Archive for the ‘NSA’ Category

International Gold Cup and Other Reasons for Giving Thanks – Middleburg Eccentric

Thanksgiving heralds the holiday season, and we have many reasons to be grateful despite and because of all the challenges thrown at us throughout 2020. Now more than ever, staying well is a priority that requires significant effort and planning. It isnt easy or fun to protect ourselves from OPGs (other peoples germs), although some have been doing this for years. It isnt a political statement to wear masks, practice good hygiene, and distance yourself from others. Its just plain old-fashioned common sense.

A big thank you on behalf of all racing and chasing enthusiasts to the National Steeplechase Association and its NSA Network for making sure that you had options if you couldnt be there in person. They provided Live Streams of each race meet on the day, bringing sanctioned meets into the safety of our homes, and the archived videos are available to one and all.

Will OKeefe is one of the greatest and possibly the best race announcer. We think he deserves a special lifetime achievement award and heaven help chasing and point-to-points when he retires. It hasnt mattered whether Will is calling the races for a mega-crowd of thousands or spectator-free meets. His passion for the sport comes through loud and clear as he narrates each contest from start to finish.

The video camera work is excellent, even with changes in natural lighting on various portions of the course, but its all there: gorgeous Thoroughbreds piloted by jockeys in bright silks, beautifully framed by the undulating sea of green turf. Will keeps you posted on whos in the lead, who might be challenging, and, with videos, you can see so much more detail. Its almost as good as being there, and almost is way better than no racing at all.

Now, however, the fall steeplechase season is a wrap, and standings are final for both sanctioned and point-to-points. Its challenging to contemplate Great Meadow on October 24 without its signature crowds of nearly 50,000 arranged around three sides of the course, but this season has been all about the horses. Tod Marks, the official NSA photographer, writes terrific previews and reports, and we enjoyed what he wrote about this years International Gold Cup.

Heres Tods opening sentence: Saturdays 10-race card at Great Meadow Race Course in The Plains, Va., had it all: Blow-out wins, white-knuckle finishes, and outstanding rides by apprentice riders. And of all the highlights, none shone brighter than Curve of Stones victory in the $25,000 International Gold Cup, his second timber-stakes score in two weeks.

Everyone was there, and Tod gives the full scoop better than we ever could do it. Suffice it to say, when the racing concluded in November, Jonathan Sheppard ended up adding a win and purse money from five horses, thereby boosting his bid for yet another top trainer title in both races won (16) and money won. Jack Fisher ran a very close second in Money Won but saddled only half the winners.

It was an interesting season, no matter how you view it. But its all about the horses really. One favorite race is the Steeplethon, a very unusual hybrid mix of timber and hurdles that demand a special Thoroughbred.

Starlight Racing LLCs Invocation, this years Steeplethon winner, was pretty brilliant over hurdles earlier in the geldings career, as stated in Will OKeefes Central Entry treasure trove of racing information and statistics. In October 2016, Invocation debuted as a 3-year old over hurdles, placing third, and four weeks later, proved best in a field of nine at the Colonial Cup for his first win. He earned eight firsts over hurdles and on the flat by mid-2019 when he went to a new trainer, Mark Beecher, who grew up in the saddle in Ireland and crossed the big puddle to the USA in 2010. Within two years, Marks career as a jump jockey took off like a rocket. He retired from race-riding in a blaze of glory after piloting Mystic Strike to victory in the 2019 Pennsylvania Hunt Cup. Among his many awards are seven NSA titles, including several as leading rider over timber.They say it takes one to know one, and no doubt this trainer and the horses in his program have come to a good understanding because Invocation has gone from flat to steeplethon to hurdle to timber to steeplethon as if its all in a days work. It will be interesting to see how next season goes for Invocation and whats in store for him and his trainer.

All this research has made us very keen to engage in a marathon of following some favorite horses in their careers by taking a ride down memory lane via NSA Networks archived videos. Because watching these amazing equine athletes and their riders is a great way to get some joy and alleviate cabin fever the next best thing to being there

Happy Healthy Thanksgiving!

