A discovered malware sample uses code from the NSA and a Chinese hacking group – CyberScoop

Written by Shannon Vavra May 7, 2020 | CYBERSCOOP

Good hackers steal, great hackers borrow.

According to new research from ESET, a code obfuscation tool thats been linked to Chinese-based hackers has been used in tandem with an implant that has been attributed to Equation Group, a hacking faction that is broadly believed to have ties to the National Security Agency.

ESET says the obfuscation tool is linked with Winnti Group, while the implant, known as PeddleCheap, appeared in an April 2017 leak from the mysterious group known as theShadow Brokers.

Its unclear if the sample was used in a malicious campaign or if its the product of a security researcher experimenting with different tools,according to Marc-tienne Lveill, a malware researcher at ESET. It was uploaded to malware-sharing repository VirusTotal in 2017, according to Lveill.

The Winnti-linked packer was used in a series of intrusions at gaming organizations in 2018, which ESET has previously documented.

ESET published its findings in the hopes that some other researchers may have more visibility into the samples origins, Lvill told CyberScoop.

Its not clear who is behind the sample its possible Equation Group used the Winnti-linked portion to run its own intelligence collection, but it is also possible Winnti, which is suspected to have links with the Chinese government, used the leaked NSA implant for its operations.

Lveill said he views the latter as the likely explanation.

It is likely that the Winnti Group used tools from the Shadow Brokers leak as a first stage to compromise their victims in 2017. Another, less likely, scenario is that the Equation Group has seen and reused the Winnti Group packer in their operations, Lveill told CyberScoop. Yet another, even less-likely scenario is that a thirdparty who had access to this Winnti Group [tool], used it with PeddleCheap from the Shadow Brokers leak.

The malware combination shows the far-reaching ramifications of the Shadow Brokers leak: attributing attacks via tools that were used in the massive dump is much moredifficult, as any number of actors can use them to muddle up security researchers findings.

These samples are an example of how attribution is difficult, if not impossible, by looking only at malware samples without additional context. It is relatively easy to repurpose malware [artifacts] once they are discovered and documented, Lveill told CyberScoop. In addition to that, it is possible intelligence agencies discover these components before they are public knowledge, misleading attribution made by analysts later on.

While the actors behind the Winnti-PeddleCheaptool may be unknown, Chinese hackers had access to some other tools that appeared in the Shadow Brokers leak months before the Shadow Brokers revealedthem to the public.

It remains unclear if that group, known as Buckeye orAPT3, stole the tools by breaching NSA systems or if they caught them in the wild. It is also possible the Chinese hackers independently observed the same vulnerabilities and created similar tools to exploit them.

View post:

A discovered malware sample uses code from the NSA and a Chinese hacking group - CyberScoop

Posted in NSA

FISA Surveillance and Possible Reforms Are Back on the Senate’s Agenda – Reason

Next week the Senate is poised to resurrect some federal surveillance powers that expired in the midst of the coronavirus pandemic. A handful of senators are hoping to force through reforms to better protect Americans' privacy.

In March the USA Freedom Act expired, somewhat unceremoniously, as lawmakers were unable to reach a consensus on a renewal as the pandemic began to pick up steam and overtake all public policy priorities.

The USA Freedom Act authorized (but restricted) the collection of Americans' phone and internet record metadata that the National Security Agency (NSA) had been gathering without citizen knowledge before Edward Snowden exposed it. A compromise bill, the USA Freedom Act added some buffers to how the NSA would collect the data and required more reporting of the activities of the Foreign Intelligence Surveillance Act (FISA) courts, so citizens would have a better sense of the extent that this "foreign" surveillance was in fact targeting Americans.

The NSA has since abandoned the metadata collection, which had proven ineffective at tracking down terror threats even as it violated Americans' Fourth Amendment rights. But the Act has other surveillance components (authorizing roving wiretaps, tracking so-called "lone wolf" terrorists). And even though the NSA has stopped using its metadata collection powers, President Donald Trump's administration has asked for the entire USA Freedom Act to be renewed, intact, permanently.

Fortunately, that's not going to happen: The House passed a renewal bill in March that officially killed off the records program once and for all. Now surveillance critics in the Senate, such as Rand Paul (RKy.), Mike Lee (RUtah) and Ron Wyden (DOre.), are pushing for further reforms to the way the government targets American citizens for secret surveillance. Their demands for amendments to the House's bill stopped the bill from moving forward in March. Now the Senate plans to consider the House's bill along with these proposed amendments.

The USA Freedom Act played no role in the FBI's use of the FISA court to secretly wiretap former Trump aide Carter Page. But the discovery that the FBI played fast and loose with the truth when requesting these warrants from the FISA court, and the subsequent evidence that the FBI regularly does a terrible job of documenting its evidence when targeting any Americans for FISA surveillance, have created an opening for civil libertarians to call for stronger privacy protections.

The Hill reports:

Sen.Rand Paul (RKy.) will get a vote on his amendment that would bar the FISA court from issuing warrants for American citizens and instead require law enforcement agencies such as the FBI to obtain a warrant from a normal court established under Article III of the Constitution.

Sens.Mike Lee (RUtah) and Patrick Leahy (DVt.) will get a vote on their amendment to require the appointment of amicus curiae, or outside advisers, with expertise in privacy and civil liberties to advise the FISA court on surveillance warrants.

Sens.Steve Daines (RMont.) andRon Wyden (DOre.) will get a vote on an amendment to bar law enforcement from obtaining internet browsing and search history without a warrant.

These are all great amendments. Unfortunately, they will probably fail. Far too many lawmakers on both sides of the aisle are against serious surveillance reforms.

Senators like Paul are banking on Trump's outrage over what happened to Page to push these additional reforms through. Establishment Republicans and Democrats are banking on Trump only caring about how surveillance affects him and the people around him.

We'll soon find out which side is correct. My money's on the establishment, but I'll be happy to be wrong this time.

Originally posted here:

FISA Surveillance and Possible Reforms Are Back on the Senate's Agenda - Reason

Posted in NSA

Little League, city softball, others still in holding pattern – Midland Daily News

Sports fans have been without any games to watch since mid-March. Unfortunately, as May hits full stride, the only game in town is still the waiting game.

Local sports organizations admit that, until Gov. Gretchen Whitmer's stay-at-home order is lifted, it is nearly impossible to plan too far ahead. And as the days continue to pass by, the prospect of holding spring and even summer sports grows increasingly uncertain.

As Northeast Little League (NELL) President Nick Kroll noted, at some point it becomes prudent to just throw in the towel.

"We've kind of posed June 1 as sort of a drop-dead cutoff (for starting a season)," Kroll said, adding that he doesn't wish to have a Little League season extend so far into summer as to infringe on families' vacation time.

"If we're still juggling stuff by the end of May, we're probably just going to (cancel the season)," he said. "We would want to give our members a full product, and if we can start by the end of May or June 1, we could run out a full regular season and still allow people to have a little time off before football starts."

Kroll said earlier this week that NELL had tentative plans to start practicing on its fields around May 18. Now, following the extension of Whitmer's stay-at-home order -- which includes a prohibition on gathering in public places, including sports practices and games -- through at least May 28, the possibility of getting in a full Little League regular season seems less likely than it did only a few days ago.

"We're sort of at the mercy of what the government says," Kroll admitted. " ... I want to play baseball, and a lot of the kids do, too, but we're not going to supersede any kind of guidance (from the state and local governments)."

Kroll said he has been receiving regular updates from Karen Murphy, director of public services for the City of Midland, on how to proceed.

Kutchey Landscaping's Nate Schultz takes a swing during the June 17, 2019 major city championship game.(Daily News file photo)

Kutchey Landscaping's Nate Schultz takes a swing during the June 17, 2019 major city championship game.(Daily News file photo)

Kutchey Landscaping's Nate Schultz takes a swing during the June 17, 2019 major city championship game.(Daily News file photo)

Kutchey Landscaping's Nate Schultz takes a swing during the June 17, 2019 major city championship game.(Daily News file photo)

Little League, city softball, others still in holding pattern

"It's really contingent on what Karen says and what the governor says," Kroll noted. "My guidance, right now, is coming from Karen. With our fields right in the heart of a city park, we're going to abide by what she says."

Murphy, likewise, said that her hands are pretty much tied when it comes to giving Little League the OK to start practicing or playing.

"The city is following directions from the governor. We're watching the executive orders closely, and we will follow whatever lead we get from there," she said. " ... We really don't have any plan as of yet. We're following whatever the governor's executive orders say. She has supported outdoor recreation as long as people practice social distancing, but as far as a full-phased approach (to starting team sports), we're not quite there yet.

"We're just getting our direction from Lansing and seeing what we'll be able to do," she added. "The social distancing will be a key piece. I think it'll be difficult to social distance if you're participating in a team sport."

Dan Reimer, president of Fraternal Northwest Little League, pointed out that the 2020 Little League World Series and state tournaments have already been cancelled, although he, like Kroll, hopes eventually to have some sort of regular season, even if on a casual level.

"We may end up doing a sandlot type of season with a relaxed atmosphere just to get the kids on the field. We'd still have uniforms and umpires, but it would be more relaxed, kind of like an instructional league just to give the kids some fun and get them out of the house," Reimer said, while adding, " ... But they might say we're stuck (having to social distance) until August, and we'll have to follow whatever we're told."

Like Kroll and Murphy, Reimer said that Fraternal Northwest can really do nothing but wait and see what transpires next.

"I'm just waiting for direction from Little League International and our district board of directors. I'm going to follow their lead," he said. " ... I really don't have any answers. We just have to wait and see what Little League wants to do.

"If they say go ahead and do a modified season in July or August, we'll gauge the level of interest and go from there," he added. "If we have enough kids who want to play ball, we'll definitely look into a modified season."

Meanwhile, Marcie Post, recreation manager for the City of Midland's Parks and Recreation Department, said she wants to be "optimistic" about the possibility of beginning city-run outdoor activities this summer, including adult and girls' softball leagues, beach volleyball, swimming at Plymouth Pool, and Tunes by the Tridge, among many others.

"We've got people who are ready to play beach volleyball and softball," Post continued. "People are still optimistic, because they keep (signing up their teams). Our rec department is really optimistic about it."

But, again, it all comes down to what the state government will and will not allow. Post said she is hopeful that the governor will soon offer guidance regarding outdoor recreation for the summer.

"We haven't made any decision at all (about summer recreational activities)," Post said. "We're waiting for guidance from the governor. ... We'll wait and see what the governor says, and we'll start making recommendations based on that.

"Summer in Michigan doesn't last forever," she added. "We need to start making a decision on these sorts of things."

In the meantime, Post said that the Michigan Recreation and Park Association, also known as MParks, has been a good resource for sharing ideas.

"The great thing is we have a strong connection with MParks, so we're in contact with other municipalities in Michigan," Post said. "We're looking at each other's opening plans, and we're trying to get our facilities open safely for our communities."

Plymouth Pool, which is operated by the city, was originally scheduled to open on Saturday, June 13, but Post said that date is now up in the air, as is the time when Kiwassee Lake at Stratford Woods Park might be opened for swimming.

