Archive for the ‘NSA’ Category

Privacy Regulations May Improve As Senators, Companies Try To Curtail NSA-Style Snooping – International Business Times

Data privacyregulationin the U.S. hasbeen a thorny issuewith provisions such as the National Security Letters (NSLs) allowing unfettered access to law enforcement agencies into citizens communications.

The power endowed on the government by laws such as the Stored Communications Act has madeaccessing citizens email and other communications fairly easy in the post-2001 period for agencies such as the CIA and the FBI.

Read: Was My Samsung TV Hacked?: How To Tell If Your Smart TV Was Compromised By CIA Weeping Angel Hack

However, it might not remain so thanks to the efforts of tech companies and senators.

While tech companies such as Microsoft are wooing Congress to pass stricter privacy regulations, many senators have introduced bills such as the Email Privacy Act, amendment to the Electronic Communications Privacy Act and the International Communications Privacy Act, with the common goal of imposing strict regulations on access to privatecommunications.

Apple had also taken a stand by refusing to provide the government a master key to iPhones following the San Bernardino shootings in 2015.

The battle between privacy and security has been waged for long, and citizens privacy rights have been sacrificed at the altar of national security. Agencies such as NSA and CIA have even peered into communications illegally, using tools such as the Weeping Angel hack to listen to people using smart TVs.

The root of all privacy battles is the 1986 Electronic Communications Privacy Act, an outdated statute that bypassed warrants for lookinginto citizens communications.

The amended Electronic Communications Privacy Act would require law enforcement officials to obtain warrants for accessing remotely stored emails and communications which are more than 180 days old.

The bill would also require the authorities to obtain warrants for accessing location data. More importantly it would impose restrictions on gag orders, which prohibit companies from making the governments requests for access to users data public.

Americans dont believe the federal government should have warrantless access to their emails just because they are 180 days old. They dont believe the government should be able to always know where you are just because you are carrying a cell phone. It is long past time that Congress updated our federal laws to better protect Americans privacy, Senator Mike Lee (R-Utah) stated in an open letter published on his website Thursday.

Read: Are Smart Home Devices Safe? Indoor Mapping Data Collection Poses Privacy Risk

The endeavor has been praised by privacy activists such as the Electronic Frontier Foundation.

National security concerns which were raised post 9/11 have highly endangered user privacy. With changing technology and improved means of communication, the ambit of government surveillance has also expanded.

While Europe has already begun a clampdown on privacy violations, the U.S. is yet to do so. Butif tech companies and the Senate sustain their efforts to guard user privacy, chances are we might be able to achieve the delicate balance between privacy and security in the near future.

See the original post:
Privacy Regulations May Improve As Senators, Companies Try To Curtail NSA-Style Snooping - International Business Times

ShadowBrokers leak probe looking at NSA insiders: report – The Hill

Investigators believe the ShadowBrokers leaks were from a National Security Agency insider, thewebsite CyberScoop reports.

Since August of last year, the ShadowBrokers have leaked files apparently stolen from the NSA, primarily source code for NSA hacking tools along with some additional files.

One set of files leaked by the group contained tools to hack into the Windows operating system. Those tools were eventually used in the devastating international ransomware attacks known as WannaCry and NotPetya.

WannaCry infected between hundreds of thousands and millions of systems, causing such damage to the United Kingdoms hospitals that some patients were turned away. NotPetya caused significant damage to a major Russian energy firm and the U.S.-based pharmaceutical giant Merck.

Citing multiple sources familiar with the investigation, CyberScoop reports that ex-NSA employees have been contacted by investigators concerning how the ShadowBreakers obtained their cache of files.

The report claims that the leadingtheory is that an inside actor was at the helm but that other theories are still in the mix, including a foreign hacker.

Sources also told CyberScoop that the investigation "goes beyond" Harold Martin, the NSA contractor arrested for hoarding classified documents at his home last year.

The ShadowBrokers claim to have leaked files to raise interest for a planned sale of the remaining cache of documents. Currently, the group is offering a subscription, leak-of-the-month service.

