Archive for the ‘NSA’ Category

Operation Jackboot: NSA Ajit Dovals brainchild that eliminated Hizbul Mujahideen chief Riyaz Naikoo – Times Now

'Operation Jackboot' claims its last high value target in killing of Riyaz Naikoo.  |  Photo Credit: IANS

Srinagar:The elimination of Hizbul Mujahideen terrorist Riyaz Naikoo on Wednesday by security forces has raised an alarm for Pakistan-based terror sponsors in the Jammu and Kashmir who propagate anti-India sentiments to destabilise peace in the Valley.

However, the execution of Naikoo was a meticulously planned operation, conceived by none other than National Security Advisor Ajit Doval.

Code named Operation Jackboot, the task to hunt down one of the most wanted terrorists in the Valley was supervised personally by NSA Doval. Naikoo was the last high-value target in the operation.

The operation was conceived after Pulwama, Kulgam, Anantnag and Shopian in south Kashmir were christened Liberated areas by Pakistan-backed militants.

Homegrown militancy was getting on the nerves of Indias security forces.

Naikoo, aka Bin Qasim, had become the de facto commander of the proscribed terrorist outfit Hizbul Mujahideen after Burhan Wani, the poster boy of terrorism in Jammu and Kashmir, was eliminated in July 2016.

Qasim, rated as an A++ category terrorist or most-wanted militant, had been on the run for over eight years and carried a bounty of Rs 10 lakh on his head.

The encounter of Burhan Wani sparked a massive uproar in the Valley and the ripple effects were felt as far as Islamabad. Locals look out a funeral procession for Wani and the subsequent violence that erupted in the Valley is still fresh in our minds.

Naikoo was counted as one from the Burhan group of Kashmiris.

The group consisted of Wani and his terror associates Sabzar Bhat, Waseem Malla, Naseer Pandit, Ishfaq Hameed, Tariq Pandit, Afaqullah, Adil Khandey, Saddam Paddar, Wasim Shah and Anees, news agency IANS reported.

These locals became poster boys of militancy in Kashmir and such was their authority, foreign terrorists were pushed to the background.

The Burhan gang of terrorists romanced the picturesque Himalayan region and seduced the educated, yet unemployed, youth of the Valley with a new-found objective in their lives.

Continue reading here:
Operation Jackboot: NSA Ajit Dovals brainchild that eliminated Hizbul Mujahideen chief Riyaz Naikoo - Times Now

Myths About the NSA – ClearanceJobs

The National Security Agency used to be one of the most obscure, secretive intelligence organizations until Edward Snowden released a treasure trove of its classified secrets. Rather than busting myths, those leaks have only proved to increase misconceptions about the U.S.s global intelligence gathering agency. Here are a few.

First, the NSA cant read your emails whenever it wants. That process is monitored by the court, senior analysts at the agency, and the Department of Justice.

Second, the NSA does not keep the information it gathers forever. If it monitors something, it only keeps that data for five years.

Finally, the NSA is probably not spying on you. The notion that the NSA is secretly recording all of your calls is another one born out of Snowdens leaks and simply not backed up by the numbers. Last year the NSA queried ten thousand American communications which means when it comes to the possibility of your calls being recorded or scanned the odds are, theyre not.

Read the original here:
Myths About the NSA - ClearanceJobs

What you must know about NSA: Its scope and provisions – Business Insider India

The act gives room for the government to keep a person in jail for about 12 months even without any charges. As Corona pandemic spreads, offenders are attacking doctors, security and medical staff across the country. They have been booked under this law.

Here we discuss the various provisions of the National Security Act 1980, its scope and various provisions.

Introduced in India on September 23, 1980, the NSA empowers the state and central governments to detain any individual suspected or found to be a threat to national security. It can also keep them in jail for as long as 12 months even without any charges. The various reasons for which a person can be booked under this law include acting against the security and welfare of the nation, damaging the countrys foreign relations, and obstructing the supply of essential services to the community.

Different provisions of the NSA, 1980

The officer concerned can keep the suspect under NSA under captivity for 5 days even without assigning any reason. Under some special circumstances, this period can extend for a period of 10 to 12 days. Beyond this period, the officer will need the permission of the state or central government to retain the person in detention.

The government will create a panel to deal with the cases booked under NSA and the person arrested under the act cannot avail of any aid by a legal practitioner in any way during the course of the proceedings.