The Midland Softball Association (MSA) has extended its deadlines for team registration to May 22 for slowpitch and to May 27 for fastpitch and modified pitch.

MSA President Steve Warner posted a long letter on the MSA's Facebook page on Thursday, part of which read:

"Softball without high-fives amongst teammates, without the base coaches' congratulatory fist bump, without good-game lines at the end of the game, and without ... the enthusiastic guy or girl greeting the defense coming off the field just doesn't feel like softball, but it may be our new normal. So, rest assured, while the world tries to navigate living and operating in this manner, we will do what is in the best interest of our members and with the right guidance from the national and state governments and governing bodies."

Post is hopeful about the prospects for the weekly Walk Midland program, which involves free weekly two-mile walks with other members of the community. They are scheduled to take place from June 1 through mid-July.

"I think we have found a way to socially distance that (program), as long as the governor's orders (allow the program to proceed)," Post said. "I feel like that's a really important one to get going because of the emphasis on health and wellness right now."

In terms of the City of Midland parks, Post said that all parks are still open, but the playground equipment remains off limits due to the risk of the coronavirus spreading through that equipment. She said that is the case with many playgrounds around the state and around the country.

With construction now allowed to resume in Michigan as of Thursday, Post said work should begin by mid-May on two city park projects: new outdoor pickleball courts in Central Park near the Greater Midland Community Center, and an extensive renovation of Grove Park, which the Midland Rotary Club is helping to sponsor.

Construction of a $1.6 million Miracle Field in Central Park is also expected to begin soon. It will be a fully accessible soft-surface baseball field for athletes of all ages with physical and cognitive disabilities. The original plan was for the first game to be played there in September.

Although the bulk of their seasons are played during the summer and not in the spring, American Legion Baseball programs and travel softball and baseball programs are also starting to feel the time crunch, as Whitmer's stay-at-home order continues to keep teams from practicing together.

With the American Legion postseason, including playoffs at the zone, state, regional, and national levels, already cancelled, Berryhill Post 165 manager Steve Cronkright said he would still like to see at least a more relaxed, modified version of a baseball season implemented, similar to what Reimer has suggested for Little League players.

"We're probably not going to be able to do anything until mid-summer. Some of the ideas we've had include having each high school (in the immediate area) have their own teams, and we (Berryhill) would supply the umpires and groundskeepers. That way, we'd at least get some ballgames in," Cronkright said. " ... But it's so up in the air right now. We don't know yet if we can even get together."

Cronkright didn't rule out the possibility of Berryhill playing in some or all of its scheduled tournaments, including the annual Gabby Mills Fourth of July Invitational, which Post 165 hosts every year.

"It depends on when we can get together. If we can get a couple of weeks of practices in -- and we've already paid for the tournaments -- then we'd like to (play the tournaments)," he noted. " ... The way it sounds, it may be close to mid-July before we can do stuff like that. But in the last couple of days, things have changed a lot, so you never know."

On the travel softball front, Midland Line Drive Express President Doug Hill indicated in an email to the Daily News that his organization is still planning to host four big tournaments at Redcoats Softball Complex in the weeks ahead: the NSA Spring Slam either May 23-24 or May 30-31, which would draw over 20 teams; an NSA 12U Class A and B state tournament June 19-21, which would draw over 40 teams; an NSA 14U Class B state tournament June 26-28, which would draw over 45 teams; and the annual Line Drive Grand Slam tournament July 10-12, which would draw over 70 teams.

Hill did not indicate whether or not the Line Drive organization intends to send teams to tournaments in other parts of the state.

For his part, Midland Lady Explorers President Charles Keeley said that his organization plans on participating in tournaments this summer, although there is some hesitance among players and parents about traveling to certain parts of the state which have been hard-hit by the coronavirus.

"Overwhelmingly, the girls and parents want to play ball, but there is some concern with traveling downstate to some of the areas that have been impacted more severely than the Tri-Cities area," Keeley said, noting that the Lady Explorers organization has already had seven early-season tournaments cancelled and will lose another six tournaments in May.

" ... For the remainder of the season, we are planning on playing in our regularly-scheduled tournaments, and there is going to be an extension of the season with tournaments being added in late July and August to make up for the early-season tournaments that were cancelled," he added.

Keeley said that Lady Explorers is keeping a close eye on what is transpiring around the state in regard to the coronavirus and that his organization has a few other events in the works.

"There has been discussion about playing some local scrimmages with other local travel softball organizations. We're also planning a Rise Softball Showcase event with (former U.S. National Team catcher) Jeff Nowaczyk in June to create player profiles and recruiting videos for our girls who are looking to play at the next level," Keeley said.

"Overall, we are very optimistic that we'll be playing ball this summer," he added.

"We just are not 100-percent sure what that will look like yet."

See the article here:

Little League, city softball, others still in holding pattern - Midland Daily News

Posted in NSA

Operation Jackboot: NSA Ajit Dovals brainchild that eliminated Hizbul Mujahideen chief Riyaz Naikoo – Times Now

'Operation Jackboot' claims its last high value target in killing of Riyaz Naikoo.  |  Photo Credit: IANS

Srinagar:The elimination of Hizbul Mujahideen terrorist Riyaz Naikoo on Wednesday by security forces has raised an alarm for Pakistan-based terror sponsors in the Jammu and Kashmir who propagate anti-India sentiments to destabilise peace in the Valley.

However, the execution of Naikoo was a meticulously planned operation, conceived by none other than National Security Advisor Ajit Doval.

Code named Operation Jackboot, the task to hunt down one of the most wanted terrorists in the Valley was supervised personally by NSA Doval. Naikoo was the last high-value target in the operation.

The operation was conceived after Pulwama, Kulgam, Anantnag and Shopian in south Kashmir were christened Liberated areas by Pakistan-backed militants.

Homegrown militancy was getting on the nerves of Indias security forces.

Naikoo, aka Bin Qasim, had become the de facto commander of the proscribed terrorist outfit Hizbul Mujahideen after Burhan Wani, the poster boy of terrorism in Jammu and Kashmir, was eliminated in July 2016.

Qasim, rated as an A++ category terrorist or most-wanted militant, had been on the run for over eight years and carried a bounty of Rs 10 lakh on his head.

The encounter of Burhan Wani sparked a massive uproar in the Valley and the ripple effects were felt as far as Islamabad. Locals look out a funeral procession for Wani and the subsequent violence that erupted in the Valley is still fresh in our minds.

Naikoo was counted as one from the Burhan group of Kashmiris.

The group consisted of Wani and his terror associates Sabzar Bhat, Waseem Malla, Naseer Pandit, Ishfaq Hameed, Tariq Pandit, Afaqullah, Adil Khandey, Saddam Paddar, Wasim Shah and Anees, news agency IANS reported.

These locals became poster boys of militancy in Kashmir and such was their authority, foreign terrorists were pushed to the background.

The Burhan gang of terrorists romanced the picturesque Himalayan region and seduced the educated, yet unemployed, youth of the Valley with a new-found objective in their lives.

Read more:

Operation Jackboot: NSA Ajit Dovals brainchild that eliminated Hizbul Mujahideen chief Riyaz Naikoo - Times Now

Posted in NSA

Covid-19 different from Tiananmen, China wont be able to tide over crisis: Ex-NSA Menon – ThePrint

Text Size:A- A+

New Delhi: China will not be able to tide over the coronavirus crisis like it did with the 1989 Tiananmen Square episode, former National Security Advisor (NSA) Shivshankar Menon said Wednesday, adding that the impact of Covid-19 will continue to simmer leading to a huge reputational loss for China as well as other countries.

This is going to simmer, this is not like Tiananmen. This is a very different situation, Menon said. Its a huge reputational loss for China. Bigger the country, the bigger the loss of reputation. The Chinese have developed a reputation over the years, which now has been turned against them. Reputation will be used as a stick to beat China with.

Menon, who is also a former foreign secretary, was speaking at an online seminar hosted by the Institute of Chinese Studies (ICS). ThePrint was the media partner for the seminar Looking at Post-COVID World: The China Dimension.

According to Menon, who is also chairman of the ICS advisory board, the pandemic has also shown the nervousness with which governments and leaders around the world have dealt with the massive crisis, be it in their individual capacities or at the multilateral stage of the G20 or the UN.

If you look at the level of rhetoric, the shriller the rhetoric, the higher the claims of victory the more it sounds to me that they (world leaders) are really nervous, that they really dont know what they are doing, Menon said.

There is a shouting match that is going on between the leaders now. They are not working together. You saw the G20, you saw the UNSC, they are not managing to work together.

Also read:Pressure mounts on India to call out China for Covid as it readies to take lead role at WHO

On the growing tensions between the US and China, especially over the origin of the virus, Menon said the problems between these major powers had been rising even before the outbreak of the pandemic.

He, however, added that the US narrative on the origin of the virus will continue to rage until the US presidential elections scheduled to take place in November this year.

I think we need to wait until the US elections There is a bipartisan consensus in the US on China and it is much harsher than it has been for a very long time. So no matter what happens in the US elections there is no going back, the former foreign secretary added.

Menon also said despite these rising tensions between Washington and Beijing, both will find it painful to decouple themselves from their economic bonding.

Lets not forget they are also tied to each other like the Siamese twins on the economic side and that decoupling will be really painful for both of them. There will come a time when they will follow their economic interests, he added.

Also read:Modi had turned his back on NAM and SAARC. Covid brings them back on his table

Comparing the pandemic with the 2008-09 financial meltdown crisis, Menon said, Unlike in 2008-end and the beginning of 2009 when for most of the powers, their leadership was secure, they knew they were either going to be there or that they were not going to be there and so they could do the right thing without any fear of any effects on their political future Today you have an issue, which frankly, the leaders dont understand there isnt a kind of scientific or expert advice that you have experience of in the economic field.

He said for India the challenge will be to see where the money goes citing the $60 billion limit that the Modi government has set for coronavirus-related relief.

Ultimately you will have to see what people do with their money. Why are we (India) running such a huge trade deficit with China? This is because Indians are spending their money in China buying things. Thats where I would look six months from now, he added.

He also cautioned against India aligning with the US or with China.

Nobody shares our interest entirely I dont see any alliance really working for us. You need to position yourself where you have better relationships with both the US and China than they have with each other, said Menon, who was also Indias former Beijing envoy from 2000-2003.

Also read:India to push for Pakistans blacklisting at FATF after Handwara & Keran terror attacks

ThePrint is now on Telegram. For the best reports & opinion on politics, governance and more, subscribe to ThePrint on Telegram.

Subscribe to our YouTube channel.

Follow this link:

Covid-19 different from Tiananmen, China wont be able to tide over crisis: Ex-NSA Menon - ThePrint

Posted in NSA

Dismay, confusion over St. Paul Park charter school’s impending closure – Bring Me The News

Natural Science Academy has about 75 students enrolled this year.

Natural Science Academy

A St. Paul Park-based charter school is facing closure after losing its authorizer.

