Archive for the ‘NSA’ Category

Jeb Bush: NSA Bulk Telephone Records Collection Hugely Important

Video:Jeb Bush Backs NSA Powers

Former Florida Gov. Jeb Bush, who is seriously considering a run for the White House in 2016, said Wednesday that the National Security Agencys program that collects bulk telephone records was hugely important, throwing his support behind the practice as Congress debates whether to reauthorize or limit it.

At an event on foreign policy hosted by the Chicago Council on Global Affairs, Mr. Bush, a Republican, said, For the life of me, I dont understand the debate over the metadata program.

The programs many supporters say it helps the U.S. government prevent terrorist attacks. But its critics believe it exists with little oversight and few boundaries and could allow the government to spy on U.S. citizens.

Mr. Bushs comments are significant, as the legal authority that allows the program to exist is set to expire in June. Congress is weighing whether to rework the program in a way that would strip the NSA of some of its powers.

Details of the NSAs metadata bulk collection program were exposed in 2013 by former NSA contractor Edward Snowden, prompting a vigorous national debate over how much power the government should have to spy on people.

Mr. Bushs support for the metadata program puts him in sharp contrast with another likely GOP White House candidate, Sen. Rand Paul of Kentucky.

Mr. Paul is a critic of the NSA, and has joined a class-action lawsuit against the Obama administration over the NSAs spying practices. He also voted against a bill that would restrain some of the NSAs powers last year, saying it didnt go far enough.

Mr. Paul is popular with the libertarian wing of the GOP, and Mr. Bush as he made evident during his comments in Chicago supports more government spending on the military and a broader military influence.

Messrs. Bush and Paul will likely square off over the privacy issue on the campaign trail but also during GOP debates.

See original here:
Jeb Bush: NSA Bulk Telephone Records Collection Hugely Important

NSA planted surveillance software on hard drives, report says

Security vendor Kaspersky outs a group capable of inserting spying software onto hard drives around the world, while Reuters fingers the NSA as the culprit.

Is the NSA behind a sophsticated way of implanting spyware on hard drives?

The National Security Agency is able to infect hard drives with surveillance software to spy on computers, Reuters said on Tuesday, citing information from cyber researchers and former NSA operatives.

In a new report, Kaspersky revealed the existence of a group dubbed The Equation Group capable of directly accessing the firmware of hard drives from Western Digital, Seagate, Toshiba, IBM, Micron, Samsung and other drive makers. As such, the group has been able to implant spyware on hard drives to conduct surveillance on computers around the world.

In a blog posted on Monday, Kaspersky said this threat has been around for almost 20 years and "surpasses anything known in terms of complexity and sophistication of techniques." The security researcher called the group "unique almost in every aspect of their activities: they use tools that are very complicated and expensive to develop, in order to infect victims, retrieve data and hide activity in an outstandingly professional way, and utilize classic spying techniques to deliver malicious payloads to the victims."

Surveillance software implanted on hard drives is especially dangerous as it becomes active each time the PC boots up and thus can infect the computer over and over again without the user's knowledge. Though this type of spyware could have surfaced on a "majority of the world's computers," Kaspersky cited thousands or possibly tens of thousands of infections across 30 different countries.

Infected parties and industries include government and diplomatic institutions, as well as those involved in telecommunications, aerospace, energy, nuclear research, oil and gas, military and nanotechnology. Also, included are Islamic activists and scholars, mass media, the transportation sector, financial institutions and companies developing encryption technologies.

And who's responsible for this sophisticated spyware?

Kaspersky didn't name names but did say that the group has ties to Stuxnet, a virus used to infect Iran's uranium enrichment facility. The NSA has been accused of planting Stuxnet, leading Reuters to finger the agency as the source behind the hard drive spyware, especially based on outside information.

Kaspersky's analysis was right, a former NSA employee told Reuters, adding that the agency valued this type of spyware as highly as Stuxnet. Another "former intelligence operative" said that the NSA developed this method of embedding spyware in hard drives but said he didn't know which surveillance efforts used it.

Read more here:
NSA planted surveillance software on hard drives, report says

Not Only the NSA Knows How to Make Unerasable Malware

Hacking tools linked to U.S. intelligence that burrow inside hard disk drives could also be made by nongovernment hackers.

Over the weekend Russian security company Kaspersky described a suite of extremely sophisticated hacking tools that since 2008 have been used to infiltrate government, military, and corporate computers in 30 countries around the world. Reuters reports that it was the work of the U.S. National Security Agency.

Kasperskys most striking finding was that the toolkit of what it calls the Equation Group could inject malware into the software embedded inside hard disk drives. Not only is that firmware invisible to conventional security software, but malicious code hidden inside it can emerge to take over a computer even after its hard disk has been carefully erased. Costin Raiu, a researcher with Kaspersky, told the New York Times that the technique rendered investigators like him practically blind.

That impressive trick sets a new bar for the sophistication in malware caught in the wild. And it has led to speculation that the NSA had assistance from hard drive manufacturers, for example by getting access to details on how their firmware worked.

But despite suggestions it would be just about impossible for even the NSA to reverse-engineer hard drive firmware without such help, it appears to be well within its reachand that of many others, too. In recent years hackers and researchers with budgets far smaller than the NSAs have reverse-engineered the firmware of hard drives and other devices and demonstrated their own invisible malware.

That raises the prospect that multiple national intelligence agenciesand perhaps even groups without government backingcould be using the technique. Few, if any, security researchers are on the lookout for such attacks because they are essentially invisible.

Anyone looking to get started hacking hard drive firmware would be well advised to start with this page on the subject from prolific hacker Jereom Domburg. In 2013 he gave several talks on his research and showed how it enabled him to remotely take over a server with a hard disk made by Western Digital, a leading manufacturer whose drives were also targeted by Equation Group.

Also in 2013, academic researchers independently went even further and developed several proof-of-concept attacks against a hard disk from a different manufacturer. They showed how a disks firmware could be infected remotely, and made a system to communicate over the Internet with the unerasable malware to send commands and copy data such as encryption keys. This line from the academic papers summary has gained new plausibility after what we learned over the weekend:

The difficulty of implementing such an attack is not limited to the area of government cyber-warfare; rather, it is well within the reach of moderately funded criminals, botnet herders and academic researchers.

At the Black Hat security conference last summer, two researchers described how they had reverse engineered the firmware of USB sticks to hide code inside that can silently take over a computer.

Go here to read the rest:
Not Only the NSA Knows How to Make Unerasable Malware

NSA MCW 2015 Fashion Show – Video


NSA MCW 2015 Fashion Show
Here #39;s our creative fashion show performance that won us 1st place at this year #39;s YFS Multicultural Week.

By: NSA York U

Continue reading here:
NSA MCW 2015 Fashion Show - Video

Game Film: NSA Gorfam 250′ 1-Pitch Softball Tournament – Video


Game Film: NSA Gorfam 250 #39; 1-Pitch Softball Tournament
Game film from the NSA Gorfam 250 1-Pitch tournament at Indian Springs Softball Complex in Broken Arrow, OK. Brought to you by RedDirtSoftball.com. Like us a...

By: RedDirtSoftball

See the original post here:
Game Film: NSA Gorfam 250' 1-Pitch Softball Tournament - Video