Centralentryoffice.comNationalSteeplechase.comThisIsHorseRacing.com

Continue reading here:
International Gold Cup and Other Reasons for Giving Thanks - Middleburg Eccentric

The NSA Warns That Russia Is Attacking Remote Work Platforms – WIRED

Throughout 2020, an unprecedented portion of the world's office workers have been forced to work from home as a result of the Covid-19 pandemic. That dispersal has created countless opportunities for hackers, who are taking full advantage. In an advisory today, the National Security Agency said that Russian state-sponsored groups have been actively attacking a vulnerability in multiple enterprise remote-work platforms developed by VMware. The company issued a security bulletin on Thursday that details patches and workarounds to mitigate the flaw, which Russian government actors have used to gain privileged access to target data.

Institutions have scrambled to adapt to remote work, offering employees secure remote access to enterprise systems. But the change comes with different risks and has created new exposures versus traditional office networks. Flaws in tools like VPNs have been especially popular targets, since they can give attackers access to internal corporate networks. A group of vulnerabilities affecting the Pulse Secure VPN, for example, were patched in April 2019, but US intelligence and defense agencies like the Cybersecurity and Infrastructure Security Agency issued warnings in October 2019, and again in January and April, that hackers were still attacking organizationsincluding government agencies that had not applied the patch.

On Thursday, CISA issued a brief advisory encouraging administrators to patch the VMware vulnerability immediately. "An attacker could exploit this vulnerability to take control of an affected system," the agency said.

In addition to warning the general public about the VMware bug, the NSA emphasized repeatedly that it "encourages National Security System (NSS), Department of Defense (DOD), and Defense Industrial Base (DIB) network administrators to prioritize mitigation of the vulnerability on affected servers."

Its one of those things where the messenger is notable as well as the message, says Ben Read, senior manager of cyberespionage analysis at the threat intelligence firm FireEye. Its a remote code execution vulnerability, its something that people definitely want to patch, but these things happen. So the fact that the NSA wanted to make a big deal about it is likely based on the fact that it was being used by Russias folks in the wild and presumably against a target that the NSA is worried about.

The affected VMware products all relate to cloud infrastructure and identity management, including VMware Workspace One Access, its predecessor, VMware Identity Manager, and VMware Cloud Foundation. VMware said in a statement that "upon notification of the issue, VMware has worked to assess this issue, and has provided the appropriate updates and patches to mitigate this issue."

The company noted in its advisory that it rates the flaw's severity as "Important," a step below "Critical," because attackers must have access to a web-based, password-protected management interface before they can exploit the vulnerability. The NSA points out that securing this interface with a strong, unique password, or setting it up so it isn't accessible from the public internet, are both steps that can reduce the risk of attack. Fortunately, VMware did not design the affected systems with the option to use default passwords that would be trivially easy for attackers to guess.

Once a hacker has access, they can exploit the vulnerability to manipulate authentication requests called "SAML assertions" (from Security Assertion Markup Language, an open standard) as a way of burrowing deeper into an organization's network. And they can use that position to access other servers that contain potentially sensitive information.

FireEyes Read notes that while the bug does first require a legitimate password to exploit, that's not an insurmountable hurdle, particularly for Russian hackers who have a known facility with credential theft techniques like password spraying. I would guess the NSA is writing something because they have seen it work, even if it is in theory not the worst vulnerability out there, he says.

"The messenger is notable as well as the message."

Ben Read, FireEye

When so many employees are working remotely, it can be difficult to use traditional network monitoring tools to flag potentially suspicious behavior. But the NSA points out that vulnerabilities like the VMware bug present a unique challenge regardless, because the malicious activity would all happen in encrypted connections to the web interface that aren't distinguishable from legitimate logins. The NSA recommends instead that organizations comb their server logs for what are known as "exit statements" that can indicate suspicious activity.

Here is the original post:
The NSA Warns That Russia Is Attacking Remote Work Platforms - WIRED

Former NSA contractor Reality Winner loses appeal, will remain imprisoned – CyberScoop

Written by Joe Warminsky Dec 8, 2020 | CYBERSCOOP

The former National Security Agency contractor convicted in 2018 of illegally leaking top secret information to a news organization will remain in federal prison after an appeals court upheld a ruling against a compassionate release amid the COVID-19 pandemic.

The eight-page opinion Monday from the U.S. Court of Appeals for 11th Circuit backed an earlier ruling that lawyers for Reality Winner had not sufficiently shown that her medical conditions or prison conditions justified an early release. The appeals court didnt rule on the merits of Winners argument it simply said the lower court had considered her request properly.

