The NSA and FBI Expose Fancy Bear’s Sneaky Hacking Tool – WIRED

Last weekend, during and in the aftermath of a contentious presidential election, the country of Belarus effectively shut off access to most of the internet for its 9.5 million citizens. It's a tactic that has become increasingly popular among authoritarian regimes, whether it's a total blackout like Belarus' or more targeted censorship of specific apps like Telegram and WhatsApp. The outage lasted around three days, although some sites remain blocked.

Elsewhere, we took a look at an Alexa bug that could have let a hacker access your entire voice history. It's patched now, but it's a good reminder to be careful what you say around your voice assistant. Covid-19 scams are so abundant that even ISIS allegedly got in on the grift with a site called FaceMaskCenter.com. And flaws in Qualcomm's ubiquitous Snapdragon chips put over a billion Android devices at risk. A fix has been issued, but those can take some time to trickle down to individual users.

Speaking of flaws, mistakes in open-source libraries could have exposed cryptocurrency exchanges to denial-of-service attacks or worse. A British AI tool intended to predict violent crime turned out not to work as advertised. And we looked at the increasingly sophisticated methods ATM hackers have used for "jackpotting," which is when they make the money machine go brrrrr.

We continued our Dark Patterns series with a dive into how Facebook and other social media sites capture your attentionand erode your privacy. And in the magazine we detailed the FBI's heart-pounding hunt for Cesar Sayoc, known as the "MAGA bomber."

And there's more! Every Saturday we round up the security and privacy stories that we didnt break or report on in depth but think you should know about. Click on the headlines to read them, and stay safe out there.

The National Security Agency is not known for being especially chatty. But it has made some useful public overtures of late; last week it offered tips to limit location tracking on your smartphone, and this week it followed up by going public with sneaky new Russian malware it discovered alongside the FBI. The announcement links the so-called Drovorub malware to Fancy Bear, the elite hacking group behind the hack of the Democratic National Committee in 2016 and more. Russia allegedly used Drovorub to plant backdoors; the versatile malware consisted of an implant, kernel module rootkit, file transfer and port forwarding tool, and command and control server. By shining a light on the malware, the US agencies hope to better enable potential targets to defend themselves.

The Wall Street Journal this week reported that TikTok used a banned method to track users for advertising purposes until last November. TikTok collected so-called MAC addresses using a security loophole that let it circumvent measures Android has in place to prevent that behavior. A MAC address is significant because it can be used to track a user even if they uninstall an app and reinstall it later. Perhaps more significant, though, is a line is the Journal report that TikTok sent those MAC addresses and other data back to ByteDance, the app's Chinese parent company. TikTok has repeatedly insisted that it does not, has not, and will not share user data with ByteDance. President Donald Trump has ordered ByteDance to sell TikTok by September 15, or the administration will take steps to shut down the app in the US.

In the era of 4G, many mobile phone conversations happen over Voice over LTE. Not only does VoLTE offer more bandwidth than the 3G calls of yesteryear, it also has a built-in layer of encryption that protects your calls from snoops. A team of researchers, though, has figured out how to undermine that security, using radio equipment that costs about $7,000 to grab that encrypted data as it heads to a cell tower and unscramble it. The attack has some important limitations, but it's a good reminder that modern telephony still has more than its share of security holesand 5G isn't looking that much better.

Motherboard this week took a deep dive down the rabbit hole of Russian SIMs, also known as white SIMs, that let criminals spoof phone numbers at will, or in some cases allow for real-time voice manipulation. While not illegal in and of themselves, the SIMs are a boon to phishing scams and other social engineering attacks.

More Great WIRED Stories

Read more:

The NSA and FBI Expose Fancy Bear's Sneaky Hacking Tool - WIRED

Posted in NSA

NSA and FBI Expose Russian Previously Undisclosed Malware Drovorub in Cybersecurity Advisory FBI – Federal Bureau of Investigation

The National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) released a new cybersecurity advisory about previously undisclosed Russian malware.

The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS) military unit 26165, whose activity is sometimes identified by the private sector as Fancy Bear, Strontium, or APT 28, is deploying malware called Drovorub, designed for Linux systems as part of its cyber espionage operations. Further details on Drovorub, to include detection techniques and mitigations, can be found in the joint NSA and FBI Cybersecurity Advisory.

"This Cybersecurity Advisory represents an important dimension of our cybersecurity mission, the release of extensive, technical analysis on specific threats," NSA Cybersecurity Director Anne Neuberger said. "By deconstructing this capability and providing attribution, analysis, and mitigations, we hope to empower our customers, partners, and allies to take action. Our deep partnership with FBI is reflected in our releasing this comprehensive guidance together."

For the FBI, one of our priorities in cyberspace is not only to impose risk and consequences on cyber adversaries but also to empower our private sector, governmental, and international partners through the timely, proactive sharing of information, said FBI Assistant Director Matt Gorham. This joint advisory with our partners at NSA is an outstanding example of just that type of sharing. We remain committed to sharing information that helps businesses and the public protect themselves from malicious cyber actors.

Drovorub is a Linux malware toolset consisting of an implant coupled with a kernel module rootkit, a file transfer and port forwarding tool, and a command and control (C2) server. When deployed on a victim machine, Drovorub provides the capability for direct communications with actor-controlled C2 infrastructure; file download and upload capabilities; execution of arbitrary commands; port forwarding of network traffic to other hosts on the network; and implements hiding techniques to evade detection.

Drovorub represents a threat to National Security Systems, Department of Defense, and Defense Industrial Base customers that use Linux systems. Network defenders and system administrators can find detection strategies, mitigation techniques, and configuration recommendations in the advisory to reduce the risk of compromise.

More information is available on NSA's fact sheet.

Read more:

NSA and FBI Expose Russian Previously Undisclosed Malware Drovorub in Cybersecurity Advisory FBI - Federal Bureau of Investigation

Posted in NSA

Shah Faesal reached out to NSA before he quit party; open to IAS return – Hindustan Times

Bureaucrat-turned-politician Shah Faesal, who left the party he himself founded, quit only after making contact with top officials in the Union government. Faesal had a talk with National Security Adviser (NSA) Ajit Doval before informing his party colleagues in the Jammu & Kashmir Peoples Movement (JKPM) that he was leaving, HT has learnt.

Faesal, 37, who hits the headlines in 2009, when he became the first person from Kashmir to top the Indian Administrative Services exam, acknowledged that he has been in touch with officials in New Delhi, although he declined to specify details.

There has been a lot of speculation about the conversations Im having with people in the government. I have been a member of IAS, and its nothing strange if Im meeting people in the government, he said.

I have to live and work here and this is perfectly normal, he added.

The NSA was not available for comment.

Faesal suggested that he is not opposed to rejoining the service, and there is talk that he could be reinstated.

Faesal, who once promised to be the voice of Kashmirs young people has come a long way. His views, too, have changed. I think we need to understand that in 1949 national consensus was about incorporating Article 370 and the 2019 national consensus is about scrapping it. We have to understand the mood of the nation and come to terms with the reality.

Early in 2019, Faesal announced his resignation from the IAS and became a vocal critic of the government. Jammu & Kashmir was stripped of its special status in August last year, and at the time, he tweeted: Kashmir will need a long, sustained non-violent political mass movement for the restoration of political rights. Abolition of Art 370 has finished the mainstream. Constitutionalists are gone. So you can either be a stooge or a separatist now. No shades of grey.

He has now deleted all his tweets. Asked to explain the stooge-and-separatist comment , he said: I was talking about the political grey zone in which electoral politics operated. I said that once the grey zone is over now people will call you stooge or separatist. [And] I said Im neither of the two.

He added: Im a proud citizen of this country who wants to make a difference in the lives of people. I dont recognise these labels at all.

In a signed article for this paper in January last year, Faesal enunciated the reasons he quit the IAS. He said then that Kashmir was in a crisis and that as an insider, he had decided to ring the alarm bell.

After being in touch with top officials in the government, Faesal now says he accepts the new reality. We are face to face with a new political reality in Kashmir. Since August 5, the facts on the ground have changed. I want to articulate my understanding of the situation without the need to be politically correct. Kashmir has suffered a lot in the past. I dont want to bank on the old illusions, take Kashmiris down a garden path, and build my career on that. Im quitting with all humility and telling people that I cant promise something that I cant deliver.

