Archive for the ‘NSA’ Category

National Storage Affiliates Trust (NSA) overbought Stock to Bite? We have reviewed it – News Welcome

The stock now we are analyzing at is National Storage Affiliates Trust (NSA) which is now in overbought queue as the Relative Strength Index has been observed at 73.3. As commonly stock is overbought when RSI goes above 70 (look further in the section of technical indicators).

There are a lot of factors to determine whether trading of National Storage Affiliates Trust (NSA) stock is going to end in profit or not but one of the most commonly known important factors has remained the overbought and oversold conditions. So, identifying oversold and overbought stocks is an important skill for every investor or trader. Commonly, traders use technical indicators for oversold and overbought stocks while investors use fundamental factors. Most common Technical indicator that is used to identify overbought and oversold stocks is the Relative Strength Index or called RSI. While most common fundamental indicator that Investors cognize to identify overbought and oversold stocks is P/E Ratio.

How much NSA Stocks is Volatile?

Now we will look for the boiling points and excitability of NSA stock. Last weeks volatility stood at 1.65% and last months volatility marked at 1.51%. Volatility of a stock indicates how tightly the price of a stock is constellated around the mean or moving average. A Stocks volatility is generally associated with investment risk; however, traders can also use it to lock in superior returns. Volatility is also measured by ATR which is an exponential moving average (14-days) of the True Ranges. The stocks ATR value pointed at 0.55.

At this moment, Stocks beta measure is 0.3. Beta is also one of the most popular indicators to measure risk of stock trading. It is a measure of a stocks volatility in relation to the market. Analysts also use it often when they need to determine risk profile of a stock. If beta is higher than 1 then risk is higher and if beta is lower than 1, then risk will be low.

Now here, we will be looking at the trend of NSA stocks performance for different time intervals in order to evaluate the companys share value step by step.

National Storage Affiliates Trust Stock Performance:

Traders shown interest in National Storage Affiliates Trust (NSA) as it recorded negotiations of 284168 shares while stock maintained an average volume of 356.05K shares. It has a market capitalization of $2.16B. NSA stock recognized return of 4.50% over last weekly trading activity and showed performance of 7.08% over monthly period. Shares are now at 12.81% for the quarter and 13.26% for the last six months. The company is driving a 24.78% of return over the course of past one year and is now with performance of 8.45% so far this year. National Storage Affiliates Trust traded with move of 1.39% at $36.46 per share on Tuesday trading session. Shares of company positioned at 0.83% from its 52-week high price while it has been noted 34.24% away from low price over the last 52-weeks.

National Storage Affiliates Trust Stock Look at Technical Side:

Most commonly used indicator to identify overbought and oversold conditions is Relative Strength Index (RSI). RSI is actually a range bound oscillator which is scaled mainly from 0 to 100. RSI from 30 to 70 are considered as a normal state but a RSI indicates the oversold situation when it comes below 30 and If RSI of a stock goes above 70 then it indicates the overbought situation. So as Currently Relative Strength Index (RSI-14) reading of National Storage Affiliates Trust (NSA) stock is 73.3, technically its an overbought stock.

Though, occasionally stocks can indicate an opposite short-term movement then it becomes important to look for trades in direction of a bigger trend. Like when bigger trend of prices stayed down when RSI was over 70 and bigger trend of stock price stayed up while RSI is below 30 then a 14-day RSI can be considered as a short-term indicator. So, in that situation a Simple Moving Average (SMA) can be crucial to look.

Simple Moving Average calculated as an average of the last N-periods (20-Day, 50-Day, 200-Day). A Simple Moving Average is one of the most flexible as well as most-commonly used technical analysis indicators. It is highly popular among traders, mostly because of its simplicity. It works best in a trending environment. Any type of moving average can be used to generate buy or sell signals and this process is very simple. National Storage Affiliates Trust (NSA) stock price is above from its 20 days moving average with 4.37% and trading above from 50 days moving average with 7.14%. The stock price is performing along above from its 200 days moving average with 13.20%.

