Page 50«..1020..49505152..6070..»

Category Archives: NSA

Will Fight Even on Foreign Soil to Protect India: Video of NSA Dovals Chat With Ashram Head Surf… – News18

Posted: October 25, 2020 at 10:35 pm

On a day when RSS chief Mohan Bhagwat talked about China "encroaching" on Indian soil, a video of National Security Advisor Ajit Doval has surfaced in which he can be purportedly seen and heard asserting India's capability to fight on its own soil as well as on foreign soil.

In the video, uploaded on the Facebook page of a Rishikesh-based ashram called Parmarth Niketan, Doval can be seen sharing space with the head of the ashram, Chidanand Saraswati. The video is dated October 24 and titled Special Ashtami and Navami Navaratri Pujan and Ganga Aarti.

"You said that we have never attacked," Doval purportedly says to Saraswati. "There are views about it, that if there was danger from somewhere, we should have done it. To save the country is essential. But that we will fight only where you want to fight is not necessary.

In what could be read as a warning to China, the NSA indicated that response from India could be at a place and time of Indias choosing. We never became aggressors to serve our personal interests. We will surely fight, on our soil as well as on foreign soil, but not for our personal interests. But in the interests of Parmarth [spirituality], Doval said.

The video featuring the NSA talking about taking on China has surfaced the same day when RSS chief Bhagwat talked about China encroaching on Indian soil and being stunned by Indias response.

Ours is a civilisation state. It is not based on any religion, language or sect. What cannot be seen, what is the foundation of this nation is its culture, Doval says, complementing the spiritual leaders for keeping it alive.

Praising rishis and munis, Doval says they founded the nation of India which was separate from the state of India. We dont safeguard the nation, we secure the state. State has definite boundaries. The nation is safeguarded by those who found it. It is founded by people like you, Doval can be heard telling Chidanand Saraswati.

The soul of the Indian nation has been sparked by rishis and munis, and sages like you. If the nation was not there, then there would have been no state. Even if the state is not around, the nation will continue to be, Doval says in the video.

He said that India was the only civilisation that continued to remain alive for thousands of years despite coming under attack by foreign aggressors. Doval said that the Persian civilisation was finished after one attack, as was the Egyptian civilisation.

Addressing the head of Parmarth Niketan, the National Security Advisor said, The talent and skills [we have] are not difficult to learn. They take timeWe can only give our lives. We fight for physical things, with physical things. Only you can fight with spirituality.

Continued here:
Will Fight Even on Foreign Soil to Protect India: Video of NSA Dovals Chat With Ashram Head Surf... - News18

Posted in NSA | Comments Off on Will Fight Even on Foreign Soil to Protect India: Video of NSA Dovals Chat With Ashram Head Surf… – News18

China govt uses United Front to gather intel on citizens abroad, says US dy NSA – The Indian Express

Posted: at 10:35 pm

Written by Kaunain Sheriff M | New Delhi | Updated: October 25, 2020 7:14:37 amThe Indian Express investigation, China is Watching, was published in September.

Referring to revelations in a series of investigative reports by The Indian Express and other global publications on how a private technology firm in Shenzhen, with links to the Chinese government and Communist Party of China (CPC) uses big data tools for hybrid warfare, a top US Security official has said that the Chinese foreign ministry handles a United Front, which includes powerful tech firms that gather intelligence to influence private citizens overseas.

Pointing to the database of Zhenhua Data, which targets individuals and institutions in politics, government, business, technology, media, and civil society, US Deputy National Security Advisor Matt Pottinger has said that the CPC is compiling digital dossiers on millions of foreign citizens around the world, with the aid of new tools of digital surveillance.

Pottinger made the remarks from White House on Thursday during a video conference hosted by Policy Exchange in London.

The Indian Express, using big-data tools, investigated metadata from Zhenhuas operations to extract Indian entities from the massive dump of log files that constituted what the company called Overseas Key Information Database (OKIDB). The investigation, published in September, had revealed the firm is monitoring over 10,000 Indian individuals, including President Ram Nath Kovind, Prime Minister Narendra Modi, Congress president Sonia Gandhi and their families.

The exposure last month of a Chinese database on at least 2.4 million people around the world, including many of us on this call, speaks to the Partys (CPCs) sheer ambition to wed traditional Leninist techniques with powerful new tools of digital surveillance, Pottinger said.