He now seems hopeful that the legislative route will provide answers. In a democracy, this consensus is dynamic and we should not lose hope. The same Parliament has provided answers in the past and Im sure the same Parliament will provide answers in the future also, he said.

Faesals resignation from the IAS is still pending and he may be reinstated, though the timeline for that is not clear. The rules can be tweaked to accommodate him, an official said.

Faesal is not averse to returning to the bureaucratic fold. I am not averse to working with the government. Public administration is my domain of expertise. Thats where I belong, he said.

Officials in Delhi and Srinagar who asked not to be named said he could be rejoining soon, and could also be reinstated in an advisory role.

See the rest here:

Shah Faesal reached out to NSA before he quit party; open to IAS return - Hindustan Times

Posted in NSA

How has the pandemic impacted work at the NSA? – C4ISRNet

WASHINGTON A cross-agency team at the U.S. National Security Agency is working to identify areas where the spy organization can do more remote work by reducing classification levels of work performed there, the NSAs chief information officer said Wednesday.

In response to the COVID-19 pandemic, on-site NSA employees are practicing social distancing within the same building, said Greg Smithberger, who also heads the agencys Capabilities Directorate. In this environment, the agency discovered its more efficient when personnel dont have to walk from meeting to meeting.

We had a culture of face-to-face meetings, and weve learned that we can be a lot more effective and efficient, you know, operating virtually even in our classified environment and then the unclassified things and the telework that opens up, Smithberger said on a virtual panel hosted by the Intelligence and National Security Alliance. [T]heres a pretty interesting cross-agency team right now is looking really hard at all the mission areas that could be doing more on the low side, and our ability to really open up telework.

Telework before the spread of COVID-19 was rarely done, he added, and telework in the future will be restricted to unclassified work. The NSA uses the Intelligence Community GovCloud environment for its cloud computing needs, a platform that hosts highly sensitive information and data. Access to the IC-GovCloud will not be allowed from home, Smithberger said.

He also said the NSAs new way of doing business virtually presents new opportunities for industry to interact with the spy group.

These more remote-friendly ways of doing business, whether theyre in the classified space or the unclassified space, have really opened up opportunities also for industry partners to bring in talent from other parts of the country that were kind of hard to get into supporting NSAs mission the way we used to do things, Smithberger said.

In the last few years, he said, the NSA developed a secure but unclassified environment hosted in the cloud that allowed for software development. Since the pandemic started, his team realized that the security architecture around the environment was strong enough that there wasnt additional risk in allowing people to use the system from home.

Overall, the NSA wants to broaden its relationship with private industry. Smithberger said the agency is building a similar environment that would allow for collaboration with people who dont have security clearances but can support the NSAs capabilities mission, cybersecurity efforts or research work.

Sign up for the C4ISRNET newsletter about future battlefield technologies.

(please select a country) United States United Kingdom Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, The Democratic Republic of The Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-bissau Guyana Haiti Heard Island and Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, The Former Yugoslav Republic of Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and The Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and The South Sandwich Islands Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe

Subscribe

By giving us your email, you are opting in to the C4ISRNET Daily Brief.

Its kind of become more of a standard for us ... to see how much we can actually do in a less protected environment, Smithberger said, adding that he also wants the agency to expand to work with some corporate partners who in some cases simply dont have access to a [sensitive compartmented information facility], but are fully clearing people.

Read more:

How has the pandemic impacted work at the NSA? - C4ISRNet

Posted in NSA

Election interference efforts have shifted, NSA and Cyber Command election threats leads say – CyberScoop

Written by Shannon Vavra Aug 7, 2020 | CYBERSCOOP

With Election Day less than 100 days away, the National Security Agency and U.S. Cyber Command are carefully monitoring threats to the 2020 U.S. presidential election from Russia, China, Iran, and groups of criminal actors, two officials said Friday.

And while Russian government operatives have probed state IT systems and run hack-and-leak operations to influence U.S. elections in the past, the playbook is not necessarily the same this year, the NSA election threats lead, David Imbordino, and Brig. Gen. William Hartman, the Cyber Command election threats lead, said.

While Russia depended on the Internet Research Agency (IRA) to run influence operations in 2016, they have been outsourcing operations to other actors, Imbordino and Hartman said, confirming that the IRA recently set up an offshoot of its troll farm in Ghana and Nigeria.

In terms of 2020 [in the IRA] weve seen a shift towards more use of proxiesintermediarieslaundering information through other individuals in the media space, Imbordino said while speaking on a panel at the virtual DEF CON conference. They had set up something in Africa, in Ghana in terms of having people there trying to put stuff online about divisive issues, using covert influence websites being able to get their narrative out.

Beyond Russias shifting tactics, the officials said the country is dealing with a whole host of foreign government interests outside of Russia in U.S. politics.

As part of a recognition of the growing threats from nations other than Russia to include China, Iran, and North Korea the NSA and Cyber Command formalized its Election Security Group following the 2018 midterm elections to cover threats fromall four nations, as CyberScoop first reported. Previously, the NSA and Cyber Command only had a joint taskforce for Russian threats, the Russia Small Group.

The NSA and Cyber Command have been tight-lipped about election threats from abroad. But Friday appeared to mark a pivot point: the two officials delivered their assessment of foreign governments efforts to interfere in U.S. politics just minutes after the Office of the Director of National Intelligence released a statement revealing details of Russias, Chinas, and Irans thoughts on President Donald Trumps and former Vice President Joe Bidens campaigns.

Bill Evanina, Director of the National Counterintelligence and Security Center, revealedRussia wants to primarily denigrate Biden, while China prefers that President Trump does not win reelection. The intelligence community has assessed that Iran seeks to undermine President Trump, and to divide, Evanina added.

Threats to U.S. elections dont stop with nation-state actors social media operations.

Ransomware threats to U.S. elections are so great, for instance, that the Election Security Group in recent months has expanded their focus to include those types of attacks, a U.S. government official told CyberScoop.

Imbordino noted Friday he is concerned about ransomware, indicating that ransomware actors could wittingly or unwittingly contribute to possible election interference operations.

I think ransomware is one of those wild cards out there that could be wielded by anyone, criminal actors, etc., Imbordino said.

In the case that a ransomware attack does target any election infrastructure or networks, Imbordino expressed concern that malicious actors could seize the moment to make people distrust the election results. Imbordino said he is worried bad actors might spread disinformation suggesting that a ransomware attack could impact the tally of peoples votes, even if thats not the case.

You can have a ransomware in a local network that actually doesnt even impact the elections counting, Imbordino said. But someone could then spin an influence campaign from that and report it to make you think there has been an impact and then not trust the results.

Moving forward, the NSA is continuing to monitor Chinas threats to the election, primarily due to both the scope and depth of their capability, Imbordino said.

[For] China, I think scale is something that is a bit unmatched in terms of them as a threat both from a cyber standpoint and from an influence standpoint. Certainly on influence theyve been very active in that region Taiwan [and] Hong Kong, Imbordino said. Them potentially becoming more aggressive in the U.S. space is something that weve been monitoring.

The Election Security Group is also continuing to monitor Irans social media influence efforts, Imbordino indicated. The U.S. intelligence community assesses Irans efforts will probably will focus on online influence, such as spreading disinformation on social media and recirculating anti-U.S. content, according to the ODNI.

Chinese- and Iranian-linked hackers have also beensending spearphishing emails to Biden and Trump campaign staff, respectively, according to Googles Threat Analysis Group.

Read the original:

Election interference efforts have shifted, NSA and Cyber Command election threats leads say - CyberScoop

Posted in NSA

Did Hedge Funds Make The Right Call On National Storage Affiliates Trust (NSA)? – Yahoo Finance

The latest 13F reporting period has come and gone, and Insider Monkey have plowed through 821 13F filings that hedge funds and well-known value investors are required to file by the SEC. The 13F filings show the funds' and investors' portfolio positions as of March 31st, a week after the market trough. Now, we are almost done with the second quarter. Investors decided to bet on the economic recovery and a stock market rebound. S&P 500 Index returned almost 20% this quarter. In this article you are going to find out whether hedge funds thoughtNational Storage Affiliates Trust (NYSE:NSA)was a good investment heading into the second quarter and how the stock traded in comparison to the top hedge fund picks.