NSA Stock Under Profitability Spotlight

Net profit margin of the company is -7.30% that shows how much the company is profiting by every dollar of sales. Operating Margin is noted at 32.10%.

Return on Assets (ROA) shows that how much the company is profitable as compared to its total assets which is -0.90% for stock. On the other hand, Return on Equity (ROE) is -3.80%. ROE actually measures financial performance and could be thought of as the return on net assets. It is considered a measure of how effectively management is using a companys assets to create profits. Return on Investment (ROI) is 5.00%. ROI measures the efficiency of investments. It helps to directly evaluate the amount of return on a specific investment, relative to the total investments cost.

Forward price to earnings ratio of 87.02.

Analysts Estimation:

Now at last but not the least, we will review what the Analysts are buzzing about this Stock. Looking for Analysts opinion is also important to understand where the stock is heading. Analyst has some hope that stock may be reaching the Target Price value of $34.88 in coming one year period. The Target Price expected by analysts that is achievable in short term period (1 year). Analysts Mean Recommendation of the stock is now at 2.3 (1.0 Strong Buy, 2.0 Buy, 3.0 Hold, 4.0 Sell, 5.0 Strong Sell). EPS growth for the next year is expected to be 59.92% and projected to gain growth of 391.40% for this year. Earnings per share EPS is one of the most important variables in determining a shares intrinsic value. EPS (ttm) is reported at -0.47. Analysts have some long term expectations that stock could hit EPS growth of 11.00% in next 5 years period while EPS growth seen at 34.10% for past 5 years period.

See the rest here:
National Storage Affiliates Trust (NSA) overbought Stock to Bite? We have reviewed it - News Welcome

The progress the government has made on election security – fifthdomain.com

The latest Senate report on Russian interference in the 2016 election, released Feb. 6, contained several broad recommendations for how the government can improve effectiveness in securing American elections.

While the Senate Select Committee on Intelligences third volume lists seven recommendations for correcting shortfalls made by the Obama administration in responding to Russian election interference, the federal government has already made progress in several of the recommended areas since the committee started its report.

The committee recommends that the executive branch bolster partnerships with countries considered near abroad to Russia. The bipartisan report states that Russia has been using these countries as a laboratory for perfecting information and cyber warfare. For example, in the military conflict between Ukraine and Russian, Russian-backed hackers have targeted the government and shut down the countrys power grid.

Expanding partnerships with such countries will help to prepare defenses for the eventual expansion of interference techniques targeting the West," the report read.

U.S. Cyber Command has taken similar measures in recent years, partnering with the Montenegrin government for the last two years to search for malicious actors in networks in the lead up to both nations elections in 2020. The U.S. Secret Service also engages with foreign states on cybersecurity issues, like in 2017 when it trained local officials in Estonia.

Having U.S. cyber personnel near the Russian cyber hot spots will help the United States learn more about Russian behavior. Tom Kellermann, a former commissioner on the Commission on Cyber Security for the 44th President of the United States, said that partnerships will help the United States determine the root cause of Russian intrusions.

How did they get in in the first place and how did they stay in? How did they maintain persistence?" said Kellermann, now head of cybersecurity strategy at VMware. These are the critical lessons we should learn from assisting our allies in order to protect our democracy."

The committee also recommended that the United States lead the way on establishing international cyber norms, writing that U.S. leadership is needed to balance any formalized international agreement on acceptable uses of cyber capabilities.

Get the top Cyber headlines in your inbox every weekday morning.

