Archive for the ‘NSA’ Category

Mysterious group posts more alleged NSA hacking tools; Russia link suspected – News & Observer


Ars Technica
Mysterious group posts more alleged NSA hacking tools; Russia link suspected
News & Observer
One document appeared to show that NSA spyware had been placed on servers in South Korea, Russia, Japan, China, Mexico, Taiwan, Spain, Venezuela and Thailand, among other countries. The dump included details of how the NSA purportedly had ...
In slap at Trump, Shadow Brokers release NSA EquationGroup filesArs Technica
'NSA malware' released by Shadow Brokers hacker groupBBC News
Shadow Brokers slam Trump, expose additional NSA cyber toolsSC Magazine
Forbes -TechCrunch -InfoWorld -Medium
all 55 news articles »

Go here to read the rest:
Mysterious group posts more alleged NSA hacking tools; Russia link suspected - News & Observer

To Split or Not to Split: The Future of CYBERCOM’s relationship with NSA – Lawfare (blog)

U.S. Cyber Command (CYBERCOM) is the U.S. armed forces command charged with offensive and defensive cyber operations. Since 2010, it has coexisted with NSA as two organizations under one director. It is simultaneously embedded within U.S. Strategic Command (STRATCOM), a functional (i.e., non-geographic) command with broader responsibility for detecting and deterring strategic attacks against the United States. Both arrangements are likely coming to an end in the near future.

In a move set up by the 2017 National Defense Authorization Act (NDAA), CYBERCOM will be elevated from a sub-unified command under STRATCOM to a fully independent unified combatant command. The 2017 NDAA also maintains a more hotly contested opportunity for CYBERCOM to be split from the NSA as early as October 2018.

Below is a brief primer on those two impending issues.

The Debate over Splitting CYBERCOM from NSA

Defense Secretary Jim Mattiss deputy principal cyber advisor, Maj. Gen. Burke Ed Wilson, recently said that he is 99 percent sure well elevate [CYBERCOM to a full combatant command] and do it fairly quickly.

Cutting the umbilical cord from NSA may be a longer process, but momentum seems strong within the new administration. In the 2017 NDAA, Congress mandated that CYBERCOM must reach full operational capacity (FOC) before the dual-hat leadership arrangement can be terminated. FOC is achieved when a command has the institutional capability and expertise to independently carry out any mission within its ambit of responsibility. CYBERCOM reached initial operational capabilitya threshold level of capability to accomplish mission objectiveslast October and is on track to reach FOC by the end of fiscal year 2018. Once the Secretary of Defense and the Chairman of the Joint Chiefs of Staff determine that the separation will not pose risks to the military effectiveness of CYBERCOM, the president may decide to initiate the split.

CYBERCOM was created as a sub-unified command within U.S. Strategic Command in 2009, absorbing the Joint Task Force for Global Network Operations and the Joint Functional Component Command for Network Warfare. Its mission has both defensive and offensive components. Per a Department of Defense fact sheet:

USCYBERCOM plans, coordinates, integrates, synchronizes, and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full-spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries.

The decision to locate CYBERCOM at the NSA headquarters in Fort Meade was a logical choice at the commands inception. NSA ensured that CYBERCOM had the necessary resources, infrastructure, and expertise with signals intelligence to develop its own capabilities. Though CYBERCOMs mission is distinct from that of NSA, many of the tools needed to conduct cyber operations are virtually the same as those necessary for cyber surveillance and espionage. As former NSA Director General Michael Hayden puts it, in the cyber domain the technical and operational aspects of defense, espionage, and cyberattack are frankly indistinguishable. Moreover, similar skillsets are required for NSA and CYBERCOM activities, and personnel with the appropriate levels of expertise are reportedly in short supply.

Despite significant technological overlap, NSA and CYBERCOM largely operate under different legal authorities. NSAs authority to conduct espionage, including cyber surveillance, comes from Title 50 of the U.S. code, while CYBERCOM would typically take offensive action pursuant to Title 10 authorities. General Hayden explains: NSA does not have the authority to destroy someone elses information, to change someone elses information, to harm someone elses network, or to take control of someone elses computers in order to create physical destruction, as these actions constitute a warmaking Title 10 function. However, NSA personnel may conduct intelligence gathering to support a Title 10 military operation, and existing law does not preclude CYBERCOM from conducting a Title 50 operation. Dual-hatting personnel between the two organizations, as has become common practice, further muddies the unclear line between Title 10 and Title 50 authorizations. Though this close coordination has benefits, there are concerns about mission distortion. A presidential panel convened by President Obama to evaluate the NSA after the Snowden leaks reported a pressing need to clarify the distinction between the combat and intelligence collection missions, and recommended appointing separate heads to remedy this line-blurring problem.

