Archive for the ‘NSA’ Category

We’re spying on you for your own protection, says NSA, FBI – The Register

A new factsheet by the NSA and FBI has laid bare ludicrous contradictions in how US intelligence agencies choose to interpret a law designed to prevent spying on American citizens, but which they use to achieve exactly that end.

The document even claims that it is surveilling US citizens for their own protection while at the same time claiming that it is not doing so.

The obvious and painful contradictions within the 10-page document [PDF] are testament to the very reason why the factsheet had to be prepared in the first place: Congress is threatening not to renew the legislation due to the intelligence agencies' willful misrepresentation of the law to perform the very activities it was designed to prevent.

FISA the Foreign Intelligence Surveillance Act was enacted in 1978 and authorizes US intelligence agencies to carry out electronic surveillance of foreign persons outside the US. It specifically prohibited surveillance of US citizens and foreign persons within US borders.

But in 2008, the FISA Amendments Act (FAA) was passed to recognize the modern realities of internet communications: that foreign intelligence targets were using networks based in the United States to communicate. The law gave the intelligence agencies the right to demand that US companies hand over their communications in the search for foreign intelligence.

In an effort to ensure that those searches were restricted to non-US citizens however, the FAA which was re-authorized in 2012 and now needs to be re-authorized again before the end of 2017 included various procedures, and checks and balances.

Somewhat inevitably however, those procedures which remain almost entirely secret and the check and balances which have been shown to be ineffective at best have been slowly undermined by the intelligence agencies to the extent that the FBI now routinely uses personally identifiable information of US citizens, such as an email or phone number, to search a huge database of gathered information if it suspects them of a crime carried out in the US.

That reality is the diametric opposite of what the law was intended to do hence the ludicrous contradictions between what the intelligence agencies say the law authorizes and the everyday realities that they argue must be retained.

The first eight pages of the 10-page document are largely accurate, giving a rundown of the law, its history and intentions, and the procedures and checks introduced. In fact, it is a useful and largely objective rundown of the issue.

On page four, the document gives some examples of where use of Section 702 have proven effective: gathering insights into the minds of high-level Middle Eastern government ministers; checking up on sanctions; identifying both terrorists and terrorist sympathizers and alerting other governments to them.

Of the five examples given (of course it's impossible to know how many real-world examples there are), only one covers an arrest on US soil: the case of Najibullah Zazi who was tracked after he sent an email to an al-Qaeda operative in Pakistan asking for help in making bombs. Zazi planned to bomb the subway in New York City but was arrested in 2009 before he had the opportunity to do so. He pled guilty in 2010 and was sentenced to life in prison in 2012. (It is worth noting, however, that Zazi was already under surveillance from US intelligence agencies thanks to his visits to Pakistan, so it's unclear what role the Section 702 data really played.)

The document carefully words some sections covering concern over how the law was being interpreted. As a result of Edward Snowden's revelations, lawmakers and civil society groups started asking precise questions and that resulted in the intelligence agencies releasing limited information about the process it goes through to obtain the rights to spy on people. The document paints the provision of that information as the intelligence agencies' "commitment to furthering the principles of transparency," when nothing could be further from the truth.

It also tries to paint a report by the Privacy and Civil Liberties Oversight Board (PCLOB) into US spying in positive terms. The independent board, the document claims, largely exonerated the intelligence agencies and "made a number of recommendations" that have "been implemented in full or in part by the government."

In reality, the board's report was a damning indictment of the agencies' effort to reinterpret the law to be able to spy on just about anyone. The recommendations that have been implemented "in part" cover the most important improvements, in particular the publication of the procedures that the agencies use in reaching determinations. These critical documents remain entirely secret.

The PCLOB also paid a high price for standing up to the NSA and FBI: they had their authority cut out from under them, the budget was slashed, and all but one of its five board members have either resigned or have not had their terms renewed. It is a shell of an organization that doesn't even answer its phone or emails.

It is on pages nine and 10 that the real issues appear however where it addresses "702 issues that are likely to arise in the re-authorization discussion."

These are:

Despite the law specifically noting that US citizens and people within US borders cannot be spied on through Section 702, in reality the intelligence agencies do exactly that.

The explanation is that this information is "incidental" and is hoovered up as the NSA and others are gathering intelligence on others. The intelligence agencies claim that it affects very few US citizens and so Congress has persistently asked what that number is: how many US citizens are included in the 702 database?

The US House Judiciary Committee first asked that question a year ago April 2016. There is still no answer.

This latest document notes: "The IC (intelligence community) and DoJ (Department of Justice) have met with staff members of both the House and Senate Intelligence and Judiciary Committees, the PCLOB, and advocacy groups to explain the obstacles that hinder the government's ability to count with any accuracy or to even provide a reliable estimate of the number of incidental US person communications collected through Section 702."

It says that the agencies are "working to produce a relevant metric" to inform discussions.

This is a transparent attempt to prevent a figure on the number of US citizens in the database from being revealed, because it would almost certainly undermine the core contention of the intelligence agencies: that their procedures prevent the unnecessary gathering of information on US citizens.

