Page 10«..9101112..2030..»

Category Archives: NSA

Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers – InsideSources

Posted: August 2, 2017 at 9:01 am

From left, National Intelligence Director Dan Coats, National Security Agency director Adm. Michael Rogers and acting FBI Director Andrew McCabe, arrive for the Senate Intelligence Committee hearing about the Foreign Intelligence Surveillance Act, on Capitol Hill, Wednesday, June 7, 2017, in Washington. (AP Photo/Carolyn Kaster)

A Senate Democrat on the Intelligence Committee is pressing the nations top spy chief to clarify whether FISA Section 702, an expiring law used by the National Security Agency to conduct broad international surveillance, can be used to domestically target Americans.

Oregon Democratic Sen. Ron Wyden asked Director of National Intelligence (DNI) Dan Coats in June ifthe government [can] use FISA Act Section 702 to collect communications it knows are entirely domestic.

Section 702 of the 2008 Foreign Intelligence Surveillance Amendments Act authorizes NSA to tap the physical infrastructure of internet service providers, like fiber connections, to intercept foreign emails, instant messages, and other communications belonging to foreign nationals as they exit and enter the U.S.

Unlike domestic NSA surveillance programs that largely collect metadata information like when a message was sent and received, but not the message itself Section 702 includes the actual content of intercepts.

Not to my knowledge, Coats responded during a congressional oversight hearing. It would be against the law.

Privacy advocates suspect Section 702 creates a loophole for NSA to incidentally collect data belonging to Americans that couldamount to millions of warrantless intercepts. Wyden, who as a member of the Senate Intelligence Committee is privy to classified briefings from Coats and other intelligence agencies, seems to have suspicions of his own.

After the hearing reporters sought clarity from Coats, to which the Office of the Director of National Intelligence (ODNI) responded in a letter.

Section 702(b)(4) plainly states we may not intentionally acquire any communication as to which the sender and all intended recipients are known at the time of acquisition to be located in the United States. The DNI interpreted Senator Wydens question to ask about this provision and answered accordingly, the letter from ODNI reads.

Wyden cryptically responded to the ODNI letter, saying [t]hat was not my question, and asked Coats to provide a public response to my question, as asked during the hearing.

Coats has so far declined to provide that response. In a letter to Coats Monday Wyden again asked the DNI to respond publicly to the original question.

As I noted in my previous letter, following the hearing, your office responded from inquiries to reporters by answering a different question, Wyden wrote.

The episode is eerily reminiscent of a March 2013 exchange between Wyden and then-DNI James Clapper, when the senator famously asked the Obama administrations spy chief whether NSA collects any type of data at all on millions or hundreds of millions of Americans.

No sir, Clapper answered. Not wittingly.

Months later Americans found out Clappers answer was untrue when former NSA contractor Edward Snowden leaked the existence of widespread agency surveillance programs intercepting data belonging to millions of Americans. Clapper later claimed he thought Wyden was asking a different question: whether NSA was listening to Americans phone conversations.

I thought, though in retrospect, I was asked when are you going to startstop beating your wife kind of question, which is, meaning not answerable necessarily, by a simple yes or no, Clapper later told NBC. So I responded in what I thought was the most truthful or least untruthful manner, by saying, No.

Going back to my metaphor, what I was thinking of is looking at the Dewey Decimal numbers of those books in the metaphorical library, he continued. To me collection of U.S. persons data would mean taking the books off the shelf, opening it up and reading it.

Wyden, who knew Clappers answer was untrue from Senate intelligence briefings, recently said hed spent six months teeing it up to ask that question, and that hes been just as careful with the question he asked Coats, suggesting theres more to the answer than Coats provided in June.

Im not dropping this, Wyden said in July. And to say, Oh, he responded to something different, Ill let you draw your own conclusions on that.

Snowden in a March interview said using Section 702 to surveil Americans comes down to little more than word games.

These intelligence agenciestheyre saying to them, collect doesnt mean that we copied your communications, that we put it in the bucket, that we saved it in case we want to look at it, he told The Intercept. To them, collect means that they take it out of the bucket, and actually look at it and read it.