Continue reading here:
ShadowBrokers leak probe looking at NSA insiders: report - The Hill

Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull – ABC Online

Updated August 01, 2017 07:34:44

The Federal Government's bid to force tech companies to reveal terrorists' secret conversations could be unachievable, according to the former deputy director of the US National Security Agency (NSA).

Chris Inglis had a 28-year career with the NSA and now advises private companies on how to detect Edward Snowden-style leakers within their ranks.

He told the ABC the Turnbull Government's bid to access encrypted messages sent by terrorists and other criminals is to be admired, but the technology may prove problematic.

"I don't know how feasible it is to achieve the kind of access the Government might want to have under the rule of law, the technology is tough to get exactly right," Mr Inglis told the ABC.

"But the Government is honour-bound to try to pursue both the defence of individual rights and collective security."

Encrypted messages affect close to 90 per cent of ASIO's priority cases and the laws would be modelled on Britain's Investigative Powers Act, which obliges companies to cooperate.

Technology experts, like adjust professor at the Centre for Internet Safety Professor Nigel Phair, have questioned how these laws would really work.

"From a technical perspective we are looking at very high-end computing power that makes it really, really difficult to decrypt a message on the fly, it's just not a simple process," he said.

Facebook has already indicated it will resist the Government's laws, saying weakening encryption for intelligence agencies would mean weakening it for everyone.

"Because of the way end-to-end encryption works, we can't read the contents of individual encrypted messages," a spokesman said.

But Mr Inglis said technology companies would not need to create a so-called backdoor to messages, but rather allow intelligence agencies to exploit vulnerabilities.

The NSA was criticised in May after it was revealed it knew about a vulnerability in Microsoft's system, but exploited it rather than reporting it to the company.

"Here's the dirty little secret: most of these devices already have what might be technically described as a backdoor their update mechanisms, their patch mechanisms," he said.

"My read on what you are trying to do is to put that issue on the table and say, 'we are not going to create backdoors, but we are going to try and use the capabilities that already exist'."

Mr Inglis said the Australian Government was pushing for legal powers the US Government had not called for.

"We have not had as rich a debate as what I sense is going on in Australia," he said.

"The Government by and large has not stepped in and directed that we are either going to seek a solution, we are still trying to find a voluntary way forward."

When Prime Minister Malcolm Turnbull announced the legislation, he noted strong libertarian tendencies of US-based technology companies.

Mr Inglis said Australia was "in the middle of the pack" when it came to cyber security planning.

"You are currently working through how to balance individual privacy the defence of liberty as well as we would say in the states and the pursuit of collective security," he said.

"No-one is exempt from the threats that are traversing across the cyber space at this moment in time."

Topics: science-and-technology, defence-and-national-security, security-intelligence, information-and-communication, turnbull-malcolm, government-and-politics, australia, united-states

First posted August 01, 2017 04:44:23

Read more:
Ex-NSA boss questions encrypted message access laws proposed by Malcolm Turnbull - ABC Online

Online site backing defense of accused NSA leaker founded to promote fearless journalism – The Augusta Chronicle

The founders of the online news publication that will help in the defense of a Fort Gordon contractor accused of leaking a classified document were among the first to report on the National Security Agency surveillance of citizens in other countries and at home in 2013, using thousands of documents leaked by a former NSA contractor, Edward Snowden.

While the document published by The Intercept which the government says came from NSA contract employee Reality Leigh Winner of Augusta is still considered classified by prosecutors, it allegedly concerns the NSA analysis of Russias efforts to infiltrate a voting software company and infect computers used by state election officials. The Intercept published a story based on the analysis, and Winner was arrested June 3.

According to The Intercepts site, journalists Glenn Greenwald, Laura Poitras and Jeremy Scahill founded the online publication dedicated to fearless, adversarial journalism. EBays founder Pierre Omidyar provided the funding in 2013 for First Look Media in 2013, a non-profit, which launched The Intercept.