He claimed Chinas United Front Work system is handled by the countrys foreign ministry and gathers intelligence about, and works to influence, private citizens overseas. He said, The focus is on foreign elites and the organizations they run. Think of a United Front worker as a cross between an intelligence collector, a propagandist, and a psychologist.

Pottinger said while Zhenhua isnt a particularly large or sophisticated actor in the United Front world, it may even be acting opportunistically, because it thinks the Party will reward it.

He said, Far more powerful tech firms, including famous Chinese app developers, play a much bigger role in this kind of work. The dossiers Zhenhua is compiling include people in virtually every country, no matter how small. They include members of royal families and members of Parliament, judges and clerks, tech mavens and budding entrepreneurs, four-star admirals and crew members of warships, professors and think-tankers, and national and local officials. They also include children, who are fair game under Beijings rules of political warfare. No one is too prominent or too obscure.

Pottinger said the United Front Work is a serious business, and the focus is on foreign elites and organisations they run. He said, the United Front Work Department alone has four times as many cadres as the US State Department has foreign-service officers.the United Front gathers intelligence about, and works to influence, private citizens overseas.

Read The Indian Express investigative series China is Watching

The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines

For all the latest India News, download Indian Express App.

The Indian Express (P) Ltd

Original post:
China govt uses United Front to gather intel on citizens abroad, says US dy NSA - The Indian Express

Posted in NSA | Comments Off on China govt uses United Front to gather intel on citizens abroad, says US dy NSA – The Indian Express

How the NSA built its offensive computer warfare unit – The Market Mail

Posted: at 10:35 pm

In a long (long) portrait dedicated to the NSA and US Cyber Command boss General Paul Nakasone, Wired revealed that in two years, it authorized more cyber attacks than before. NSA since its inception.

The NSA has long monitored and spied on its targets abroad. Wired describes how he did not initiate what would become his cyber command responsible for defending American systems and attacking his adversaries and enemies until 2009. Russia had indeed entered its classified computer network and disconnected from the Internet, possibly via a broken USB key.

Nakasone was then appointed as the head of a group nicknamed the Four Horsemen (four horsemen including a woman), who were responsible for explaining what the NSAs Cyberdefense Division would be, but raising it from 100 to 2000 Also for cyber fighters.

Unlike France, which refuses to attribute the attacks that identify the countries launching them and does not officially recognize its offensive computer warfare (LIO) operations, Nakasone was convinced that it It was necessary to communicate. Wanting to leave the private sector to join their units, not only to gain more resources and powers from the authorities, but to create hackers, and finally to demonstrate their expertise to reject their rivals.

Launched in 2010, USCYBERCOM today has more than 6,000 cyber-fighters, in addition to 38,000 and 20,000 private intelligence contractors working for the NSA.

Here is the original post:
How the NSA built its offensive computer warfare unit - The Market Mail

Posted in NSA | Comments Off on How the NSA built its offensive computer warfare unit – The Market Mail

NSA Warns China Is Targeting Flaws in U.S. National Security Systems – Nextgov

Posted: October 24, 2020 at 6:02 am

The National Security Agency issued an advisory warning that adversaries connected to China are targeting national security systems and noted specific areas and vulnerabilities defenders should focus on based on tactics theyve recently observed.

We hear loud and clear that it can be hard to prioritize patching and mitigation efforts, NSA Cybersecurity Director Anne Neuberger said in a press release Tuesday. We hope that by highlighting the vulnerabilities that China is actively using to compromise systems, cybersecurity professionals will gain actionable information to prioritize efforts and secure their systems.

Government officials at the Cybersecurity and Infrastructure Security Agency and the FBI have previously called attention to the use of known vulnerabilities by China and other actors. NSA officials hope that specifically calling out the tactic as one of state-sponsored adversaries from China will spur target organizations to do whats necessary to protect themselves.

We are releasing this now to emphasize the importance of mitigating these [Common Vulnerability Enumerations], Neuberger said in a statement to Nextgov. "While these vulnerabilities are already public, theyre still being successfully leveraged by malicious cyber actors, highlighting the need for [national security systems, Department of Defenseand defense industrial base] system owners and the broader community to take action.

Among 25 vulnerabilities NSA described, seven of them could be used to gain remote access to internal systems, making them priorities for mitigation.

Remote access systems serve as gateways from the internet into internal networks, often offering immediate, highly privileged access to attackers, according to an infographic the NSA released with the advisory.

Lower in the risk profile, but with just as many vulnerabilities, was a category of weaknesses that could be used to exploit internal servers. These servers typically house an organizations intellectual property or other crown jewels.

