Archive for the ‘NSA’ Category

NSA chief on Wikileaks and the hacks affecting the US …

The head of the USs National Security Agency said Nov. 15 that a nation-state consciously targeted presidential candidate Hillary Clintons presidential campaign, in order to affect the US election.

In response to a question, Michael S. Rogers, a Naval officer and NSA director since 2014, said on stage at a Wall Street Journal conference that Wikileaks was furthering a nation-states goals by publishing hacked emails from the Democratic National Committee and Clintons presidential campaign weeks ahead of the election.

There shouldnt be any doubt in anybodys minds, this was not something that was done casually, this was not something that was done by chance, this was not a target that was selected purely arbitrarily. This was a conscious effort by a nation-state to attempt to achieve a specific effect, he said.

Rogers did not name the nation-state in question, nor elaborate on the effect it sought, but he didnt have to. In October US intelligence agencies, including the NSA, issued a statement (paywall) accusing Russias senior-most officials of authorizing the hacks in order to interfere with the US presidential election. Wikileaks, DCleaks, and the hacker who goes by Guccifer 2.0 were named as being part of a Russia-directed effort.

Rogers went on to say that the NSA was trying to make life harder for hackers. Part of that effort involved dealing directly with a host of countries and telling them what the US considered acceptable behavior when it comes to online activities. Vice president Joe Biden said last month that the US would covertly retaliate against Russian attacks.

Rogers told NPR previously that there was no clear set of rules of engagement among countries when it came to cyberwarfare. We are not in a world of clear definitions right now, he said.

Wikileaks founder Julian Assange denied his organization was being directed by Russia in a statement published before polling day. Wikileaks must publish, he wrote. It must publish and be damned.

View original post here:
NSA chief on Wikileaks and the hacks affecting the US ...

2 senior officials ask for head of NSA to be replaced …

The recommendation by Defense Secretary Ash Carter and Director of National Intelligence James Clapper was made last month, according to The Washington Post, which first reported the recommendation.

The replacement of such a senior person would be unprecedented at a time when the US intelligence community has repeatedly warned about the threat of cyberattacks.

A major reason for their recommendation is the belief that Rogers was not working fast enough on a critical reorganization to address the cyberthreat. The Obama administration has wanted to keep the NSA dealing with signals intelligence, which would be a civilian-led agency, and a separate cybercommand which would remain under the military, the official told CNN.

Right now, one man, Rogers, heads both. He took over as head of the NSA and Cyber Command in April 2014.

The official said the initial plan was to announce the reorganization and that given the shift of personnel, Rogers would be thanked for his service and then move on.

Another issue -- but not the sole driving factor in removing Rogers, according to the source -- is a continuing concern about security.

Harold Martin, a former contractor for Booz Allen who was working at the NSA, has been charged and is being held without bail after allegedly stealing a large amount of classified information. Prosecutors allege he stole the names of "numerous" covert US agents. He was arrested in August after federal authorities uncovered what they have described as mountains of highly classified intelligence in his car, home and shed, which they said had been accumulated over many years.

Martin's motivation remains unclear, and federal authorities have not alleged that he gave or sold the information to anyone.

Separately, this comes as Rogers is one of those under consideration by President-elect Donald Trump to be the next director of national intelligence, CNN has previously reported. Rogers went on a private trip on Thursday to meet with Trump, a trip that took many administration officials by surprise.

Some officials also have complained about Rogers' leadership style, according to the Post.

The Pentagon declined to comment, as did a spokesman for the director of national intelligence. The NSA did not return a request for comment.

The idea for dividing NSA's efforts has been in the works for a while.

"So we had them both in the same location and able to work with one another. That has worked very well, but it's not necessarily going to -- the right approach to those missions overall in the long run. And we need to look at that and it's not just a matter of NSA and CYBERCOM," Carter told a tech industry group in September.

CNN's Jim Sciutto contributed to this report.

Link:
2 senior officials ask for head of NSA to be replaced ...

The NSA might be spying on you from this creepy NYC …

33 Thomas St.Photo: J.C. Rice

A massive, heavily fortified skyscraper that has puzzled New Yorkers for years sitting windowless and unlit in Lower Manhattan since 1974 is reportedly hiding a very dark secret.