The Osprey Wilds Environmental Learning Center, which recently changed its name from the Audubon Center of the North Woods, has chosen not to renew its contract with Natural Science Academy, citing poor academic performance and governance concerns. The Natural Science Academy had previously signed two probationary three-year contracts with them.

Osprey authorizes about 35 schools, according to its website. NSA is the only school out of the 10 up for renewal this year to not receive another contract, Erin Anderson, director of charter school authorizing, told BMTN.

The 14-year-old elementary schools website lists 11 staff members. Around 75 students are enrolled this year.

NSA staff and parents have pushed back against the decision in letters to the Minnesota Department of Education, state legislators and a widely circulated petition.

They argue that the closure is unfairly based on state test scores, but the Osprey Wilds Environmental Learning Centers correspondence to the school emphasizes poor performance according to other measures, including curriculum-based measures chosen by the school and nationally normed growth assessments. In addition, the authorizer cited concerns over the schools teacher-run leadership structure and governance.

It must be frustrating to have just been informed of this, and we are disappointed to learn that the school board did not adequately advise its community of the risk of closure, in view of the numerous communications from ACNW to the school, Anderson wrote to parents, citing notices sent to the school in May 2018 and February 2019 concerning low academic performance.

In order to be eligible for renewal, the school had to score at least 50 out of 100 points on an assessment based largely on state test scores, measures chosen by the school and nationally normed growth assessments. The school scored 60.7, making it eligible, but it didnt meet the standard for five out of eight academic categories, a March 13 notice from Osprey to NSA says.

Those five areas are reading growth, math growth, reading proficiency, math proficiency and science proficiency, based on three years worth of various measurements of academic performance.

A report from January details that Osprey received complaints against the schools lead teacher from two former employees in November 2017 and December 2019.

The complaints alleged a very stressful and negative workplace and a toxic environment of practices, according to the report.

The school has functioned under basically the same instructional leadership structure for at least the last six years (two contract periods) which has resulted in persistently low academic achievement and a lack of accountability for student outcomes, Osprey wrote in its March notice of non-renewal to the school.

At an informal hearing with Osprey in April, the school provided "ample evidence" of an improved workplace culture, Anderson said in an email. The non-renewal was ultimately based on poor academic performance and "NSA's failure to properly conduct its corporate governance," she said.

Advocates for the school have expressed confusion over the non-renewal process and surprise that the school is being closed during the pandemic.

Kate Maki, whose fourth-grade student has attended the school since kindergarten, began working at the school as a special projects coordinator two years ago.

I really like the school, I completely believe in it. And Im watching it grow and change and become this great thing, Maki said.

The school had a bad year when it was renewed in 2017, Maki said, and implemented an expeditionary learning-based curriculum the next fall.

Our last years science scores were phenomenal We were like, why are we not getting an A+ on this? she said.

She said she and other staff members had the understanding that three-year contracts were the norm.

They said, youve been on probation for six years total. And were like, well, thats always been the case So why would we even bat an eye?

"NSA is being used as a sacrificial lamb."

Harry Adler, who joined the schools board of directors in March, and has held multiple roles in education including principal, executive director of a charter school and current work helping an authorizer assess schools, expressed similar confusion.

What I find strange about it is, many of their schools are basically on probation because theyre on three-year contracts. So they call these three-year contracts probationary, and it has not been that long since the state has offered five-year contracts, he said.

In a complaint letter to the Minnesota Department of Education, Adler emphasized that comparing the schools scores to other students across the state and neighboring District 833 doesnt show an adequate representation of students academic success because of the schools small class sizes.

Thirty-nine students took the MCA tests in 2019, documents show.

Ospreys 2019 annual report shows that 15 percent of its schools had scored lower than 50 percent of their points on its academic performance evaluation, he added.

NSA is being used as a sacrificial lamb to give the perception that ACNW (Audubon Center of the North Woods)is providing strong oversight. I believe the closure decision cannot be justified analytically based on the data and is ethically wrong given the pandemic, Adler said in the letter.

MDE has said it will look into the complaint, Adler said.

Correction: A previous version of this story inaccurately described the timing of the employee complaints. In separate instances, two former employees sent a complaint to Osprey after they had stopped working there.

Continued here:

Dismay, confusion over St. Paul Park charter school's impending closure - Bring Me The News

Posted in NSA

Redmi K30 5G Extreme Edition with 48MP main camera to arrive on May 11 – Gizchina.com

Today, Redmi announced that it will hold a new launch event on May 11. The company will unveil the Redmi K30 5G Extreme Edition at the launch event. This will be the first time that Redmi is collaborating with Jingdong to release a customized version of the phone. We probably know that this smartphone is a derivative of the Redmi K30 series. The official poster shows that the Speed Edition uses a dual punch-hole full screen. This device is probably the same as the lower version of Redmi K30 5G which was previously rumored to be the Redmi K30i.

The Redmi K30 5G Extreme Edition comes with a 48MP main camera. This is lower than the 64MP main camera on the regular version. With this reduction, the K30 5G Speed Edition will most likely cost less than the regular version. This means that we will have a 5G smartphone that will sell for less than 1999 yuan ($282). It will certainly be the cheapest 5G device in the market for now.

There have been speculations that this device will sell for 1799 yuan ($254). Considering that the regular version sells for 1999 yuan ($282), we can not rule out this possibility. We are only sure that it will sell for less than $282. However, the exact price tag is not known for now.

In terms of core configuration, the Redmi K30 5G Extreme Edition features a 120Hz full screen, FHD+ screen resolution, Qualcomm Snapdragon 765G mobile platform, SA, and NSA dual-mode 5G support, and a 4500 mAh battery capacity with 30W flash charging.

Its worth noting that in addition to the Redmi K30 5G Extreme Edition, Redmi also has a new 5G phone in the Redmi Note 10 series (tentative). Recall that the general manager of Redmi, Lu Weibing said that an upcoming Redmi phone will use MediaTeks Dimensity 800 SoC. This chip is MediaTeks mid-range chip for the 5G market. It also supports SA/NSA dual-mode 5G.

The rest is here:

Redmi K30 5G Extreme Edition with 48MP main camera to arrive on May 11 - Gizchina.com

Posted in NSA

The FBI Set Flynn Up to Preserve the TrumpRussia Probe – National Review

Michael Flynn at the White House, February 1, 2017.(Carlos Barria/Reuters)Perjury trap was not score-settling. To investigate the president, it was a practical necessity to sideline his chosen national-security adviser.

Michael Flynn was not the objective. He was the obstacle.

Once you grasp that fundamental fact, it becomes easier to understand the latest disclosures the Justice Department made in the Flynn case on Thursday. They are the most important revelations to date about the FBIs TrumpRussia investigation, code-named Crossfire Hurricane.

The new disclosures, in conjunction with all we have learned in the last week, answer the all-important why question: Why was Flynn set up?

The answer to the what question has been clear for a long time: The FBI set a perjury trap for Flynn, hoping to lure him into misstatements that the bureau could portray as lies. In the frenzied political climate of the time, that would have been enough to get him removed from his new position as national security adviser (NSA), perhaps even to prosecute him. On that score, the new disclosures, startling as they are to read, just elucidate what was already obvious.

But why did they do it? That has been the baffling question. Oh, there have been plenty of indications that the Obama administration could not abide Flynn. The White House and the intelligence agencies had their reasons, mostly vindictive. But while that may explain their gleefulness over his fall from grace, it has never been a satisfying explanation for the extraordinary measures the FBI took to orchestrate that fall.

Concealing Information as It Relates to RussiaTo understand what happened here, you have to understand what the FBIs objective was, first formed in collaboration with Obama-administration officials. That includes President Obama, Vice President Biden, and Flynns predecessor, national-security adviser Susan Rice, with whom then-Acting Attorney General Sally Yates and then-FBI director James Comey met at the White House on January 5, 2017 smack in the middle of the chain-of-events that led to Flynns ouster. Recall Rices CYA memo about the meeting: President Obama said he wants to be sure that, as we engage with the incoming team, we are mindful to ascertain if there isany reason that we cannot share information fully as it relates to Russia (emphasis added). Rice wrote those words on January 20, at the very time the FBI was making its plan to push Flynn out.

The objective of the Obama administration and its FBI hierarchy was to continue the TrumpRussia investigation, even after President Trump took office, and even though President Trump was the quarry. The investigation would hamstring Trumps capacity to govern and reverse Obama policies. Continuing it would allow the FBI to keep digging until it finally came up with a crime or impeachable offense that they were then confident they would find. Remember, even then, the bureau was telling the FISA court that Trumps campaign was suspected of collaborating in Russias election interference. FBI brass had also pushed for the intelligence community to include the Steele dossier the bogus compendium of TrumpRussia collusion allegations in its report assessing Russias meddling in the campaign.

But how could the FBI sustain an investigation targeting the president when the president would have the power to shut the investigation down?

The only way the bureau could pull that off would be to conceal from the president the fullness of the Russia investigation in particular, the fact that Trump was the target.

That is why Flynn had to go.

President Trump was a political phenomenon but a novice when it came to governance. He was not supported by the Republican foreign-policy and national-security clerisy, which he had gone out of his way to antagonize in the campaign. The staff he brought into the government consisted mainly of loyalists. There were some skilled advisers, too, but their experience was not in the national-security realm.

The exception was Flynn. The former head of the Defense Intelligence Agency knew how the spy agencies worked. He knew where and how they kept secrets. He had enough scars from tangles with the intelligence bureaucracy that he knew how the game was played how intelligence officials exploited information, or selectively withheld it.

Someone as smooth as Director Comey might be able to dissuade President Trump from inquiring too deeply into the Russia investigation. Trump would be satisfied as long as Comey kept assuring him not to worry because the bureau was not investigating him personally even though it was. The unseasoned Trump staff would also be easy to brush back: Just tell them that the FBI was rigorously independent, and that if the White House poked around too much, Trump staffers would be accused of political meddling. The staff was green enough to be bullied into minding its own business even about the FBIs counterintelligence mission, in which the bureau is supposed to serve the White House, not the other way around.

But Flynn was different. After 33 years in the Army chain of command, the decorated former combat commander grasped that the FBI, like other executive-branch components, worked for the president. As NSA, Flynn would ensure that Trump ran the intelligence agencies, not be run by them. If Flynn wanted to know what was going on in intelligence investigations, hed be able to find out he wouldnt take Jim Comeys no for an answer. He was loyal to Trump, not to the intelligence establishment or the policy community. And he was White House staff, not a cabinet appointee i.e., he did not have to wait interminably on an iffy Senate confirmation; he would be on the job from the very first moments of the new administration, getting his arms around what the executive branch intelligence apparatus was up to.

Collusion Narrative and the Sanctions ControversyThe eleven pages of documents the Justice Department released on Thursday are a treasure trove for analysts whove followed the collusion caper. There will be time to discuss various aspects of them, particularly the matter of how disgraced former agent Peter Strzok managed to keep open the Flynn thread of the Russia investigation (Crossfire Razor) after the FBI had seemingly closed it on January 4 the day before Comeys Oval Office meeting with Obama & Co. For now, though, lets focus on that why question.