(please select a country) United States United Kingdom Afghanistan Albania Algeria American Samoa Andorra Angola Anguilla Antarctica Antigua and Barbuda Argentina Armenia Aruba Australia Austria Azerbaijan Bahamas Bahrain Bangladesh Barbados Belarus Belgium Belize Benin Bermuda Bhutan Bolivia Bosnia and Herzegovina Botswana Bouvet Island Brazil British Indian Ocean Territory Brunei Darussalam Bulgaria Burkina Faso Burundi Cambodia Cameroon Canada Cape Verde Cayman Islands Central African Republic Chad Chile China Christmas Island Cocos (Keeling) Islands Colombia Comoros Congo Congo, The Democratic Republic of The Cook Islands Costa Rica Cote D'ivoire Croatia Cuba Cyprus Czech Republic Denmark Djibouti Dominica Dominican Republic Ecuador Egypt El Salvador Equatorial Guinea Eritrea Estonia Ethiopia Falkland Islands (Malvinas) Faroe Islands Fiji Finland France French Guiana French Polynesia French Southern Territories Gabon Gambia Georgia Germany Ghana Gibraltar Greece Greenland Grenada Guadeloupe Guam Guatemala Guinea Guinea-bissau Guyana Haiti Heard Island and Mcdonald Islands Holy See (Vatican City State) Honduras Hong Kong Hungary Iceland India Indonesia Iran, Islamic Republic of Iraq Ireland Israel Italy Jamaica Japan Jordan Kazakhstan Kenya Kiribati Korea, Democratic People's Republic of Korea, Republic of Kuwait Kyrgyzstan Lao People's Democratic Republic Latvia Lebanon Lesotho Liberia Libyan Arab Jamahiriya Liechtenstein Lithuania Luxembourg Macao Macedonia, The Former Yugoslav Republic of Madagascar Malawi Malaysia Maldives Mali Malta Marshall Islands Martinique Mauritania Mauritius Mayotte Mexico Micronesia, Federated States of Moldova, Republic of Monaco Mongolia Montserrat Morocco Mozambique Myanmar Namibia Nauru Nepal Netherlands Netherlands Antilles New Caledonia New Zealand Nicaragua Niger Nigeria Niue Norfolk Island Northern Mariana Islands Norway Oman Pakistan Palau Palestinian Territory, Occupied Panama Papua New Guinea Paraguay Peru Philippines Pitcairn Poland Portugal Puerto Rico Qatar Reunion Romania Russian Federation Rwanda Saint Helena Saint Kitts and Nevis Saint Lucia Saint Pierre and Miquelon Saint Vincent and The Grenadines Samoa San Marino Sao Tome and Principe Saudi Arabia Senegal Serbia and Montenegro Seychelles Sierra Leone Singapore Slovakia Slovenia Solomon Islands Somalia South Africa South Georgia and The South Sandwich Islands Spain Sri Lanka Sudan Suriname Svalbard and Jan Mayen Swaziland Sweden Switzerland Syrian Arab Republic Taiwan, Province of China Tajikistan Tanzania, United Republic of Thailand Timor-leste Togo Tokelau Tonga Trinidad and Tobago Tunisia Turkey Turkmenistan Turks and Caicos Islands Tuvalu Uganda Ukraine United Arab Emirates United Kingdom United States United States Minor Outlying Islands Uruguay Uzbekistan Vanuatu Venezuela Viet Nam Virgin Islands, British Virgin Islands, U.S. Wallis and Futuna Western Sahara Yemen Zambia Zimbabwe

Subscribe

By giving us your email, you are opting in to the Daily Brief.

This is another area where the U.S. government has already made progress. At the United Nations, the United States has worked to establish international cyber norms and proposed creating a group to study how to enforce cyber norms, all while butting heads with the Russian and Chinese representatives.

According to Chris Painter, a former top cyber official at the Department of State, while the United States has led on establishing some norms, like critical infrastructure shouldnt be targeted outside of wartime, there is still outstanding work to be done on enforcing those norms.

We have to make sure that those norms are just not paper tigers, Painter said. They have to be accepted by countries around the world and there has to be accountability when people break them."

Another recommendation from the committee suggests that credible information about foreign information or cyber operations be shared as broadly as appropriate within government, Congress and, when appropriate, private-sector partners. The committee also adds that the federal government must have substantive and timely outreach with state and local governments when election infrastructure is targeted.

The federal government has made strides in this area, particularly with its outreach to state and local governments, an effort spearheaded by the Cybersecurity and Infrastructure Security Agency within the Department of Homeland Security. Top election officials in states have security clearances to gain access to more threat intelligence and CISA frequently holds phone calls with state operators of critical infrastructure, which includes election officials.

Within the intelligence community, NSAs new Cybersecurity Directorate is also making an effort to share contextualized threat intelligence with the defense industrial base.

