Archive for the ‘NSA’ Category

NSA chief explains ‘discrepancy’ over claim that Russia …

NSA Director Adm. Mike Rogers cast a dash of doubt Tuesday on the intelligence community's conclusion that Russia-tied hackers sought to help Donald Trump in the 2016 election, explaining for the first time in public testimony why his agency had only "moderate confidence" in that judgment.

Testifying before a Senate Armed Services Committee hearing, Rogers affirmed he and the NSA were highly confident the Russians sought to hurt Hillary Clinton in the election. But Sen. Tom Cotton, R-Ark., asked Rogers who also heads U.S. Cyber Command -- why the NSA differed on the related conclusion about Trump in the Jan. 6 intelligence report on alleged Russian interference in the election.

That conclusion stated that the Russian government aspired to help President-elect Trumps election chances when possible by discrediting Secretary Clinton and publicly contrasting her unfavorably to him.

The FBI and CIA backed that with high confidence, but the NSA only held that judgment with moderate confidence.

Cotton noted that fellow Sen. Elizabeth Warren, D-Mass., during the hearing called Trump Russias preferred candidate and asked Rogers to explain the discrepancy.

I wouldnt call it a discrepancy, Id call it an honest difference of opinion between three different organizations and in the end I made that call, Rogers said.

He added that when he looked at the data, for each of the other judgments there were multiple sources and he could exclude every other alternative rationale. But for this particular conclusion, it didnt have the same level of sourcing and the same level of multiple sources, he said.

He noted that he still agreed with the judgment, but he wasnt at the same confidence level as CIA Director John Brennan and FBI Director James Comey.

Probed further by Sen. Tim Kaine, D-Va. -- who was Clintons running mate Rogers clarified that while he was highly confident the Russians wanted to prevent Clinton from winning, and to undercut her effectiveness if she did win, he was only moderately confident the Russians actively wanted Trump to win.

The FBI, CIA and NSA were all in complete agreement about the Clinton-related conclusion in the report, which stated: Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election. Russias goals were to undermine public faith in the US democratic process, denigrate Secretary Clinton, and harm her electability and potential presidency.

Earlier at Monday's hearing, Rogers also testified that there has been no reduction in Russian efforts to affect the outcome of other countries' elections, and warned about the dangers of state and non-state actors moving from data "extraction" to data "manipulation."

Chairman John McCain, R-Ariz., asked Rogers if he had seen a reduction in Russian efforts to meddle in elections and pointed toward alleged interference in Sundays French presidential race.

No I have not, Rogers said, adding that U.S. needs to publicly out Russian behavior.

They need to know we will publicly identify this behavior, he said.

Emmanuel Macron, the eventual winner of the French election, was hit by a hack Friday which revealed a number of his campaign team's emails. It was not clear who was behind the hack, but it was reminiscent of hacks that hit the 2016 U.S. election that exposed Democratic National Committee staff emails, and the private emails of Clinton campaign Chairman John Podesta. Both the Clinton campaign and the Obama administration have blamed Russia for those hacks.

Rogers was also asked by lawmakers to lay out his worst-case scenario for future cyber attacks. Rogers said he was concerned about outright destructive activity on critical infrastructure as well as cyberattacks moving from the obtaining and revealing data to data manipulation on a massive scale.

Such as changing voter rolls? asked McCain.

Yes, said Rogers. Thats a very different kind of challenge for us.

He also warned about a possible situation in which, as the effectiveness of cyberattacks becomes clearer, non-state actors decide cyber is an attractive weapon with which to destroy the status quo.

During further questioning, Rogers said the National Security Agency became aware of Russian attempts to interfere with political institutions in the summer of 2015.

He said that when he came aware of Russian actions, he informed the FBI, and also in his role as head of the U.S. Cyber Command, informed the Pentagon to make sure its systems were optimized in order to be able to withstand such an attack.

Adam Shaw is a Politics Reporter and occasional Opinion writer for FoxNews.com. He can be reached here or on Twitter: @AdamShawNY.

See the rest here:
NSA chief explains 'discrepancy' over claim that Russia ...

How Trump’s NSA Came to End a Disputed Type of Surveillance – New York Times


New York Times
How Trump's NSA Came to End a Disputed Type of Surveillance
New York Times
The Foreign Intelligence Surveillance Court was delaying its annual reauthorization because the N.S.A. had discovered widespread violations of a rule for how analysts could handle Americans' emails collected under the program. Now, the agency director, ...
This Is the Secret Court Order That Forced the NSA to Delete the Data It Collected About YouMotherboard
Election Hack: NSA Chief Says FISA Revealed Russian Interference ...Fortune
Their View: NSA stops one abuse, but many remainHesperia Star

all 5 news articles »

Read this article:
How Trump's NSA Came to End a Disputed Type of Surveillance - New York Times

Man finds NSA supercomputer info sitting on an unsecured server … – PC Gamer

Despite plentiful advice online about how to protect your privacy and keep your data safe, we all make mistakes now and then. We leave that text file of passwords in our Dropbox folder. We forget the password of our home router set to 'password.' But at least most of us can say we never left extensive software and documentation for one of the most powerful codebreaking systems in the worlda supercomputer collaboration between IBM, NYU and the Department of Defensecasually lying around on a completely unsecured public server. That's a pretty big oops, especially when someone finds it.