On the surface, the ominous structure known as the Long Lines Building serves as a giant telecommunications hub for the New York Telephone Company, which is an AT&T subsidiary.

But a recent investigation conducted by The Intercept indicates that it might actually house a covert surveillance mega-center, where millions upon millions of phone calls, faxes and emails are intercepted daily by the National Security Agency.

This is yet more proof that our communications service providers have become, whether willingly or unwillingly, an arm of the surveillance state, said Elizabeth Goitein, co-director of the liberty and national security program at the Brennan Center for Justice.

According to the Intercept, the NSA has been using a secure room known as a Sensitive Compartmented Information Facility which they integrated inside the Long Lines Building to record conversations and internet data from across the globe.

While mystery has long surrounded the 550-foot tower of concrete and granite, located at 33 Thomas Street, new documents leaked by NSA whistleblower Edward Snowden, which were published by The Intercept on Wednesday, are said to serve as evidence of the agencys electronic spying efforts.

When combined with architectural plans, public records and interviews with former AT&T employees, the documents reportedly prove that the AT&T building is actually one of the NSAs most important surveillance sites code-named TITANPOINTE.

A series of top-secret NSA memos obtained by the Intercept also suggest that the agency has been using equipment to tap into millions of international phone calls.

The outlet reports that 33 Thomas Street is ultimately a core location thats been used for a number of controversial surveillance programs targeting the communications of the United Nations, the International Monetary Fund, the World Bank, and at least 38 countries, including US allies such as Germany, Japan and France.

While the NSA documents that Snowden leaked feature dozens of references to TITANPOINTE, its connection to 33 Thomas Street was initially unclear. It wasnt until after the Intercept obtained a set of secret travel guides dated April 2011 and February 2013 that they were able to link the two.

In the document from 2011, the NSA lists various facilities for NSA employees and reveals that TITANPOINTE is, in fact, in New York City. The other guide states that a partner called LITHIUM which according to the Intercept, is the agencys code name for AT&T oversees building visits at the facility.

Inside the building are at least three 4ESS switches, which are used to route calls across different phone networks.

Of the first two, one handled domestic long-distance traffic and the other was an international gateway, Thomas Saunders, a former AT&T engineer who retired in 2004, told The Intercept.

The Snowden documents also describe TITANPOINTE as having access to foreign gateway switches, as well.

In addition to monitoring phone calls, The Intercept reports that the facility also intercepts satellite communications as part of a surveillance program dubbed SKIDROWE.

Many New Yorkers have probably spotted the numerous satellite dishes on the roof of the Long Lines Building, which are believed to be used by the NSA.

This is yet more proof that our communications service providers have become an arm of the surveillance state

After a series of surveillance operations targeting anti-Vietnam War activists, domestic terrorists and foreign radical suspects including Martin Luther King and Muhammad Ali led to tighter controls on intelligence gathering, the NSA implemented a new program called BLARNEY, which was first exposed by Snowden in 2013.

According to the Intercept, NSA documents dated between 2012 and 2013 indicate that TITANPOINTE served as one of BLARNEYs core sites and that equipment was being used at the 33 Thomas Street address to keep tabs on long-distance phone calls, faxes, internet voice calls, video conferencing and other forms of internet communication.

In one instance, an April 2012 memo showed that NSA engineers working under the BLARNEY program were tapping in on a line at the UN mission in New York. This directly led to the collection against the email address of the U.N. General leading the monitoring mission in Syria, the memo said.

Such spying activities are totally unacceptable breaches of trust in international cooperation, Mogens Lykketoft, former president of the U.N.s general assembly, told The Intercept.

According to the NSA documents, most of the cyber espionage going on at 33 Thomas Street involves tracking calls and other forms of communication as they come through AT&Ts international phone and data cables.

The SKIDROWE program ultimately focuses on gathering digital network intelligence as it is sent between foreign satellites, The Intercept reports.

This data is then handed over to XKEYSCORE a mass surveillance system that is used by the NSA to track emails, online chats, passwords and even internet browsing histories.