Other vulnerabilities listed could be used to exploit mobile device managementby distributing malicious apps, for example; access to directories to elevate or otherwise manipulate credentials; public facing servers, which could allow attackers to pivot to internal networks by getting around web authentications; user workstations to establish a base for further exploration; and network devices, which can be used to inject malicious links in network traffic.

Many of the vulnerabilities listed can be used to gain initial access to victim networks by exploiting products that are directly accessible from the Internet. Other vulnerabilities enable further exploitation of a network once cyber actors have a presence within the network, reads an NSA factsheet on the advisory. Exploiting a combination of these vulnerabilities can be particularly effective for cyber actors and problematic for network defenders.

Some of the vulnerabilities come with tailored mitigations, but generally, the NSAs first piece of advice is to apply patches for systems or products as soon as possible after theyre released.

However, the NSA notes, defenders should expect that data stolen or modified (including credentials, accounts, and software) before the device was patched will not be alleviated by patching. This is where it would be good to change passwords and review account access, the advisory said.

The NSA said organizations should also disable external management capabilities and set up an out-of-band management network; block obsolete or unused protocols at the network edge and disable them in device configurations; isolate Internet-facing services in a network Demilitarized Zone (DMZ) to reduce the exposure of the internal network; and enable robust logging of Internet-facing services and monitor the logs for signs of compromise.

Originally posted here:
NSA Warns China Is Targeting Flaws in U.S. National Security Systems - Nextgov

Posted in NSA | Comments Off on NSA Warns China Is Targeting Flaws in U.S. National Security Systems – Nextgov

NSA Issues List of Vulnerabilities Used by Chinese Backed Hackers – JD Supra

Posted: at 6:02 am

The National Security Agency (NSA) issued a Cybersecurity Advisory on October 20, 2020, entitled Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities, alerting IT professionals to 25 vulnerabilities that Chinese state-sponsored hackers are using against U.S. businesses that can be exploited to gain initial access to victim networks using products that are directly accessible from the internet and act as gateways to internal networks. The Advisory is designed to share information with security professionals to urge them to update systems to protect against the attacks.

According to the notice, [W]e hope that by highlighting the vulnerabilities that China is actively using to compromise systems, cybersecurity professionals will gain actionable information to prioritize efforts and secure their systems.

The 25 vulnerabilities can be accessed here:

The Advisory further provides general mitigation steps that companies can employ:

The vulnerabilities are listed in detail in the Advisory and companies may wish to confirm that all of the vulnerabilities listed have been patched on their systems.

[View source.]

Go here to read the rest:
NSA Issues List of Vulnerabilities Used by Chinese Backed Hackers - JD Supra

Posted in NSA | Comments Off on NSA Issues List of Vulnerabilities Used by Chinese Backed Hackers – JD Supra

Why the NSA Told Henry Kissinger to Drop Dead When He Tried to Cut Intel Links with Britain – The Daily Beast

Posted: at 6:02 am

LONDONHenry Kissinger once tried to come between the National Security Agency (NSA) and Britains GCHQ, their signals intelligence (SIGINT) brothers from the other side of the pond, and the response from the U.S. intelligence agency was short and swift.

The NSA simply said, Drop dead, says the author of a new authorized history of GCHQ, who explains that the two intelligence agencies have a closer relationship with each other than they do with their own governments.

The worlds two leading signals intelligence agencies are so tightly bound together that they share virtually all of the material they gather with no questions asked. Over the years, GCHQ (Government Communications Headquarters) has frequently protected the NSA from rivals within the U.S. including the CIA and Naval intelligence unitsand even their respective presidents and prime ministers come second in the hierarchy of loyalty, according to Behind the Enigma: The Authorized History of GCHQ, Britains Secret Cyber-Intelligence Agency by John Ferris.

I say in the bookand both GCHQ and NSA allowed me to say itthat at some point or another, every director of GCHQ and NSA colludes with each other in order to do something which their own national authority might try to impede, Ferris told The Daily Beast.

One such clash arose in 1973 when Kissinger, who was President Nixons national security adviser at the time, ordered the NSA to stop sharing signals intelligence with Britain in order to pressure London to support Nixons Israel policy.

The NSA refused to comply, challenging Kissingers authority despite his key role at the White House. Ironically, under the shared intelligence agreement between the agencies, Kissingers move would have left the U.S. flying blind in the Middle East because collecting signals intelligence in the region was entirely the domain of the British who funnelled the intel back to Fort Meade.