The Intercept has an average of 5 million visitors a month, said Vivian Siu, director of communications for First Look.

The online publication has a lot of readers in and outside of the U. S., said Rick Edmonds, media business analysis with the Poynter Institute, a nonprofit school for journalism. The Intercept began as a site for leaked documents but has expanded into other areas, Edmonds said. Non-profit, online publications are definitely a growing part of journalism and investigative reporting, he said.

The non-profit, online publication ProPublica has been publishing significant investigative work, Edmonds noted. There is also the International Consortium of Investigative Journalists that won a Pulitzer Prize for the Panama Papers investigation into the finances of Pakistani Prime Minister Nawaz Sharif, which led to his resignation Friday. The new form of journalism has a significant presence, Edmonds said.

I believe that great journalism boils down to a few key principles, Scahill wrote in an article asking for readers support for investigative journalism. Hold those in power accountable, regardless of their political or corporate affiliations; give voice to the voiceless; provide people with information they can use to make informed decisions; be transparent with your readers about how you know what you know; (and) make sure your facts are straight.

Scahill won a George Polk Award for his reporting in war zones and for his 2008 report about Blackwater, the private armed security force. Greenwald is a journalist and attorney who wrote four New York Times best-sellers on politics and law. He also wrote No Place to Hide about the U.S. surveillance and his experience in reporting on the Snowden documents. In 2013 he was awarded a George Polk award and several others for his reporting on the Snowden documents.

Poitras was also awarded a George Polk award and shared the 2014 Pulitzer Prize for public service with The New York Times. Poitras left The Intercept for Field of Vision, which is also part of First Look Media. She was awarded an Academy Award for best documentary in 2015.

The Intercept has won a number of national journalism awards. It focuses on national security, politics, civil liberties, the environment, international affairs, technology, criminal justice, the media and more, according to its website. And it seeks whistleblowers, providing an email site and online drop box.

In Winners case, the Press Freedom Defense Fund of the First Look Media is giving $50,000 in matching funds to Stand with Reality, a fundraising campaign. First Looks attorney Baruch Weiss, a former U.S. attorney with experience in NSA investigations, will support Winners local defense team.

Winner is in custody without bond. She has pleaded not guilty to one count of willful retention and transmission of national defense information.

Reach Sandy Hodson at sandy.hodson@augustachronicle.com or (706) 823-3226

Excerpt from:
Online site backing defense of accused NSA leaker founded to promote fearless journalism - The Augusta Chronicle