While the relationship between the NSA and AT&T has been widely known for quite some time, whats been going on inside the Long Lines Building has never been officially revealed.

During the day, the telecommunications center seems foreboding, yet harmless. There are no windows and no lights making for an eerie scene once the sun goes down.

The structure was constructed by John Carl Warnecke, a prominent architect who had been ultimately tasked with designing a telephone exchange building for AT&T.

Dubbed Project X, architectural drawings and plans described it as a skyscraper to be inhabited by machines, which was designed to house long lines telephone equipment and to protect it and its operating personnel in the event of atomic attack.

The Cold War had been going on at the time and since many feared an imminent nuclear strike on the US the 29-floor building was fortified to withstand an atomic blast, according to the Intercept.

It was also outfitted with enough food to last 1,500 people at least two weeks, should their be a disaster and 250,000 gallons of gasoline to fuel power generators. In the event of a power failure, the building is supposed to be able to act as a self-contained city for at least two weeks, the plans said.

After its construction, questions and rumors swirled for years about the enigmatic structure.

According to a New York Times article from 1994, the Long Lines Building served as AT&Ts giant Worldwide Intelligent Network and directed an average of 175 million phone calls each day.

The company went on the defensive when asked about the belief that they were hiding an NSA surveillance hub right under the noses of New Yorkers.

[AT&T does not] allow any government agency to connect directly to or otherwise control our network to obtain our customers information, explained Fletcher Cook, a company spokesperson.

Rather, we simply respond to government requests for information pursuant to court orders or other mandatory process and, in rare cases, on a legal and voluntary basis when a persons life is in danger and time is of the essence, like in a kidnapping situation.

Mark Klein a former AT&T technician who claimed in 2006 that the NSA had been spying on the public from a secure room at one of the companys San Francisco buildings told The Intercept that he worked at 33 Thomas Street for 9 years and wasnt aware of any NSA presence.

But he said he always had a creepy feeling about the building.

I knew about AT&Ts close collaboration with the Pentagon, going way back, Klein explained, adding that he was not surprised by the evidence linking the building to the NSA.

Its obviously a major installation, he said. If youre interested in doing surveillance, its a good place to do it.

The Intercept investigation was ultimately a joint reporting project between the outlet and their filmmaker-driven documentary unit, Field of Vision which is set to debut a short film this week about the Long Lines Building at the IFC Center, titled Project X.

Read the original:
The NSA might be spying on you from this creepy NYC ...

Terror-funding conviction in San Diego under fire over NSA …

In the weeksafter newspapers beganpublishing reportsonU.S. government surveillance programs uncovered by Edward Snowden, law enforcement officialswere under fire.

One congressional hearing in July 2013 centered on the revelation that for years theNational Security Agency had been collecting data on phone calls made and received bymillions of Americans. Lawmakers wanted to know if the programhad produced any results.

Federal officials pointed to a little known case in San Diego. Using the agencys database of phone records, NSA analysts in 2007 linked a cellphone belonging to a Somali immigrant taxi driver to a phone number associated withShabab, a terrorist group in his homeland.

Based on that lead, a top FBI official testified, agents spent months eavesdropping on the mans phone calls, building a case against him and three other Somali men living in the area. The men were convicted of conspiring to aid terrorists and were sent to prison. The cab driver, Basaaly Saeed Moalin, was sentenced to 18 years behind bars.

In the wake of the Snowden revelations, Congress did away with the lawthe NSA relied on to justify the bulk collection of phone records and replaced it with more restrictive rules. But Moalin and the other defendants on Thursdayrevived questions about the defunct programslegalitywhen they argued to a federal appeals court that their convictions should be overturned because the governments use of the phone recordswasimproper.

The case marks the first time a challenge to thephone data program has been used to appeal aconviction, according to the American Civil Liberties Union, which is representing the men.

In filings and at thehearing before a three-judge panel of the U.S. 9th Circuit Court of Appeals on Thursday, lawyers for the ACLU and the government offered contrasting views of the case.

Alex Abdo, an attorney for Moalin and the other men, urged the judges to find that the lynchpin of the governments caseagainst the men was its initial reliance on information gathered from the NSAs database of phone records. As such, he argued, the wire tap evidence that FBI agents went on to collect against the men and which was the centerpiece of the case against them should not have been allowedat trial.

