Archive for the ‘NSA’ Category

Snowden: NSA hack might reveal ugly side of US spying

Over the weekend, a mysterious group called "The Shadow Brokers" leaked what appear to be hacking tools that the U.S. National Security Agency uses to spy on people.

This bundle of computer code is about three years old. But it's still dangerous, since it puts a high-tech military arsenal online within reach of all kinds of criminals. They can use these tools to rob banks, steal government secrets or expose personal lives.

And on Tuesday morning, in a series of tweets, ex-NSA whistleblower Edward Snowden pointed out yet another potential repercussion from the leak.

If these digital weapons are found on a computer, that's evidence of an attack -- similar to finding fragments of a blown up missile.

Computer security researchers around the world are now reviewing computer networks for these tools. And wherever they find this leaked code, they'll know the NSA was spying.

The United States currently claims the moral high ground and censures China, Iran, North Korea and Russia for hacking Americans. But it could soon be caught doing the same to others.

Here's an easy-to-understand explanation of Snowden's technical commentary on Twitter this morning, in which he describes how modern-day computer spying works.

Modern day spying 101

Ever wonder how the U.S. government can accuse China of hacking the United States?

To launch an attack, an enemy government wouldn't hit American targets directly. That's too easy to trace back. Instead, foreign hackers find a dummy spot to launch their attack.

For example, Chinese hackers might slip into a computer server at a company in Peru. Then they'll use that server as a launchpad, sending commands from that computer to break into a U.S. target.

It's like China launching a missile at the United States from Peru.

The job of NSA hackers is sneak into those enemy launchpad computer servers and scrape off computer code evidence of a breach. Next time that same code is used in an attack, the NSA can trace it back to the bad guys.

But the NSA's job is also to spy on foreign governments, so it too launches hacking missions from unsuspecting servers. And foreign governments try to collect evidence of NSA tools to identify the NSA in the future.

The NSA's elite hacking team, called Tailored Access Operations, is instructed to always wipe evidence of its presence after a mission. It's like a Navy SEAL team picking up its spent ammunition shells. But sometimes evidence gets left behind.

Typically, enemy governments keep the evidence they find of an NSA hack a secret. What's new this time around is that someone is actually calling out the United States in a way that will help other countries detect American spy activity.

Here, Snowden is referring to recent veiled accusations by the United States that Russia hacked the Democratic National Committee. The U.S. government hasn't formally pointed the finger, but officials are hinting to reporters that Russia is messing with American politics.

Snowden thinks this NSA tool leak could be a message to the United States: You toy with foreign politics too -- don't be hypocritical.

Snowden ended his screed by pointing out an interesting tidbit. Even though these NSA tools have just been leaked, it appears that they were stolen back in 2013 -- a short time after Snowden blew the whistle on NSA spying on Americans. At that point, the NSA went into lockdown mode and ramped up security.

So, ironically, the NSA's response to Snowden's alleged treachery might have actually prevented enemy hackers from continuing to steal NSA tools.

CNNMoney (New York) First published August 16, 2016: 1:36 PM ET

Read more:
Snowden: NSA hack might reveal ugly side of US spying

Were Russians Involved in NSA Hack? – NBC News

Edward Snowden is seen on a screen as he delivers a speech during the Roskilde Festival in Roskilde, Denmark, June 28 2016. Mathias Loevgreen Bojesen / Scanpix Denmark via Reuters

In clumsily worded English, the Shadow Brokers also boasted online that they were saving their best stolen material for a public auction, to be sold to the highest bidder.

Since then, many cybersecurity experts -- including some former NSA officials -- have come to believe the material posted by the Shadow Brokers is indeed "exploits" and other specially constructed pieces of malware created by the NSA to break into the computers and communications devices of governments like Iran and China, as well as companies and individuals, and to either steal or manipulate the data they contain.

Snowden, the self-described superhacker spy, took to Twitter on Tuesday to say he thinks the public posting of what he described as NSA cybertools may be part of a broader influence operation by Russia.

