnings ratio of 87.02.

Analysts Estimation:

Now at last but not the least, we will review what the Analysts are buzzing about this Stock. Looking for Analysts opinion is also important to understand where the stock is heading. Analyst has some hope that stock may be reaching the Target Price value of $34.88 in coming one year period. The Target Price expected by analysts that is achievable in short term period (1 year). Analysts Mean Recommendation of the stock is now at 2.3 (1.0 Strong Buy, 2.0 Buy, 3.0 Hold, 4.0 Sell, 5.0 Strong Sell). EPS growth for the next year is expected to be 59.92% and projected to gain growth of 391.40% for this year. Earnings per share EPS is one of the most important variables in determining a shares intrinsic value. EPS (ttm) is reported at -0.47. Analysts have some long term expectations that stock could hit EPS growth of 11.00% in next 5 years period while EPS growth seen at 34.10% for past 5 years period.

See original here:

National Storage Affiliates Trust (NSA) overbought Stock to Bite? We have reviewed it - News Welcome

Posted in NSA