One of the most bizarre aspects of this unparalleled intelligence sharing partnership is that it is not enshrined in any treaty; its a subnational, totally non-binding agreement, which makes the NSAs willingness to stand up to Kissinger even more extraordinary.

If Jeremy Corbyn had been elected with a majority, I think he would have broken it and he could have done so. And if Donald Trump wanted to break it, he could do so. Any British prime minister or American president is free to choose. The problem is theyre so closely intertwined that it would cause massive immediate problems, or huge amounts of expenditure to overcome. That wouldnt have bothered Corbyn, said Ferris.

The relationship was also entirely secret for 25 years after World War II. It wasnt until 2010 that the documents behind the agreement were put into the public domain. This comprehensive book uses unprecedented access to GCHQ files to chart the full history of the agreement, which is called UKUSA (pronounced yoo-kusa, a bit like the Japanese mafia, by those in the know).

The only organization I can think of which in any way comes close is NORAD, the North American air defense system where the Canadian and American air defense systems are integrated. But thats much more narrow and specific than UKUSA, but thats the only other thing that comes close. So, yes, this is really unique, said Ferris, who is a professor of history at the University of Calgary in Canada.

At the end of the Cold War, during which British expertise on intercepting Russian communications had been instrumental, there was a fear that GCHQs influence would wane, but the agency, which is based in Cheltenham, southwest England, bucked expectations and repositioned itself as a trailblazer in modern signals intelligence.

With the resources freed from exhaustively covering the Soviet Union, GCHQ was able to start doing what its really good at, which is exploring new territoriesin this case, the early days of the internet, mapping it out for themselves and the Americans and then coming up with new methods of interception and cryptography to suit the new environment.

British paymasters recognized the outsized diplomatic clout they maintained in Fort Meade and in Washington, where GCHQ intel product remains highly respected, so long as the intelligence agency was allowed to thrive, and so investment in the agency remained relatively high despite the end of the Cold War.

Ferris was not allowed to detail current intel methods in the book for obvious reasons, but the documents published by Edward Snowden, who was employed by a contractor to work at an NSA facility, give an unmistakable insight into the current balance of the relationship between GCHQ and the NSA.

If Im judging simply by material which has been leaked, mostly by Snowden in the past five or six years, my sense is that the British are relatively much more significant than they were at any point since the 1960s, said Ferris. If you go through the Snowden material, youll find that a huge number of the technical innovations clearly are British, and, in fact, the Americans pay GCHQ to develop them.

The book argues that regular NSA efforts to subsidize GCHQ, which has a much smaller budget and staff, is a sign not of GCHQs weakness but of its strength. The British SIGINTers are seen as valuable scouts and innovators who routinely deliver a good return on investment. As the former director of GCHQ, David Omand, once joked, We have the brains. They have the money.

This is not to say, the NSA is not filled with brilliant people in itself, and their capacity for intelligence gathering is unparalleled. The Americans have this raw power, which once focused is overwhelming, said Ferris. I would personally say that NSA is one of the most technologically disruptive organizations in history. So, the two of them together are very formidable.

The relationship between the American and British signals intelligence communities blossomed during World War II, when U.S. pioneers were invited over to Bletchley Park, the legendary home of the codebreakers who cracked Germanys secret wartime communications.

Genuinely, they were astounded by the quality of every branch of British SIGINT and, in fact, came to understand that what the British were doing was very ahead of us in every single way, said Ferris.

NSA could trust GCHQ to have its back in a way that it cannot trust any other American agency to have its back.

John Ferris

Anglo-American relations were complicated during the course of the war, with Washington initially reluctant to become embroiled in another predominantly European conflict. After the war, American SIGINTers, with the help of GCHQ input, succeeded in convincing President Harry Truman that a large-scale peacetime SIGINT operation was necessary to ensure there was never a Nuclear Pearl Harbor.

UKUSA was established in 1946, linking American and British SIGINT efforts ever since. The agreement also took in Britains recent Dominions; Canada, New Zealand, and Australia. Together they formed a global network which is now known as Five Eyes.

The relative merits of NSA and GCHQ have fluctuated over the decades. In the 50s and even early 60s, GCHQ was still seen as the more impressive intelligence producer. American internal memos bemoaned the supremacy of GCHQs final product, which was often deemed better written and more fully analysed.