The Intercept published a fascinating story today about WindsorGreen, an encryption-breaking computer designed by brilliant mathematicians and likely used by the NSA. Specifically, the fascinating part is how easily a security researcher, with a hobby of poking around the internet looking for out-of-place files, found some pretty high-level Department of Defense stuff. Under the alias Adam, he told The Intercept "The fact that this software, these spec sheets, and all the manuals to go with it were sitting out in the open for anyone to copy is just simply mind blowing."

"All of this leaky data is courtesy of what I can only assume are misconfigurations in the IMAS (Institute for Mathematics and Advanced Supercomputing) department at NYU. Not even a single username or password separates these files from the public internet right now. Its absolute insanity," Adam wrote to The Intercept over email.

The only tool Adam used to find the NYU trove was Shodan.io, a website thats roughly equivalent to Google for internet-connected, and typically unsecured, computers and appliances

Adam didn't find this server full of secrets by hacking through NYU firewalls or anything so complex. According to The Intercept, "the only tool Adam used to find the NYU trove was Shodan.io, a website thats roughly equivalent to Google for internet-connected, and typically unsecured, computers and appliances around the world, famous for turning up everything from baby monitors to farming equipment. Shodan has plenty of constructive technical uses but also serves as a constant reminder that we really ought to stop plugging things into the internet that have no business being there."

That last line is the kicker here. You may have read about how botnets comprised of Internet of Things devices are being used in massive DDOS attacks, like the ones instigated by squabbles over Minecraft servers last year. Shodan.io is a reminder that anyone could easily find a hole through your weak home router, and more importantly, your internet-connected refrigerator or lightbulbs could someday be used to DDOS a website you care about, like Steam.

In other words, Juicero wasn't just a sign that Silicon Valley spends millions of dollars reinventing basic shit we already have, but with internet connectivity. It's a harbinger of a bleak, bleak future where your coffee maker and your $400 juice bot can and will be taken hostage by a 17-year-old and next thing you know we're living a version of Maximum Overdrive we made for ourselves.

Adam informed NYU about the unsecured server and the files were removed, but experts have reviewed the documentation (which was the property of IBM and didn't appear to be classified by the DOD) and suggested that WindsorGreen is likely the best cryptography system in the world. The NSA is doubtless giving it a workout.

View original post here:
Man finds NSA supercomputer info sitting on an unsecured server ... - PC Gamer

NSA Director: Russia Hacked French ‘Infrastructure’ Ahead of Vote – Foreign Policy (blog)


Foreign Policy (blog)
NSA Director: Russia Hacked French 'Infrastructure' Ahead of Vote
Foreign Policy (blog)
National Security Agency Director Michael Rogers said the NSA warned French authorities that Russian hackers were targeting that country's computer infrastructure in the run-up to Sunday's pivotal presidential election, a revelation likely to intensify ...
NSA chief: US alerted France to Russian election hackingCNET
The NSA Confirms It: Russia Hacked French Election 'Infrastructure'WIRED
NSA chief explains 'discrepancy' over claim that Russia sought to boost TrumpFox News
ABC News -CyberScoop -Politico
all 131 news articles »

See the original post:
NSA Director: Russia Hacked French 'Infrastructure' Ahead of Vote - Foreign Policy (blog)

NSA has constricted its surveillance of Americans’ emails and text messages – The Week Magazine

Ivanka Trump's new book, Women Who Work, has gotten mixed reviews. If you want to read a glowing one, you can head on over to the government-financed Voice of America. On this week's Full Frontal, Samantha Bee gave Ivanka's guide to "rules for success" the book-club treatment, and it isn't pretty.

Trump "writes about her struggles as the working mother of a beautiful 10-year-old lifestyle brand," Bee began, and "if there's one thing the author inherited from her dad besides, you know, absolutely everything it's his recipe for word salad." She played some clips of Trump speaking at various forums, repeating one word in particular. "Stop using 'architect' as a verb that's not how you language," Bee said. "Learn how to architect a sentence!"

Still, "if you're not a fan of Ivanka's prose, don't worry you won't find much of it in this book," she said. "Practically every word that isn't 'I,' 'Trump,' or 'architecting' is cribbed from BrainyQuotes.com, or another self-help book." This has landed Ivanka in some hot water. "Who could have anticipated that confining your research to internet memes would have a downside?" Bee asked, letting Whoopi Goldberg sigh over Ivanka's appropriation of a Toni Morrison quote. And "it takes a special kind of whiteness to take a Maya Angelou line about racism, mangle it, and apply it to asking for a raise," Bee said.

The examples of life challenges Trump cites, like turning down Anna Wintour's personal invitation for an internship, rubbed Bee the wrong way, too. "If you were raised working poor like I was, this book will inspire you," Bee said. "Specifically, it will inspire you to challenge the next rich woman you see to a broken beer bottle fight."

"Okay, look. Ivanka is smart, polished, and hard-working," Bee concluded. "I truly believe that if she hadn't been Donald Trump's daughter, she would have still been one of the more successful realtors in the southeast Tampa area. But her belief that she's a role model is laughable." Look, "if you want to pickle yourself in the vapid platitudes that didn't help her climb from the very top all the way to the terrifyingly, inappropriately influential," you can buy Women Who Work for $26, Bee said, or you can check it out for free at your local library and "help future borrowers by returning the dust jacket with a better book inside." Peter Weber

Originally posted here:
NSA has constricted its surveillance of Americans' emails and text messages - The Week Magazine