The U.S. intelligence community believes Russia is behind numerous hacks of entities and people associated with the Democratic Party over the past year, and federal authorities are investigating them and the subsequent release of information via WikiLeaks and other outlets. Many U.S. officials believe those hacks are part of an effort by Russian President Vladimir Putin to help his favored candidate, Republican Donald Trump, and hinder his Democratic rival, Hillary Clinton.

But so far, the Obama administration hasn't formally accused Russia or taken steps to publicly confront it or issue sanctions. And Snowden speculated that Russia may be using the weekend disclosures to warn the White House against taking such actions.

In one tweet, Snowden noted that the "undetected hacker squatting on this NSA server lost access in June 2013," suggesting the hackers have been sitting on the material for three years.

"Why did they do it? No one knows, but I suspect this is more diplomacy than intelligence, related to the escalation around the DNC hack," Snowden tweeted. He also said the weekend postings "may be an effort to influence the calculus of decision-makers wondering how sharply to respond to the DNC hacks. This leak looks like a somebody [sic] sending a message that an escalation in the attribution game could get messy fast."

The NSA leaker also said any U..S. action against Russia could result in the public disclosure of embarrassing information about cyber-operations of its own: "Here's why that is significant," Snowden said. "This leak is likely a warning that someone can prove US responsibility for any attacks that originated from this malware server."

Such a disclosure could have huge foreign policy consequences, Snowden said, especially if it shows that NSA hackers were targeting U.S. allies. "Particularly if any of those operations targeted elections," he said.

The NSA did not respond to requests for comment, but when asked if the agency had been hacked, one NSA official told NBC News that, "I don't have anything for you on that."

NSA expert James Bamford said the hack appeared to be significant, but he cautioned against pointing the finger at Russia, especially the government, given how many different groups of hackers routinely target NSA servers.

"There are so many unknowns here, and a lot of people in the hacking community don't think this is the Russian government," said Bamford, the author of three books about the NSA who has also visited Snowden in Russia and interviewed him there.

"I don't know how Snowden would have any idea who did this, sitting there in an apartment in Moscow," Bamford said. "Even the NSA probably doesn't know who did this."

In recent days, other security experts also have come to believe that the computer code comes from the NSA and that Russia is behind its theft and release.

Former NSA general counsel Stewart Baker told NBC News that "there is a lot of consensus among technical experts" that the cybertools were indeed stolen from the NSA, most likely from an external command and control server created to launch hacking operations that couldn't be traced back to the U.S.

"The more disastrous and less likely scenario is that someone has hacked U.S. infrastructure and extracted large files," said Baker, a prominent international cybersecurity lawyer.

Either way, the weekend postings are cause for dismay, Baker said, noting that "the assumption that it is Russian intelligence is a good first estimate, as it's one of a half dozen leaks of information directly hostile to the U.S. government and U.S. institutions."

"It shows how very sophisticated the spy-vs-spy game in cyberspace has become," he said. "What we are now seeing is an example of one spy agency trying to compromise the infrastructure of another spy agency and how that it is happening at an almost unfathomably sophisticated level."

See more here:
Were Russians Involved in NSA Hack? - NBC News

In ‘Bizarre’ NSA-Linked Hacking Saga, Some Exploits Prove …

At least some of the hacking weapons possibly pilfered from an NSA-linked cyberoperation and exposed publicly earlier this week are real and include a zero-day exploit, according to two companies whose products were targeted.

Cybersecurity companies Cisco and Fortinet announced online Wednesday that some code published by the mysterious Shadow Group affected legacy versions of their firewalls, but the vulnerabilities already were addressed in upgraded versions. More severely, however, Cisco said one of the exploits in the code was unknown to the company until it popped up online and is still a threat.

If the right configurations are present, Cisco said, the vulnerability "could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system."

Yvonne Malmgren, a spokeswoman for Cisco, told ABC News that the company is directing its customers to workarounds to "mitigate that particular vulnerability" and that a fix is coming "in the near future."

Cybersecurity experts and former U.S. officials who have analyzed some of the code released online by the Shadow Brokers were already convinced at least some of it appeared very real. Zero-day vulnerabilities those that are unknown to makers of the target software are particularly valuable on the cyber black market because, by definition, there's no specific defense against them.