Section 702 expires at the end of December unless Congress renews the law.

Follow Giuseppe on Twitter

Subscribe for the Latest From InsideSources Every Morning

Original post:
Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers - InsideSources

Posted in NSA | Comments Off on Senator Asks Spy Chief If Americans Are Targeted Under Expiring NSA Powers – InsideSources

What do DoD officials think of splitting NSA/CYBERCOM dual hat? – Federal Times

Posted: August 1, 2017 at 5:56 pm

For the past few years, there has been much discussion regarding the separation of these two agencies as CYBERCOM was co-located with NSA at its standing up to help get the organization on its feet. As their capabilities and capacities mature, there has arisen a heated argument between some in the executive branch and in Congress to split the two, something that was always envisioned with no clear timeline indicated.

According to officials, DoD does not have an official position on the advantages and disadvantages of the dual-hat leadership arrangement of NSA/CSS and CYBERCOM, GAOs report said. As of March 2017, DoD officials informed us that DoD had not determined whether it would end the dual-hat leadership arrangement and was reviewing the steps and funding necessary to meet the requirements established in the law.

Advantages include more in-depth coordination and collaboration, faster decision-making and more efficient use of resources.

Disadvantages, meanwhile, citing comments from officials canvased, include:

Congress has stipulated a series of measures the government must meet prior to severing the dual-hat, one of which is the cyber mission force must reach full operational capability, something that is not slated to occur until September 2018.

The GAO report also outlined, based on conversations with DoD officials, efforts to mitigate risks associated with ending the dual-hat. They include:

Read the original here:
What do DoD officials think of splitting NSA/CYBERCOM dual hat? - Federal Times

Posted in NSA | Comments Off on What do DoD officials think of splitting NSA/CYBERCOM dual hat? – Federal Times

Report: NSA Illegally Surveilled Kim Dotcom in New Zealand – Newsmax

Posted: at 5:56 pm

The National Security Agency used New Zealand government technology to spy on Megaupload founder Kim Dotcom, The New Zealand Herald reports.

New Zealand's Government Communications Security Bureau (GCSB) admitted to the country's high court that it ended surveillance on Dotcom in 2012. However, the Herald obtained the court judgment in July showing that the GCSB "has admitted unlawfully intercepting private communications of Kim and Mona Dotcom (the Dotcoms) and Bram van der Kolk during the period from Dec. 16, 2011 to March 22, 2012."

The documents show that the GCSB ended its active involvement on Jan. 20, 2012, the day Dotcom's mansion was raided by the police. However, "limited interception of some communications continued beyond the detasking date without the knowledge of GCSB staff."

A 2013 review of the GCSB found that it had unlawfully spied on 88 people.

According to the Herold, the GCSB documents contain an admission of NSA involvement, but it was not made outright.

Dotcom told the Herald, "New Zealanders must know how much power a foreign state holds over their private information."

He added, "The NSA has unrestricted access to GCSB surveillance systems. In fact, most of the technology the GCSB uses was supplied by the NSA."

Dotcom also said he expects his legal team to take action in response to this revelation.

"If the GCSB was aiding and abetting the NSA to spy directly on New Zealanders, then the seriousness of the situation has changed dramatically and a truly independent inquiry and a new criminal investigation will be unavoidable."

2017 Newsmax. All rights reserved.

See the article here:
Report: NSA Illegally Surveilled Kim Dotcom in New Zealand - Newsmax

Posted in NSA | Comments Off on Report: NSA Illegally Surveilled Kim Dotcom in New Zealand – Newsmax

ShadowBrokers leak probe looking at NSA insiders: report – The Hill

Posted: at 5:56 pm

Investigators believe the ShadowBrokers leaks were from a National Security Agency insider, thewebsite CyberScoop reports.

Since August of last year, the ShadowBrokers have leaked files apparently stolen from the NSA, primarily source code for NSA hacking tools along with some additional files.

One set of files leaked by the group contained tools to hack into the Windows operating system. Those tools were eventually used in the devastating international ransomware attacks known as WannaCry and NotPetya.