In the latter decades of the 20th century, big American investments in supercomputing and expensive advances, including satellite technology, ensured NSA was in the ascendancy.

The agreement was founded on individual personal relationships between SIGINTers, and sometimes those were rocky. There were complaints that GCHQ was hogging the most prestigious roles; British assessments of American product were sometimes deemed too rude to share; and in the mid-80s NSA Director William Odom complained that GCHQ did not carry out its share of the work given how much authority it demanded.

The British clearly cant accept happily their own loss of pre-eminence in this business, Odom wrote in his remarkably frank diary. Socially I no longer find the British amusing, merely a pain in the ass.

But throughout it all, NSA and GCHQ, two largely civilian organizations, maintained their togetherness. All of the Five Eyes countries would send senior liaison officers and up-and-coming integrees to work at the other agencies, sharing intel techniques and honing each others skills. A no-poach policy ensures that the agencies are willing to let their best and their brightest take part in the exchanges. In Behind the Enigma, Ferris writes:

In one legendary moment, an American integree at Cheltenham and a British one at Fort Meade conducted negotiations between GCHQ and NSA on behalf of their adopted services; in another, every member of a Sigint conference between Australia, Britain, Canada and the United States held a British passport.

GCHQ is also part of American decision-making. There are lots of interagency meetings and important issues where GCHQ representatives are part of the decision-making process right on U.S. soil. On Sept. 12, 2001, the head of GCHQ was on the only aircraft allowed into the United States immediately after 9/11. General Michael Hayden, former director of the NSA, has since said it was decided in the aftermath that GCHQ would assume command of all American SIGINT if Fort Meade was compromised.

NSA could trust GCHQ to have its back in a way that it cannot trust any other American agency to have its back. And GCHQ and NSA provide each other with state secrets, which only a handful of other people would see. It is one of the most unusual arrangements Ive ever seen, Ferris said.

If the agreement does eventually collapse it will cost the U.S. billions of dollars to replace the input from Britain.

General Hayden, who was director of both the NSA and CIA, was an exception, but there has often been a rivalry between the two agencies which dates back to the 1950s when NSA was created: CIA operatives around the world had previously been responsible for foreign SIGINT collection.

There was a huge amount of blood on the floor, said Ferris, and relations were often tough over the decades to come. There are moments when CIAfor good reasons or badis not doing what NSA would like. And GCHQ helps NSA avoid some of those problems. GCHQ has perfectly civil relations with CIA. So, its actually easier for GCHQ to get CIA to help NSA than it is for NSA to get CIA to help NSA.

Many SIGINTers believe UKUSA will eventually fall apart now that the unifying threat of the Cold War has faded away and there is no guarantee that new generations of political leaders will share common foreign policy goals. The strength of the agreement was tested in the Middle East in the 70s when British and American governments disagreed over Israel, and similarly two decades before when Washington did not support British policy during the 1956 Suez crisis. On that occasion GCHQ actually hampered British government policy by refusing to cooperate with French intelligence.

If the agreement does eventually collapse it will cost the U.S. billions of dollarsFerris believes the NSA budget would have to increase by around a thirdto replace the input from Britain. But even more than that, one of the greatest intelligence-gathering partnerships the world has ever seen would be permanently damaged.

Original post:
Why the NSA Told Henry Kissinger to Drop Dead When He Tried to Cut Intel Links with Britain - The Daily Beast

Posted in NSA | Comments Off on Why the NSA Told Henry Kissinger to Drop Dead When He Tried to Cut Intel Links with Britain – The Daily Beast

PRISM and privacy: Ways to avoid being spied on by the government – TechGenix

Posted: at 6:02 am

We live in a world of a beehive of online activities, with many individuals happily sharing their private information on the Internet. Unfortunately, Uncle Sam is constantly looking over your shoulder. Unknown to most people, a lot of data is collected via the U.S. National Security Agency (NSA) PRISM surveillance program. Once youre the target, a massive amount of data about you can be collected and forwarded to the government. Whenever the government is caught with its hands in the privacy jar, two platitudes are always given: If you have not done something wrong, youve nothing to hide, and you have to trust the government it has your best interests at heart.

Basically, the governments nothing-to-hide notion implies that its only criminals who may want to hide. But is that true? Besides, we all have something that we want to hide. Just ask anybody to show you their credit card bill or even their emails what would be the response?

If theres nothing that should be hidden and you can trust the government with your data, think about this scenario: What will happen if someone gains access into the governments database? Since you are here, we assume you are one of those folks who want to escape NSA spying. If so, it is time for you to be smart and be a ghost!