As part of the recommendation, the committee also said that feds needed to create a mechanism for notifying the public of operations.

Delaying the release of information allows inaccurate narratives to spread, which makes the task of informing the public significantly harder, the committee wrote.

Both the IC and civilian government have partnered together to establish a process for public notification of cyberthreats. Back in November, the Office of the Director of National Intelligence, NSA, DHS, State, CIA, NSA and FBI agreed to a framework in which they would discuss potentially exposing an interference operation after convening leaders from all the agencies.

The committees other recommendations were that the executive branch prepare for the next attack, integrate responses to cyber incidents, prioritize collection on information warfare, and clarification of roles and authorities within the IC.

Read the original:
The progress the government has made on election security - fifthdomain.com

Unclear NSA CIO Role Puts the Agency’s IT at Risk, IG Says – Nextgov

The National Security Agencys chief information officer may be unsure of what theyre supposed to be doing with attention being pulled disproportionately toward cybersecurity issues, according to the agencys inspector general.

The Agencys CIO role is ambiguous, without clearly defined authorities and responsibilities, the OIG wrote in the semi-annual report released Thursday, which otherwise gives NSA a pat on the back for implementing its recommendations.

The IG audited the agency for compliance with Clinger-Cohen Act of 1996 and an Office of Management and Budget memorandum, documents that describe the CIO role and responsibilities for budget, program and workforce management as well as overseeing information security.

Examining the implementation of an enterprise IT architecture program and the CIOs placement within the NSAs management structure, the IG said the agency and the CIO made substantial progress, but there were a few attention-grabbing reasons they noted as contributing to shortfalls.

These were dual hatting the functions of the CIO with those of an NSA Directorate, a lack of documentation for the delegation of authorities, failure to include the CIO role in agencyorganization charts, and agency communications that reinforced the CIOs authorities primarily for the information security component.

The CIO has the requisite oversight of and decision rights for all Agency IT, the IG explains, noting, The issues identified in this audit increase the risk that the agency ...may not be maximizing its effectiveness and efficiency in designing, investing in, acquiring, managing, and maintaining the full range of its IT.

The report said the IG made four recommendations to address the issue, and that the NSA has sufficiently addressed one of those, with actions planned to implement the other three.

In general, though, the IG reports the NSAs overdue recommendations for the period of April through September represented 59% of the total number of open recommendations, which was the lowest percentage of open recommendations that were overdue over the past four semi-annual reports.

This reflects significant progress, but there is still substantial work to be done, according to the latest report.

The OIG is now evaluating NSAs implementation of the Federal Information Security Modernization Act of 2014. That audit will focus specifically on assessing the agencys information security practices.

Link:
Unclear NSA CIO Role Puts the Agency's IT at Risk, IG Says - Nextgov

NSA and University of Illinois: Partnering to Secure Networks and Cyber Systems – Illinois Computer Science News

FT. MEADE, Md. The University of Illinois at Urbana-Champaign (Illinois) is one of the first universities to partner with NSA on researching the science of security and has been working on cybersecurity problems with NSA for more than 19 years.

As one of the initial schools to be designated to host an NSA Science of Security (SoS) Lablet, Illinois has been instrumental in stimulating basic research to create scientific underpinnings for security and advocating for scientific rigor in security research, said NSA Deputy Director George Barnes. The Illinois SoS Lablet builds on a long history in developing science upon which systems might be engineered.

To celebrate this partnership, NSA has named Illinois as a featured schooland ishighlighting the collaboration on NSA.gov, IntelligenceCareers.gov, and on social media beginning January 23, 2020.

As a public comprehensive research university, the University of Illinois at Urbana-Champaign has an opportunity and responsibility to advance our society, said Illinois Chancellor Robert Jones. We are honored to be named a National Security Agency Featured School, and we look forward to continuing to partner to develop the talent and tools needed for our national security challenges.

The partnership began in 2000 when Illinois was designated as a Center of Academic Excellence in Cyber Defense(CAE-CD), a program now jointly sponsored by NSA and the Department of Homeland Security. That program, along with a CAE-Research designation, which Illinois received in 2008, promotes higher education and research in the critical area of cybersecurity.