Is National Storage Affiliates Trust (NYSE:NSA) going to take off soon? Investors who are in the know were becoming more confident. The number of bullish hedge fund bets increased by 7 lately. Our calculations also showed that NSA isn't among the 30 most popular stocks among hedge funds (click for Q1 rankings and see the video for a quick look at the top 5 stocks). Video: Watch our video about the top 5 most popular hedge fund stocks.

In the financial world there are a large number of tools investors have at their disposal to grade stocks. A pair of the most under-the-radar tools are hedge fund and insider trading indicators. We have shown that, historically, those who follow the top picks of the best fund managers can outperform the broader indices by a solid amount. Insider Monkey's monthly stock picks returned 101% since March 2017 and outperformed the S&P 500 ETFs by more than 58 percentage points. Our short strategy outperformed the S&P 500 short ETFs by 20 percentage points annually (see the details here). That's why we believe hedge fund sentiment is a useful indicator that investors should pay attention to.

David Harding of Winton Capital Management

At Insider Monkey we scour multiple sources to uncover the next great investment idea. With Federal Reserve creating trillions of dollars out of thin air, we believe gold prices will keep increasing. So, we are checking out gold stocks like this small gold mining company. We go through lists like the 10 most profitable companies in America to pick the best large-cap stocks to buy. Even though we recommend positions in only a tiny fraction of the companies we analyze, we check out as many stocks as we can. We read hedge fund investor letters and listen to stock pitches at hedge fund conferences. If you want to find out the best healthcare stock to buy right now, you can watch our latest hedge fund manager interview here. Now let's take a look at the new hedge fund action encompassing National Storage Affiliates Trust (NYSE:NSA).

At Q1's end, a total of 18 of the hedge funds tracked by Insider Monkey held long positions in this stock, a change of 64% from the fourth quarter of 2019. On the other hand, there were a total of 16 hedge funds with a bullish position in NSA a year ago. With the smart money's sentiment swirling, there exists an "upper tier" of noteworthy hedge fund managers who were adding to their holdings considerably (or already accumulated large positions).

The largest stake in National Storage Affiliates Trust (NYSE:NSA) was held by Renaissance Technologies, which reported holding $54.7 million worth of stock at the end of September. It was followed by Winton Capital Management with a $7.9 million position. Other investors bullish on the company included Millennium Management, Two Sigma Advisors, and D E Shaw. In terms of the portfolio weights assigned to each position Quantinno Capital allocated the biggest weight to National Storage Affiliates Trust (NYSE:NSA), around 0.27% of its 13F portfolio. Navellier & Associates is also relatively very bullish on the stock, setting aside 0.24 percent of its 13F equity portfolio to NSA.

Story continues

As one would reasonably expect, key hedge funds were breaking ground themselves. Citadel Investment Group, managed by Ken Griffin, established the most valuable position in National Storage Affiliates Trust (NYSE:NSA). Citadel Investment Group had $1.4 million invested in the company at the end of the quarter. Paul Marshall and Ian Wace's Marshall Wace LLP also initiated a $0.6 million position during the quarter. The other funds with brand new NSA positions are Peter Rathjens, Bruce Clarke and John Campbell's Arrowstreet Capital, Hoon Kim's Quantinno Capital, and Greg Eisner's Engineers Gate Manager.

Let's go over hedge fund activity in other stocks similar to National Storage Affiliates Trust (NYSE:NSA). These stocks are Fitbit Inc (NYSE:FIT), Rogers Corporation (NYSE:ROG), Vonage Holdings Corp. (NASDAQ:VG), and BankUnited Inc (NYSE:BKU). This group of stocks' market caps are similar to NSA's market cap.

[table] Ticker, No of HFs with positions, Total Value of HF Positions (x1000), Change in HF Position FIT,26,273167,2 ROG,19,77338,-2 VG,25,206818,-10 BKU,18,172092,-7 Average,22,182354,-4.25 [/table]

View table hereif you experience formatting issues.

As you can see these stocks had an average of 22 hedge funds with bullish positions and the average amount invested in these stocks was $182 million. That figure was $77 million in NSA's case. Fitbit Inc (NYSE:FIT) is the most popular stock in this table. On the other hand BankUnited Inc (NYSE:BKU) is the least popular one with only 18 bullish hedge fund positions. Compared to these stocks National Storage Affiliates Trust (NYSE:NSA) is even less popular than BKU. Hedge funds dodged a bullet by taking a bearish stance towards NSA. Our calculations showed that the top 10 most popular hedge fund stocks returned 41.4% in 2019 and outperformed the S&P 500 ETF (SPY) by 10.1 percentage points. These stocks gained 18.6% in 2020 through July 27th but managed to beat the market by 17.1 percentage points. Unfortunately NSA wasn't nearly as popular as these 10 stocks (hedge fund sentiment was very bearish); NSA investors were disappointed as the stock returned 0.2% since Q1 and underperformed the market. If you are interested in investing in large cap stocks with huge upside potential, you should check out the top 10 most popular stocks among hedge funds as most of these stocks already outperformed the market so far in 2020.

Get real-time email alerts: Follow National Storage Affiliates Trust (ETR:NSA)

Disclosure: None. This article was originally published at Insider Monkey.

Related Content

Original post:

Did Hedge Funds Make The Right Call On National Storage Affiliates Trust (NSA)? - Yahoo Finance

Posted in NSA

National Speakers Association Inducts Mary Kelly, Ph. D. into the Speaker Hall of Fame – The Grand Junction Daily Sentinel

DENVER, Aug. 10, 2020 /PRNewswire/ -- The National Speakers Association (NSA) inducted Commander Mary Kelly, Ph.D., into the Speaker Hall of Fame in a virtual ceremony in August 2020. Kelly is among an elite group of only 255 professional speakers throughout the world to ever receive this honor. Past recipients include Ronald Reagan, Norman Vincent Peale, Ken Blanchard, Jeanne Robertson, and General Colin Powell.

"Thank you to everyone who is part of this amazing community. I'm honored to be with you tonight, humbled beyond belief by this amazing award, and thrilled to serve this community of people dedicated to changing the world," Kelly said during the induction ceremony.

In presenting the award, Tim Gard noted that Mary Kelly, "Is someone who handles every situation with grace and humor."

"Mary Kelly is one of the most creative and motivating speakers I have ever worked with.Energetic, creative, witty, genuine, and extremely knowledgeable! She's the BOMB!" declared Michael Paulovich, Project Management Office.

"Mary hit it out of the park with our wine ambassadors. She taught them how to manage their time, be productive leaders, and most importantly, how to create business plans. She understood our business as if she had been working with us for years," said Melissa Lynch, Boisset Collection.

About Mary Kelly

Mary Kelly is a graduate of the United States Naval Academy and spent over 20 years on active duty in intelligence and logistics. She retired from the Navy as a commander. She has masters' degrees in history and economics, and a Ph.D. in economics.

With over 20 years combined teaching experience at the Naval Academy, the Air Force Academy, and Hawaii Pacific University, she taught economics, finance, history, and leadership. She has extensive experience in executive business coaching, improving profit growth, banking, and organizational leadership. Her programs are leadership-based, and focus on communication, business growth, teamwork, strategic planning, productivity, and project development.

Mary Kelly, Keynote Speaker

A high-energy, high-content keynote speaker, Mary uses research, humor, and experience to show professionals how to excel. Mary's relatable, no-nonsense approach inspires audiences to embrace their roles, surpass their goals, and plan for the future. She is a certified virtual speaker, and has delivered virtual programs since 1998.

Mary speaks to 80+ organizations a year, and is a favorite with financial planners, real estate professionals, medical practices, insurance agents, financial institutions, military audiences, manufacturing organizations, and CEO groups.

For a full list of Mary Kelly's live and virtual programs, please click here.

Mary Kelly, Executive Consultant and Coach

Mary has a unique ability to reach executives and help them attain their goals through leadership training, professional development, and succession planning.

To learn more, please inquire directly here.

Mary Kelly, Author

Mary has written 13 books on leadership, productivity, business planning, and personal finance help people at all levels or organizations. Her latest book, "Who Comes Next? Leadership Succession Planning Made Easy," is being used in 5 countries.