Online activities should be private, but unfortunately, thats not the case. In 2013, the NSA outlined how data can be collected via the PRISM program. The technology is merely based on the optical fiber wiretaps. PRISM is meant to track the activities of potential foreign terrorists. Just like in criminal investigations, the NSA is probably not intentionally spying on you, but the fact that they can when they want to is a breach of privacy.

There are several ways you stay out of the omnipresent eyes of the government and the NSAs PRISM. Below are some simple measures to minimize the likelihood of the NSA PRISM program monitoring your Internet activities.

One of the surest ways of beating the NSAs PRISM surveillance trap is by encrypting your Internet traffic. Its simply that all the encrypted data is useless to the PRISM program without the decryption key. Your conversations may not be private unless you encrypt. First, you can encrypt the hard drive and all the existing files. All the data stored on the cloud should be encrypted before being submitted to Internet service providers. The last thing you want is entirely trusting Google, Microsoft, or Apple to encrypt data for you. As an individual, avoid storing unencrypted personal data in clouds like OneDrive, Dropbox, and Google Drive.

Using a good VPN will help keep the NSA from sniffing around your personal space and your business. A VPN merely helps establish a private network thats private to the Internet and allows you to surf anonymously (although there are many caveats here). It conceals the user identity by masking the devices IP address and then directing traffic via VPN servers in a location that you may choose.

However, a VPN should not be just a VPN but should be a VPN that doesnt keep logs. A VPN without logs means that the VPN provider cannot reveal your identity even if it gets a court order. Thats because it wont be recording any of your web activities details in the first place. Moreover, a VPN will ensure that you easily bypass Internet restrictions, as well as getting access to blocked websites.

Each time you visit a new site, a trail of footprints are left behind that can tell so much about you. Most advertising networks use those digital footprints for targeted ads, meaning that the NSA is most probably watching every keystroke you make.

Therefore, to ensure that you block web tracking, simply visit your browsers settings and then disable third-party cookies so that they do not load on the current web page.

Secondly, you need to privately search the web by activating private incognito mode in the browser. Alternatively, you can opt to use browser extensions like Ghostery that prevent ad agencies and search engines from tracking web pages.

Furthermore, you can disable JavaScript from the browser setting to help avoid web tracking. And masking your IP address via a VPN is another excellent way of staying out of the radar of tracking cookies.

Sometimes connecting to free hotspots can prove to be a channel through which someone can access your device. However, wandering from the library to the coffee shop and the free caf down the street can provide a security protection layer. Why? Because your IP address keeps on varying by location. However, you should be very careful about such hotspots as they are the real hotspots of malware invasion.

After doing everything right, youll also want to tie all your encrypted services with hard-to-crack passwords. You need to find the best password manager and then create your unique password.

The NSA can tap into all cellular networks across the globe. Therefore, theres every reason to protect your communications. Your instant messaging services can be protected from the NSA surveillance program using an Off-the-Record (OTR) chat extension. It helps in encrypting all messages on IM networks.

Another reigning king for anonymous browsing is the Onion Router (TOR). It allows you to browse anonymously as it conceals user identity by encrypting and bouncing communications over a plethora of servers. Therefore, it makes it difficult for spy agencies to trace the traffic source or the recipient easily. All they see is traffic originating from a plethora of random nodes and not your PC.

Ultimately, keeping off the NSAs PRISM is not a walk in the park. While all these tips do not mean that youre entirely PRISM-proof, theyll minimize the risk of NSA snooping on your online activities. You just have to pray that you dont give them enough evidence to suspect you because then all privacy bets are off.

Featured image: Shutterstock

Post Views: 5

Home Articles PRISM and privacy: Ways to avoid being spied on by the government

Continue reading here:
PRISM and privacy: Ways to avoid being spied on by the government - TechGenix

Posted in NSA | Comments Off on PRISM and privacy: Ways to avoid being spied on by the government – TechGenix

Jump into Fall! with the National Steeplechase Association – Past The Wire

Posted: at 6:02 am

FAIR HILL, Md., Oct. 22, 2020With COVID-19 eliminating, or severely limiting, live spectators at fall steeplechase races from Pennsylvania to Georgia, race organizers were struggling with decisions on whether or not to continue with their race plans. Since the pandemic, and with events not allowed to have spectators in much of the U.S., there has been a large decrease in equestrian events. Many of those employed in the industry face potential unemployment and financial hardship. Additionally, many non-profits usually receive funding and increased awareness through relationships with steeplechase race meets.

