{"id":176162,"date":"2017-02-09T05:55:44","date_gmt":"2017-02-09T10:55:44","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/overnight-cybersecurity-ex-nsa-contractor-indicted-over-alleged-theft-natos-new-cyber-guide-senators-move-to-the-hill\/"},"modified":"2017-02-09T05:55:44","modified_gmt":"2017-02-09T10:55:44","slug":"overnight-cybersecurity-ex-nsa-contractor-indicted-over-alleged-theft-natos-new-cyber-guide-senators-move-to-the-hill","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/overnight-cybersecurity-ex-nsa-contractor-indicted-over-alleged-theft-natos-new-cyber-guide-senators-move-to-the-hill\/","title":{"rendered":"Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO&#8217;s new cyber guide | Senators move to &#8230; &#8211; The Hill"},"content":{"rendered":"<p><p>    Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of    the biggest news in the world of hacking and data privacy.    We're here to connect the dots as leaders in government, policy    and industry try to counter the rise in cyber threats. What    lies ahead for Congress, the administration and the latest    company under siege? Whether you're a consumer, a techie or a    D.C. lifer, we're here to give you ...  <\/p>\n<\/p>\n<p>    THE BIG STORIES:  <\/p>\n<p>    --NSA CONTRACTOR INDICTED: A federal grand jury on Wednesday    issued an indictment of a former National Security Agency    contractor accused of stealing thousands of pages of classified    documents. Herald Thomas Martin III, 52, was charged with 20    counts of \"willful retention of national defense information,\"    according to a statement released by the Justice Department    shortly after the indictment was returned. Martin worked at the    NSA between 2012 and 2015 while he was an employee at the    consulting firm Booz Allen Hamilton. The indictment alleges    that Martin had been stealing and maintaining mounds of highly    classified information starting as early as 1996, until his    arrest last August.  <\/p>\n<p>    To read the rest of our piece,click    here.  <\/p>\n<p>    --FBI NOT ANTICIPATING IMMEDIATE CHANGE ON ENCRYPTION:    Donald    TrumpDonald    TrumpTrump    pens letter to Chinese president     New York Post reporter sues after being fired for critical    Trump tweet: report     Sessions urges respect in Senate farewell speech MORE's    White House has discussed encryption policy with the FBI, a    bureau official indicated Wednesday. James Baker, the FBI's    general counsel, said he is unaware of any planned changes on    encryption policy under the new administration. \"There have    been some discussions, obviously, about this,\" he said at an    encryption policy at an event in Washington, D.C. \"It is a big    topic and one that people have discussed,\" he continued. \"I am    not aware of any policy change or even a determination at this    point in time, given how soon we are into the new    administration.\"  <\/p>\n<p>    To read the rest of our piece,click    here.  <\/p>\n<p>    --NATO'S NEW CYBER GUIDE: NATO on Wednesday released the first    major revision to the Tallinn Manual, the closest thing there    is to a rulebook for nation-led cyber operations. Like the    original 2013 manual, the new version is the result of a study    by NATO to gauge consensus opinions from international law    experts on what types of cyber statecraft are acceptable. \"Let    me assure you, the manual will sit on the desk of every legal    advisor in every ministry of defense and every ministry of    foreign affairs in the entire world,\" Director and General    Editor Michael Schmitt said at a press briefing before its    launch at the Atlantic Council headquarters in Washington. Both    manuals pull together law originally developed to cover fields    ranging from armed conflicts to outer space to extrapolate the    likely legal consequences for cyber operations. But while the    first draft covered war-like cyber attacks between nations, the    new draft adds legal analysis of peacetime operations.  <\/p>\n<p>    To read the rest of our piece,click    here.  <\/p>\n<\/p>\n<p>    A POLICY UPDATE:   <\/p>\n<p>    --SENATORS MAKE PLAY ON RUSSIAN SANCTIONS: A bipartisan    group of senators is moving to check President Trump on Russia    by bolstering congressional oversight before he can lift    sanctions.  <\/p>\n<p>    Sens. Lindsey    GrahamLindsey    GrahamOvernight    Cybersecurity: Ex-NSA contractor indicted over alleged theft |    NATO's new cyber guide | Senators move to limit Trump on    Russia     Lindsey Graham: Floor action to silence Warren long    overdue     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military MORE    (R-S.C.), Ben    CardinBen    CardinOvernight    Cybersecurity: Ex-NSA contractor indicted over alleged theft |    NATO's new cyber guide | Senators move to limit Trump on    Russia     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military     Senators move to limit Trump on Russia sanctions MORE    (D-Md.), Marco    RubioMarco    RubioWarren    seizes spotlight after GOP rebuke     Overnight Cybersecurity: Ex-NSA contractor indicted over    alleged theft | NATO's new cyber guide | Senators move to limit    Trump on Russia     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military MORE    (R-Fla.), Sherrod    BrownSherrod    BrownOvernight    Cybersecurity: Ex-NSA contractor indicted over alleged theft |    NATO's