Mid Range | Firewalls | SonicWall

_productName NSA 6600 NSA 5600 NSA 4600 NSA 3600 NSA 2600 Deep Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Stateful Packet Inspection Firewall TotalSecure Firewall Overview S S S S S Unlimited File Size Protection TotalSecure Firewall Overview S S S S S Protocols Scanned TotalSecure Firewall Overview S S S S S Application Intelligence and Control Threat Prevention Services Available S S S S S Intrusion Prevention Service Threat Prevention Services Available S S S S S Gateway Anti-Virus and Anti-Spyware Threat Prevention Services Available S S S S S Content & URL Filtering (CFS) Threat Prevention Services Available S S S S S SSL Inspection (DPI SSL) Threat Prevention Services Available S S S S S Content Filtering Client (CFC)1 Threat Prevention Services Available O O O O O Analyzer Reporting1 Threat Prevention Services Available O O O O O Capture Advance Threat Protection1 Threat Prevention Services Available O O O O O Enforced Client Anti-Virus and Anti-Spyware (McAfee or Kaspersky) Threat Prevention Services Available O O O O O 24x7 Support Threat Prevention Services Available S S S S S Interfaces Firewall General 4x10GbE SFP+, 8x1GbE SFP, 8x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 2x10GbE SFP+, 4x1GbE SFP, 12x1GbE, 1GbE Management, 1 Console 8x1 GbE, 1GbE Management, 1 Console Management Firewall General CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS CLI, SSH, GUI, GMS Nodes Supported Firewall General Unrestricted Unrestricted Unrestricted Unrestricted Unrestricted RAM Firewall General 4 GB 4 GB 2 GB 2 GB 2 GB Visual Information Display (LCD Display) Firewall General N N N N N Site-to-Site VPN Tunnels Firewall General 6000 4000 1500 1000 75 Global VPN Clients (Maximum) Firewall General 2000 (6000) 2000 (4000) 500 (3000) 50 (1000) 10 (250) SSL VPN NetExtender Clients (Maximum) Firewall General 2 (1500) 2 (1000) 2 (500) 2 (350) 2 (250) VLAN Interfaces Firewall General 500 400 256 256 256 SonicPoints Wireless Controller Firewall General S S S S S WWAN Failover (4G/LTE) Firewall General S S S S S Network Switch Management Firewall General S S S S S Firewall Inspection Throughput2 Firewall/VPN Performance 13 Gbps 9 Gbps 6 Gbps 3.4 Gbps 1.9 Gbps Full DPI Performance (GAV/GAS/IPS) Firewall/VPN Performance 3 Gbps 1.6 Gbps 800 Mbps 500 Mbps 300 Mbps Application Inspection Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps IPS Throughput Firewall/VPN Performance 4.5 Gbps 3 Gbps 2 Gbps 1.1 Gbps 700 Mbps Anti-Malware Inspection Throughput Firewall/VPN Performance 3 Gbps 1.7 Gbps 1.1 Gbps 600 Mbps 400 Mbps IMIX performance Firewall/VPN Performance 3.5 Gbps 2.4 Gbps 1.6 Gbps 900 Mbps 600 Mbps SSL DPI Performance Firewall/VPN Performance 1.3 Gbps 800 Mbps 500 Mbps 300 Mbps 200 Mbps VPN Throughput4 Firewall/VPN Performance 5 Gbps 4.5 Gbps 3 Gbps 1.5 Gbps 1.1 Gbps Latency Firewall/VPN Performance 16 s 24 s 17 s 38 s 45 s Maximum Connections5 Firewall/VPN Performance 750K 750K 400K 325K 225K Maximum DPI Connections Firewall/VPN Performance 500K 500K 200K 175K 125K DPI-SSL Connections Firewall/VPN Performance 6000 4000 3000 2000 1000 New Connections/Sec Firewall/VPN Performance 90000 60000 40000 20000 15000 Logging Features Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Analyzer, Local Log, Syslog Network Traffic Visualization Features S S S S S Netflow/IPFIX Reporting Features S S S S S SNMP Features S S S S S Authentication Features XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database XAUTH/ RADIUS, Active Directory, SSO, LDAP, Terminal Services6, Citrix6, Internal User Database Dynamic Routing Features BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP BGP, OSPF, RIP Single Sign-on (SSO) Features S S S S S Voice over IP (VoIP) Security Features S S S S S Interface to Interface Scanning Features S S S S S PortShield Security Features S S S S S Port Aggregation Features S S S S S Link Redundancy Features S S S S S Policy-based Routing Features S S S S S Route-based VPN Features S S S S S Dynamic Bandwidth Management Features S S S S S Stateful High Availability Features S S S S S Multi-WAN Features S S S S S Load Balancing Features S S S S S Object-based Management Features S S S S S Policy-based NAT Features S S S S S Inbound Load Balancing Features S S S S S IKEv2 VPN Features S S S S S Active/Active Cluster Features S S S S S Terminal Services Authentication/Citrix Support Features S S S S S TLS/SL/SSH decryption and inspection Features S S S S S SSL Control for IPv6 Features S S S S Easy VPN Features S S S S Biometric Authentication Features S S S S DNS Proxy Features S S S S Hardware Failover Failover Active/Passive with State Sync, Active/Active DPI with State Sync Active/Passive with State Sync, Active/Active DPI with State Sync Multi-WAN Failover Failover S S S S S Automated Failover/Failback Failover S S S S S

Read the original post:
Mid Range | Firewalls | SonicWall