Assistant U.S. Atty. Michael Smith challenged the idea that the case against the men had been tainted by the use of the NSA data. The panel, he said,should find the men were convicted in a fair trial and uphold the rulingsof thejudge in thecase, who denied the mens request for a new trial when the NSA program became public andconcludedthe government had investigated the case appropriately.

While the NSAs collection of phone records has been stopped, Abdo argued the case still had significance beyond the fate of the four men since the government has maintained its authority, in general, to conduct bulk collection of data on Americans. A definitive ruling from the judges in favor of the defendants, Abdo said, would serve as deterrence against the government starting up similar surveillance.

Moalin, who was granted asylum in the U.S. in the mid-1990sand later became a U.S. citizen, had maintained close ties to Somalia, which was upended by years of civil unrest and fighting between a transitional government and militias opposed to its rule, including Shabab.

Moalin, a well known figure in San Diegos sizable Somali immigrant community,and the others were accused of sending several thousands of dollars to Shababto help fund the terror network. In phone calls recorded by the FBI and played at the trial, Moalin was heard speaking to a man who prosecutors allegedwas a Shabab commander. In one call, the alleged commandertoldMoalin that it was time to finance the jihad.

Defense attorneys countered thatMoalin and the other men were not aiding Shabab, but were sending money to Moalins struggling home regiontohelp build schools and orphanages.The man heard on the recordings, they said, was not a terrorist commander but alocal police chief talking about the need to help fund local militias in their fighting againstEthiopian forces that had come to the side of the Somali government.

In court filings, Abdo and other defense attorneys argued that the NSAs bulk collection of phone records was not authorized by the Patriot Act, the counterterrorism law that agency officials used to justify the program. Moreover, they said, the search of the database that produced Moalins phone number violated theconstitutions protections against searches and seizures.

JudgeMarsha S. Berzon, who asked nearly all the questions at the hearing Thursday, gave no indication from her line of questioning how the panel might come down in the case.

joel.rubin@latimes.com

For more news on federal courts in Southern California, follow me on Twitter: @joelrubin

Read the original:
Terror-funding conviction in San Diego under fire over NSA ...

Network Security Products | SonicWall

SonicWall firewalls deliver security with greater effectiveness, performance and scalability than competitors and at a lower cost of ownership. Theyre unmatched at preventing intrusions, blocking malware and controlling applications for 100 percent of your network traffic.

NSS Labs proves the SuperMassive E10000 series excels over comparable firewalls in security effectiveness, performance, scalability, reliability and TCO. Built to protect 10+ Gb networks at very large data centers, carriers and service provider deployments, SuperMassive E10000 firewalls set the standard for high-performance application control and threat prevention. View Products

The SuperMassive 9000 series ensures the security, performance and scalability demanded by today's enterprises, government agencies and universities with 10+ Gb infrastructures. Offering high-core-density architecture in an efficient one-rack appliance, SuperMassive 9000 firewalls save valuable rack space and reduce power and cooling costs. View Products

Applying the same security engine and services as our SuperMassive series, Network Security Appliance (NSA) next-gen firewalls boost performance and reduce costs and complexity for distributed enterprises, SMBs, branch offices, school campuses and other public institutions. View Products

Stop security risks with the best Unified Threat Management (UTM) firewall for small businesses, retail deployments, distributed enterprises, remote sites and branch offices. Provide high-performance intrusion prevention, malware blocking, content/URL filtering, and application control across 802.11ac wireless networks. View Products

Accelerate the effectiveness of your existing infrastructure, and improve the end user experience. Reduce application latency, and conserve bandwidth for small-to-medium-sized organizations with remote and branch offices.

View Products

Combine high-performance 802.11ac wireless technology with award-winning, advanced firewall protection. Receive unparalleled wireless security, and drastically simplify network setup and management. View Products

SonicOS platform

What makes it different?

Learn more

Network security services

Match our offerings to your business.

See Services

Product selector

Find products to fit your needs.

Choose product

See more here:
Network Security Products | SonicWall