The Shadow Brokers a name that's new to the cybersecurity community and could be a reference to a popular video game popped up online over the weekend claiming to have broken into the files of another elite hacking team known as the Equation Group. The Equation Group was first identified in February 2015 by the Russian cybersecurity firm Kaspersky Lab, which recently described it as the "apex predator" of the hacking world.

In its initial report, Kaspersky said that the Equation Group "is unique almost in every aspect of their activities: They use tools that are very complicated and expensive to develop, in order to infect victims, retrieve data and hide activity in an outstandingly professional way, and utilize classic spying techniques to deliver malicious payloads to the victims."

Kaspersky also said the Equation Group appeared to have "solid links" with the creators of the cyber-superweapon Stuxnet, which was reportedly the product of a joint U.S. National Security AgencyIsraeli intelligence operation. That link, along with Equation Group's reported long-time targeting of Iranian, Russian, Chinese and Pakistani systems, among others, has led observers to suspect the Equation Group is at least connected to the NSA or some Western intelligence agency.

The names of some of the exploits released by the Shadow Brokers refer to operations exposed by former NSA contractor Edward Snowden, but researchers pointed out that since his revelations in 2013, those names have been public information.

The Shadow Brokers announced in stilted English earlier this week that they plan to put the best of the cyberweapons up for auction and that if it nets at least 1 million bitcoins (worth over $560 million), they will release more Equation Group files to the public. As of this report, the auction has pulled in less than $1,000.

It's unclear how the Shadow Brokers got a hold of the cyberweapons; the group claims to have "followed" Equation Group traffic to its "source range" and then hacked it.

The question remains whether the Equation Group or another U.S.-aligned or -allied hacking group, private contractor or intelligence agency was actually hacked and, more immediately, whether the yet-to-be-released cyberweapons are as real as the teaser code. The Shadow Group billed the unseen payloads as "better than Stuxnet," the game-changing worm that physically damaged an Iranian nuclear facility.

Snowden noted on Twitter that date references in the released code end in the fall of 2013, just after he went public with revelations about NSA surveillance operations. He speculated that perhaps an NSA outside "staging server" essentially a holding pen for malware had been hacked and the NSA migrated the malware to a different server after he went public as a security precaution, inadvertently but fortuitously cutting off the hackers' access.

Oren Falkowitz, a former NSA hacker with the agency's elite Tailored Access Operations, said he strongly doubted the NSA itself was hacked a sentiment shared by two other cybersecurity experts who spoke to ABC News.

"I can think of a dozen ways" the tools could have been stolen, Falkowitz said, such as being taken from an outside server and being pilfered from an unsecured laptop. The NSA from time to time outsources the development of offensive cyberweapons to private contractors, according to cybersecurity experts.

As for who the Shadow Brokers are, there's only speculation, which runs the gamut from a disgruntled insider at a U.S.-linked group to a sophisticated nation-state like Russia. But the group's public posturing has thrown observers for a loop.

"Revealing the results [of a major hack] in this way is extremely atypical," Falkowitz said. "To do something as childish as hold a public auction with bitcoin ... just seems like not consistent with the way really sophisticated government groups would operate."

"It's really bizarre," he said.

Fortinet did not immediately respond to a request for comment for this report.

Read the original post:
In 'Bizarre' NSA-Linked Hacking Saga, Some Exploits Prove ...

Oklahoma NSA Softball

Welcome !2015 NSA Adult and YouthSoftball and BPA Youth Baseball

Adult Coaches

New for 2015, here are a few changes you need to know about.

1. Players will give the coach they want to play for their Player number.

2. Coach signs in to team account and starts building roster by putting in player numbers to be added automatically to the roster.

3. No more Coach sending invites and waiting for Player accept.

4. No more Players signing in to Accept to be on a roster.

5. Player is officially on the roster once they sign the printed online roster.

This is NSAs way to make the process easier and simpler for coaches and players.

We are looking for sponsors for the 2015 softball tournaments. If you, or anyone you know might be interested in sponsoring one tournament, or be a sponsor for a series of tournaments, please contact me. We are looking at some exciting changes to our tournament structure, and are sure that you will like what we have coming in 2015 with our Tournaments.