Media

Mary Kelly has published more than 500 articles. She is a frequent guest on media programs. To schedule an interview with Mary, click here.

About the National Speakers Association

The National Speakers Association (NSA) is part of a global network of more than 3,000 members whose skills, expertise and experience represent the most recognized and respected community of thought leaders in the industry.

Founded in 1973 by Cavett Robert, CSP, CPAE, NSA has comprehensive resources, cutting-edge tools, insightful education and productive events that speakers need to develop their brands and grow their businesses. NSA members include experts in a variety of industries and disciplines, who reach audiences as speakers, trainers, educators, humorists, motivators, consultants, and authors.

In February 1977, the National Speakers Association established the Council of Peers Award for Excellence Speaker Hall of Fame to honor professional speakers who have reached the top echelon of platform distinction. Inductees are evaluated by their peers through a rigorous and demanding process, and must excel in seven categories of speaking excellence and professionalism.

For more information on the CPAE Speaker Hall of Fame, contact NSA headquarters at (480) 968-2552.

Media Contact for Mary KellyBrynn Brinkmann719-357-7360244999@email4pr.com

Go here to see the original:

National Speakers Association Inducts Mary Kelly, Ph. D. into the Speaker Hall of Fame - The Grand Junction Daily Sentinel

Posted in NSA

For 2020 Election, Threat is Bigger than Russia > US DEPARTMENT OF DEFENSE – Department of Defense

As November approaches and a new general election is on the minds of most Americans, preserving the security of that election is on the minds of cyber experts at U.S. Cyber Command and the National Security Agency. Officials there say that unlike in 2016, where Russia was the biggest threat to election security, there are now new threats that pose a risk.

"We're looking at the spectrum of all of our adversaries, Russia, China, Iran, and ransomware actors,"said Dave Imbordino, the election security lead with the National Security Agency, during a panel discussion Friday that was part of the 2020 DEF CON convention.

For the 2020 election, Imbordino said, there are more threats to consider, and it's easier for those threats to get involved.

"There's more people in the game,"Imbordino said. "They're learning from each other. Influence is a cheap game to get into now with social media. It doesn't cost a lot of money. You can try to launder your narratives online through different media outlets. That's something we're laser-focused on as well."

Army Brig. Gen. Joe Hartman, commander of the Cyber National Mission Force at U.S. Cyber Command and also the election security lead for Cybercom, said that since 2018, Cybercom hasn't let its guard down in regard to election security. While in 2016, he said, the Defense Department was focused on other things, by the 2018 midterm election, Cybercom and NSA had set up the "Russia Small Group"to deal with potential Russian interface during that election. They haven't lost focus since then.

"For us that never stopped. I got back to the command about a year ago in 2019. And we didn't start up ... this thing called the election security group. It was already working, and it never stopped working [since] 2018,"he said. "We think we're in a much better position now, certainly, than we were in 2016 or 2018."

What are the threats to U.S. elections? Influence operations are a primary threat. That involves the creation of information online by adversarial nations, often through proxy groups, to create discord and influence opinion in the U.S.

Imbordino said the Russian-operated Internet Research Agency, for instance, has set up operations overseas to generate misleading and divisive information to influence voter opinion.

"They have set up something in Africa, Ghana, in terms of ... having people there trying to put stuff online, posting things about, you know, socially divisive issues, using covert influence websites to be able to get their narrative out,"he said. "That's kind of a shift in tactic we've seen from Russia side."

China, he said, has proven effective in doing the same in their own part of the world, in Taiwan and Hong Kong, for instance.

"Them becoming potentially more aggressive in the U.S. space is something that we need to monitor and be prepared for,"Imbordino said. "For the Chinese cyber threat ... they're a little bit different in terms of the scale and breadth of the targets they go after. Every U.S. citizen is a target of China, just because of the big data, the PII [personally identifiable information] that they're interested in collecting ... I think that sets them uniquely apart."

Iran is also getting into the influence game, he said, and is learning from what other adversaries are doing.

Hartman said Cybercom has capabilities now on the home front to defend against threats to national elections, including on-call defensive cyber elements in "war rooms"that are ready to respond if called upon by agencies like DHS or FBI, for instance. But that's not all, he said.

"We have elements that are sitting over in other op centers, and they are prepared. If we see an adversary that's attempting to do something to interfere with that election ... we have the ability to play the away game,"he said. "We have the ability to go out in foreign space and look at what you're doing. And we have the ability to make you stop doing that."

Originally posted here:

For 2020 Election, Threat is Bigger than Russia > US DEPARTMENT OF DEFENSE - Department of Defense

Posted in NSA

The White House reportedly quashed part of an intelligence report that showed Russia is helping the Trump campaign – MSN Money

Reuters Russian President Vladimir Putin in a meeting with President Donald Trump. Reuters

Last year, President Donald Trump's administration tried to pressure intelligence agencies to delete part of a classified report that found Russia was trying to help him win the 2020 election, according to an investigation by The New York Times Magazine.

The report, known as a National Intelligence Estimate, was compiled by the Office of the Director of National Intelligence (ODNI) in July 2019 and made several "key judgments" about matters of national security. "Key Judgement 2" in the report concluded that Russia aimed to interfere in the 2020 election to help Trump, unnamed national security sources told Times reporter Robert Draper.

Trump was reportedly unhappy with that finding. He has repeatedly denied the assertion that Russia tried to help his campaign in 2016 despite reports from the FBI, CIA, NSA, Justice Department, and Republican-led Senate Intelligence Committee that supported that conclusion. Russian President Vladimir Putin has similarly denied interfering in the 2016 election, but has also said he wanted Trump to win.

When the ODNI was finalizing last year's report, Trump administration staffers requested that it remove language in "Key Judgement 2" that detailed Russia's attempts to help Trump in 2020, former director of national intelligence Dan Coats told the Times.

"I can affirm that one of my staffers who was aware of the controversy requested that I modify that assessment," Coats said. "But I said, 'No, we need to stick to what the analysts have said.'"

Shortly after that exchange, Coats was surprised to learn that Trump was forcing him into early retirement. He was first made aware of the news when Trump tweeted that Coats' last day as DNI would be August 15 months before Coats planned to retire.

After Coats' departure, the National Intelligence Estimate was published with softer language describing Russia's potential motivation for interfering in the 2020 election. Instead of directly concluding that Russia wanted Trump to win in 2020, the report was updated to state that "Russian leaders probably assess that chances to improve relations with the US will diminish under a different US president."

The changes were made, according to an email reviewed by the Times, following edits by Beth Sanner, an ODNI official who presents President Donald Trump's daily national intelligence briefings.

The episode is part of a broader conflict between Trump and US intelligence communities, Draper reported. After a yearslong FBI probe into possible ties between the Trump campaign and Russia, Trump's Republican allies in Congress are now pushing an investigation into whether the FBI overstepped its authority.

Visit link:

The White House reportedly quashed part of an intelligence report that showed Russia is helping the Trump campaign - MSN Money

Posted in NSA

GFA Express Appreciation To NSA | General Sports – Peace FM Online

The Ghana Football Association (GFA) has expressed appreciation to the National Sports Authority(NSA) for the successful vetting of prospective beneficiaries of the Youth Employment Agency (YEA) sports allowance.

According to a statement released by the NSA on August 7, the Director-General of the NSA has forwarded the report he received from the committee tasked to vet the prospective beneficiaries of the sports allowances to the YEA.

The YEA is expected to begin processing of the monthly allowances to be paid to the vetted beneficiaries.

"We will continue our excellent working relationship with the National Sports Authority team to quickly get our Womens clubs to resolve all outstanding issues on the remaining 57 female players to complete the Vetting Process successfully," said General Secretary Mr. Prosper Harrison Addo.

The GFA would continue to engage Womens Premier League clubs to immediately resolve all the outstanding issues on the remaining players to immediately complete the vetting process with the NSA.

Source: GNA

Featured Video

Originally posted here:

GFA Express Appreciation To NSA | General Sports - Peace FM Online

Posted in NSA

NSA O’Brien Says US Has ‘Sanctioned The Heck Out Of Russia’ – Newsmax

National security adviser Robert O'Brien on Sunday said theres almost nothing left of sanctions to penalize Russia for election interference.