See the article here:
We're spying on you for your own protection, says NSA, FBI - The Register

NSA all up in banks? – CNET – CNET

This is CNET, and here are the stories that matter right now. The TheShadowBrokers hacking group has released new information. They say that the NSA used Windows hacking tools to target several banks. The hacking tools were stolen last year, and allowed the NSA to break into a range of systems Microsoft says that it has already patched the holes that took advantage of these exploits. iPad 4 users, you might be in line for an upgrade. According to a number of reports, iPad 4 users who have had issues with their tablets might be able to take those machines to Apple to get another tablet. According to 9to5Mac, Apple may replace the faulty iPad 4 tablets with iPad Air 2 models. And finally, images of the Moto C may have leaked online. The images show a large rear camera and a texture power button. The images also show a standard headphone jack along with a micro USB port instead of the newer USB-C standard, and a removable back. [MUSIC] Stay up to date with the latest by downloading the CNET Tech Today app available for Android and iOS.

Visit link:
NSA all up in banks? - CNET - CNET

Microsoft already fixed most of those NSA security holes before they were leaked – Fast Company

Although the gender wage gap is more complicated than a broad cents-on-the-dollar figure, Glassdoor's latest report suggests that certaincollege majors not only impact career paths, but salary disparities in the first five years after graduation.

The majors with the biggest gender pay gaps favoring men:

* Health care administration (men earn 22% more)

*Mathematics (18%)

*Biology (13%)

The majors with the biggest gender pay gaps favoring women:

*Architecture (women earn 14% more)

*Music (10.1%)

*Social work (8.4%)

Nine of the 10 highest paying majors are male-dominated. By contrast, six of the 10 lowest paying majors are female-dominated.

Even with the same major, men and women face unequal pay through sorting into different jobs after graduating that pay differently. According to Glassdoor's chief economist Andrew Chamberlain:

In the case of health care administration, men from this major gravitate toward more senior roles like quality specialist, data consultant, and implementation consultant, while women often take jobs as administrative assistant, customer care representative and intern. What we see in this study is that men in these health care administration roles are being fast-tracked toward higher-paying jobs despite similar majors as women. In mathematics and biology, we see a similar phenomenon.

Chamberlain says the study can't explain why this is happening, only that it's real and contributing to the gender pay gap. Read the full study here. LD

Originally posted here:
Microsoft already fixed most of those NSA security holes before they were leaked - Fast Company

Ex-NSA manager R.I.’s first cybersecurity officer – The Providence Journal

Mike Steinmetz will make $176,419 a year to advise the governor on digital security policy.

PROVIDENCE, R.I. -- Governor Gina Raimondo has appointed Mike Steinmetz, a former National Grid and National Security Agency manager, as Rhode Island's first cybersecurity officer.

Steinmetz, who started Monday, will be Raimondo's top adviser on digital security policy and lead the creation of a state cybersecurity strategy, according to a news release Tuesday from the governor's office.

"Modern infrastructure is more than just roads and bridges," Raimondo said the release. "It's also the digital connections we're making faster and more frequently than ever before."

Steinmetz will make $176,419 a year, according to Raimondo spokesman David Ortiz.

The cybersecurity officer position was created in the state budget approved by lawmakers last year and reports to the director of administration. It is not considered a cabinet position and does not require state Senate confirmation, Ortiz said.

Before joining state government, Steinmetz was a National Grid director of strategy and planning and director of governance and compliance. Before that, he worked for the U.S. Department of Defense and the National Security Agency.

Originally posted here:
Ex-NSA manager R.I.'s first cybersecurity officer - The Providence Journal

NSA Is Hosting a Free Cybersecurity Summer Camp for Teen Girls … – Observer

A new cybersecurity summer camp is giving middle and high school girls a head start at a career intech.

The program, called GenCyber, will be entirely free thanks to theNational Security Agency (NSA), which is footing the bill fortuition, boarding andregistration fees for all participants. The NSAs goal forthe campis to inspire young people to direct their talents toward cybersecurity careers they believe are critical to national and economic security.

Another goal is to increase diversity in tech. Currently, women earn only 28 percent of computer science degrees, own only fivepercent of startups and hold only 11 percent of executive positions at Silicon Valley companies.

With the shortage of women in technology fields, anything we can do to encourage young women to explore STEM careers can only be good, said Jose-Marie Griffiths, president of Dakota State University, which will beone of the camps two locations.The other host campus isSouth Dakota School of Mines & Technology. Both were launched inSouth Dakota as an effort by the universities, because itsbeen identified as one of the industry sectors with the highest potential inthe state.

Core sessions at the camps will focus on cybersecurity, programming, networking and robotics. Students also have a choice of electives including multimedia forensics, socket programming, password cracking, iRobot create, network forensics, web hacking and 3-D printing.

At the DSU camp, an FBI Computer Analysis Response Team (CART) will present ondigital forensics, and twospeakers from Google will discuss security and privacy.There will also be a cyber sleuth escape room, and Access Data, a leading forensics company, will be hostinghands-on labs with social media and web traffic.

The SD Mines camp features a collaboration with Black Hills Information Security (BHIS), a company focused on customized security solutions for their clients. Officials from BHIS will be involved in enhancing the curriculum alongside professors in Mines Department of Mathematics and Computer Science. There will be some fun opportunities to get off campus as wellfield trips toMt. Rushmore and the South Dakota Air and Space Museum

You can find out more about attending theMines and Dakota States GenCyber here and here.

Read the original here:
NSA Is Hosting a Free Cybersecurity Summer Camp for Teen Girls ... - Observer