Supporters of the split also point to other potential advantages. The creation of a fully independent command dedicated to cyber operations denotes a level of seriousness and dedication to the development of U.S. cyber capabilities appropriate for an era in which cyber offense and defense are critical to U.S. national security interests. For some in the government, the slow pace at which CYBERCOM has developed effective offensive tools has been a source of frustration, particularly as the military tackles threats like ISIS. Some predict that an independent CYBERCOM would be better positioned to aggressively, and sometimes more openly, pursue its mission, particularly for situations in which military and intelligence goals may be unaligned. For example, it might be of strategic benefit that a Title 10 action be attributable to the United States, whereas for intelligence purposes, avoiding detection for the same action is essential. In addition, a commander dedicated solely to cyber military operations may be able to advocate more effectively for resources and personnel than would be possible in a dual-hatted role, and CYBERCOM has struggled with resource constraints under current joint leadership. The separation could also allow CYBERCOM-dedicated personnel to specialize and develop advanced cyber capabilities. Finally, there is the simple fact that leading either of these organizations alone is a more than fulltime job and it is untenable to expect a single person to accomplish both simultaneously.

Others, however, have argued that the benefits of shared infrastructure and dual-hatting NSA and CYBERCOM employees outweigh any gains from separation. Even assuming CYBERCOM reaches FOC by October 2018, there are questions about the additional resources, financing, and capabilities that would need to come online such that CYBERCOM could be weaned off of its reliance on NSA. Some key players, including Senator John McCain, argue that it would be foolish to separate organizations that must be closely coordinated to ensure success. The NSA has the advantage of over 50 years of experience with signals intelligence, which will continue to be the foundation for seven-year-old CYBERCOMs operations even after the separation. Furthermore, it takes far longer than the typical three-year military billet to develop the expertise needed to conduct cyber operations. In addition, dividing responsibility between two wholly separate cyber-focused entities increases the risk that they will work at cross-purposes.

Steps Towards a Unified, Separate CYBERCOM

Notwithstanding these concerns, separating NSA from CYBERCOM has become more a question of when rather than if. As mentioned above, the 2017 NDAA establishes that CYBERCOM will be elevated to a unified combatant command. Taken together, these changes may increase the risk of disruption to CYBERCOMs mission effectiveness. As such, military leaders can learn from the formation and dismantling of past functional combatant commands as they plan for both elevating and separating CYBERCOM from STRATCOM and NSA.

One such functional unified combatant command is U.S. Special Operations Command (SOCOM), which Congress created in 1987. SOCOM is tasked with synchronizing and carrying out Special Operations (e.g., hostage rescues, counterinsurgency actions) in support of missions in global combatant commands. It was created after Congressional and DoD investigations determined that a clearer organizational focus and chain of commandas well as dedicated fundingwere needed for special operations in low-intensity conflicts.

Frank Cilluffo of George Washington University has recommended that CYBERCOM adopt a collaborative operations style similar to that employed by Joint Strategic Operations Command (JSOC)a subunified division of SOCOM responsible for quick, high-profile strikes like the mission to capture or kill Osama bin-Laden. Like JSOC, CYBERCOM would draw on intelligence assets (i.e., from NSA) to quickly harmonize and implement cyber operations. Ideally, this model of collaborative operations would preserve the important relationship that has developed between NSA and CYBERCOM while allowing each to pursue a distinct mission set.

Even if a collaborative model, similar to JSOC, is adopted, the potential for redundant responsibilitieswhich has led to the downfall of past COCOMswould still loom large. U.S. Strategic Command, for example, has a broad set of capacities, including tailored nuclear, space, cyberspace, global strike, joint electronic warfare, missile defense, and intelligence capabilities. While formal responsibility for cyberspace may be removed, preventing overlap between these two commands will likely be difficult. If not adequately deconflicted, one could imagine CYBERCOM being reintegrated into STRATCOM just as U.S. Space Command was rolled into STRATCOM in 2002 to facilitate integrated command for C4ISR (command, control, communications, computers, intelligence, surveillance, and reconnaissance). Does a C3ISR model make sense for STRATCOM? After all, cyber, just like military space capacities, is fundamental to U.S. command and control.

