Archive for the ‘NSA’ Category

NSA technical director: Sharing hacker information isn’t enough, we … – CyberScoop

The nature of cyberthreats aimed at both the U.S. government and private American companies calls for a dramatic shift in how the larger cybersecurity community shares information about hackers and collectively responds to attacks, said Neal Ziring, technical director for the NSAs Capabilities Directorate.

While raising the awareness of what different hackers and foreign intelligence agencies are doing in cyberspace remains essential, Ziring said, its simply not enough based on the level of danger and activities occurring today.

The next and necessary step is the development of a shared, public-private framework in the U.S. that can roll out software patches and other system updates at machine speed to individual researchers, industry and the government as soon as new intelligence becomes available, according to Ziring and Thomas Donahue, director of research at the Cyber Threat Intelligence Integration Center. They bothspoke Thursday at a cybersecurity conference in D.C.

The big thing for me is that information sharing by itself is not enough. We need to start establishing the infrastructures, the standards, the practices for shared response, Ziring said. Todays actors can be really successful because they develop this tradecraft and they get to use it over and over and over again and they advertise the investment in this tradecraft as monetizing it against lots of targets. Thats what we need to take away from them. And the only way to do that is to have a response that can be shared amongst all of us.

Zirings plan is to essentially democratize cyberthreat intelligence and make it actionable for a myriad of different U.S. partners. The market today leans on a model inwhichprivate companies acquire and sell proprietary research only to clients, keeping much of what they find accessible only to customers.

While the Homeland Security Department has helped pioneer the development of several different cyberthreat information sharing programs, a response framework like the one described by Ziring does not exist today.

With [recent cyber events] as the new normal setting for decision making, we must improve our awareness of the infrastructure and activities of our adversaries because it is poor, our ability to respond to specific incidents is way too slow and our strategic response to that kind of behavior is at best nascent and weak, said Donahue.

At the moment, a private, nonprofit organization named the Cyber Threat Alliance, or CTA , offers perhaps the closest model to what Ziring is proposing.

The CTAs move to an incorporated entity signifies the commitment by industry leaders to work together to determine the most effective methods for sharing automated, rich threat data and to make united progress in the fight against sophisticated cyber attacks, the organizations website reads.

Founded in 2014, the CTA is exclusively comprised by prominent, private sector cybersecurity firms, including Fortinet, Intel Security, Palo Alto Networks, Symantec, Check Point and Cisco, whocollectively pool threat intelligence and code-based countermeasures. Companies provide this information at-will and in good faith.

Zirings comments come nearly one month after former NSA Director Keith Alexander told senators that the U.S. government would be wise to reorganize current cybersecurity responsibilities, which are split between the FBI, Homeland Security Department, Defense Department and intelligenceagencies, into a single entity. Alexander said that this new organization would lead the efforts to develop constructive relationships with private digital security companies.

Read the original:
NSA technical director: Sharing hacker information isn't enough, we ... - CyberScoop

Circa: Obama Intel Changes Could Have Allowed NSA Intercepts Of … – Townhall

Was Donald Trump wiretapped? Was the transition team under surveillance? There are more questions than answers, especially with the latter question, but one thing is clear: our intelligence community caught the Trump transition team through incidental collection. John Solomon and Sara Carter of Circa News reported that those logs are expected to be turned over to Congress next week, as they investigate possible links between the Trump campaign and Russia. Yet, they didnt get into the weeds concerning the allegations that have yet to unveil any solid evidence of collusion between Russia and Trumps campaign. Carter and Solomon decided to look into the regulations regarding NSA surveillance, which were changed under Obama that allowed unmasking of American caught through incidental collection topossibly become victim to political games.

Solomon and Carter also added that 16 other executive agencies, not just the FBI and CIA, can now ask for unmasked information after the Obama tweaks to NSA minimization protocols, the process in which the NSA conceals the identity of a citizen who was not subject to the FISA warrant. Its done either through redaction or naming them generically, like American No. 1. Yet, given the rise in lone wolf attacks, those procedures aimed at protecting privacy were reduced:

[]

The ACLU, an ally of Obama on many issues, issued a statement a few months ago warning that the presidents loosened procedures governing who could request or see unmasked American intercepts by the NSA were grossly inadequate and lacked appropriate safeguards.

Nunes, the House intelligence panel chairman who was not interviewed for this story, alleged in the last week he has received evidence that Obama administration political figures gained access to unmasked American identities through foreign intercepts involving the Trump transition team between November and January.

[]

as the U.S. intelligence community became more worried over the last decade about its ability to locate lone wolf terrorists, foreign spies and hackers in an increasingly digital world, Bush and Obama began relaxing the rules for minimization and increasing access to NSA collected information on Americans. In short, the Obama administration created a standard set of exceptions to the minimization rules.

One of those relaxations came in 2011 when Attorney General Eric Holder sent a memo to the FISA court laying out the rules for sharing unmasked intercepts of Americans captured incidentally by the NSA. The court approved the approach.

In 2015, those rules were adapted to determine not only how the FBI got access to unmasked intelligence from NSA or FISA intercepts but also other agencies. One of the requirements, the NSA and FBI had to keep good records of who requested and gained access to the unredacted information.

And in his final days in office, Obama created the largest ever expansion of access to non-minimized NSA intercepts, creating a path for all U.S. intelligence to gain access to unmasked reports by changes encoded in a Reagan-era Executive Order 12333.