new cyber guide | Senators move to limit Trump on    Russia     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military     Sanders, Dems read Coretta Scott King's letter after Warren    silenced MORE    (D-Ohio), John    McCainJohn    McCainOvernight    Cybersecurity: Ex-NSA contractor indicted over alleged theft |    NATO's new cyber guide | Senators move to limit Trump on    Russia     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military     Navy's No. 2 on base closures: Don't give away 'waterfront    property' MORE    (R-Ariz.) and Claire    McCaskillClaire    McCaskillOvernight    Cybersecurity: Ex-NSA contractor indicted over alleged theft |    NATO's new cyber guide | Senators move to limit Trump on    Russia     Overnight Defense: McCain, Spicer spar over Yemen raid | Senate    bill would limit Trump on Russia sanctions | Trump cozies up to    military     Senators move to limit Trump on Russia sanctions MORE    (D-Mo.) introduced legislation Wednesday setting up a period of    congressional oversight before Trump could roll back financial    penalties.  <\/p>\n<p>    The legislation, known as the Russia Sanctions Review Act,    would require Trump to notify Congress before he lifts    sanctions tied to the invasion of Ukraine or Russia's meddling    in the White House race.  <\/p>\n<p>    \"To provide relief at this time would send the wrong signal to    Russia and our allies who face Russian oppression. Sanctions    relief must be earned, not given,\" said Graham, a frequent GOP    critic of the president.  <\/p>\n<p>    To read the rest of our piece,click    here  <\/p>\n<\/p>\n<p>    A LIGHTER CLICK:  <\/p>\n<p>    --FAR MORE THAN YOU COULD EVER WANT TO KNOW ABOUT ALUMINUM    CANS. A palate cleansinginformational    videofor stressful times. (Via Boing Boing)  <\/p>\n<\/p>\n<p>    A REPORT IN FOCUS:  <\/p>\n<p>    --ENCRYPTION CHALLENGES FOR FBI 'MANAGEABLE': The challenges    that data encryption pose for law enforcement are manageable,    according to a new analysis by a Washington, D.C., think tank,    to be released later Thursday.  <\/p>\n<p>    The research from the Center for Strategic and International    Studies, which was shared with The Hill, found no instances in    which encryption played a \"determinative role\" in recent major    terrorist attacks in Europe and the United States.  <\/p>\n<p>    The think tank also concluded that encryption does not play a    major role in terrorists' efforts to recruit followers over the    internet.  <\/p>\n<p>    The report comes at a moment of heightened concern over    cybersecurity and a debate about encryption and federal    authorities' access to secured communications.  <\/p>\n<p>    To read the rest of our piece,click    here.  <\/p>\n<\/p>\n<p>    WHO'S IN THE SPOTLIGHT:  <\/p>\n<p>    --EVERYBODY: Here are16    people to watch in tech, including a bunch of cybersecurity    folk.  <\/p>\n<\/p>\n<p>    IN CASE YOU MISSED IT:  <\/p>\n<p>    Links from our blog, The Hill, and around the Web.  <\/p>\n<p>    Most Americansthink    they know more about cybersecuritythan Donald Trump    or Hillary    ClintonHillary Rodham    ClintonKaine:    Sometimes I feel like I live in 'alternate reality'        Warren seizes spotlight after GOP rebuke     Overnight Cybersecurity: Ex-NSA contractor indicted over    alleged theft | NATO's new cyber guide | Senators move to limit    Trump on Russia MORE.    (The Hill)  <\/p>\n<p>    A digital liberties group is pushing the EU toabandon    its data transfer pactwith the U.S. (The Hill)  <\/p>\n<p>    President Trump and Intel tout new$7    billion investmentto create 10K jobs. (The Hill)  <\/p>\n<p>    FTC names a deregulation supporterhead ofits    Bureau of Consumer Protection. (The Hill)  <\/p>\n<p>    DHS is bringingmarket-ready    techto the RSA conference. (The Hill)  <\/p>\n<p>    ForcePoint Security Labs spots a reconnaissancehacking    campaigntargeting U.S. based embassies. (ForcePoint    blog)  <\/p>\n<p>        Republicans flock to \"Confide,\"a secure messaging    app, to avoid email breaches. (Axios)  <\/p>\n<p>    Websites should let youcut    and paste passwords.(Troy Hunt)  <\/p>\n<p>    The Virginian cybersecurity firmInvincia    is soldto the Brit behemoth Sophos. (Washington Post)  <\/p>\n<\/p>\n<p>    If you'd like to receive our newsletter in your    inbox,please sign    up here.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>More here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/thehill.com\/policy\/cybersecurity\/overnights\/318600-overnight-cybersecurity-nsa-suspect-indicted-fbi-official-sees-no\" title=\"Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to ... - The Hill\">Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to ... - The Hill<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/overnight-cybersecurity-ex-nsa-contractor-indicted-over-alleged-theft-natos-new-cyber-guide-senators-move-to-the-hill\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-176162","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176162"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=176162"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/176162\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=176162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=176162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=176162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}