In an interview on CBS News Face The Nation, OBrien praised President Donald Trump and his administration for its firm stance against Moscow.

The president has told the Russians many times not to get involved in our elections, OBrien said, adding: Theres almost nothing we can sanction left of the Russians.

Weve sanctioned the heck out of Russia, he declared.

According to OBrien, the tough sanctions in response to election interference all happened under the Trump administration.

"We're not going to have foreign countries decide who our next president will be, that's outrageous, he said.

Now recovered from his own bout with the coronavirus, OBrien also praised the U.S. response to the pandemic.

What has happened with testing in America is really a miracle, he said. There is no country in the world that comes close to what America is doing on testing."

2020 Newsmax. All rights reserved.

See the rest here:

NSA O'Brien Says US Has 'Sanctioned The Heck Out Of Russia' - Newsmax

Posted in NSA

DHS Warns of a Persistent Cyber Threat Targeting Critical Infrastructure in the U.S. – CPO Magazine

Foreign rogue nation-state threat actors are targeting critical infrastructure in the U.S., according to the White House report involving the National Security Agency (NSA) and the Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency (CISA).

The threat actors are targeting internet-connected operational technology (OT) in the United States defense systems. Cyber threats originating from state-sponsored actors were also targeting critical infrastructures such as electricity, water, and gas. Consequently, the NSA and CISA directed the owners and operators to take immediate action to secure the systems.

The agencies warned that the increase in adversary capabilities and activity, the criticality to U.S. national security and the vulnerability of OT systems, civilian infrastructure makes attractive targets for foreign actors.

The NSA and CISA noted that OT assets are present in the Department of Defense systems and also in the defense industrial base sector. Their use is prominent in most critical areas including in the national security systems. The agencies say the use of such systems is necessary because of the increased demand for a decentralized workforce. However, their use opens an attack landscape while increasing monitoring complexities because of the pervasive nature of the systems.

The DHS indicated there was strong evidence of a cyber threat involving the use of email spear phishing tactics to infiltrate critical infrastructure networks through OT assets. Additionally, there are persistent efforts to conduct ransomware attacks on critical infrastructure. A ransomware cyber threat is particularly concerning because of its disruptive nature and ability to leak sensitive information.

In February, CISA released a report describing a ransomware attack on a natural gas compression facility, which led to the shutdown of operations on the facility.

A similar cyber threat was blocked in May targeting critical infrastructure on an Israeli water system, according to CyberScoop. Authorities said the attack was highly organized and synchronized.

Nilesh Dherange, CTO of Gurucul, reiterated that the cyber threat was real.

The most recent NSA and CISA alerts are directed at Government assets, but they are valid warnings for any organization that has internet-facing systems. They offer solid advice that applies to any size of the operation and reiterates recommendations the Information Security community has been giving for years.

The NSA and CISA advised organizations to create a resilience plan for the OT assets. The plan involves the creation of a manual process to restart industrial control systems after an attack takes place. They also recommended having a system monitoring process in place to monitor the cybersecurity state of the critical infrastructure concerning cyber threats. Because of the increased risks facing essential services, the agencies advised organizations to remain ahead of the cyber threat operators by being proactive.

Organizations should also create an incident response plan to anticipate new methods that hackers may deploy. This should include collaboration between organizations and CISA in the creation of organizational cybersecurity plans.

Operators should also harden their networks by restricting access to OT networks, and to carry regular tests to discover vulnerable OT devices within their networks.

Dherange summed up the list of measures that the operators of critical infrastructure should adopt.

In a nutshell: Have resiliency, business continuity, and response plans in place and exercise them. Understand and document your environment, your likely adversaries, and how they will probably attack so you can harden appropriately. Make sure personnel are trained and equipped to resist the expected attack vectors and mitigate them after a breach.

Evan Dornbush, CEO and Founder of Point3 Security, says the cyber threat was critical, and therefore, operators should heed the advice.

If the NSA is coming out of the shadows to speak up in a joint alert with CISA, you want to listen and take action. What is most helpful is that the advisory shares a list of tools attackers are using to identify targets. Seeing what the attacker sees allows your cybersecurity team to prioritize your defensive actions. The Advisory goes further still, offering a robust set of recommendations for executing a response strategy.

View original post here:

DHS Warns of a Persistent Cyber Threat Targeting Critical Infrastructure in the U.S. - CPO Magazine

Posted in NSA

Money Explodes; Gold Glitters; The Recovery Slows – Forbes

03 April 2020, North Rhine-Westphalia, Cologne: Jewellery is presented in the shop window of a ... [+] goldsmith's studio together with toilet paper for decoration. Photo: Henning Kaiser/dpa (Photo by Henning Kaiser/picture alliance via Getty Images)

I often get asked why the price of gold is rising, and, as a follow on, will it continue.The price of gold has always had a significant correlation (80%) with the Feds balance sheet (i.e., the money supply), especially during periods of significant balance sheet expansion (money printing).The table shows the Y/Y change in the money supply of the western worlds major economies.The U.S., clearly the largest western economy, has increased its money supply at a much faster pace than any of the other majors.Note that the EU, the only western economy that approaches the size of the U.S., is growing its money stock at less than 40% of the pace of the U.S. Federal Reserve (Fed).

Year over Year Money Supply

Noteworthy is the fact that the value of all of these countries currencies have risen since the virus outbreak as the U.S. money supply has exploded and the U.S. Congress has sent helicopter money to the U.S. populous.In fact, at the time of this writing, the U.S. Congress is in the time honored process of having the two major political parties posture on how the opposition party doesnt care about the American people etc. etc.This, of course, is a prelude to what will be another multi-trillion stimulus package.The CARES Act stimulus amounted to about $2 trillion, and its a pretty sure bet that the upcoming one will be in the same area.Thats $4 trillion total, bigger than the entire GDPs of most of the western worlds economies (only Japan and the combined EU are larger).In fact, the big news out of the EU in the latter part of July was that they finally reached agreement on a stimulus package of their own total was $860 billion!So, $4 trillion vs. $860 billion.Is it any wonder why the dollars exchange rate is in free fall?

The Fed, of course, has been on a mission of its own to protect asset values and has expanded its balance sheet by over $3 trillion since February.And when the Congress appropriates free money, the federal government must issue new debt.Normally, when a huge amount of new debt supply comes to market, the laws of supply and demand would require that the price (i.e. the rate of interest) would have to rise to clear the market.However, the Fed has pledged that interest rates wont rise for several more years (i.e., until inflation rises to their targeted 2% level, which wont happen until the economy is much further along in the recovery process).To keep interest rates at current levels means that the Fed must buy the new debt, in effect, monetizing the federal governments stimulus. That means that the U.S. money supply will continue its rapid escalation, and the value of the dollar will continue to fall vis a vis other currencies.

The Price of Gold

What does all of this have to do with golds price?Gold is priced in dollars, and the dollar is the worlds reserve currency.As the dollar falls in value vis a vis other currencies, the price of gold in terms of dollars is going to rise.

Gold is the ultimate currency, i.e., it cant be manipulated by any government.Its supply is limited, growing at a rate of about 2% per year (new mining).Historically, gold has been a hedge against inflation.But it is also a safe haven, i.e., a hedge against uncertainty (like a pandemic).So, it would be natural for its price to rise in the current worldwide pandemic, even without money supply growth.While the U.S. is clearly the money supply glutton, it isnt as if the money supply of other countries isnt growing at a faster pace than their economies (i.e., they are also creating excess money, just not as fast as the U.S.).Together, uncertainty and money creation are pushing golds price up.Will it continue? You already know the answer.

There is a danger, however, to the policies being pursued by the Administration, Congress and the Fed.The danger is that if the U.S.s money creation continues at a much faster pace than that of the rest of the western countries, there is a good chance that the dollar loses its status as the worlds reserve currency.What would take its place?Probably no singe countrys currency (like China).More likely, a basket of currencies, like an index.This would be a big blow to the U.S economy.As the reserve currency, almost all international transactions are done in dollars, creating a demand for the currency and providing cheap financing for U.S entities.All this would disappear if the dollar loses its reserve currency status.