After careful consideration and with the benefit of oral argument, we conclude that the District Court did not abuse its discretion in denying Ms. Winners motion, Mondays opinion says. Because we resolve her appeal on this basis alone, we need not (and do not) address Ms. Winners other arguments.

In early April, Winner, now 29, had filed a motion for compassionate release with the U.S. District Court for the Southern District of Georgia, saying that she suffers from depression and an eating disorder, and that COVID-19 related prison lockdowns affected her ability to cope with those conditions, thus making her more susceptible to further illness. The district court rejected Winners motion without holding an evidentiary hearing.

Winner was working as a linguist for Pluribus International Corp., a government contractor, when she was accused of leaking leaking a report on Russian interference in U.S. elections. The Intercept published details from the document but says it did not know the exact source. Afterward, Winner was arrested and pleaded guilty to violating the Espionage Act.

Some have branded Winner a whistleblower, given that the leaked document expanded the publicly available information about the Russian threat to elections at a time when the White House was claiming it was a hoax.

Winner is serving her 63-month prison sentence at Federal Medical Center Carswell in Fort Worth, Texas, where it was reported this summer that she and about 500 other detainees had contracted COVID-19. She could be released by November 2021.

Her lawyers have noted that she is a nonviolent first offender who admitted her mistake. Those arguments and others werent enough to persuade the district court.

Winner has not carried the burden of demonstrating that her specific medical conditions under the particular conditions of confinement at FMC Carswell place her at a risk substantial enough to justify early release, U.S. District Judge J. Randal Hall wrote in April, in rejecting Winners motion. In fact, the court is constrained to observe that Winner is in a medical prison, which is presumably better equipped than most to deal with any onset of COVID-19 in its inmates.

U.S. courts have been hearing many requests like Winners this year as the COVID-19 pandemic rips through prison populations. In some cases, motions for compassionate release do succeed: Late last week a federal judge in Virginia sent a native of Kosovo back to his home country after the convicted hacker argued for his release.

Read the original here:
Former NSA contractor Reality Winner loses appeal, will remain imprisoned - CyberScoop

Quashing Detention Order, Allahabad HC Asks Govt to Exercise NSA With ‘Extreme Care’ – The Wire

New Delhi: The Allahabad high court on Monday quashed the detention order of Javed Siddiqui under the stringent National Security Act (NSA) on the grounds that the authorities did not present his petition report before the advisory board on time.

According to a report in the Indian Express, a division bench of Justice Pradeep Kumar Srivastava and Justice Printinker Diwaker quashed the detention order on a habeas corpus plea by Siddiqui and observed that a law such as the NSA had to be exercised by the executive with extreme care.

Where the law confers extraordinary power on the executive to detain a person without recourse to the ordinary law of the land and to trial by courts, such a law has to be strictly construed and the executive must exercise the power with extreme care, the court said and noted that the executive was under obligation to pass detention order according to procedure established by law.

The court also ordered the forthwith release of Siddiqui, if he was not required in any other case.

The history of personal liberty is largely the history of insistence on observation of the procedural safeguards. The law of preventive detention, though is not punitive, but only preventive, heavily affects the personal liberty of individual enshrined under Article 21 of the Constitution of India and, therefore, the Authority is under obligation to pass detention order according to procedure established by law and will ensure that the constitutional safeguards have been followed, the high court observed.

Siddiqui was arrested earlier this year in June and booked under for arson and rioting after a number houses belonging to people from the Dalit community had been burnt down at Bhadethi village in the Sarai Khwaja locality of Jaunpur.

As per the courts order, the detention order against Siddiqui was passed on July 10 and the petitioner gave his representation July 20. The detention order for Siddiqui was approved on July 21, 2020. It is evident that the representation so given by the petitioner (Siddique) was well within the prescribed period of 12 days, the court said and noted that Siddiquis representation was rejected on August 14, 2020, after the advisory board had already made the recommendation for approval of the detention order on August 12.

Also read: UP is Primarily Using the National Security Act Against Those Accused of Cow Slaughter

The record shows that the representation of the petitioner was not placed before the Advisory Board till 12.08.2020 (August 12) even though the same was filed on 20.07.2020 (July 20). It remained pending with the State Government and after two days from the date the Advisory Board sent the recommendation, the same was rejected, the high court said.

The court also said that the state authority had given no reasonable explanation for the delay in forwarding the petitioners representation and not placing it before the advisory board. It is evident from the record that while extraordinary haste was shown in taking action against the petitioner, the authorities remained reluctant and there was complete inaction on their part causing an unjustified delay in processing the detenues representation against his detention under the NSA, the bench said in its order.