Upon the new presidents January 20 inauguration, Flynn was the matter of most immediate urgency to the FBI. That was not because the agents were trying to make a case on him. It was because he was already starting his new job as Trumps NSA.

It was also a frenzied time, with the media and Democrats pushing the collusion narrative, creating an uproar over whether Flynn had discussed anti-Russia sanctions with Ambassador Kislyak. Flynn publicly said the subject did not come up. Vice President Pence publicly backed him. But the FBI had had surveillance coverage on the Russian envoy. The bureau knew the issue of sanctions had been discussed. Though Flynn had said nothing inappropriate on the subject, its mere mention would become a huge political problem.

We do not know for sure what Flynns conversation was with Pence. Maybe he misinformed the vice-president. Maybe there was a garble (the difference between didnt come up and wasnt discussed inappropriately could easily be confused). Or maybe Pence decided it was politically expedient to back Flynns account, regardless of whether it was true. Whatever happened, such political matters would not be the business of the Justice Department and the FBI in most administrations. Can anyone imagine the Obama Justice Department and FBI getting alarmed that the president, National Security Adviser Rice, and Secretary of State Clinton were publicly saying things about the Benghazi attack that the FBI knew to be untrue?

This was the Trump administration, however, so Obama holdover officials, such as Acting AG Yates, would pose as aghast that Pence was publicly echoing Flynns misstatement. Even though they knew the misstatement was trivial . . . which explains why the FBI moved to close the Flynn investigation on January 4, after Flynns conversations with Kislyak they plainly knew Flynn was not a Kremlin mole.

More to the point, the newly revealed documents include emails between Strzok and other FBI officials from the weekend before the FBIs January 24 grilling of Flynn.

Most of the press attention has been about the planning for that grilling about how brazenly the bureau spoke of trying to get Flynn to lie, about the renegade scheme to orchestrate an interrogation of Flynn without informing the Trump White House, as protocol required. Thats significant, but it misses the bigger picture. The January 2122 emails show that the FBI did not start out with that perjury-trap plan. They ended up with the perjury-trap plan because there was no practical alternative if the bureau was to achieve its objective the withholding of information about Russia from the incoming Trump team, in order to keep the TrumpRussia investigation alive.

No AlternativeThe perjury trap was set for Flynn out of necessity. If the Justice Department had informed the White House about recordings of Flynn and Kislyak discussing sanctions, and the FBI then asked for permission to interview Flynn, the bureau knew permission was sure to be denied. Flynn would be untouchable, and free to discover the entirety of the Obama administrations extensive but secret effort to depict Trump and his minions as Russian operatives an effort the FBI was determined to keep pursuing.

If no way could be found to sideline Flynn (the way Attorney General Jeff Sessions would later be sidelined), then Flynn was going to find out about Crossfire Hurricane. He was going to be a hands-on NSA, so that was a given.

Strzok thus started out the weekend by proposing that Flynn be given a defensive briefing. This is when an official is advised that he and his cohorts are the targets of some espionage or criminal operation. Here, it would be the purported Russian infiltration of the Trump campaign and the new administration.

Understand: It is not that the FBI wanted to give Flynn this information; it is that there was no practical alternative. Under the circumstances, the FBI would have to tell Flynn directly. But that raised the question: Could it be done in a way that would scare him off, make him feel vulnerable, marginalize him?

On Saturday, Strzok started out by proposing to Bill Priestap, the bureaus counterintelligence chief, that Flynn be given a defensive briefing . . . about CROSS WIND and [redacted]. Cross Wind like Crossfire Razor and Crossfire Typhoon, another code name in the new documents appears to have been a subset of the overarching Crossfire Hurricane probe (the latter was depicted as an umbrella; underneath it were the Cross subsets such Trump campaign figures as Flynn, Carter Page, and George Papadopoulos).

Strzok conceded he was not certain that a defensive briefing was the right approach. Maybe, he suggested, such a briefing could be floated as a pretext; it would get them in the door, then theyd use the opportunity to interview Flynn i.e., to hint that he might be in legal jeopardy over his contacts with Kislyak, then pepper him with questions, hoping hed say something that compromised him. Or maybe they could just give Flynn a defensive briefing in the usual sense i.e., put him on notice, and see what he does with that. The idea would be: share a bit of information, then keep tabs on Flynn to see if he spilled the beans to the suspects. That can be an effective way of proving a conspiracy.

While the emails are heavily redacted, we can glean that the sanctions issue hung heavily. The Justice Department seemed to want to alert Vice President Pence that Flynn had misled him. Playing this out, Strzok speculated about what would happen if DOJ decided that VPOTUS or anyone else needed to be told about the [redacted] whats redacted, I suspect, is a reference to the recorded FlynnKislyak discussions. Strzok surmised that if the Trump White House were told, the bureau would lose any chance to interview Flynn. The agents might believe they needed to take an overt investigative step, such as a pretextual defensive briefing that enabled them to interrogate Flynn; but if the Trump White House had been alerted, it could specifically direct us not to. Trump would probably keep Flynn in place, and the bureau would be powerless to keep the NSA from digging into the Russia probe.

On Sunday morning, having heard Strzok out, an official whose identity is blacked out sent a heavily redacted email to Strzok and Lisa Page (FBI deputy director Andrew McCabes counsel, and Strzoks paramour). Because of Flynns NSA position, the unidentified official acknowledged, standard procedure would call for tell[ing] him about Wind and [redacted]. Yet, the official cautioned, Id be interested in letting that play out a bit before he tells them and the whole thing goes underground. Translation: Once we tell Flynn, then Flynn will tell his administration superiors, and that will derail the FBIs Trump-Russia investigation. Then, in what may be a reference to the recorded communications about sanctions between Flynn and Kislyak, the official conceded, if we usually tell the WH [White House], then I think we should do what we normally do. But the dilemma remained: Agents need[ed] to debrief or interview Razor [Flynn], but they could be told not to if the White House were given prior notice.

As the weekend wound down, FBI officials could not square the circle. Try as they might, they could not figure out a way to brief Flynn about any aspect of Crossfire Hurricane, or to alert the White House about the FlynnKislyak sanctions discussion. When game-planned, each proposal along those lines led to the virtual certainty that the bureau would be told not to question Flynn. He would keep his job, and be poised to inquire into the full extent of the TrumpRussia investigation.

Going RogueBy Monday, January 23, the FBIs top hierarchy had concluded that the only solution was to go rogue: They would approach Flynn without alerting anyone ahead of time, not even the Justice Department and certainly not the White House. It was the same reasoning theyd used in July 2016, when Comey gave his infamous press conference about the Hillary Clinton emails investigation, in violation of Justice Department guidelines: If you ask permission to do something that is against the rules, you might be told no; but if you just act audaciously, your superiors may not like it, but theyll have to accept it otherwise theyll look like theyre obstructing the FBI.

And since this was going to be their only shot at Flynn, they had to try to make it a kill shot. Theyd do a perjury trap. Flynn would be grilled about his conversations with Kislyak that had become such a media-driven controversy. But the bureau would not play the recordings for him. They would not refresh his recollection. They would not ask him to go line-by-line to help them understand the conversation. That is what they would do in a normal investigation, if they were really trying, say, to figure out what Russia was up to. The goal here was not to advance anyones understanding.

The goal was to get Flynn to lie. Not to lie so theyd have leverage to threaten a prosecution and thus pressure Flynn to reveal vital evidence hed been concealing. They wanted him to lie for the sake of lying so they could get rid of him.

To better the odds that he would agree to talk and make inaccurate statements that could be portrayed as willful falsehoods, the FBI would not tell him the purpose of the interview. Agents would not formally advise him of his rights, as they would in a normal case, even if they were dealing with a real criminal. They would just buzz him with questions about what exactly was said, in conversations that had occurred weeks before, at a time when Flynn was having hundreds of similar conversations. They would press him about what exact words had been uttered, even though they knew the exact words because they had recordings. They would try to put him in fear that they could prove the falsity of his public statements about not discussing sanctions. They would put him in fear that he could be prosecuted for violating the Logan Act (an absurd suggestion, but Flynn is not a lawyer and many commentators were discussing this moribund, constitutionally suspect provision as if it were a real crime). In the hotly partisan collusion climate of the time, they would make Flynn understand he could be framed as a sinister collaborator with Russia.

In sum, the FBI could create a scenario in which (a) Flynn might be subject to prosecution, (b) there could be grounds for terminating him, and (c) he would surely be seen as too conflicted about Russia to be made privy to details of the bureaus TrumpRussia investigation.

CheckmateThe text messages and notes disclosed in the last week show that not everyone was comfortable with this plan. Bill Priestap, the counterintelligence chief, expressed deep misgivings. The objective of the plan seemed unclear, even improper: Were they trying to advance an investigation in good faith, or just get [Flynn] to lie so we can prosecute him or get him fired? Why were they not going to refresh Flynns recollection with the recording or a transcript, as the FBI would do with similarly situated interviewees? Why did the bureau think it needed to be so aggressive with Flynn?

Strzok and Page fretted in text messages on Monday, January 23, that Priestap was not getting the picture. His protests were irking McCabe. By Tuesday morning, a few hours before the January 24 interview, the deputy director was even more frustrated because Priestap had repeated his concerns to Director Comey. If Comey wavered, the plan could be scotched.

The director did not waver. The FBIs top officials met at headquarters. Comey approved the plan to have Strzok and agent Joe Pientka visit Flynn at his office no heads-up to others at the White House would be provided. McCabe was to call Flynn to arrange the meeting, assisted by Strzok in thinking through what to tell the NSA. The idea was to put Flynn at ease make him feel like it would just be a chat between veteran national-security guys, not a criminal investigation; discourage Flynn from getting a lawyer; disabuse him of any thought of involving the White House counsel or chief-of-staff. Just a quick meeting so they could put to rest all this Russia noise in the media. No big deal.

The rest is history.

Acting Attorney General Yates was not given notice that would have triggered an obligation to alert White House counsel Don McGahn. By the time she went to see White House counsel McGahn two days later, she was in a position to say not only that Flynn had discussed sanctions with Kislyak, putting Vice President Pence in an embarrassing position; she was able to add that Flynn had been interviewed by the FBI.

Not immediately perceiving the magnitude of a revelation that the FBI had just interrogated the presidents NSA, in the White House and without getting clearance, McGahn quipped, How did he do? Yates has testified that she explain[ed] to Mr. McGahn that the underlying conduct that General Flynn engaged in was problematic in and of itself i.e., the specious Logan Act angle that Flynn had illegally consulted the Russians without notifying the Obama administration. She also fatuously claimed that Flynn could conceivably be subject to Russian blackmail as if the Russians did not assume the U.S. government had a recording of the FlynnKislyak conversation (something theyd have assumed even if it hadnt already been leaked to the Washington Post). Yates indicated that these problems with Flynns credibility and capacity to function as NSA had not been cleared up, despite the FBIs interview. As McGahn heard Yates out, he was already asking whether she thought Flynn should be fired.