Expansive mandates, unsupported by commanders of existing COCOMs, have also proved fatal to functional combatant commands. U.S. Strike Command, later U.S Readiness Command, was tasked with providing a reserve of general purpose forces, training reserve forces, developing joint doctrine, and planning for contingency operations. It was then expanded to include planning for operations in the Middle East, sub-Saharan Africa, and Southern Asia. Criticized for becoming a world-wide General Purpose Forces Command, it was disbanded in 1986 to allow for a more narrowly-tailored commandSOCOM. This bears out a central lesson that General Duane Cassidy, the first commander of U.S. Transportation Command (TransCom), derived from TransComs success: it is essential to have (1) buy-in from leadership of the other combatant commands and (2) support from civilian leadership.

Though the debate over CYBERCOMs independence and institutional design will no doubt continue, a complete separation now seems inevitable. While CYBERCOMs shift away from reliance on NSA will be necessarily gradual, General Hayden estimates the transition could be achieved in as little as nine months. This means that a fully independent CYBERCOMwith all its potential benefits and liabilitiescould be just a few years away.

Follow this link:
To Split or Not to Split: The Future of CYBERCOM's relationship with NSA - Lawfare (blog)

WikiLeaks reveals that NSA has been spying on Pakistan’s mobile networks – Tech2 (blog)

The US National Security Agency (NSA) has been spying on Pakistans mobile networks, whistleblowing organisation WikiLeaks has tweeted. Hundreds of NSA cyber weapons variants publicly released including code showing hacking of Pakistan mobile system, @wikileaks tweeted.

According to a report in Express Tribune on Monday, the hacker group Shadow Brokers released a new cache of information detailing how the NSA accessed private and public networks in other countries. A researcher on Twitter who identifies himself as x0rz decrypted the files and uploaded them on Github, a web-based repository and internet hosting service.

The researcher confirmed that the archives include evidence of NSA operators access inside the GSM network of Mobilink one of the Pakistans most popular mobile services provider, the report noted. The hacker group had previously released data suggesting the US agency may have been monitoring hundreds of IP addresses in Pakistan. The encrypted files were being decrypted by security researchers around the world.

Shadow Brokers had initially wanted to auction its data cache in exchange for Bitcoin but as no buyer turned up, they released the data online. This is not the first time that reports have surfaced claiming that the US NSA is snooping on other countries. According to a Daily Mail report in 2014, WikiLeaks disclosed documents that suggested the Bharatiya Janata Party (BJP) was among six political parties from around the world the NSA was authorised to conduct surveillance on for gathering foreign intelligence. The authorisation was given by a secret American court, it said.

The leak was planned months ahead of Prime Minister Narendra Modis visit to the US, the report claimed. Another report in the Washington Post that also came in 2014 said the US has long had broad no-spying arrangements with four countries Britain, Canada, Australia and New Zealand in a group known collectively as the Five Eyes.

But a classified 2010 legal certification approved by the Foreign Intelligence Surveillance Court and included among a set of documents leaked by former NSA contractor Edward Snowden lists 193 countries [including India], that would be of valid interest for US intelligence, the Post said.

Publish date: April 12, 2017 11:45 am| Modified date: April 12, 2017 11:41 am

Tags: Github, Mobile networks, National Security Agency, NSA, Pakistan, Shadow Brokers, spying, Surveillance, United States, WikiLeaks

Read the original:
WikiLeaks reveals that NSA has been spying on Pakistan's mobile networks - Tech2 (blog)

Former NSA Analyst: George Washington Would Have Shot Half of Trump WH as Traitors – PoliticusUSA

National security expert and former NSA analyst John Schindler had some harsh words for the Trump administration following the revelation of a FISA warrant on Carter Page, saying that George Washington would have had at least half the Trump WH shot as traitors, without tears or doubts:

The question is, is it true? George Washington is known to Americans as the guy who could not tell a lie, but he was a hard man, a product of his time. And one episode, in particular, argues that he would have done just what Schindler says.

On this very day in 1782, Patriot Captain Joshua Huddy wrote his last will and testament before being lynched by a loyalist officer in retaliation for the death of a loyalist in accordance with the ancient lex talionis (law of retaliation, or eye for an eye).