WannaCry infected between hundreds of thousands and millions of systems, causing such damage to the United Kingdoms hospitals that some patients were turned away. NotPetya caused significant damage to a major Russian energy firm and the U.S.-based pharmaceutical giant Merck.

Citing multiple sources familiar with the investigation, CyberScoop reports that ex-NSA employees have been contacted by investigators concerning how the ShadowBreakers obtained their cache of files.

The report claims that the leadingtheory is that an inside actor was at the helm but that other theories are still in the mix, including a foreign hacker.

Sources also told CyberScoop that the investigation "goes beyond" Harold Martin, the NSA contractor arrested for hoarding classified documents at his home last year.

The ShadowBrokers claim to have leaked files to raise interest for a planned sale of the remaining cache of documents. Currently, the group is offering a subscription, leak-of-the-month service.

The rest is here:
ShadowBrokers leak probe looking at NSA insiders: report - The Hill

Posted in NSA | Comments Off on ShadowBrokers leak probe looking at NSA insiders: report – The Hill

NSA whistleblower Snowden: VPN ban makes Russia ‘less safe and less free’ – ZDNet

Posted: July 31, 2017 at 9:57 am

NSA whistleblower Edward Snowden argues that Russia's decision to outlaw VPNs is a "tragedy of policy".

Edward Snowden has laid into the Russian government for banning the use of virtual private networks (VPNs) and other tools that people can use to circumvent censorship and surveillance.

Russian president Vladimir Putin signed the law on Sunday, prompting a Twitter tirade from Snowden, the US National Security Agency (NSA) whistleblower who has been sheltering in Moscow since 2013.

Snowden called the decision a "tragedy of policy" that would make Russia "both less safe and less free". He also linked the government's move to China's crackdown on VPN technology, which led Apple to pull dozens of VPN apps from its Chinese App Store over the weekend.

"Whether enacted by China, Russia, or anyone else, we must be clear this is not a reasonable 'regulation,' but a violation of human rights," Snowden wrote, arguing that, "If the next generation is to enjoy the online liberties ours did, innocuous traffic must become truly indistinguishable from the sensitive."

He also appeared to urge tech industry workers to push back against the anti-VPN trend.

Linking Russia's move to China's crackdown on VPN technology, Snowden urged tech workers to be vigilent.

Snowden is these days the president of the Freedom of the Press Foundation. In line with his 2013 decision to expose the NSA's mass-surveillance activities, he has long been an advocate of individuals being able to protect their communications and online activities.

However, he has previously warned against people relying too much on VPNs, because their operators may be vulnerable to hacks or subpoenas that could expose users.

The former NSA contractor originally fled from the US to Hong Kong, where he famously started working with newspapers to expose the agency's activities.

Then, while apparently trying to fly to Latin America, Snowden found himself stranded at a Moscow airport because the US had cancelled his passport. The Russians granted him asylum, which was extended for "a couple more years" in January this year.

During his stay there, Snowden has occasionally voiced strong criticism of Russia's surveillance policies.

In mid-2016, when the Russian government introduced a data-retention law and forced communications providers to help decrypt people's messages, the American said the legislation was "an unworkable, unjustifiable violation of rights that should never have been signed".

In 2014, he also denounced the so-called Blogger's Law, which imposed restrictions on what bloggers can write.

The latest law, banning VPNs, will come into effect in November this year. It is mainly intended to stop Russians viewing websites that are on the official state blacklist.

Read more:
NSA whistleblower Snowden: VPN ban makes Russia 'less safe and less free' - ZDNet

Posted in NSA | Comments Off on NSA whistleblower Snowden: VPN ban makes Russia ‘less safe and less free’ – ZDNet

Online site backing defense of accused NSA leaker founded to promote fearless journalism – The Augusta Chronicle

Posted: July 30, 2017 at 1:56 pm

The founders of the online news publication that will help in the defense of a Fort Gordon contractor accused of leaking a classified document were among the first to report on the National Security Agency surveillance of citizens in other countries and at home in 2013, using thousands of documents leaked by a former NSA contractor, Edward Snowden.