At about the same time NSA researchers began collaborating with Illinois faculty and students in support of broad cybersecurity and assurance goals, to include research in programming languages and system verification in support of systems analysis.

This early work with Illinois led to valued capability developments that are still in use within NSA and partner federal agencies today, said Mr. Brad Martin, Illinois Academic Liaison.

In 2011, Illinois became one of just three universities to host a SoS Lablet. Dr. David Nicol, a professor at Illinois, has been involved in the lablet since the beginning and appreciates the fact that NSA has been investing in research at the early conceptual stages.

I was pleased that the problem of viewing the scientific basis for security was being taken seriously, he said. Its commendable that NSA recognized this issue and invested resources in studying it.

NSA has also awarded Illinois more than $600,000 in grants over the last five years and has hosted a number of summer interns from the university. Currently, two students at Illinois are in the Stokes Educational Scholarship Program, which recruits students, particularly minorities, who have demonstrated skills critical to NSA. The students receive up to $30,000 a year toward their college education and commit to summer internships and six years of agency employment following graduation.

Currently 115 Illinois graduates with degrees at all levels in areas from mathematics to Russian work at NSA.We have many talented employees at NSA who have come from Illinois, said Ms. Kathy Hutson, NSAs Senior Strategist for Academic Engagement. We are so pleased with the partnership we have forged with the university and what it has yielded for NSA.

Illinois is the fifth university to be named an NSA Featured School. The series highlights schools designated as CAEs that have a depth and breadth of engagement with the Agency.

The rest is here:
NSA and University of Illinois: Partnering to Secure Networks and Cyber Systems - Illinois Computer Science News

Powerful lawmakers join effort to kill surveillance program protected by Trump administration – POLITICO

But a newfound appetite for curtailing U.S. surveillance practices has emerged among Republicans who have criticized the FBIs eavesdropping of former Trump campaign adviser Carter Page, making them willing to buck the Trump administrations demands that the program be permanently extended.

And intelligence officials arent making the case to keep to phone records program, either. Theyve previously admitted it has become too technically complex a burden to maintain.

Longtime privacy advocates on the Hill are seizing on this momentum to kill the program theyve argued is ineffective and violates Americans rights before the statute authorizing it expires on March 15.

This is a big moment for reformers, Sen. Ron Wyden (D-Ore.), a senior member of the Senate Intelligence Committee, who is looking to push for greater surveillance changes given this new climate in Congress, told POLITICO this month.

Intelligence Chairman Richard Burr (R-N.C.) and Virginia Sen. Mark Warner, the panels top Democrat, introduced legislation that would render the program essentially inoperable while renewing the laws other surveillance authorities predominantly used by the FBI for another eight years.

I plan to propose to leadership that we move, in some fashion, [our] bill, Burr said.

Senate Judiciary Chairman Lindsey Graham (R-S.C.), whose panel held a contentious public hearing with an NSA official who couldnt offer examples of the program helping in terror probes, said the proposed legislation works for him.

Meanwhile, in the Democrat-controlled House, the Judiciary and Intelligence committees have been working together for months on a bill that would pull the plug on the surveillance tool once and for all.

The panels are writing a proposal that will both renew authorities necessary to the protection of national security, while also bolstering additional privacy and transparency safeguards where appropriate, a senior Democratic House Intelligence Committee official told POLITICO.

Obviously, time is of the essence, and we hope to come to [a] consensus in the coming month or so, the official added.

A House Democratic aide said the program was built to address an adversary and a technological gap that existed 25 years ago, but times have changed. Bad guys don't use landlines to talk to each other anymore The technology is different. It is less valuable to us today than it was than it would have been in 2001 when they needed it.

But a critical player is Senate Majority Leader Mitch McConnell (R-Ky.), who has yet to indicate he would buck the White House over the intelligence tool. A McConnell spokesperson declined to comment, and a spokesperson for the National Security Council did not respond to a request for comment from POLITICO about the broad resistance from Congress.