In an effort to help alleviate the hardship on the industry and their partners, the National Steeplechase Association has stepped up and is livestreaming several fall race meets. These efforts by NSA allow the horses to race, while spectators enjoy the sport from their homes, and associated non-profits including land conservation organizations, community hospitals and food banks continue to have a spotlight on their great work.

Over the past years, steeplechase events have contributed millions to community nonprofits. We wanted to provide a venue for the steeplechase/racing industry to be able to get horses out and receive some financial support in the form of purse money while continuing to create exposure for non-profit beneficiaries, explained Dr. William Allison, co-chairman of the Virginia Gold Cup Association, the organization that oversees the Virginia Gold Cup and the International Gold Cup. Thanks to the NSA, horsemen have been able to continue training their equine athletes and fans can still enjoy the racing through Live Stream viewing.

Race fans and equestrian enthusiasts can easily Jump into Fall! and view the Live Stream at http://nsa.network.video/ on the following dates:

Race day start times generally kick off at 12:30 pm; final start times will be posted on the NSA website 48 hours before each race meet. Expert commentary will be provided by industry insiders Megan Connolly and Joe Clancy, with guest appearances from other sporting notables.

Unlike flat track racing, steeplechase racing provides the thrills and excitement of Thoroughbred horses racing over fences. By most accounts, the first steeplechase race was held in 1752 in Ireland. Todays sport is a true celebration of the long and close relationship between man and the horse. Riders depend on the athleticism, strength, speed and sure-footedness of their horses to carry them safely over varied fences.

While COVID restrictions have made race meets challenging this year, we hope to be able to bring in new spectators who may want to see and learn about steeplechase racing, said Al Griffin, president of the NSA. Its an exciting sport that relies on a partnership between riders and horsesnot something you see with other sports. The live stream provides an opportunity for the public to see what its all about, free of charge.

This year, the Live Stream will capture that excitement as well as gorgeous fall scenery in some of the countrys most beautiful equestrian regions. The complimentary Live Stream productions have been sponsored by Brown Advisory, Charlestons The Post & Courier, Bruton Street-US and the Virginia Equine Alliance.

Press Release/Photo National Steeplechase Association

See the article here:
Jump into Fall! with the National Steeplechase Association - Past The Wire

Posted in NSA | Comments Off on Jump into Fall! with the National Steeplechase Association – Past The Wire

Cyber Security Today Twitter criticized by regulator, NSA ranks vulnerabilities, cybercrooks pretend to be good guys, and more – IT World Canada

Posted: at 6:02 am

Twitter criticized by regulator, NSA ranks vulnerabilities, cybercrooks pretend to be good guys and more.

Welcome to Cyber Security Today. Its Wednesday October 21st. Im Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com. To hear the podcast click on the arrow below:

Remember the big Twitter hack last July? Thats when attackers took over the accounts of celebrities and promoted a double your bitcoin scam. Well, New York States financial regulator has criticized Twitter for poor security in letting the attackers get away with it. There were no special tricks used by the attackers, the report said. A few employees fell for a phone call from someone pretending to be from Twitters IT department, and that led to the infiltration. Just as bad, Twitter didnt have a chief information security officer for seven months before the hack. That sends a message cybersecurity wasnt a top priority, the report said.

Ive often talked of the importance of having two-factor authentication to strengthen employee logins. Well, Twitter had it. But hackers got around that by tricking staff into logging into lookalike company sites. Then when they added their two-factor codes, the hackers copied them. The lesson here is some staff who can access sensitive things should use a special USB key for their two-factor codes for better protection instead of numbers.

Its not easy for IT departments to prioritize which software patches that they should install. Updates are issued almost daily from companies around the world. The U.S. National Security Agency wants to help. On Tuesday it issued a list of the 25 most commonly used vulnerabilities exploited by Chinese state-sponsored cyber attackers. Most either exploit holes allowing hackers to remotely get into computer networks, or to attack web services. The list includes holes in products from Pulse Secure, F5 Networks, Citrix, Microsoft, Adobe, Oracle, Cisco Systems and others. The NSA says U.S. government systems and companies that sell to the Defence department should see this list as a priority. Other companies should, too. Theres a link to the list here.