While the document published by The Intercept which the government says came from NSA contract employee Reality Leigh Winner of Augusta is still considered classified by prosecutors, it allegedly concerns the NSA analysis of Russias efforts to infiltrate a voting software company and infect computers used by state election officials. The Intercept published a story based on the analysis, and Winner was arrested June 3.

According to The Intercepts site, journalists Glenn Greenwald, Laura Poitras and Jeremy Scahill founded the online publication dedicated to fearless, adversarial journalism. EBays founder Pierre Omidyar provided the funding in 2013 for First Look Media in 2013, a non-profit, which launched The Intercept.

The Intercept has an average of 5 million visitors a month, said Vivian Siu, director of communications for First Look.

The online publication has a lot of readers in and outside of the U. S., said Rick Edmonds, media business analysis with the Poynter Institute, a nonprofit school for journalism. The Intercept began as a site for leaked documents but has expanded into other areas, Edmonds said. Non-profit, online publications are definitely a growing part of journalism and investigative reporting, he said.

The non-profit, online publication ProPublica has been publishing significant investigative work, Edmonds noted. There is also the International Consortium of Investigative Journalists that won a Pulitzer Prize for the Panama Papers investigation into the finances of Pakistani Prime Minister Nawaz Sharif, which led to his resignation Friday. The new form of journalism has a significant presence, Edmonds said.

I believe that great journalism boils down to a few key principles, Scahill wrote in an article asking for readers support for investigative journalism. Hold those in power accountable, regardless of their political or corporate affiliations; give voice to the voiceless; provide people with information they can use to make informed decisions; be transparent with your readers about how you know what you know; (and) make sure your facts are straight.

Scahill won a George Polk Award for his reporting in war zones and for his 2008 report about Blackwater, the private armed security force. Greenwald is a journalist and attorney who wrote four New York Times best-sellers on politics and law. He also wrote No Place to Hide about the U.S. surveillance and his experience in reporting on the Snowden documents. In 2013 he was awarded a George Polk award and several others for his reporting on the Snowden documents.

Poitras was also awarded a George Polk award and shared the 2014 Pulitzer Prize for public service with The New York Times. Poitras left The Intercept for Field of Vision, which is also part of First Look Media. She was awarded an Academy Award for best documentary in 2015.

The Intercept has won a number of national journalism awards. It focuses on national security, politics, civil liberties, the environment, international affairs, technology, criminal justice, the media and more, according to its website. And it seeks whistleblowers, providing an email site and online drop box.

In Winners case, the Press Freedom Defense Fund of the First Look Media is giving $50,000 in matching funds to Stand with Reality, a fundraising campaign. First Looks attorney Baruch Weiss, a former U.S. attorney with experience in NSA investigations, will support Winners local defense team.

Winner is in custody without bond. She has pleaded not guilty to one count of willful retention and transmission of national defense information.

Reach Sandy Hodson at sandy.hodson@augustachronicle.com or (706) 823-3226

Follow this link:
Online site backing defense of accused NSA leaker founded to promote fearless journalism - The Augusta Chronicle

Posted in NSA | Comments Off on Online site backing defense of accused NSA leaker founded to promote fearless journalism – The Augusta Chronicle