The government officials who could request or approve an exception to unmask a U.S. citizens identity has grown substantially. The NSA now has 20 executives who can approve the unmasking of American information inside intercepts, and the FBI has similar numbers.

This isnt new concerning the game of government exploiting new technological features to maximize its power and take advantage of it before the courts can catch up.

Here is the original post:
Circa: Obama Intel Changes Could Have Allowed NSA Intercepts Of ... - Townhall

Analysis: Ex-NSA aide’s tale a headache for Donald Trump – Boston Herald

President Trumps long national nightmare the ongoing scandal over Russias meddling into the campaign for the White House may have grown worse last night with the revelation that former National Security Adviser and Gen. Mike Flynn has a story he very much wants to tell, according to his lawyer.

Trump has been facing incoming from all sides ever since the now seemingly ancient high point of his presidency, his speech to a joint session of Congress.

His approval ratings have dipped to an all-time low for first-year presidents, 35 percent, according to Gallup. He was dealt a major legislative blow last week when Republicans failed to pass a replacement plan for Obamacare.

Yesterday, Trump engaged in a Twitter battle against some of his most loyal Republican supporters during the campaign, the House Freedom Caucus members.

And now Flynn, another one of his key campaign backers, has come forward seeking immunity in exchange for his story, though neither Flynn nor his attorney are revealing whether his story will help or hurt the president.

But for Trump, the black cloud of the Russia probe continues to hang over the White House with no signs of breaking anytime soon. There have been no smoking guns, but a lot of unanswered questions that have provided a steady drip of bad news and unwelcome distractions from Trumps agenda for his first 100 days seen as a defining period in any presidency.

The prospect of a once-loyal Trump foot soldier turned rogue if indeed Flynn has information that could damage Trump will dominate 24-hour cable news coverage and overtake everything else happening in Washington.

But Flynns testimony could also turn out to be more bust than bombshell, just like Trumps tax returns unearthed on MSNBC by Rachel Maddow earlier this month. It may simply be a bid by Flynn to save himself.

Trump also has the proven track record of being able to somehow emerge from shocking scandals, including his Access Hollywood tape and controversial comments and tweets during the campaign.

But for now, Flynns eagerness to step forward only ensures there will be more media attention, public intrigue and Washington drama for a president who campaigned on cleaning up Beltway corruption.

See the rest here:
Analysis: Ex-NSA aide's tale a headache for Donald Trump - Boston Herald

"They’re Like The Praetorian Guard" – Whistleblower Confirms …

Authored by Chris Menahan via InformationLiberation.com,

NSA whistleblower William Binney told Tucker Carlson on Friday that the NSA is spying on "all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House."

Binney, who served the NSA for 30 years before blowing the whistle on domestic spying in 2001, told Tucker he firmly believes that Trump was spied on.

"They're taking in fundamentally the entire fiber network inside the United States and collecting all that data and storing it, in a program they call Stellar Wind," Binney said.

"That's the domestic collection of data on US citizens, US citizens to other US citizens," he said. "Everything we're doing, phone calls, emails and then financial transactions, credit cards, things like that, all of it."

"Inside NSA there are a set of people who are -- and we got this from another NSA whistleblower who witnessed some of this -- they're inside there, they are targeting and looking at all the members of the Supreme Court, the Joint Chiefs of Staff, Congress, both House and Senate, as well as the White House," Binney said.

"And all this data is inside the NSA in a small group where they're looking at it. The idea is to see what people in power over you are going to -- what they think, what they think you should be doing or planning to do to you, your budget, or whatever so you can try to counteract before it actually happens," he said.

"I mean, that's just East German," Tucker responded.

Rather than help prevent terrorist attacks, Binney said collecting so much information actually makes stopping attacks more difficult.

"This bulk acquisition is inhibiting their ability to detect terrorist threats in advance so they can't stop them so people get killed as a result," he said.

"Which means, you know, they pick up the pieces and blood after the attack. That's what's been going on. I mean they've consistently failed. When Alexander said they'd stop 54 attacks and he was challenged to produce the evidence to prove that he failed on every count."

Binney concludes ominously indicating the origin of the deep state...

"They are like the praetorian guard, they determine what the emperor does and who the emperor is..."

Who's going to stop them?

See the rest here:
"They're Like The Praetorian Guard" - Whistleblower Confirms ...

Obama let NSA intercepts get into political hands – WND.com

(CIRCA) As his presidency drew to a close, Barack Obamas top aides routinely reviewed intelligence reports gleaned from the National Security Agencys incidental intercepts of Americans abroad, taking advantage of rules their boss relaxed starting in 2011 to help the government better fight terrorism, espionage by foreign enemies and hacking threats, Circa has learned.

Dozens of times in 2016, those intelligence reports identified Americans who were directly intercepted talking to foreign sources or were the subject of conversations between two or more monitored foreign figures. Sometimes the Americans names were officially unmasked; other times they were so specifically described in the reports that their identities were readily discernible. Among those cleared to request and consume unmasked NSA-based intelligence reports about U.S. citizens were Obamas national security adviser Susan Rice, his CIA Director John Brennan and then-Attorney General Loretta Lynch.

Some intercepted communications from November to January involved Trump transition figures or foreign figures perceptions of the incoming president and his administration. Intercepts involving congressional figures also have been unmasked occasionally for some time.

See the rest here:
Obama let NSA intercepts get into political hands - WND.com