Everybody wants to be a Good Guy, including cybercriminals. After bad publicity two years ago, some ransomware gangs swore they dont target hospitals, only evil capitalist companies. Last week one went further, saying it has started donating some of the money it has forced victims to pay to two charities. Lets make the world a better place, the Darkside gang apparently said on its website. Well, one of the charities that got the equivalent of $10,000 in bitcoin, a non-profit for sponsoring children in extreme poverty, isnt fooled. If the donation comes from a hacker, it told the BBC, we wont keep it. As the ZDNet news service pointed out, its illegal in most countries to receive funds obtained by crime.

This being Cyber Security Awareness Month its a good time to think about whether the cyber training offered at work and in schools is worthwhile. So a management consulting firm called Oliver Wyman created a scoring system to rate countries cyber risk literacy. Its based on public motivation to practice good cybersecurity, government policies to improve cyber literacy, education systems, how well businesses raise employees cyber skills and the degree to which digital access and skills are shared across the population. The best country is Switzerland, followed closely by Singapore, the United Kingdom, Australia and the Netherlands. Canada ranks sixth, the U.S., 10th. South Africa is last out of 50 countries rated, just after China.

Finally, theres a report that a ransomware group called Nefilim has begun publishing stolen data that appears to come from Luxottica, a company that makes eyeglass frames like RayBan and owns a number of eyeglass retailers around the world like LensCrafters. According to Security Affairs, an Italian researcher discovered the documents, which are said to be corporate financial files. Nefilim is one of the ransomware groups that steals and encrypts data, and threatens to publicly release the files unless victim organizations pay up.

Thats it for Cyber Security Today. Links to details about these stories can be found in the text version of each podcast at ITWorldCanada.com. Thats where youll also find my news stories aimed at businesses and cybersecurity professionals. Cyber Security Today can be heard on Mondays, Wednesdays and Fridays. Subscribe on Apple Podcasts, Google Podcasts or add us to your Flash Briefing on your smart speaker.

See more here:
Cyber Security Today Twitter criticized by regulator, NSA ranks vulnerabilities, cybercrooks pretend to be good guys, and more - IT World Canada

Posted in NSA | Comments Off on Cyber Security Today Twitter criticized by regulator, NSA ranks vulnerabilities, cybercrooks pretend to be good guys, and more – IT World Canada

NSA looks to future with events planned for 2021 – Darlington and Stockton Times

Posted: at 6:02 am

THE National Sheep Association (NSA) was very disappointed to cancel its sheep events this summer, but is now proceeding with plans for its line-up of spring and summer events for 2021.

The NSA 2021 diary is already looking full with the main regional events NSA Welsh Sheep, NSA Scotsheep, NSA North Sheep, NSA Sheep South West and NSA Sheep Northern Ireland all set to take place between May and July, offering visitors a much-needed day out meeting with fellow sheep farmers and industry experts. Bookings for events will now open very soon.

NSA chief executive Phil Stocker said: Of course, we were left with no choice but to cancel our 2020 events. Now, despite some uncertainty about the situation we will find ourselves in next year, we must proceed with optimism that our line-up of events will be able to take place once again next year.

As an organisation that acts as the voice of the UKs sheep sector, a sector likely to be considerably affected in 2021 by our imminent departure from Europe, there will never be a more important time for us to be able to meet with members and colleagues face-to-face to discuss the changes upon us and the steps needed for our industry to move forward into a new era for the countrys farmers.

"We sincerely hope that the ongoing Covid-19 pandemic will have subsided sufficiently to allow this to happen.

NSA is formed of nine regions that each has involvement with or organises its own regional sheep event for members in that area. As business to business events, NSA Sheep Events offer visitors opportunity to hear from industry leaders in informative seminars, take part in practical workshops, discuss an array of products both new and existing with sheep farming trade stands, view competitions and much more.

Events are planned include: NSA Scotsheep, Thursday, May 27, Over Finlarg Farm, Tealing, Dundee; and NSA North Sheep, Wednesday, June 2, Bradford House Farm, Ponteland, Northumberland.

It is anticipated that event trade and breed society bookings will open from Monday, November 2, for exhibitors to secure their place at the 2021 events. All measures will be put in place to ensure events will be Covid-19 safe and operate to current Government guidance on the day.

For more information, see the NSA website at http://www.nationalsheep.org.uk.

Here is the original post:
NSA looks to future with events planned for 2021 - Darlington and Stockton Times

Posted in NSA | Comments Off on NSA looks to future with events planned for 2021 – Darlington and Stockton Times

Page 50«..1020..49505152..6070..»