Mid Range | Firewalls | SonicWall

Posted: July 28, 2017 at 6:56 pm

_productName NSA 6600 NSA 5600 NSA 4600 NSA 3600 NSA 2600 Deep Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Stateful Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Unlimited File Size Protection TotalSecure Firewall Overview S S S S S Protocols Scanned TotalSecure Firewall Overview S S S S S Application Intelligence and Control Threat Prevention Services Available S S S S S Intrusion Prevention Service Threat Prevention Services Available S S S S S Gateway Anti-Virus and Anti-Spyware Threat Prevention Services Available S S S S S Content & URL Filtering (CFS) Threat Prevention Services Available S S S S S SSL Inspection (DPI SSL) Threat Prevention Services Available S S S S S Content Filtering Client (CFC)1 Threat Prevention Services Available O O O O O Analyzer Reporting1 Threat Prevention Services Available O O O O O Capture Advance Threat Protection1 Threat Prevention Services Available O O O O O Enforced Client Anti-Virus and Anti-Spyware (McAfee or Kaspersky) Threat Prevention Services Available O O O O O 24x7 Support Threat Prevention Services Available S S S S S Interfaces Firewall General 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 8x1 GbE, 1GbE Management, 1 Console Management Firewall General CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS Nodes Supported Firewall General Unrestricted Unrestricted Unrestricted Unrestricted Unrestricted RAM Firewall General 4 GB 4 GB 2 GB 2 GB 2 GB Visual Information Display (LCD Display) Firewall General N N N N N Site-to-Site VPN Tunnels Firewall General 6000 4000 1500 1000 75 Global VPN Clients (Maximum) Firewall General 2000 (6000) 2000 (4000) 500 (3000) 50 (1000) 10 (250) SSL VPN NetExtender Clients (Maximum) Firewall General 2 (1500) 2 (1000) 2 (500) 2 (350) 2 (250) VLAN Interfaces Firewall General 500 400 256 256 256 SonicPoints Wireless Controller Firewall General S S S S S WWAN Failover (4G/LTE) Firewall General S S S S S Network Switch Management Firewall General S S S S S Firewall Inspection Throughput2 Firewall/VPN Performance 13 Gbps 9 Gbps 6 Gbps 3.4 Gbps 1.9 Gbps Full DPI Performance (GAV/GAS/IPS) Firewall/VPN Performance 3 Gbps 1.6 Gbps 800 Mbps 500 Mbps 300 Mbps Application Inspection Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps IPS Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps Anti-Malware Inspection Throughput Firewall/VPN Performance 3 Gbps 1.7 Gbps 1.1 Gbps 600 Mbps 400 Mbps IMIX performance Firewall/VPN Performance 3.5 Gbps 2.4 Gbps 1.6 Gbps 900 Mbps 600 Mbps SSL DPI Performance Firewall/VPN Performance 1.3 Gbps 800 Mbps 500 Mbps 300 Mbps 200 Mbps VPN Throughput4 Firewall/VPN Performance 5 Gbps 4.5 Gbps 3 Gbps 1.5 Gbps 1.1 Gbps Latency Firewall/VPN Performance 16 s 24 s 17 s 38 s 45 s Maximum Connections5 Firewall/VPN Performance 750K 750K 400K 325K 225K Maximum DPI Connections Firewall/VPN Performance 500K 500K 200K 175K 125K DPI-SSL Connections Firewall/VPN Performance 6000 4000 3000 2000 1000 New Connections/Sec Firewall/VPN Performance 90000 60000 40000 20000 15000 Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Network Traffic Visualization Features S S S S S Netflow/IPFIX Reporting Features S S S S S SNMP Features S S S S S Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database Dynamic Routing Features BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP Single Sign-on (SSO) Features S S S S S Voice over IP (VoIP) Security Features S S S S S Interface to Interface Scanning Features S S S S S PortShield Security Features S S S S S Port Aggregation Features S S S S S Link Redundancy Features S S S S S Policy-based Routing Features S S S S S Route-based VPN Features S S S S S Dynamic Bandwidth Management Features S S S S S Stateful High Availability Features S S S S S Multi-WAN Features S S S S S Load Balancing Features S S S S S Object-based Management Features S S S S S Policy-based NAT Features S S S S S Inbound Load Balancing Features S S S S S IKEv2 VPN Features S S S S S Active/Active Cluster Features S S S S S Terminal Services Authentication/Citrix Support Features S S S S S TLS/SL/SSH decryption and inspection Features S S S S S SSL Control for IPv6 Features S S S S Easy VPN Features S S S S Biometric Authentication Features S S S S DNS Proxy Features S S S S Hardware Failover Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Multi-WAN Failover Failover S S S S S Automated Failover/Failback Failover S S S S S

View post:
Mid Range | Firewalls | SonicWall

Posted in NSA | Comments Off on Mid Range | Firewalls | SonicWall

Released Documents Show More Section 702 Violations By The NSA – Techdirt

Posted: at 6:56 pm

Always lawful and subject to strict oversight. Those are the NSA's defenses any time someone leaks something about its surveillance programs or obtains documents indicating abuse of snooping powers. It gets a little old when it's document after document showing the astonishing breadth of the NSA's surveillance programs or the continual abuse and misuse of these powers.