NSA Flynns days were numbered. He was frozen out of anything to do with Russia. The collusion chatter went into overdrive. On February 9, the New York Times reported, based on leaks from the usual current and former American officials, that Flynn and Kislyak had indeed discussed sanctions. Four days later, the president reluctantly cashiered his chosen national-security adviser, one of few allies he had in a virulently Trump-hostile intelligence community.

With the obstacle out of the way, the objective was achieved: Flynn was gone, and the TrumpRussia investigation continued.

The rest is here:

The FBI Set Flynn Up to Preserve the TrumpRussia Probe - National Review

Posted in NSA

Keysight First to Gain Approval from 3GPP for 5G New Radio Protocol Test Cases that Support Carrier Aggregation – EE Journal

Keysights 5G network emulation solution supports the widest range of protocol conformance test cases validated by the Global Certification Forum

SANTA ROSA, Calif., May 4, 2020

Keysight Technologies, Inc. (NYSE: KEYS), a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world, announced that the company is the first to gain approval from 3GPP for 5G new radio (NR) protocol test cases that support carrier aggregation (CA) technology, using itsProtocol Conformance Toolset.

Keysights test cases were submitted on March 21, 2020 and verified by the 3GPPs RAN 5 working group, which works to establish conformance testing specifications for the radio interface of a user equipment (UE). Chipset and device makers rely on 3GPP-verified 5G NR protocol CA test cases to verify designs that use CA to increase bandwidth and support higher data rates. These test cases focus on 5G NR deployments using CA in non-standalone (NSA) and standalone (SA) mode in frequency range 1 (FR1) and FR2.

Keysight then submitted these test cases for verification at the most recent Conformance Agreement Group (CAG) #62 meeting, led by the Global Certification Forum (GCF) on April 23, 2020. There it was confirmed that Keysights Protocol Conformance Toolset maintains support for the widest range of GCF-validated protocol conformance test cases. Comprehensive test case support enables device makers to leverage Keysights common solution platform to verify designs that use different modes to address global requirements.

Keysight consistently supports the development of 5G technologies, such as carrier aggregation, enabling a connected mobile ecosystem to market devices that support advanced 5G applications, said Kailash Narayanan, vice president and general manager of Keysights wireless test group. Many mobile device makers use Keysights 5G solutions to access a comprehensive range of validated test cases for GCF certification acrossmultiple technologies, including 5G NR, LTE and C-V2X, on acommon solution platform.

Following the GCF meeting, it was confirmed that Keysights RF/RRM DVT & Conformance Toolset, part of the companys suite of 5G network emulation solutions, offers a leading number of GCF-validated 5G NR radio frequency (RF) test cases and bands. The toolset uniquely delivers GCF-validated RF test cases that enable users to verify compliance to theC-V2X standard as specified by 3GPP. As a result, the automotive industry can accelerate commercialization of connected cars and autonomous vehicles.

About Keysight Technologies

Keysight Technologies, Inc. (NYSE: KEYS) is a leading technology company that helps enterprises, service providers and governments accelerate innovation to connect and secure the world. Keysights solutions optimize networks and bring electronic products to market faster and at a lower cost with offerings from design simulation, to prototype validation, to manufacturing test, to optimization in networks and cloud environments. Customers span the worldwide communications ecosystem, aerospace and defense, automotive, energy, semiconductor and general electronics end markets. Keysight generated revenues of $4.3B in fiscal year 2019. More information is available atwww.keysight.com.

Related

Go here to read the rest:

Keysight First to Gain Approval from 3GPP for 5G New Radio Protocol Test Cases that Support Carrier Aggregation - EE Journal

Posted in NSA

Liberia: Chief Medical Officer Confirms the Investigation of Lab Technicians over ‘Leaked’ COVID-19 Results – Front Page Africa

Dr. Francis Kateh, Chief Medical Officer of Liberia says President George Weah is considered a low risk case despite his close proximity with Information Minister Lenn Eugene Nagbe few days prior to him being declared COVID-19 Positive. He said, testing for the President is a matter of choice

MONROVIA Liberias Chief Medical Officer, Dr. Francis Kateh, has confirmed an ongoing investigation involving lab technicians assigned at the laboratory of the National Public Health Institute (NPHIL) by the National Security Agency (NSA).

FrontPageAfrica recently gathered that several lab technicians and researchers are being probed by the NSA for allegedly releasing to the public results of coronavirus cases and information involving top government officials.

The lab technicians and researchers, who normally sleep on duty, are encountering difficulties in reaching their family members, loved ones, and others health authorities supervising them as a result of the seizure of their phones.

The situation has claimed the attention of the Liberia Association of Medical Laboratory Technology and the body has officially written Health Minister, Dr. Wilhelmina Jallah, to intervene into the matter.

Speaking to FrontPageAfrica via telephone on Sunday, Dr. Kateh termed as unhealthy the alleged disclosure of Covid-19 positive results of key government officials to the public.

Some investigations are going on. To what degree the investigations have gone, I dont know. Maybe after the investigations, it may come over to us. We all have to be very mindful of the kind of information that we put out, especially when it has the tendency to affect the public good.

He maintained that the release of unofficial information to the public during the fight against a pandemic has the propensity of stirring confusion in the country.

When quizzed whether or not the investigations are linked to the unofficial release of Covid-19 positive results of key government officials to the public by lab technicians, Dr. Kateh stated: I have no knowledge of that, but there are some analyses going on and I am sure at the appropriate time, the appropriate authority will inform the public.

From all of our analyses, His Excellency (Weah) is at low risk and so, we cannot ask him to give any sample. If he thinks that he needs to get his specimens done like any other citizen; you can also come and say look, I need my sample collected because I am not feeling too well; definitely we are under obligation to do that. If His Excellency asks us to do that, we will do that. But at this point medically, we see no reason why we should ask him to give his sample. The President is well and he is in full command of fighting Covid-19 in this country

He, however, said that the reported seizure of lab technicians phones is in no way negatively impacting the testing process and the overall combat against the coronavirus pandemic in Liberia.

Dr. Kateh pointed out that more samples are being tested as a result of the collective efforts of health authorities and lab technicians.

He further called for the laws of Liberia to take its course if lab technicians are found guilty of leaking sensitive health information to the public.

On Weahs test

For some time now, there have been public outcry on the need for President George Manneh Weah to submit to a Covid-19 test due to the close proximity he was with Information Minister Lenn Eugene Nagbe days before he was pronounced positive for COVID-19.

Dr. Kateh disclosed that President Weah has been identified as a low risk and as such, there is no need for him to submit his specimens for testing.

We determine who goes for test based on certain things. For example, if I am confirmed positive and you and I are very close friends and we have interacted. Based on our interaction, we can determine whether you are at higher risk. If you are at a higher risk, definitely you have no choice.

If you and I are friends and basically had interacted but based on the interaction and distance; remember you have to be six feet apart and based on that, the probability diminishes. We cannot classify you as a high risk. But we put you into a low risk category. For the low risk, we also give you advice and say look, if you have any kind of symptoms do not hesitate to let us know; we will come over and get a sample.

He maintained that the conduct of testing on President Weahs specimens can only be done at the will and pleasure of the Liberian Chief Executive.

From all of our analyses, His Excellency (Weah) is at low risk and so, we cannot ask him to give any sample. If he thinks that he needs to get his specimens done like any other citizen; you can also come and say look, I need my sample collected because I am not feeling too well; definitely we are under obligation to do that. If His Excellency asks us to do that, we will do that. But at this point medically, we see no reason why we should ask him to give his sample. The President is well and he is in full command of fighting Covid-19 in this country.

Post Views: 4,149

More:

Liberia: Chief Medical Officer Confirms the Investigation of Lab Technicians over 'Leaked' COVID-19 Results - Front Page Africa

Posted in NSA

The reach of cyberattacks related to Covid-19 – Politico

With help from Eric Geller, Martin Matishak and Laurens Cerulus

Editors Note: Morning Cybersecurity is a free version of POLITICO Pro Cybersecuritys morning newsletter, which is delivered to our subscribers each morning at 6 a.m. The POLITICO Pro platform combines the news you need with tools you can use to take action on the days biggest stories. Act on the news with POLITICO Pro.

Coronavirus-themed cyberattacks show no sign of slowing, as federal agencies and companies explore whos vulnerable and whos responsible.

MC exclusive: An examination of cyber-related sanctions and indictments showed disparities across U.S. administrations and nations.

The NSA and an Australian spy agency warned about a kind of attack thats on the rise.

A message from Global Strategy Group:

What do Americans expect from corporate leaders as they respond to COVID-19? Who do they trust most? How and whether companies respond will have a lasting impact on their reputationand their bottom line. Download the full report here.

HAPPY THURSDAY and welcome to Morning Cybersecurity! Russian Doll was great but your MC host isnt sure what to make of this. Send your thoughts, feedback and especially tips to [emailprotected]. Be sure to follow @POLITICOPro and @MorningCybersec. Full team info below.

POLITICO Pro is here to help you navigate these unprecedented times. Check out our new Covid-19 Coverage Roundup, which provides a daily summary of top Covid-19 news coverage from across all 16 federal policy verticals as well as premium content, such as DataPoint graphics. Please sign up at our settings page to receive this unique roundup sent directly to your inbox every weekday afternoon.

Sign up for POLITICO Nightly: Coronavirus Special Edition, your daily update on how the illness is affecting politics, markets, public health and more.

EVER-EXPANDING Months into the Covid-19 crisis, were still learning more each day about the scope and innovation in coronavirus-themed attacks via the government agencies and tech companies fighting off the hackers.

IBM on pace and vulnerabilities: IBM says it has seen a 6,000 percent increase in Covid-19 spam from mid-March to mid-April. It also released a study today that suggests small-business owners and consumers could be the most vulnerable to scams where cyber criminals masquerade as the government. More than a third of those polled by IBM and Morning Consult said they expect emails from the IRS, despite years of the IRS and others warning that the agency wouldnt email anyone about their tax filings; over half said they would click on links or attachments in emails about stimulus checks. And just 14 percent of small-business owners said they felt very knowledgeable about relief loans. Palo Alto Networks also provided some figures on coronavirus-related scams Wednesday.

DOJ on takedowns, Google on nation-state hacking: DOJ said Wednesday that law enforcement, cybersecurity companies and website operators have taken down hundreds of domains that were using the coronavirus crisis for fraud. Not coincidentally, some of the ones identified by the FBI mimicked the IRS relief payment portal. And, according to Google, federal employees have been targets themselves of coronavirus-themed phishing campaigns orchestrated by hackers backed by other nations; in total, more than a dozen such hacking groups have launched attacks that use Covid-19.

FireEye on Vietnam: Hackers linked to the Vietnamese government have been spear-phishing Chinese government agencies in an apparent effort to understand Beijings handling of the coronavirus pandemic, FireEye researchers said Wednesday. The malicious emails went to China's Ministry of Emergency Management and the municipal government in Wuhan, where the virus first emerged, according to FireEye, which attributed the activity to the Vietnam-linked group APT32. While targeting of East Asia is consistent with the activity weve previously reported on APT32, the researchers wrote, this incident, and other publicly reported intrusions, are part of a global increase in cyber espionage related to the crisis, carried out by states desperately seeking solutions and nonpublic information.

