{"id":41209,"date":"2014-10-08T19:48:29","date_gmt":"2014-10-08T23:48:29","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-it-a-better-interface-for-cbp-data-worries-and-more\/"},"modified":"2014-10-08T19:48:29","modified_gmt":"2014-10-08T23:48:29","slug":"nsa-it-a-better-interface-for-cbp-data-worries-and-more","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-it-a-better-interface-for-cbp-data-worries-and-more\/","title":{"rendered":"NSA IT, a better interface for CBP, data worries and more"},"content":{"rendered":"<p><p>NSA looks to IT to lock down systems, protect privacy    <\/p>\n<p>    The National Security Agency spent about $30 million and    devoted 300 people to compliance efforts in 2013, according to    the Oct. 7 report of the agency's Civil Liberties and Privacy    Office.  <\/p>\n<p>    The     recent report covers signals intelligence collection for    foreign intelligence and counterintelligence authorized under    Executive Order 12333, and specifically the rights of U.S.    persons whose data is caught up in the NSA dragnet. The NSA    uses a mix of training, compliance procedures, and    compartmentalization of activities as part of overall efforts    to minimize exposure of data on U.S. persons to unauthorized    use. From an IT perspective, NSA efforts address data privacy    and insider threat concerns. The NSA is researching in an area    called Private Information Retrieval with the goal of improving    \"data security and privacy protection by cryptographically    preventing unauthorized users from accessing protected data,\"    per the report. The research taps commercial technology to    secure the computing environment, validate program activity,    secure searches, and minimize harm when adverse activity is    detected.  <\/p>\n<p>    The CLPO was established in Jan. 2014 to \"ensure that civil    liberties and privacy protection considerations are integrated    into NSA's mission activities.\"  <\/p>\n<p>    Scott Belcher, president and CEO of the Intelligent    Transportation Society of America, was named CEO of the    Telecommunications Industry Association. He will step into the    newly created post Nov. 9.  <\/p>\n<p>    Belcher's diverse management experience spans 25 years and    covers both public- and private-sector roles -- including a    seven year term with ITS America, four years as executive vice    president and general counsel for the National Academy of    Public Administration and five years as managing director for    environmental affairs and associate general counsel for the Air    Transport Association, according to his LinkedIn profile.  <\/p>\n<p>    Customs and Border Protection has added a new automated    broker's interface query capability to its automated commercial    environment, which allows international shippers to request    cargo, manifest and entry record status information on file in    the ACE system. The query capability, said the agency, will be    available on Oct. 18 for ABI filers.  <\/p>\n<p>    According to CBP, the capabilities the new cargo query will    provide include processing status for an ACE cargo release    entry, cargo manifest details and other key shipping data. The    agency has set Oct. 1, 2015, as the deadline for mandatory use    of ACE for all electronic filings in its cargo processing    system.  <\/p>\n<p>    Social media giant Twitter sued the U.S. government on Oct. 7,    alleging that restrictions on disclosures of the scope of    government surveillance of Twitter users are unconstitutional.  <\/p>\n<p>    The lawsuit,    filed in a U.S. District Court in San Francisco, alleged that    \"the U.S. government engages in extensive but incomplete speech    about the scope of its national security surveillance    activities as they pertain to U.S. communications providers,    while at the same time prohibiting service providers such as    Twitter from providing their own.\"  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>Read this article:<br \/>\n<a target=\"_blank\" href=\"http:\/\/fcw.com\/articles\/2014\/10\/08\/news-in-brief-october-8.aspx\/RK=0\/RS=i8PSyY_EgDL7BNZdjL7lhDF0fAM-\" title=\"NSA IT, a better interface for CBP, data worries and more\">NSA IT, a better interface for CBP, data worries and more<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> NSA looks to IT to lock down systems, protect privacy The National Security Agency spent about $30 million and devoted 300 people to compliance efforts in 2013, according to the Oct. 7 report of the agency's Civil Liberties and Privacy Office. The recent report covers signals intelligence collection for foreign intelligence and counterintelligence authorized under Executive Order 12333, and specifically the rights of U.S <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/nsa-2\/nsa-it-a-better-interface-for-cbp-data-worries-and-more\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94881],"tags":[],"class_list":["post-41209","post","type-post","status-publish","format-standard","hentry","category-nsa-2"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/41209"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=41209"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/41209\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=41209"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=41209"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=41209"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}