The Hill has dug through some recently-released documents and memos from the NSA which show long-term abuse of surveillance programs. The NSA recently ditched part of its Section 702 collection because it just couldn't stop hoovering up Americans' communications. This was "incidental," according to the NSA, and supposedly impossible to stop. But the incidents detailed in these documents suggest a lot of over-collection happened because no one noticed and, if anyone did, no one cared.

They detail specific violations that the NSA or FBI disclosed to the Foreign Intelligence Surveillance Court or the Justice Department's national security division during President Obamas tenure between 2009 and 2016. The intelligence community isn't due to report on compliance issues for 2017, the first year under the Trump administration, until next spring.

The NSA says that the missteps amount to a small number less than 1 percent when compared to the hundreds of thousands of specific phone numbers and email addresses the agencies intercepted through the so-called Section 702 warrantless spying program created by Congress in late 2008.

This is about the only place where any American can become part of the "one percent:" as the unwitting subject of NSA surveillance. NSA spokesman Michael Halbig says evidence of misuse is a sign the oversight is working. But oversight is also supposed to aid in prevention, not just detection of past misuse. And the NSA's internal oversight isn't nearly as "robust" as Halbig attempts to portray it.

The Hill reviewed the new ACLU documents as well as compliance memos released by the NSA inspector general and identified more than 90 incidents where violations specifically cited an impact on Americans. Many incidents involved multiple persons, multiple violations or extended periods of time.

For instance, the government admitted improperly searching the NSAs foreign intercept data on multiple occasions, including one instance in which an analyst ran the same search query about an American every work day for a period between 2013 and 2014.

The NSA also passed on intel to the FBI and CIA without properly minimizing it and made other dissemination errors. The documents show the NSA was also slow to inform other agencies of its minimization failures. Notification is supposed to made within five days of discovery, but in some cases it took the NSA more than three months to inform intel recipients of the error.

This information has been released at a critical time for the NSA. Section 702 powers are sunsetting this year and could be subject to additional modifications prior to their renewal. The FBI --perhaps even more than the NSA -- is looking for a clean reauthorization of Section 702 programs. This administration favors a clean re-auth, which means complaints about a 1% violation rate aren't likely to change anyone's mind. But 1% of several hundred million yearly searches is still a very large number of violations. If Google or Microsoft suffered a breach affecting the privacy of 1% of its users, it would be a huge problem even if the number of affected accounts amounted to a rounding error.

Former House Intelligence Committee Chair Pete Hoekstra -- a former surveillance state cheerleader -- now worries the NSA's collection powers have increased far past the point of reason. As he points, 1% simply isn't an acceptable failure rate.

One percent or less sounds great, but the truth is 1 percent of my credit card charges dont come back wrong every month. And in my mind one percent is pretty sloppy when it can impact Americans privacy.

More here:
Released Documents Show More Section 702 Violations By The NSA - Techdirt

Posted in NSA | Comments Off on Released Documents Show More Section 702 Violations By The NSA – Techdirt

Chinese President Xi meets NSA Ajit Doval, hails security heads for building cooperation – Economic Times

Posted: at 6:56 pm

NEW DELHI: Chinese President Xi Jinping on Friday said enhancing BRICS cooperation not only protects and expands the interests of BRICS countries, but also helps explore ways to build a new type of international relations in what could be viewed as a remark that the platform could be used by both India and China for global cooperation across wide range of areas including security challenges.

Xi made the remarks during his meeting with Russian Security Council secretary Nikolai Patrushev, South African minister of state security David Mahlobo, Indian National Security Adviser Ajit Doval, and Brazilian Institutional security minister Sergio Etchegoyen, who were in Beijing to attend the seventh meeting of BRICS High Representatives for Security Issues.

Xi, in his address to the BRICS NSAs, praised them for building a mutual trust and cooperation among the member nations.