Weinvite you tosanction your teams here on-linefor the 2015 season, beginning in January, 2015. Look here for UpcomingLeague play,info for Tournaments, Updated National rules, Classification & Roster rules, Post season play, NSA points system, SUPER WORLD SERIES info, Hotels, NSA links and Sponsors.If you are interested in becoming a Tournament Director or run the NSA Program at your Ball Park, PleaseContact us at bhancock@playnsa.com,or call the NSA State Director Bill Hancock at 918-607-1661.We look forward to seeing yourSoftball Team on the Diamonds in 2015 !!

Indian Springs 2015 SUMMER LEAGUES

Clinton Oklahoma - Acme Brick Ballpark

Coweta Softball Complex

All Star Sports Complex- Batting Cages/Practice

Oklahoma NSA Headquarters

Bill Hancock

StateDirector

(918)607-1661

So, If you are looking for Post season play with an Association that works hard to put teams in their CORRECT Classification, Thenwe look forward to seeing your teamat many of the Ball Parks in Oklahoma this year. We want to see as many teams as possible qualify for World Series and "Super" World Series events in September and October.

Clarion Hotel

2600 N. Aspen Ave

Broken Arrow, OK

918-258-7085

Free HOT breakfast

Outdoor Swimming Pool

Pet Friendly

Ask for Oklahoma NSA Special Rate.

ECONOLODGE HOTEL

2600 N. Aspen Ave Building B

Broken Arrow, OK

918-251-1010

Free Continental Breakfast

Pet Friendly

Special Oklahoma NSA Rates

Sleep Inn and Suites, Tulsa Central/I44

8021 E. 33rd St South (I-44 and Memorial)

Tulsa, OK 74145

Tel: (918) 663-2777

Fax: (918) 858-4445

QUALITY INN

10829 e. 41ST ST.

918-665-0220

Free HOT breakfast

Free WIFI

Microwave and Refrigerator in every room

Outdoor Pool

Special Okahoma NSA Room Rates

More here:
Oklahoma NSA Softball

Colorado Fastpitch National Softball Association

NSA COLORADO BEST FASTPITCH EVENTS IN THE STATE

Welcome to the Colorado Chapter

of National Softball Association

2016 Schedule

Registrations will open mid-November

March 12th-13th - Got Game

April 16th-17th - Get into the Groove

May 14th-15th - No Place Like Home

June 10th-12th - Colorado State Championships

October 22nd-23rd - Wicked Wind Up

November 5th-6th - Fight Like A Girl

To Register for any NSA Colorado Event:

Click "Enroll" on any event listed belowClick "More Info" tab under each event to see theWHO'S COMINGLIST

Programs

REFUNDS: NSA Colorado will charge a $75 administrative fee for all refunds outside of the following guidelines.If a team cancels15 business days or moreprior to the event start date they may transfer the registration to another NSA Colorado event for full value (this also applies to cancellations due to weather). If a team cancels10 to 14 business daysprior to the event, 50 percent of the entry fee will be refunded; no refund will be given if a team cancels9 or fewer business daysprior to the event.If one game is played there will be a 50% refund and if 2 or more games are played there will be no refund.

*****NEW IN 2015***** ROSTERS & INSURANCE: ALL teams MUST complete the 2015 roster. Completion of the 2015 team roster includes completion ofindividual player registration by parent or legal guardian. Proof of insurance must be uploaded or emailed toinfo@coloradofastpitchnsa.comwithin 72 hours of start of your first tournament.

REGISTRATION: The team registrationdoes not guaranteea spot in the tournament. To guarantee to play youmust register andpayonline. We appreciate all payments by MasterCard or Visa. We no longer accept personal checks.

Welcome to NSA softball. We are excited to bring a new sanctioning body to the state of Colorado. The NSA board consisting of Cathy Bennett, Carl Goodman,and Tami Rumsey bring years of youth sport knowledge as Coaches, tournament directors (30+combined years), youth sport board members and parents. We pride ourselves in working in the players best interests. We operate on one simple motto- "Do the right thing" .

We alsowelcome Reese Robinson as our consultant and most important our UIC.

We look forward to your teams and your families making NSA their tournament of choice.

View original post here:
Colorado Fastpitch National Softball Association