The spear-phishing campaign, which seems to have begun in early January, uses virus-related lures to entice victims into opening the infected attachments, which then deploy the Metaljack malware payload. FireEye spotted the same malware and command-and-control server in a phishing campaign in December likely targeting Southeast Asian countries.

The first malicious email that FireEye caught was dated Jan. 6, one week before Thailand reported the first infection outside China. Vietnam was [very] quick to respond to early reports of the disease, Reuters reporter Jack Stubbs pointed out. Maybe now we have an idea why. Vietnam has reported fewer than 300 coronavirus cases and no deaths.

FIRST IN MC: CYBER SANCTIONS AND INDICTMENTS The Trump administration in its first term has been far more aggressive in issuing cyber-related sanctions and indictments against China, Iran, North Korea and Russia than the Obama administration in its second term, according to an analysis and infographic out today from the Foundation for Defense of Democracies. President Donald Trump has issued 106 indictments and 110 sanctions, compared to 28 and five, respectively, from President Barack Obama from 2013 to 2016, the think tank found.

Across both administrations, the number of sanctions and indictments are applied inconsistently across nations. While North Korea is behind larger and more destructive attacks than Iran, North Korea has endured six total indictments and sanctions to Irans 30, the analysis and infographic concluded. Authors Trevor Logan and Pavak Patel explained that might be because North Korean hackers are more closely affiliated with their governments, whereas Iranian hackers arent exclusively loyal and therefore easier to name.

China more often faces indictments than sanctions. Logan and Patel wrote that may indicate that the United States is reluctant to issue sanctions against malicious Chinese actors due to the fear of escalation or economic retaliation against American companies. In contrast, the relative weakness of the Iranian, North Korean, and Russian economies means that Washington can act more freely without fear of blowback.

MALWARE IN A HALF SHELL The NSA and its Australian counterpart on Wednesday issued guidelines for detecting and defending against so-called shell malware, a tactic hackers are increasingly using in their operations. Web shells provide attackers with persistent access to a compromised network using communication channels disguised to blend in with legitimate traffic, the notice from NSA and the Australian Signals Directorate explained. The intelligence organizations suggested a defense-in-depth approach using multiple detection capabilities as the best way to both uncover and prevent the malware from wreaking havoc on systems, as well as tips on how to recover from such an attack. A critical focus once a web shell is discovered should be on how far the attacker penetrated within the network.

A message from Global Strategy Group:

New research from Global Strategy Group reveals the opportunities and risks facing corporate leaders as they respond to COVID-19.

A majority of Americans expect the private sector to play a major role, and people trust corporate leadership more than the White House.

But CEOs need to buck the existing perception that they are too focused on their bottom line and not enough on their employees.

Americans trust corporations in this moment and corporations can and must deliver. Companies will be defined later by what they do now, and the reputational costs could be high.

Download the full report today.

WHOS ZOOMING WHO Zoom announced stronger encryption and an array of additional security measures for version 5.0 of the video conferencing platform it rolled out on Wednesday. From our network to our feature set to our user experience, everything is being put through rigorous scrutiny, said Oded Gal, chief product officer of the company.

CZECHS TO WORLD: STOP ATTACKING HOSPITALS From our friends at POLITICO Europes Cyber Insights: The Czech Republic wants all countries around the world to pledge not to launch cyberattacks on hospitals and medical facilities. Thats according to its written feedback on a draft report on international norms for cybersecurity from the U.N.s Open-ended Working Group.

The rising number of cyberattacks on medical facilities worldwide reinforce the need for coordinated global action to protect [the] public health care sector from malicious ICT activities, the Czech proposal reads. Specifically, it wants the OEWG to endorse the idea to add medical services and medical facilities to a list of things that states are barred from attacking, as laid out in the U.N.s landmark 2015 deal on cyber norms.

Czech hospitals have been the targets of cyberattacks in the past month, and last week its government warned of more attacks, prompting the U.S. to threaten hackers with consequences.

Russias feedback for the draft said the application of international humanitarian law should be applied only in the context of a military conflict while currently the ICTs [information and communications technologies] do not fit the definition of a weapon. Moscow also slammed the mention of political attribution of cyberattacks, adding the report artificially exaggerated the importance of having NGOs and civil rights groups engage with the U.N. OEWG.

Member states feedback on the OEWGs draft report can be found here. Heres security researcher Lukasz Olejniks Twitter thread analyzing the papers.

TWEET OF THE DAY Only sharing this because of the good dog.

Alston & Bird announced a Women in Cyber network co-directed by partners Kim Peretti, co-leader of Alston & Birds cybersecurity preparedness and response team, and Amy Mushahwar, member of the firms privacy and data security and cybersecurity preparedness and response teams. Associates Emily Poole and Alysa Austin will support them.

The networks advisory board includes Jeannie McCarver, senior vice president for cybersecurity at U.S. Bank; Tracey Scraba, chief privacy officer at CVS Health; and Jennifer Martin, global cybersecurity counsel at Verizon Media.

Motherboard: Researchers revealed some iPhone zero day exploits.

ZDNet: Security researcher identifies new APT group mentioned in 2017 Shadow Brokers leak.

NBC News: The leaked data on employees of the World Health Organization and others was likely from previous breaches.

Kaspersky released a survey on corporate security and employee privacy.

The Voting Village's Jake Braun and Synack's Mark Kuhr talked election security.

Good news about the number of ransomware attacks on governments, health care providers and educational organizations in the first quarter, via Emsisoft.

Thats all for today.

Stay in touch with the whole team: Eric Geller ([emailprotected], @ericgeller); Bob King ([emailprotected], @bkingdc); Martin Matishak ([emailprotected], @martinmatishak); and Tim Starks ([emailprotected], @timstarks).

Read more:

The reach of cyberattacks related to Covid-19 - Politico

Posted in NSA

Odisha to invoke NSA for attacks against doctors and healthcare personnel – Economic Times

Bhubanesar: Odisha will invoke the National Security Act (NSA) for attacks against and dishonour of any doctor and healthcare personnel.

Prompted by attacks on health care professionals in Madhya Pradesh and elsewhere and the refusal to allow the burial of two doctors in Tamil Nadu, Chief Minister Naveen Patnaik promised to honour doctors and healthcare professionals who caught the virus and died doing their duty as martyrs.

In a recorded video released to the media, Patnaik also announced that families of any government doctor, healthcare and other personal who succumbed to Covid-19 would receive his or her salary until the date of retirement.

In the absence of any cure or vaccine those fighting the Covid19 war for us, doctors and healthcare professionals are taking a huge risk by putting themselves in the front. We have a rich tradition of honoring our brave hearts who fight for the country and acknowledge their supreme sacrifice. In the same spirit we propose to recognize and honor the valiant work being done by our Covid warriors, said Patnaik.

They will awarded belatedly on national days. A detailed scheme of awards is to follow. The Government of India had already announced Rs 50 lakh insurance cover for all doctors.

Read the original:

Odisha to invoke NSA for attacks against doctors and healthcare personnel - Economic Times

Posted in NSA

NSA Web Shell Advisory and Mitigation Tools Published on GitHub – Computer Business Review

Add to favorites

Administrators should not assume that a modification is authentic simply because it appears to have occurred during a maintenance period.

As web shell attacks continue to be a persistent threat the U.S. National Security Agency (NSA) and the Australian Signals Directorate (ASD) have released a detailed advisory and a host of detection tools on GitHub.

Web shells are tools that hackers deploy into compromised public-facing or internal server that give them significant access and allow them to remotely execute arbitrary commands. They are a powerful tool in a hackers arsenal, one that can deploy an array of payloads or even move between device within networks.

The NSA warned that: Attackers often create web shells by adding or modifying a file in an existing web application. Web shells provide attackers with persistent access to a compromised network using communication channels disguised to blend in with legitimate traffic. Web shell malware is a long-standing, pervasive threat that continues to evade many security tools

A common misconception they are trying to dispel is that hackers only target internet-facing systems with web shell attacks, but the truth is that attackers are regularly using web shells to compromise internal content management systems or network device management interfaces.

In fact these types of internal systems can be even more susceptible to attack as they may be the last system to be patched.

In order to help IT teams mitigate these types of attacks the NSA and ASD have released a seventeen page advisory with mitigating actions that can help detect and prevent web shell attacks.

Web shell attacks are tricky to detect at first as they designed to appear as normal web files, and hackers obfuscate them further by employing encryption and encoding techniques.

One of the best ways to detect web shell malware is to have a verified version of all web applications in use. These can then be then used to authenticate production applications and can be crucial in routing out any discrepancies.

However the advisory warns that while using this mitigation approach administrators should be wary of trusting times stamps as, some attackers use a technique known as timestomping to alter created and modified times in order to add legitimacy to web shell files.

They added: Administrators should not assume that a modification is authentic simply because it appears to have occurred during a maintenance period.

The joint advisory warns that web shells could be simply part of a larger attack and that organisations need to quickly figure out how the attackers gained access to the network.

Packet capture (PCAP) and network flow data can help to determine if the web shell was being used to pivot within the network, and to where. If such a pivot is cleaned up without discovering the full extent of the intrusion and evicting the attacker, that access may be regained through other channels either immediately or at a later time, they warn.

To further help security teams the NSA has released a dedicated GitHub repository that contains an array of tools that can be used to block and detect web shell attacks.

Follow this link:

NSA Web Shell Advisory and Mitigation Tools Published on GitHub - Computer Business Review

Posted in NSA

Six test corona positive in MP after visiting hair-cutting salon that served COVID-19 patient earlier – The New Indian Express

Express News Service

BHOPAL: Panic has struck the Bargaon village in Madhya Pradeshs Khargone district after six villagers, who went to a hair-cutting salon recently for hair-cuts and shaving, have tested positive for coronavirus. Swab samples of as many as 10-12 persons, who recently visited the salon in the village, were sent for COVID-19 testing recently. Out of them, six men have tested positive for the deadly virus.

According to officiating chief medical and health officer (CMHO) of Khargone district, Dr Divyesh Verma, primary probe has revealed that a youth from Bargaon, who works at a hotel in Indore, had recently come to his native village in Khargone. Possibly on April 5, he went for hair-cut and shave to the salon in Bargaon village and was later tested positive.

Subsequently, the samples of around 10-12 more men who went to the same hair-cutting salon the same day were sent for testing. Out of them, six persons from the same Bargaon village have tested positive. The entire village has been sealed and survey is underway. The kin of the six positive cases have been home-quarantined and their samples are being sent for testing, the CMHO informed.

It seems the same towel and instruments used during the haircut and shaving of the youth (who worked in Indore hotel and later tested positive for COVID-19) were used by the barber for the other customers, which infected six of them, he claimed.

The six positive cases are aged between 28 and 73 years.Till date, Khargone district has reported 60 positive cases, 19 of which have been reported in the last two days.

2017 batch trainee IPS officer tests positive for COVID-19 in Jabalpur

Meanwhile, a 2017 batch trainee IPS officer posted as circle SP (CSP) in Jabalpur, tested positive for the virus. The young officer was among those cops who had gone to the adjoining Narsinghpur district on April 20 to bring back to Jabalpur a coronavirus positive National Security Act (NSA) detainee Javed Khan, who had escaped from Netaji Subhash Chandra Bose Medical College Hospital in the city on April 19 afternoon.