Scope of the NSA, 1980

The NSA empowers the government to keep the suspect in jail for a period of 12 months even without any charges whatsoever. In case any fresh evidence is found against the arrested individual, the jail term can be extended.

Read this article:
What you must know about NSA: Its scope and provisions - Business Insider India

National Storage Affiliates Trust Announces Date of its First Quarter 2020 Earnings Release and Conference Call – Business Wire

GREENWOOD VILLAGE, Colo.--(BUSINESS WIRE)--National Storage Affiliates Trust (NSA or the Company) (NYSE: NSA) today announced the Company will release financial results for the three months ended March 31, 2020 after market close on Monday, May 11, 2020. NSA will host a conference call to discuss its financial results, current market conditions and future outlook at 1:00 p.m. Eastern Time on Tuesday, May 12, 2020. Following prepared remarks, management will accept questions from registered financial analysts. All other participants are encouraged to listen to the call via webcast using the link found on the Companys website.

Conference Call and Webcast:

Date/Time: Tuesday, May 12, 2020 at 1:00 p.m. ET

Webcast link available at: http://www.nationalstorageaffiliates.com

Domestic (toll free): 877-407-9711

International: 412-902-1014

Replay Information:

Domestic (toll free): 877-660-6853

International: 201-612-7415

Conference ID: 13692161

A replay of the webcast will be available for 30 days on NSAs website at http://www.nationalstorageaffiliates.com. Any transcription, recording or retransmission of the Companys conference call and webcast in any way are strictly prohibited without the prior written consent of NSA.

Supplemental materials will be posted to the investor relations section of the companys website prior to the conference call.

About National Storage Affiliates Trust

National Storage Affiliates Trust is a Maryland real estate investment trust focused on the ownership, operation and acquisition of self storage properties located within the top 100 metropolitan statistical areas throughout the United States. As of December 31, 2019, the Company held ownership interests in and operated 742 self storage properties located in 35 states and Puerto Rico with approximately 47.1 million rentable square feet. NSA is one of the largest owners and operators of self storage properties among public and private companies in the United States. For more information, please visit the Companys website at http://www.nationalstorageaffiliates.com. NSA is included in the MSCI US REIT Index (RMS/RMZ), the Russell 2000 Index of Companies and the S&P SmallCap 600 Index.

The rest is here:
National Storage Affiliates Trust Announces Date of its First Quarter 2020 Earnings Release and Conference Call - Business Wire

How a former NSA scientist grasped the Holy Grail of encryption and changed the paradigm for safely sharing data – SiliconANGLE

Women are a minority in tech, with an average of three men for every one woman. When it comes to cybersecurity, the imbalance is even more acute.

A 2020 report shows that female cybersecurity experts are outnumbered five to one by their male counterparts. Inside the National Security Agency, cybersecuritys inner sanctum, the ratio is anyones guess.So the fact that a woman not only entered, but conquered and emerged victorious, from the NSA andwith the rights to market the ultimate encryption treasureis a feat worthy of attention.

How did she do it?Math, said Ellison Anne Williams (pictured), founder and chief executive officer of Enveil Inc. Math and grit.

Williams spoke withJohn Furrier, host of theCUBE, SiliconANGLE Medias mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed her time at the NSA and how homomorphic cryptography provides the missing link in the cybersecurity chain.

The treasure Williams carried from the NSA is one that has often been described as the Holy Grail of cryptologists: Homomorphic encryption. Developed within the NSA by researchers wanting to maintain security for data in-use,the technology enables data to be handled securely while remaining encrypted.

This week theCUBE spotlights Williams in its Women in Tech feature.

Data security has three parts: data at rest, data in transit, and data at use, explained Williams. The first part involves securing data at rest on the file system and the database.This would be your more traditional in-database encryption, she said.

The second part is securing data as its moving around through the network, known as data in transit. The third part of the data security process is securing data that is in-use data under analysis or search. This is when the data is both at its most vulnerable and its most valuable.

While there are many security solutions for both data at rest and in transit, protecting data while it is being processed has always been the weak point. Data was secure before and after processing but had to be decrypted in order to be accessed, then re-encrypted. Homomorphic encryption solves that issue.

It means we can do things like take searches or analytics, encrypt them, and then go run them without ever decrypting them at any point during processing, Williams explained.

Williams holds adoctorate in mathematics (algebraic combinatorics) from North Carolina State University and two masters degrees, one in mathematics from the University of South Carolina and another in computer science from Nova Southeastern University in Florida.