Whats Trending

Heres whats trending in the U.S. economy:

Employment

The big news of the week was the better than expected payroll numbers for July.The headline number for net new job creation was 1.763 million, much better than the 1.4-1.5 million expectation.Once again, the headline number was the seasonally adjusted (SA) one, and it is very misleading.Given government ever-changing edicts on business closures, re-openings, capacity constraints, masks, etc. etc., and the monumental changes in consumer behavior and attitudes toward shopping, entertainment, leisure, travel since February, the use of seasonal factors makes no sense at all and only distorts the data.The non-seasonally adjusted (NSA) number was a much lower 591k, still positive, but only about 1/3rd of the headline.

The Unemployment Picture

On the state reporting level, we see the same issues.On August 6, markets were happy when the Initial Claims data (IC) from state reporting agencies showed 1.186 million new claimants (week ended August 1), much better that the 1.4 million expectation. Continuing Claims (CC) showed up at 16.107 for the July 25 week (CC lags IC by a week).The NSA data are actually much more encouraging.For IC, the August 1 week was 984k, the first time new claims have been less than one million since early March.NSA CC were also lower (15.849 million).Using the BLS most recent Establishment (Payroll) Survey, and data from those surveys back to February, the table shows the SA and NSA net new jobs.Note that the differences werent significant until the latest (July) count.

New Payrolls

Still a steep hole to climb out of, but more encouraging than the headline SA numbers. As can be seen from the chart, the much-needed downtrend in the unemployment data may have resumed.However, lets not be too hasty.This is only one data point.

In addition, that payroll survey was taken the week ending July 17, just when the re-closings had commenced.Since then, large layoffs have been announced by companies that have given up on the concept of a V-shaped recovery.The August payroll survey, taken this week (week of August 10-14) will provide us a better view of the impact that the upward spiral of cases and the reaction of various state and local governments have had on the employment situation.Unfortunately, that data release is still nearly a month away.

Bankruptcies (BKs)

As discussed weekly in this blog, publicly traded company bankruptcies continue their uptrend unabated.We are now trending for 277 for the year almost double that of 2019 (139).

Annualized Bankruptcies

Conclusions

Continue reading here:

Money Explodes; Gold Glitters; The Recovery Slows - Forbes

Posted in NSA

NSA Reports on New Cyber Vulnerability in Computers – ExecutiveGov

NSA

The National Security Agency (NSA) has issued a report on a new cyber vulnerability that threatens certain systems present within theDepartment of Defense and other organizations.

TheBootHole vulnerability allows cyber actors to get through the Secure Boot security standard that makes devices boot only with software trusted by original manufacturers, NSA said Thursday.

Cyber terrorists may use this vulnerability to tamper with a device's boot process. Devices running on Linux orWindows 8 and above may be affected by this vulnerability.

NSA provided two mitigation options in theMitigate the GRUB2 BootHole Vulnerability" report for users of Linux, an operating system that uses the Grand Unified Bootloader 2 or GRUB2 affected byBootHole.

For the standard mitigation, the report advises Linux users to update the boot components ofendpoints. The agency will soon release another report for users of Windows and other systems based on the Unified Extensible Firmware Interface.

Read more:

NSA Reports on New Cyber Vulnerability in Computers - ExecutiveGov

Posted in NSA

The Trump administration reportedly quashed an intelligence report that showed Russia is helping him win the 2020 election – MSN Money

Reuters Russian President Vladimir Putin in a meeting with President Donald Trump. Reuters

Last year, President Donald Trump's administration tried to pressure intelligence agencies to delete part of a classified report that found Russia was trying to help him win the 2020 election, according to an investigation by The New York Times Magazine.

The report, known as a National Intelligence Estimate, was compiled by the Office of the Director of National Intelligence (ODNI) in July 2019 and made several "key judgments" about matters of national security. "Key Judgement 2" in the report concluded that Russia aimed to interfere in the 2020 election to help Trump, unnamed national security sources told Times reporter Robert Draper.

Trump was reportedly unhappy with that finding. He has repeatedly denied the assertion that Russia tried to help his campaign in 2016 despite reports from the FBI, CIA, NSA, Justice Department, and Republican-led Senate Intelligence Committee that supported that conclusion. Russian President Vladimir Putin has similarly denied interfering in the 2016 election, but has also said he wanted Trump to win.

When the ODNI was finalizing last year's report, Trump administration staffers requested that it remove language in "Key Judgement 2" that detailed Russia's attempts to help Trump in 2020, former director of national intelligence Dan Coats told the Times.

"I can affirm that one of my staffers who was aware of the controversy requested that I modify that assessment," Coats said. "But I said, 'No, we need to stick to what the analysts have said.'"

Shortly after that exchange, Coats was surprised to learn that Trump was forcing him into early retirement. He was first made aware of the news when Trump tweeted that Coats' last day as DNI would be August 15 months before Coats planned to retire.

After Coats' departure, the National Intelligence Estimate was published with softer language describing Russia's potential motivation for interfering in the 2020 election. Instead of directly concluding that Russia wanted Trump to win in 2020, the report was updated to state that "Russian leaders probably assess that chances to improve relations with the US will diminish under a different US president."

The changes were made, according to an email reviewed by the Times, following edits by Beth Sanner, an ODNI official who presents President Donald Trump's daily national intelligence briefings.

The episode is part of a broader conflict between Trump and US intelligence communities, Draper reported. After a yearslong FBI probe into possible ties between the Trump campaign and Russia, Trump's Republican allies in Congress are now pushing an investigation into whether the FBI overstepped its authority.

See the rest here:

The Trump administration reportedly quashed an intelligence report that showed Russia is helping him win the 2020 election - MSN Money

Posted in NSA

There Will Be Blowback – Forbes

Caption from US State Dept. "Announcement"

The publication of the Expansion of the Clean Network to Safeguard Americas Assets coming from the Secretary of States office yesterday is an example of posturing and saber rattling that will result in zero impact on intellectual property theft, potentially massive wasted expenditure, and more government encroachment on free markets. It will not end well.

Do not let anyone forget that the new era of digital mercantilism was kicked off in 2013 due to the activities of the National Security Agency. Thanks to Edward Snowden we learned that the NSA, for years, had been tapping undersea cables, forcing major US companies like Apple, Microsoft, Yahoo, Youtube, Skype and AOL (See PRISM slides.) to secretly funnel data to them, tapping communications in major telecom hubs, and developing exploits for HP, Dell, Cisco, Fortinet, Juniper, and Huawei gear.

The reaction from around the world was swift. Trust in US technology products was degraded. The EU reacted strongly with condemnations coming from world leaders whose cell phones had been compromised by the NSA. The EU passed GDPR in part as a reaction. The EU is also attempting to build an alternative cloud platform, Gaia X., to counter the dominance of AWS, Azure, and Google for modern computing infrastructure, despite forcing all of those platforms to build data centers in Europe to keep data in Europe (and, incidentally, give law enforcement and intelligence agencies their own jurisdiction to control and possibly monitor data.)

There has always been an effort on the part of governments to gain control of the means of production, apart from a short period post-Adam Smith, and pre-WWII, when capitalism had a brief moment in the sun. In those days governments were happy to tax output but did not create Soviet style command economies and industrial policies. During the late 90s there were some that thought the internet would free us from national boundaries and restrictions on trade. Any manufacturer of any good could launch a website with a shopping cart and sell anywhere in the world. If the product was digital, like a blog post, ebook, or video, it could be transferred over the internet free of taxes, import duties, or censorship. Those days and that dream are long gone.

Mercantilism according to the Wikipedia entry is:

Mercantilism is an economic policy that is designed to maximize the exports and minimize the imports for an economy. It promotes imperialism, tariffs and subsidies on traded goods to achieve that goal.

Each new administration in the US tries its hand at protecting US industry sectors, from wheat, to sugar, to textiles, to manufacturing. This turns into votes for the politicians and gives the manufactures the ability to raise prices without investing in efficiency and quality.

There is one industrial sector that the US dominatestechnology. Cisco, Juniper, Arista, and others completely own the market for networking gear while engaging in healthy competition with each other. The positions of Google, Apple, Microsoft, Facebook, and Amazon, are demonstrated by their market caps. With a few exceptions software is dominated by US tech companies.

Keep in mind that practically all technology hardware is produced in China for American companies. There is no need for an industrial policy to protect these companies and massive harm could come from anti-China posturing.