Doval's meeting with Xi comes amid high tensions between India and China owing to Doklam standoff. Xi, according to state-run news agency Xinhua, congratulated all NSAs on the success of the two-day meeting, saying that it has made important preparations for the upcoming BRICS summit in China's southeastern coastal city of Xiamen in September.

Prime Minister Narendra Modi will attend the summit with the two sides looking forward to end the standoff at border ahead of that. Doval and his Chinese counterpart had discussed the issue in their standalone bilateral meet on Thursday and the possible way forward to end the stalemate.

See the article here:
Chinese President Xi meets NSA Ajit Doval, hails security heads for building cooperation - Economic Times

Posted in NSA | Comments Off on Chinese President Xi meets NSA Ajit Doval, hails security heads for building cooperation – Economic Times

Accused NSA leaker’s supporters ask feds to drop charges against her – MyAJC

Posted: at 6:56 pm

Reality Winners supporters said they delivered petitions with more than 16,000 signatures to the U.S. Justice Departments headquarters in Washington Thursday, asking the agency to drop its charges against the accused National Security Agency leaker.

Among those delivering the petitions on Whistleblower Appreciation Day were representatives from several groups, including CodePink, Defending Rights & Dissent, RootsAction.org, Whistleblower and Source Protection Program and Stand with Reality, a nonprofit campaign that is supporting Winners case through advocacy and fundraising.

"We should not be charging whistleblowers acting in the public interest, disclosing information responsibly to journalists, as if they were traitors to our country. Anyone who cares about a free press should be concerned about her case, Rainey Reitman, co-founder of Stand with Reality, said in a prepared statement.

The Justice Department declined to comment.

Federal prosecutors have accused Winner of leaking to The Intercept online news outlet a top-secret NSA report about Russias meddling in the 2016 presidential election. The Intercept published the report, which says Russian military intelligence officials tried to hack into the U.S. voting system just before last Novembers election.

A federal grand jury has indicted Winner, 25, on a single count of "willful retention and transmission of national defense information. She faces up to 10 years in prison and $250,000 in fines. Winner, who is being held in the Lincoln County Jail, has pleaded not guilty to the charge.

Meanwhile, federal prosecutors are defending their proposed rules for safeguarding top-secret information during her trial, now set for Oct. 23 in Augusta. Winners defense attorneys have argued those rules could block her from getting a fair hearing. Specifically, they have said the governments proposed protective order could prevent Winner from reviewing evidence in the case, including classified information. That, they said, would amount to a violation of the former Air Force linguists Sixth Amendment right to confer with her attorneys.

RELATED:Accused NSA leakers attorneys push back against proposed secrecy rules for trial

But in a court papers filed this week, the prosecutors said she will be given access to the records she is entitled to see under the Classified Information Procedures Act and as required by due process. But her attorneys must ask the court for her to see such documents, the prosecutors said.

The scope of classified discovery in this case has not yet been determined. It may include, for example, classified information to which the defendant has not previously had access, the government said in its court filing. Given the charge against the defendant, disclosing that information to her could further jeopardize national security. If defense counsel believe that they must disclose specific information provided in discovery to the defendant, that should be the subject of a subsequent motion.

Winners attorneys are also seeking permission to quote from records already in the public domain, including newspaper articles. Prosecutors have pointed to case law that says disseminating classified information that has already been made public could harm government intelligence sources and operations. Further, Winners defense team is objecting to proposed requirements that they identify expert witnesses they ask to review classified evidence, saying that would amount to an unfair advantage for prosecutors.

The government has a legitimate interest in knowing who is accessing classified information, the prosecutors said. The defense has not identified any prejudice that would result from disclosing experts identities to the government. Accordingly, the government should receive advance notice of all personnel for whom the defense seeks access to classified discovery and an opportunity to submit objections to the court if necessary.

See more here:
Accused NSA leaker's supporters ask feds to drop charges against her - MyAJC

Posted in NSA | Comments Off on Accused NSA leaker’s supporters ask feds to drop charges against her – MyAJC

Page 10«..9101112..2030..»