The NSA gained the ability to access and analyze Americans domestic calling records shortly after 9/11. Established in secret, the program was designed to vacuum up metadata the numbers and time stamps for calls or text messages but not the actual content so the agency could sift for links among possible associates of terror suspects.

The Snowden leaks eventually forced the Obama administration and Congress to settle on a new law, the USA Freedom Act, that ended NSAs bulk phone collection but allowed the records to be retained by telephone companies and accessed by the federal government with court approval.

Problems with the revised system began to emerge publicly in 2018 when the NSA announced it had uncovered technical irregularities that caused it to collect more phone records than it had legal authority to gather. The agency dumped its entire collection of phone records. However, the problem soon resurfaced, according to an inspector general report.

The recurring compliance headaches around the program, its negative association with Snowden and an inability by intelligence leaders to offer concrete examples of its value in fighting terrorism led a spectrum of observers including former and current intelligence officials to question if the scaled down system was worth keeping at all.

The administration had been quiet about its intentions for the future of the program. Thats a contrast to 2017 when the White House and the intelligence community successfully pressed lawmakers to renew a separate set of warrantless programs that intercept digital traffic of foreign targets while collecting personal information on Americans.

In March, a senior congressional aide revealed that the NSA had deactivated the domestic surveillance program. Then-Director of National Intelligence Dan Coats confirmed that fact in a letter to Congress in August, which acknowledged that the system has been indefinitely shut down but still asked lawmakers to extend its legal basis.

On Capitol Hill, the urge to strike the program from the books only grew. But in December, lawmakers were forced to include language in a stopgap government funding bill that punted the deadline for the surveillance programs by 90 days, until March 15.

The move was made, in part, because the House impeachment inquiry dominated much of the congressional calendar and to wait for potentially consider additional surveillance reforms, some of which were highlighted by Justice Department Inspector General Michael Horowitzs review of the FBIs handling of its investigation of the Trump campaign in 2016.

A lot of very smart people had a notion that it would be a bad idea for us to pass a bill the first week of December and to have an IG report detailing the inner depths of the FISA process come out the second week of December and then look foolish, the House Democratic aide told POLITICO.

The aide said that on big ticket questions there isnt a lot of daylight between the existing Senate bill and the one that will be produced by the House Judiciary and Intelligence panels, though an eight-year extension of the other authorities isnt likely to pass the lower chamber.

Other issues could also complicate the short window left for lawmakers to take up the surveillance law.

This week, Wyden and a bipartisan group of House and Senate lawmakers introduced a bill that would end the program, codify an intelligence community decision to stop location-tracking surveillance activities, and change the process for obtaining court approval for surveillance, while proposing additional transparency measures.

To pass a bill where everybody says the thing doesn't work and we're just going to write into law what they're already doing and then call it a day, I think, would be very unfortunate because there's a lot more to do, Wyden said.

But additional changes appear to be a non-starter for Burr, who advised Wyden and others to introduce legislation if they want to see them enacted.

Elizabeth Goitein, a privacy advocate and co-director of the Liberty & National Security Program at the Brennan Center for Justice, said offing the program should be the bare minimum lawmakers try to achieve.

When you have a surveillance program that has collected more than a billion records of Americans some of them without legal authorization, and all of them without any significant benefit its a no-brainer that the program should be terminated, she said.

The House aide said the expectation is for legislation to be introduced and voted on, at least by the Judiciary Committee, before going to the full chamber before the March 15 deadline. An overwhelmingly bipartisan House vote could send a message to the Senate to get on board with its bill.

Burr suggested that any extension would have to be hitched to another must-pass bill something in short supply this time of year. Such a move would prevent the legislation from being jammed on the floor by privacy hawks like Wyden and Republican Sens. Rand Paul (Ky.) and Mike Lee (Utah).

Burr didnt rule out another short-term extension, either.

Im not going to rule out that we may have an effort by leadership to extend the authorization another 90 days or 60 days or something, Burr said.

We still have to do it. This is a must do.

See the article here:
Powerful lawmakers join effort to kill surveillance program protected by Trump administration - POLITICO