The Stick it to China memo has five bullet points and I am just going to assume there are no plans behind them:

-Clean Carriers. This bullet point seeks to bar Chinese telecom providers from the US. Would it be a bad thing if they did move into the US? What if a Chinese carrier delivered 10 gig internet for $10 a month? Sign me up. I dont trust any carrier and everyone should protect themselves from the monitoring of your activity that they engage in by using end-to-end encryption and proxies.

-Clean Store: To remove un-trusted applications from U.S. mobile app stores. This is transparently a policy to back Trumps tweets about TikTok and would be a massive encroachment on Apple and Googles ability to continue to dominate the market for apps.

-Clean Apps: To prevent untrusted PRC smartphone manufacturers from pre-installing or otherwise making available for download trusted apps on their apps store. Leaving aside the internal contradiction, this is aimed squarely at Huawei which sells some of the lowest cost smart phones in the world. I dont trust any app from any store and neither should you.

-Clean Cloud: This section is meant to bar US organization from storing data in Chinese cloud providers, specifically calling out Alibaba, Baidu, and Tencent. That could be disastrous for companies that sell into the single biggest market in the world, China. Once again, never trust any cloud provider. Encrypt all of your data all of the time.

-Clean Cable. To ensure the undersea cables connecting our country to the global internet are not subverted for intelligence gathering by the PRC. We know this is done all the time by the NSA to everyones undersea cables. Other countries do this too. It is completely impossible to protect tens of thousands of miles of cables that lie deep in the ocean. The simple solution to undersea tapping of cables is, you guessed it, encrypt all the data all the time.

Thankfully this ridiculous posturing by the State Department will be short lived. On January 20, 2021, a new Secretary of State will be sworn in and we will return to sane policies. But we must push back whenever we can against the rise of digital mercantilism.

Continued here:

There Will Be Blowback - Forbes

Posted in NSA

What and how are you thinking? Anything is possible – Martins Ferry Times Leader

I just finished an interview for the First Light Show airing nationally on Westwood One next week. We talked about how and why we need to bring manufacturing back to the USA creating high wage jobs. Our Region is advantaged because of our proximity to markets, abundant natural gas and natural gas liquids. It was a great opportunity to tell our story to the nation. Shale Crescent USAs thought leadership made this possible.

Dr. Clay Marsh, West Virginia Covid-19 Czar said something profound this week I havent heard anyone in the medical community say directly. We are entering a new time period of learning to live with the virus. I might not have the quote exactly but my understanding is, Covid-19 isnt going away anytime soon even though we are working on vaccines and possible cures. If the virus isnt going away we need to live our lives in a way that protects us and others as we move to normal activities.

Going back to lockdown isnt the answer. We may find extended lockdown was deadlier than the virus because of depression, stress, increased suicide, domestic abuse, substance abuse and deaths from other diseases like cancer, high blood pressure and heart disease that went untreated. One doctor said he has only diagnosed about 1/3 of the cancer cases he normally does. Cancer doesnt take vacations. People chose not to go to the doctor out of fear.

When I had cancer over 30 years ago, my wife pushed me to see a doctor and made the appointment. It was serious enough for me to have surgery the next day. Fortunately, the cancer was found early. My type of cancer spreads quickly. A delay could have been deadly. How many cancer cases have spread into something incurable during Covid-19?

Industries like trucking, healthcare, petrochemicals and others learn to successfully deal with risks every day. Driving to the store, church or the beach is a risk most of us are willing to take. In industry following common sense rules like wearing PPE or seatbelts lowers the risk. Wearing a mask, social distancing and washing our hands does the same for us when dealing with Covid-19. The question isnt if we can get back to business, school or athletics it is, How can we? This question assumes we can, will and must.

We know how we can bring manufacturing back to the USA. I got a new crown from my dentist this week. It was made in the USA out of ceramic and zirconium on a 3D printer instead of by hand in China. My dentist said it wont crack or chip. We are using high tech computerized 3D printing capabilities to make critical healthcare PPE, essential medical equipment, products like Covid-19 tests and parts we are currently getting overseas. Small and medium manufacturing companies in our Region have the ability to change quickly and adopt new technology or change product lines quicker than large companies. This helps to keep current jobs and bring in new manufacturing jobs which are really important now.

Lynnda and I attended Influence 2020 the annual National Speakers Association (NSA) Conference last weekend. It was virtual. NSA is an ethnically and physically diverse association of professional speakers, trainers, coaches, business thought leaders and entertainers. NSA members were hurt by Covid-19 when meetings cancelled. I have a friend with a very successful business who lost 6 months of income in a week when meetings went away.

In addition to the mainstage presentations at Influence, we attended small virtual breakout sessions with the most successful people in the business. These individuals have seven figure businesses. They also have staffs and overhead a business like mine does not have. One individual lost over $1 Million in business almost immediately when meetings and live events began to cancel. I wanted to see how they were thinking in challenging times. These successful people responded honestly and openly to our questions. Their mindsets were surprisingly consistent. The approach they have to this pandemic is something I believe we can all learn from. Here are some thoughts;

The biggest challenge we have living with Covid-19 is our thinking, Hall of Fame Speaker Willie Jolley told us. When we change our thinking, we change our life. The late speaker and radio personality, Earl Nightingale said, We become what we think about. Willie added, Our thinking and attitude are formed by the people we spend time with and the things we read.

One thing all of these successful people did was to give first without any expectation of receiving anything. They knew everyone was hurting in some way. They began by calling their customers and offering to help at no charge. Some had weekly Zoom sessions where they brainstormed solutions or just listened.

Successful people are experts and thought leaders in their space. They are trusted advisors who share their expertise. These individuals challenge people to think. They get paid for their ability to think and to go beyond the obvious. They believe certainty is an illusion. They dont panic in a crisis. They lead.

They know how to refocus and evolve. When the old way is doesnt work find a new way. Their businesses are growing again. Successful people are;

Positive thinkers

Readers

Givers, who give first without expecting something in return

See opportunity even in a crisis. They believe there is always opportunity if we look.

Dont blame. They know that is a waste of time.

Experts in their space and thought leaders.

Exceptional communicators

We are each capable of all of these qualities, if we change our thinking and believe we are capable. How are you thinking? Anything is possible.

Greg Kozera, gkozera@shalecrescentusa.com is the director of marketing and sales for Shale Crescent USA. He is a professional engineer with a masters in environmental engineering who has over 40 years experience in the energy industry. He is the author of four books and numerous published articles.

Today's breaking news and more in your inbox

See more here:

What and how are you thinking? Anything is possible - Martins Ferry Times Leader

Posted in NSA

TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law – Security Boulevard

Last week, President Donald Trump threatened to ban the popular social media platform TikTok, whose corporate owner is a Chinese company with alleged ties to the Chinese Communist Party. Trumps stated grounds for seeking to ban the popular application was that the app threatens U.S. national security. But exactly how?

I must confess Im not a regular user of TikTok, but my adult children are. TikTok, which has several billion subscribers, allows users to create and share short videospeople impersonating president Trump, dog and cat videos, etc.ranging from the benign to the puerile. So how is it that the application threatens national security?

The short answer is dataor more significantly, data privacy. Or, even more significantly, the unenforceability of data privacy policies.

Tik Tok, like almost every other social media and internet application, collects data on massive numbers of subscribers. It knows who they are, what they like, what they dislike, what they post and what they view. It also knows where they are when they are using the app (and often when they are not), what their IP address is, what kind of browser or phone they are using and a host of other details. Its customers are its product.

Like every other social media platform, TikTok has a privacy policy that purports to set out what data the company may collect, with whom it may share the data and how it can use the data. Nothing in the Tik Tok privacy policy says it can share, give or analyze subscribers data for the benefit of the Chinese Communist Party. It doesnt say, We may give any and all of your information to our Chinese Army overlords, who may use this to target you and your family as an American imperialist pig-dog It doesnt say, By using TikTok you agree that the Chinese Communist Party can know your sexual orientation and may use this and other knowledge to blackmail you should you ever pose a threat to the great leader But then again, nothing in the privacy policy says that TikTok cant. At least not explicitly.