As an undergrad, Williams was a pre-med student with a plan to study infectious diseases. Instead, she fell in love with math and became an expert in distributed computing and algorithms, cryptographic applications, graph theory, combinatorics, machine learning, and data mining.

After graduating from North Carolina State, Williams joined the research team at the NSA, where she spent 12 years doing a little bit of everything, including large-scale analytics, information security and privacy, computer network exploitation, and network modeling. She also advocated for women to join the NSAs team and mentored her male colleagues.

During her last few years at the NSA, she had the opportunity to work at The John Hopkins University Applied Physics Laboratory in Maryland. It was there that she worked on homomorphic encryption as part of a larger project for the NSA.

Although she had worked in research her whole career, Williams had always harbored entrepreneurial dreams. So when she learned she could declassify some of her research through the NSA Technology Transfer Program, she jumped at the chance to create a homomorphic encryption solution for the marketplace.

The idea of homomorphic encryption is not new. The concept has been around since 1978, but a first-generation fully homomorphic solution wasnt proposed until 2009. Research continued, and second- and third-generation fully homomorphic solutions were proposed. But problems remained with implementing these solutions at scale.

With the launch of Enveil Inc. in 2016, Williams took a bet that by combining the entrepreneurship in her DNA with the results of her years of research at John Hopkins and the NSA she could change that.

Less than a year after founding, the company got the cybersecurity communitys attention at the finals of theRSA Innovation Sandbox. Thats where the conversation really started to change around this technology called homomorphic encryption, the market category space called securing data in use, and what that meant, Williams said.

Williams expected a surprised reaction when the community discovered Enveil had a market-ready homomorphic encryption solution. She didnt expect that big-name early adopters, such as Bloomberg Beta, Thomson Reuters Corp., Capital One Financial Corp., and Mastercard Inc., would be eager to strategically invest in the company.

The enthusiasm is because homomorphic encryption solves the problem of secure data sharing. New technologies such as machine learning rely on ingesting massive amounts of data. Being restricted to just one data source limits the potential for powerful insights, but sharing data resources for analysis is a risky business.

There are also codes and regulations that govern data sharing, such as Europes General Data Protection Regulationand the California Consumer Privacy Act, which limit how data can be managed.Not to mention, people can get upset if they discover a company has a cavalier attitude tosharingpersonal data; as Google discovered withProject Nightingale.

This makes the ability to maintain anonymity and security while sharing data critically important for businesses, especially those in the financial sectors, where the payoff and the risks are high stakes. Say a bank suspects a client of financial misconduct, such as money laundering, and as part of establishing the trail, it needs to verify transactions with other institutions.

[Banks] cant necessarily openly, freely share all the information. But if I can ask you a question and do so in a secure and private capacity, still respecting all the access controls that youve put in place over your own data, then it allows that collaboration to occur, Williams stated.

Homomorphic encryption enables the data to be searched while remaining encoded, so no personally identifiable information is ever revealed and regulation compliance and security is ensured.

Current use casesamong Enveils clients include financial regulation, with banks able to securely share information to combat money laundering and other fraudulent activity. Global transactions are simplified by allowing collaboration regardless of national privacy restrictions. And in healthcare, hospitals and clinics can share patient details to research facilities and remain confident that they are not disclosing sensitive personal data.

After just over three years in operation, Williams is proud of what her company has accomplished. Its really pretty impressive, she said.

It is. Breaking the male-dominated culture of cybersecurity, Williams has created a company that is at the forefront of data in-use security, recently announceda $10 million Series A funding and is looking to expand globally with new product lines that enable advanced decisioning in a completely secure and private capacity.

Were creating a whole new market, Williams said. [Were] completely changing the paradigm about where and how you can use data for business purposes.

Heres the complete video interview, part of SiliconANGLEs and theCUBEs coverage of theRSA Conference:

Show your support for our mission with our one-click subscription to our YouTube channel (below). The more subscribers we have, the more YouTube will suggest relevant enterprise and emerging technology content to you. Thanks!

Support our mission: >>>>>> SUBSCRIBE NOW >>>>>> to our YouTube channel.

Wed also like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we dont have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary onSiliconANGLE along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams attheCUBE take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.

If you like the reporting, video interviews and other ad-free content here,please take a moment to check out a sample of the video content supported by our sponsors,tweet your support, and keep coming back toSiliconANGLE.

Read the original here:
How a former NSA scientist grasped the Holy Grail of encryption and changed the paradigm for safely sharing data - SiliconANGLE