The other cops, including a sub-inspector and an additional SP (ASP) who accompanied the young IPS officer, have been found negative for the virus.

Efforts are now underway to ascertain the other cops and people who had come in contact with the IPS officer since April 20. Another senior IPS officer, who is presently in Jabalpur had self-quarantined self and family members, as he had met the young CSP (who has tested positive) recently. The samples of the senior IPS officer and family members have been sent for testing.

Javed Khan, a resident of Chandan Nagar COVID-19 containment zone in Indore, was among the four men against whom NSA was invoked on April 8 for attacking an on-duty cop. Three of the four NSA detainees, including Khan have so far tested positive for coronavirus.

Till date, Jabalpur district has reported 56 positive cases and one death. Seven patients from the district have also been discharged from the hospital after they recovered. The 56 cases include 13 new patients, all residents of Chandni Chowk area.

Follow this link:

Six test corona positive in MP after visiting hair-cutting salon that served COVID-19 patient earlier - The New Indian Express

Posted in NSA

Washington fights to stay in Syria game from isolated base – The Arab Weekly

The US deployment east of the Euphrates in north-eastern Syria receives the most attention, but there is another front where US forces are deployed that is currently heating up the inhospitable border region where Jordan, Syria and Iraq meet.

The US military base at Syrias al-Tanf is less than 30km from the long-shuttered Iraqi al-Walid border crossing along the M2 highway.

The few hundred US forces based there are in many respects orphans of Washingtons contracting Syria strategy a legacy deployment far less valuable than in the past but not costly enough in blood or treasure to warrant a White House decision to withdraw.

Washingtons presence in the region dates to 2016, when it established a base to train forces of the short-lived New Syrian Army (NSA). Maghawir al-Thawra (MaT) was born out of the NSAs collapse that year.

The 300-strong proxy forces of MaT have shown little interest of late in fighting the regime or ISIS. Instead they rule over ever diminishing numbers of refugees in the desert camp at Rukban nearby.

At its peak, the camp hosted 60,000. Today, as part of the ongoing effort by Damascus to reduce the footprint of opposition forces, thousands have left for parts of Syria under government control. Today barely 12,000 remain.

The couple of hundred US troops at al-Tanf have no interest in Rukban, except to highlight Damascuss humanitarian shortcomings. The camp is within the self-declared US exclusion zone claimed by US forces. So, as a matter of international law, the camps well-being is an American responsibility, a task Washington has, at best, only half-heartedly embraced.

In this desolate part of Syria there is no oil to covet, nor is the MaT anywhere close to the asset represented by the Kurdish-led Syrian Democratic Forces (SDF).

The real estate around al-Tanf is what keeps US forces in place a single highway linking Iraq and points east (Iran) to Syria and points west (Lebanon/Hezbollah).

These days, after the battle to unseat Assad has failed, the sole objective of the zone established by Washington is to obstruct passage along the M2 highway and to keep the al-Walid crossing closed. US control of this road complicates Irans effort to cement a bulletproof transport link between Iran and its allies in Syria and Lebanon and obstructs the revival of regional trade vital to the economic rehabilitation of the entire Mashreq.

Jordan has just announced that, due to concerns about the coronavirus, it will no longer allow the transit of aid to Rukban through its border.

In recent months, however, the big picture around al-Tanf is being transformed.

Although the US is loathe to acknowledge it, al-Tanfs value to Washington is eroding as the US redeploys out of small isolated bases in Iraqs nearby Anbar province and elsewhere, with the commensurate strengthening of the presence of the Iraqi Army and the Popular Mobilisation Forces (PMF). Such is the case at Bukamal, for example a long shuttered border crossing to the north now open to transit from Iraq to Syria and beyond.

In the US zone itself, the Russian Defence Ministry and an Iranian news outlet recently highlighted what was described as the surrender of some MaT forces and equipment to the Syrian Army.

Earlier this week, SANA reported that a recent attack in Damascus was tied to the Military Operations Centre (MOC) the Amman-based command centre run by Washington to coordinate anti-regime efforts around its base at al-Tanf.

Whether such incidents occurred is not the most important point. For those opposing

Washingtons presence, there is obvious advantage in highlighting problems even if they are manufactured for the US in the faraway desert outpost.

What cannot be denied, however, is the fact of a new phase in Iraqi and Syrian efforts together with their allies and proxies to increase pressure on the border region at American expense.

Washington is far from rolling over in the face of this campaign. It continues to tout its presence in central Syria. On April 10, for example, it distributed pictures of its top of the line F-35A Lightning II fighter jet, strik[ing] at extremist organisations in Syria despite COVID-19, reflecting the worldwide unity to see an enduring defeat delivered against Daesh.

Along the Iraq-Syria frontier however, the trend leads in another direction. Earlier this month a combined operation of the Iraqi army and the Popular Mobilisation Forces (PMF) Victory Heroes 2 deployed 8 brigades along the frontier region.

This operation was facilitated by the removal of US forces from the Iraqi base at al-Qaim controlling the approach to the border crossing at Bukamal. Qaim-Bukamal is now the only crossing on the Iraqi-Syrian border that is officially operated by the Iraqi and Syrian governments.

Such developments suggest that the day is not far off when Iraq, with the collaboration of the PMF elements, will control its entire western border.

Syrias challenge in this regard is, if anything, more complicated. The al-Walid border crossing is closed because of the US presence at al-Tanf. Assad is also challenged to contain the scattered but deadly ISIS presence in the Badia region south-west of Deir ez-Zor, where an ISIS attack recently killed 27 regime forces.

Both Baghdad and Damascus share the strategic objective of reasserting their sovereign control over their respective borders. Attaining this objective requires a de facto partnership to undertake complementary campaigns on both sides of the border. The incremental success of this effort will increase the isolation of the small and increasingly strategically insignificant US position at al-Tanf, offering US President Donald Trump yet another reason to close the books on Americas costly adventure in As-Sham.

Excerpt from:

Washington fights to stay in Syria game from isolated base - The Arab Weekly

Posted in NSA

The Reverend John J. Morris, Served 27 Years At OLL – My veronanj

The Reverend John J. Morris, 89, of Virginia Beach, Va. passed away on April 19, 2020 of natural causes. He was born in Roseland, N.J. on March 5, 1931 to John and Dorothy Morris.

Father Morris was a graduate of Montclair State University Class of 1952 and Seton Hall University 1956 for seminary studies and ordained as a priest on May 29, 1960. Father Morris served his country in the United States Navy as a Reserve Component chaplain for nearly 14 years. He served Our Lady of the Lake Church in Verona for more than 27 years, first as parochial vicar before being appointed administrator. His last posting was as the chaplain at NSA Northwest Annex Chapel in Chesapeake, Va.

Father Morris was a resident of Marian Manor in Virginia Beach where he continued serving as chaplain for the last three years.

He was uniquely qualified to be great a son, brother and uncle but no one more qualified to represent godliness and promote the Lords Word.

Father Morris is survived by a niece, Darcie Loraine Mager; three nephews, Ronald William Dressel, David Joseph Dressel and Dennis Patrick Dressel; along with nine grandnieces and grandnephews. He was predeceased by his sister, Dorothea Therese Dressel.

Private interment services were held at Gate of Heaven Cemetery in East Hanover. A memorial Mass will be offered at a later date. Condolences may be left at http://www.proutfuneralhome.com.

Memorial donations may be made to the Marian Manor Resident Council Employee Fund, ATTN: Desiree Mitchell, 5345 Marian Lane, Virginia Beach, VA 2346

Continue reading here:

The Reverend John J. Morris, Served 27 Years At OLL - My veronanj

Posted in NSA

How a girl grasped the Holy Grail of encryption and changed the paradigm for safely sharing data – SiliconANGLE

Women are a minority in tech, with an average of three men for every one woman. When it comes to cybersecurity, the imbalance is even more acute. A 2020 report shows that female cybersecurity experts are outnumbered five to one by their male counterparts. Inside the National Security Agency, cybersecuritys inner sanctum, the ratio is anyones guess.

So, the fact that a woman not only entered, but conquered and emerged victorious from the NSAand with the rights to market the ultimate encryption treasureis a feat worthy of attention.

How did she do it? Simple

Math, said Ellison Anne Williams (pictured), founder and chief executive officer of Enveil Inc. Math and grit.

Williams spoke withJohn Furrier, host of theCUBE, SiliconANGLE Medias mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed her time at the NSA and how homomorphic cryptography provides the missing link in the cybersecurity chain.

The treasure Williams carried from the NSA is one that has often been described as the Holy Grail of cryptologists: Homomorphic encryption. Developed within the NSA by researchers wanting to maintain security for data in-use,the technology enables data to be handled securely while remaining encrypted.

This week theCUBE spotlights Williams in our Women in Tech feature.

Data security has three parts: data at rest, data in transit, and data at use, explained Williams. The first part involves securing data at rest on the file system and the database.This would be your more traditional in-database encryption, she said.

The second part is securing data as its moving around through the network, known as data in transit. The third part of the data security process is securing data that is in-use data under analysis or search. This is when the data is both at its most vulnerable and its most valuable.

While there are many security solutions for both data at rest and in transit, protecting data while it is being processed has always been the weak point. Data was secure before and after processing but had to be decrypted in order to be accessed, then re-encrypted. Homomorphic encryption solves that issue.

It means we can do things like take searches or analytics, encrypt them, and then go run them without ever decrypting them at any point during processing, Williams explained.

With her blonde curls and Southern charm, Williams doesnt match the stereotype of a socially awkward cybersecurity specialist. But while her looks may cause some to double-take at business meetings, her intelligence and expertise are indisputable. Williams holds adoctorate in mathematics (algebraic combinatorics) from North Carolina State University and two masters degrees, one in mathematics from the University of South Carolina and another in computer science from Nova Southeastern University in Florida.

As an undergrad, Williams was a pre-med student with a plan to study infectious diseases. Instead, she fell in love with math and became an expert in distributed computing and algorithms, cryptographic applications, graph theory, combinatorics, machine learning, and data mining.

After graduating from North Carolina State, Williams joined the research team at the NSA, where she spent 12 years doing a little bit of everything, including large-scale analytics, information security and privacy, computer network exploitation, and network modeling. She also advocated for women to join the NSAs team and mentored her male colleagues.

During her last few years at the NSA, she had the opportunity to work at The John Hopkins University Applied Physics Laboratory in Maryland. It was there that she worked on homomorphic encryption as part of a larger project for the NSA.

Although she had worked in research her whole career, Williams had always harbored entrepreneurial dreams. So when she learned she could declassify some of her research through the NSA Technology Transfer Program, she jumped at the chance to create a homomorphic encryption solution for the marketplace.

The idea of homomorphic encryption is not new. The concept has been around since 1978, but a first-generation fully homomorphic solution wasnt proposed until 2009. Research continued, and second- and third-generation fully homomorphic solutions were proposed. But problems remained with implementing these solutions at scale.