As a result, a number of privacy class action lawsuits alleging that TikTok violates the federal Childrens Online Privacy Protection Act (COPPA) have been recently consolidated into one single class action suit in the Northern District of California. The lawsuits allege that TikTok sends users data (including those of minors) to China. TikTok says that its servers are in the U.S., but also notes that the company can transfer data to Beijing, if it so chooses, without breaking any laws. As TikToks responsive pleading in the class action case noted, [t]he Apps privacy policy also fully discloses that user data will be shared with TikToks corporate affiliates and third-party business partners and service providers, as is standard with free social networking apps that have a business model based on advertising.

In fact, TikToks privacy policy is similar to those of Facebook, Twitter, WeChat and other social media outlets or short content providers. It provides general platitudes about only sharing data with business partners and only to help provide services and enhancements and to customize content and to infer information about you Like other providers, TikTok says, We may disclose your information to respond to subpoenas, court orders, legal process, law enforcement requests, legal claims, or government inquiries, and to protect and defend the rights, interests, safety, and security of TikTok Inc., the Platform, our affiliates, users, or the public. We may also share your information to enforce any terms applicable to the Platform, to exercise or defend any legal claims, and comply with any applicable law.

Again, on the surface, its pretty anodyne stuff. So why the national security tag? I mean, does information about dogs in pajamas really threaten to bring down the worlds longest-lasting democracy?

The short answer has little to do with the fact that TikToks parent company is Chinese-owned and has more to do with the power of informationparticularly personal information. Information about peoples likes and dislikes, members of their family, facial recognition, travel, location, politics, finances, sexual orientation, friends, education, employment, search history and intimate connections are the kinds of things that used to take months or years for spies to collect and cultivate. Now its a few mouse clicks away. It is rife with potential for misuse and abuse. In fact, its often impossible to tell the difference between appropriate and inappropriate use of such data. Lets face it, you are being surveilledmaybe by Facebook, maybe by Proctor & Gamble, maybe by the Coca-Cola Co., maybe by the Chinese Communist Party. And you are making it very easy to be surveilled. You post on Facebook, you share on LinkedIn and you tweet. And, if you are below a certain age, you use TikTok.

What distinguishes TikTok, at least in the opinion of the U.S. government, is not the information the company collects, stores, processes or shares. Its not the aggregation, analysis and slicing and dicing of that information. Its not the intimate profiling and use of the analyzed data or even the sharing of that data. And, its not that there is not something called a privacy policy that governs the collection and use of that data.

Its that because TikToks parent corporation is Chinese, we dont believe the company will adhere to its privacy policy, and, if it doesnt, we have no effective remedy. Therefore, we have to assume (well, we say we have to assume) that everything collected and shared by TikTok is simultaneously shared with the Chinese Ministry of State Security (MSS). Just as Europeans may assume that everything collected or stored by U.S. companies or cloud providers is simultaneously shared with the NSA. It doesnt matter whether it is true or not; it is perceived to be true, and that makes it a national security concern. Same for Huawei and ZTEthe U.S. government assumes that these entities are agents of the Chinese Communist Party acting on behalf of their government overlords. In fact, it was a perception that the NSA can compel U.S. companies to produce dataparticularly mass data about non-US personsthat lead an EU court in July to rule that the U.S./EU commercial data-sharing agreement known as Privacy Shield was unenforceable.

Using data as a weapon is nothing new. Scraping and analyzing data can help intelligence agencies profile and target people for recruitment or intimidation. LinkedIn and Indeed can be used to gather information about people with high-level security clearances. Facebook and Twitter and other social media can be the source for massive facial recognition programs such as Clearview AI. Under current U.S. law, most of this data is entitled to little if any legal protection, provided that the anodyne and amorphous privacy policies can be said to provide some modicum of notice to the data subjects that their data is being collected and that it might be used. It is that issue that needs to be addressed: a firm and unshakable commitment to protect the privacy of social media information. With openness and completeness.

Frankly, reading TikToks privacy policy, I have NO CLUE whatsoever what it does with subscribers information, with whom it shares that information and for what purpose, and I read privacy policies for a living. The best I can say is the company collects a lot of data and shares it with anyone that helps with TikToks business model. And at least that part is true whether it is owned by ByteDance or Microsoft.

Recent Articles By Author

Go here to see the original:

TikTok and National Security: The Need for a Comprehensive U.S. Privacy Law - Security Boulevard

Posted in NSA

Buhari to overhaul the nation’s security apparatus, says NSA – TheCable

President Muhammadu Buhari is planning a complete re-engineering of the nations security apparatus, according to Babagana Monguno, national security adviser.

Monguno broke the news to state house correspondents after a security briefing on Tuesday.

The president, according to Monguno, told service chiefs at the briefing that their effort is not good enough.

Monguno said since the issues are operational, Bashir Magashi, minister of defence, is working on something and will likely give a new direction to the security agencies in the days to come.

He said Buhari told the service chiefs that Nigerians have lost confidence in the security sector but he is determined to restore that confidence.

The president is angry over the declining security situation. At the last meeting, he mentioned it, Monguno said.

What he said today is virtually a reaffirmation of what he said the first time. Yes Mr President said you are doing your best, as far as Im concerned, but theres still a lot more to be done. Im more concerned about the promise we made to the larger Nigerian society and I am ordering an immediate re-engineering of the entire security apparatus.

This is something that I believe will be done in a very short time, but I just want us to keep hope alive.I know how everybody feels, I know how Nigerians feel, definitely the president is not oblivious of the fact that securing the nation is a primary responsibility of government and I believe in his sincerity, but again, since hes not an octopus, since hes not a spirit, if he delegates to people, then the onus is on them to actually fulfil the legitimate expectations of the larger Nigerian society.

There have been complaints over the widespread insecurity in the country, with many asking the president to fire the service chiefs.

On Monday, governors said they were planning to meet with the president over the rising insecurity in the country.

They also said the attack on the convoy of Babagana Zulum, their Borno counterpart, is an indication that the country is not safe.

Boko Haram insurgents had opened fire on the convoy of the Borno governor in Kukawa local government area last week.

Read more:

Buhari to overhaul the nation's security apparatus, says NSA - TheCable

Posted in NSA

Trump quashed report section showing Russia is helping him win 2020 – Business Insider – Business Insider

Last year, President Donald Trump's administration tried to pressure intelligence agencies to delete part of a classified report that found Russia was trying to help him win the 2020 election, according to an investigation by The New York Times Magazine.

The report, known as a National Intelligence Estimate, was compiled by the Office of the Director of National Intelligence (ODNI) in July 2019 and made several "key judgments" about matters of national security. "Key Judgement 2" in the report concluded that Russia aimed to interfere in the 2020 election to help Trump, unnamed national security sources told Times reporter Robert Draper.

Trump was reportedly unhappy with that finding. He has repeatedly denied the assertion that Russia tried to help his campaign in 2016 despite reports from the FBI, CIA, NSA, Justice Department, and Republican-led Senate Intelligence Committee that supported that conclusion. Russian President Vladimir Putin has similarly denied interfering in the 2016 election, but has also said he wanted Trump to win.

When the ODNI was finalizing last year's report, Trump administration staffers requested that it remove language in "Key Judgement 2" that detailed Russia's attempts to help Trump in 2020, former director of national intelligence Dan Coats told the Times.

"I can affirm that one of my staffers who was aware of the controversy requested that I modify that assessment," Coats said. "But I said, 'No, we need to stick to what the analysts have said.'"

Shortly after that exchange, Coats was surprised to learn that Trump was forcing him into early retirement. He was first made aware of the news when Trump tweeted that Coats' last day as DNI would be August 15 months before Coats planned to retire.

After Coats' departure, the National Intelligence Estimate was published with softer language describing Russia's potential motivation for interfering in the 2020 election. Instead of directly concluding that Russia wanted Trump to win in 2020, the report was updated to state that "Russian leaders probably assess that chances to improve relations with the US will diminish under a different US president."

The changes were made, according to an email reviewed by the Times, following edits by Beth Sanner, an ODNI official who presents President Donald Trump's daily national intelligence briefings.

The episode is part of a broader conflict between Trump and US intelligence communities, Draper reported. After a yearslong FBI probe into possible ties between the Trump campaign and Russia, Trump's Republican allies in Congress are now pushing an investigation into whether the FBI overstepped its authority.

Link:

Trump quashed report section showing Russia is helping him win 2020 - Business Insider - Business Insider

Posted in NSA