The Americans demanded the guilty party be handed over so they could execute him in turn, and when the British refused and the father of our country promptly seized a British officer, an unassuming (and moreover, innocent), Captain Charles Asgill, intending to hang Asgill as a response to the murder of Huddy if the British did not hand over the guilty party, Loyalist Captain Lippincott.

Asgill had been taken prisoner at Yorktown and so was protected by the articles of the British surrender, Article XIV, which stated that No article of capitulation to be infringed on pretence of reprisals.

The captive British captains were told to draw lots but rightly refused as the demand was in violation of their rights as prisoners of war. The Americans drew for them and picked Asgill, who had just turned 20 and had seen the briefest of service before being captured with the rest of Lord Cornwallis army at Yorktown.

George Washington said the selection of this innocent young man has distressed me exceedingly, adding that I am deeply affected with the unhappy Fate to which Capt. Asgill is subjected. Nice to hear, certainly, that George Washington had a heart, but he was going to execute the poor fellow anyway if the British did not cooperate.

Washington showed kindness to the unfortunate young man by ordering he be treated with every tender Attention and politeness. None of that was going to save Asgill, of course. The Patriots were really, really angry about the lynching of Huddy, for as Thomas Paine said, even Native Americans had what he called formality in their punishments.

To be fair, it does not seem Washington really wanted to kill Asgill but the fact remains he felt he had the right to do so. And it was only the heartfelt plea of Asgills mother that finally saved the young man when a very moved Congress ordered the captains release.

Washingtons words to Asgill were that he was only seeking justice (it must hardly have seemed like justice to Asgill) and that it was not a greater relief to Asgill than to Washington that he had not had to execute him (also unlikely true).

What this story demonstrates is there is absolutely no doubt that Schindler is right about Washington. He would not hesitate to execute traitors (or if he hesitated would do it anyway) if he felt it was the right thing to do.

Given American treatment of a British spy captured in the Benedict Arnold plot, Major John Andre, the only area in which Schindler might have erred is in the chosen mode of execution.

Here too, Washington liked and respected Andre and did want to kill him, but as the British would not hand over Arnold to save Andre, he had to die.

Andre pleaded to be shot by firing squad, but this was considered far too gentlemanly for a spy, and so he was hanged, as Arnold would have been, instead.

So it would be more accurate to say Washington would have hanged half of Trumps White House as traitors, which thought is certainly enough to bring a sigh in memory of the good old days.

Charles Asgill, Donald Trump, George Washington, lex talionis, Lynching of Joshua Huddy, The Asgill Affair, Trump/Russia collusion

Link:
Former NSA Analyst: George Washington Would Have Shot Half of Trump WH as Traitors - PoliticusUSA

Pakistan, India cannot remain enemies forever: Pak NSA Nasser Janjua – Economic Times

ISLAMABAD: Accusing India of "defeating the spirit of bilateralism" by defying talks over the Kashmir issue, Pakistan's National Security Adviser Nasser Janjua has said that the two neighbours "cannot remain enemies forever" and they need to engage and resolve their disputes.

Janjua's remarks comes against the backdrop of spike in Indo-Pak tensions over the death sentence awarded to Indian national Kulbhushan Jadhav by a military court and New Delhi's warning to Islamabad to consider the consequences on bilateral ties if he is hanged.

Pakistan's NSA claimed that the international community is overlooking Kashmir issue due to their own strategic interests related to India.

"Although India considers Kashmir a bilateral issue, it has defeated the spirit of bilateralism by defying any dialogue over it," Janjua said while speaking to Canadian High Commissioner Perry Calderwood yesterday.

"Extreme thoughts are to be mitigated through a change of perception, by winning hearts and minds and not by use of force alone," he said, referring to the situation in Kashmir.

"We need to engage with each other and resolve disputes," Janjua was quoted as saying by the state-run Associated Press of Pakistan (APP).

"Pakistan and India cannot remain enemies forever," he said, amid a strain in Indo-Pak ties.

Janjua and Calderwood discussed regional dynamics and bilateral ties, Pakistan's role in eradicating terrorism, counter-terrorism cooperation, the implementation of the National Action Plan (NAP) and Pakistan-India relations with reference to the US' offer for mediation.

Janjua also underscored the need for a non-discriminatory approach while considering Pakistan's membership for elite Nuclear Suppliers Group (NSG).

Read the original:
Pakistan, India cannot remain enemies forever: Pak NSA Nasser Janjua - Economic Times