This inaction on the part of the authorities certainly resulted in deprivation on the right of the petitioner of the fair opportunity of hearing and it also resulted in denial of the opportunity of fair hearing to the petitioner as provided under the law. This is not permissible and is in gross violation of established legal and procedural norms and legal and constitutional protection, the Allahabad high court said.

The court said that it was of the opinion that delaying and not placing the representation before the advisory board speaks in volume about the reluctance on the part of opposite parties.

The plea of Covid-19, officials suffering from pandemic, intervening holiday or negligence on the part of an official on account of which he was suspended, are no reason, which could be attributed towards any fault or lapse on the part of the petitioner. Even on the date when the case was fixed before the Advisory Board, the authorities could have placed the representation of the petitioner before the Board. Thus, we find that no reasonable explanation has been given for the delay and not placing the representation before the Board, the high court said.

Reportedly in June, following an alleged brawl among children, over a dozen huts of people from the Dalit community were set ablaze and massive damages were caused to 14 other houses. The FIR registered against Javed Siddiqui accused him of attacking the Bhadethi village slums along with 80 people and indulging in riots and arson there while heaping anti-Dalit abuses on the slum inhabitants.

Siddiqui was later arrested and the Jaunpur district magistrate subsequently on July 10 issued a detention order against him under section 3(2) of the National Security Act.

In his habeas corpus plea, Siddiqui contended that he was not given a fair opportunity to present his case before the UP advisory board, Lucknow to challenge the detention order. He alleged that neither his representation was placed before the advisory board in time nor he was supplied relevant documents about his detention under the NSA.

Earlier this year, in response to the Uttar Pradesh governments repeated instances of invoking the National Security Act against alleged cow slaughter cases, the Allahabad high court raised concerns that the law was being misused to target innocent people.

(With inputs from PTI)

See more here:
Quashing Detention Order, Allahabad HC Asks Govt to Exercise NSA With 'Extreme Care' - The Wire

VMware fixes zero-day vulnerability reported by the NSA – BleepingComputer

VMware has released security updatesto address a zero-day vulnerability inVMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector.

The vulnerabilityis a command injection bug tracked asCVE-2020-4006 and publicly disclosed two weeks ago.

While it did not issue any security updates at the time it disclosed the zero-day, VMware provided a workaround to help admins mitigatethe bug on affected devices.

If successfully exploited, the vulnerabilityenables attackers to escalate privileges and execute commands on the host Linux and Windows operating systems.

The full list of VMware product versions affected by thezero-day includes:

While initially, the company didn't disclose the identity of the organization or researcher who reported the vulnerability, VMware acknowledged the US DefenseDepartment'sintelligence agency contribution in an update to the security advisory made on Thursday.

VMware also lowered the bug'sCVSSv3 base score to 7.2/10 and the maximum severity rating from 'Critical' to 'Important.'

CVE-2020-4006 exists intheadministrative configurator of some releases of VMware Workspace ONE Access, Access Connector, Identity Manager, and Identity Manager Connector.

"A malicious actor with network access to the administrative configurator on port 8443 and a valid password for the configurator admin account can execute commands with unrestricted privileges on the underlying operating system," the advisory explains.

"This account is internal to the impacted products and a password is set at the time of deployment. A malicious actor must possess this password to attempt to exploit CVE-2020-4006."

Threat actors can obtain the password needed to exploit the vulnerability using techniques documented in the MITRE ATT&CK database.

VMware released security updates that fully mitigate the vulnerability on devices running one of the affected products.

Information onpatch deployment steps, expected changes, and how to confirm that the patch has been applied are available within the patch files.

Links to download security updates forCVE-2020-4006 are available in the table embedded below.

DHS-CISAencouragedadmins and users on Thursday to apply the patchissued by VMware to thwart attackers' attempts to take over vulnerable systems.

Admins who can't immediately download and deploy the patch can still use the temporary workaroundthat fully removes the attack vector on impacted systems and prevents CVE-2020-4006 exploitation.

Details on how to implement and revert the workaroundonLinux-based appliances andWindows-based servers are available HERE.

However, once the workaround is applied, "configurator-managed setting changes will not be possible" asVMware explains.

More:
VMware fixes zero-day vulnerability reported by the NSA - BleepingComputer