With the launch of Enveil Inc. in 2016, Williams took a bet that by combining the entrepreneurship in her DNA with the results of her years of research at John Hopkins and the NSA she could change that.

Less than a year after founding, the company got the cybersecurity communitys attention at the finals of theRSA Innovation Sandbox. Thats where the conversation really started to change around this technology called homomorphic encryption, the market category space called securing data in use, and what that meant, Williams said.

Williams expected a surprised reaction when the community discovered Enveil had a market-ready homomorphic encryption solution. She didnt expect that big-name early adopters, such as Bloomberg Beta, Thomson Reuters Corp., Capital One Financial Corp., and Mastercard Inc., would be eager to strategically invest in the company.

The enthusiasm is because homomorphic encryption solves the problem of secure data sharing. New technologies such as machine learning rely on ingesting massive amounts of data. Being restricted to just one data source limits the potential for powerful insights, but sharing data resources for analysis is a risky business.

There are also codes and regulations that govern data sharing, such as Europes General Data Protection Regulationand the California Consumer Privacy Act, which limit how data can be managed.Not to mention, people can get upset if they discover a company has a cavalier attitude tosharingpersonal data; as Google discovered withProject Nightingale.

This makes the ability to maintain anonymity and security while sharing data critically important for businesses, especially those in the financial sectors, where the payoff and the risks are high stakes. Say a bank suspects a client of financial misconduct, such as money laundering, and as part of establishing the trail, it needs to verify transactions with other institutions.

[Banks] cant necessarily openly, freely share all the information. But if I can ask you a question and do so in a secure and private capacity, still respecting all the access controls that youve put in place over your own data, then it allows that collaboration to occur, Williams stated.

Homomorphic encryption enables the data to be searched while remaining encoded, so no personally identifiable information is ever revealed and regulation compliance and security is ensured.

Current use casesamong Enveils clients include financial regulation, with banks able to securely share information to combat money laundering and other fraudulent activity. Global transactions are simplified by allowing collaboration regardless of national privacy restrictions. And in healthcare, hospitals and clinics can share patient details to research facilities and remain confident that they are not disclosing sensitive personal data.

After just over three years in operation, Williams is proud of what her company has accomplished. Its really pretty impressive, she said.

It is. Breaking the male-dominated culture of cybersecurity, Williams has created a company that is at the forefront of data in-use security, recently announced $10 million in Series A funding, and is looking to expand globally with new product lines that enable advanced decisioning in a completely secure and private capacity.

Were creating a whole new market, Williams said. [Were] completely changing the paradigm about where and how you can use data for business purposes.

Watch the complete video interview below, and be sure to check out more of SiliconANGLEs and theCUBEs coverage of theRSA Conference.

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

Read more:

How a girl grasped the Holy Grail of encryption and changed the paradigm for safely sharing data - SiliconANGLE

Posted in NSA

Weird Hours, Contractor Concerns: How the Intelligence Community Is Grappling with Coronavirus – Defense One

Intelligence agencies are trying to adapt to social distancing guidelines, but thats leaving many employees and contractors in limbo.

Like any other vital institution, the U.S. intelligence community is grappling with the disruptive effects of the coronavirus including unconventional working hours and uncertainty among the employee and contractor workforces.

At NSA and CIA, some departments and functions have adjusted schedules and adopted unconventional working hours in a bid to implement social-distancing measures while fulfilling their missions. Some employees who used to work regular hours are now working in shifts, such as three days on and three days off, or one week on and one week off, etc., sources within the intelligence community told DefenseOne.

Spokespeople for the CIA and the NSA declined to say whether full-time employees or contractors were working diminished hours or in altered shifts. But they did say that any changes they might have made had not hurt their ability to carry out critical intelligenceactivities.

Given CIAs unique mission, were always prepared to preserve our mission capability, no matter the circumstances, while also protecting the well-being of our global workforce. In response to COVID-19, our officers are exercising tremendous creativity and flexibility, and were delivering on our mission, a CIA spokesperson told Defense One in anemail.

Subscribe

Receive daily email updates:

Subscribe to the Defense One daily.

Be the first to receive updates.

NSA maintains and rehearses comprehensive plans to remain effective and achieve our missions across a variety of challenging situations, an NSA spokesperson said. We continue to monitor the potential risks presented by COVID-19, and are taking appropriate steps such as workplace distancing and increased cleaning to ensure NSAs people remain safe, secure, and healthy without impacting our operationalcapabilities.

The pandemic is also affecting the large group of contractors who serve the intelligence community. Many have found themselves in a difficult situation because their contracts require them to work in a specific Sensitive Compartmented Information Facility, or SCIF a generally small facility that is built to keep invasive signals intelligence collection out. In fact, a lot of work that deals with open source or even unclassified material still usually occurs in classified settings, simply because thats common practice now, according to an intelligence community contractor who spoke to Defense One.

The new work schedules are also causing confusion among contractors who wonder whether they will be paid for working shifts, part-time, or not at all. Theres been no detailed IC-wide guidance about this to agencies, and little given by agencies to contracting officers, the contractorsaid.

From where should that guidance come? Probably the Office of the Director of National Intelligence, or ODNI, according to retired CIA officer John Sipher. He called that contractor confusion exactly the kind of thing the DNI should be dealing with. It impacts the entire IC. ODNI has put out a letter on the subject but the relevant portion, on section 3610 of the CARES Act, still leaves big questions unanswered said thecontractor.

The ODNI could, for example, tell agencies that contractors should get their full wages even if they cant work where the contract says they should. Or it could tell them to allow workers to work from company SCIFs, or adopt othersolutions.

One problem is that the ODNI has not had a Senate-confirmed director since Dan Coats left last August. In February, the President nominated Rep. John Ratcliffe, R-TX, for the position, but he hasnt yet been confirmed by theSenate.

According to a March 21 letter from the Intelligence and National Security Alliance, the risks of not compensating contractual intelligence workers could decimate the so-called Trusted Workforce. The community could lose people that it needs both now and in thefuture.

Agencies have begun to send both government and contract staff home and are considering limiting the number of workers who can come to government facilities for as long as eight weeks, notes the letter. The number of cleared contractors alone is about 500,000 and they are supported by thousands more colleagues who do not require a clearance. If these contract employees cannot continue working during the COVID crisis, there is a significant risk that they will not rejoin the Trusted Workforce when the crisis is over, leaving the national security industrial baseless able to support critical governmentmissions

Of course, the other thing that the intelligence community could do to make it easier to retain top talent during a period of unusual work-from-home arrangements is reforming the clearance process. Less classified intelligence material means more material that analysts can work with at home or from other non-SCIF locations. Reforming that process means processing clearance applications for workers much faster, not classifying as much material, and ensuring that analysts work with non-classified material in non-classified settings, even if it eventually goes into a classified report or product. The problem of over-classification of intelligence is one national security leaders have been highlighting with increasingurgency.

Bottom line: it may well take a massive global disaster to bring the intelligence community into the new era. But it could lose important talent along theway.

More:

Weird Hours, Contractor Concerns: How the Intelligence Community Is Grappling with Coronavirus - Defense One

Posted in NSA

How the National Sheriffs’ Association is working to assist agencies in the COVID-19 crisis – Police News

As the COVID-19 crisis continues to deepen its impact on law enforcement agencies across the nation, the National Sheriffs Association (NSA) has formed an industry action group in order to better coordinate with and assist sheriffs offices in getting vital supplies to deputies working the frontline of the outbreak.

The initiative is a collaboration between the NSA and numerous corporate and industry partners, including Home Depot, Motorola Solutions, AWS and dozens more.

They have been very gracious to serve on an advisory group and help us identify what they may have in their tool belt and connections they may have to better provide services and supplies to agencies, Jonathan Thompson, NSAs CEO and executive director, told PoliceOne.

The group recently held its first meeting, discussing how the NSA can help industry leaders expedite partnerships with agencies during the crisis, improve agency access to critical supplies through those partnerships, and tackle potential slowdowns at the state level or federal level.

Thompson says the most immediate concern being voiced by sheriffs is the need for medical supplies, including personal protective equipment and disinfectants. While PPE and other medical supplies are the tier one focus, agency needs during the pandemic extend far beyond that.

Everything from I.T. support for a shortfall of people working in their offices to do the work to equipment that needs to be replaced on an urgent basis and expediting that replacement of equipment, Thompson said. We're also seeing a serious level of long-term planning regarding jail operations. How do we make sure inmates are still getting housed, clothed and fed in an efficient and effective way? While we're seeing a number of depopulation efforts, there are still several hundred thousand people in jails across the country and they have to be fed, clothed and taken care of.

As for what needs to be done now to protect deputies, Thompson says hes most concerned about PPE and testing.

Reliable tests are vital because we need to know if someone has been exposed, where they are in the infection cycle and where they are in the shedding cycle, Thompson said. We want to make sure that once we have people tested and their symptoms are becoming more acute, that they know, number one, you can't work. Number two, you need to get yourself taken care of whether rest and staying at home can suffice or if it's more dangerous or risky than that, getting them to a hospital as soon as possible. Those are the things that are keeping me awake at night getting more PPE and getting test equipment to sheriff's offices immediately.

I think it's going to be incumbent upon the federal government and state governments to make certain we don't expose first responders, Thompson continued. And when they are exposed, we've got to be able to respond to them and support them. So, we're urging governors to evaluate every day those tier one personnel that need to be protected with PPE, as well as tested. Those are the essential factors.

For companies or individuals who would like to provide support to the initiative, they can follow this link. Sheriffs offices in need of support can contact the NSA via the member website or through their state association.

Law enforcement and first responders have been helping people in this country for hundreds of years, Thompson said. We need help now, too. We need our leaders to recognize first responders are vulnerable and we need their help. We need the private sector to step up and we know they can, and we know they want to. We're eager to accept that help.

See the original post here:

How the National Sheriffs' Association is working to assist agencies in the COVID-19 crisis - Police News

Posted in NSA

Walkers asked to heed rules – Craven Herald

The National Sheep Association (NSA) is calling for the public to observe the lockdown rules more closely.

NSA Chief Executive Phil Stocker explains: There is no doubt this lockdown is difficult. We are all feeling the effect, and NSA completely understands the frustration and the want to get outside. However, we mustnt forget that the fields were walking across are where our food is produced, and by being there we put the people producing our food at risk.

NSA has heard some extreme and concerning stories from its members of people still arriving in cars for walks, picnics and more.

Mr Stocker continues: By travelling to farms you are risking passing on this dangerous virus to a food producing farmer, and that is simply not acceptable. We all know the rules and simply put, travelling to walk somewhere a car drive away from your home is not necessary. We implore the British public to obey these rules and respect other peoples homes and lives particularly as we approach the Easter weekend.

With little still known about the virus, NSA is concerned about viral transmissions on gates, fences and other surfaces. Mr Stocker adds: These risks are very real and if people continue to flout the rules, we have no doubt the Government will be prepared to step things up to protect lives.

Read the original post:

Walkers asked to heed rules - Craven Herald

Posted in NSA