Archive for the ‘NSA’ Category
About | New Saint Andrews College
Fellow of Theology Dr. Ben Merkle is the colleges second president and previously served as the undergraduate dean. He holds a D.Phil. in Oriental Studies and an M.St. in Jewish Studies from Oxford University, England; an M.A. degree in English Literature, and a B.S. in Education (Secondary Education-Chemistry, with a minor in History) both from the University of Idaho. He also studied theology at Greyfriars Hall from 1998 to 2000.
Dr. Merkle served as a lecturer at New Saint Andrews from 2000 until 2005, when he was promoted to fellow of theology. He has taught the freshman introductory theology course and Lordship Colloquium, as well as Hebrew. He has also team-taught Anglo-Saxon.
Dr. Merkle was promoted to the office of president in 2015.
He has served as a minister at Christ Church, Moscow. He previously served as a part-time campus minister with Collegiate Reformed Fellowship, a campus ministry of Christ Church.
Dr. Merkle is the author of The White Horse King: The Life of Alfred the Great (Thomas Nelson Publishers, 2009) and Defending the Trinity in the Reformed Palatinate: The Elohistae (Oxford University Press 2015). He is a contributing editor and former managing editor of the periodical Credenda/Agenda.
He and wife Bekah (B.A., 1998), the first graduate of New Saint Andrews, have five children.
Contact Information: (208) 882-1566 | bmerkle@nsa.edu
More here:
About | New Saint Andrews College
NSA’s National Cryptologic University will host a reaffirmation of accreditation site visi – National Security Agency
FORT MEADE, Md. The National Security Agencys (NSA) National Cryptologic University will host a reaffirmation of accreditation site visit for the Council on Occupational Education (COE) 12-13 October 2022. National Cryptologic University received its initial accreditation with COE in 1990, and has undergone subsequent site visits and rigorous self-studies in order to maintain this recognition. Affirmation of accreditation occurs every six years to determine compliance with the standards and criteria for accreditation.To maintain COE accredited status, National Cryptologic University must abide by educational standards and criteria established by COE. Accreditation requirements and standards for National Cryptologic University are in accordance with DoDM 3115:11 DoD Intelligence and Security Training Standards, March 24, 2015.Persons wishing to make comments should send comments directly to the commission by 12 October 2022. To submit a comment, write to the Executive Director of the Commission, Council on Occupational Education, 7840 Roswell Road, Bldg. 300, Suite 325, Atlanta, GA 30350. Persons making comments must provide their names and mailing addresses.
View original post here:
NSA's National Cryptologic University will host a reaffirmation of accreditation site visi - National Security Agency
NSA Affiliates Donate More Than 86 Tons of Food To Help Fight Hunger – HS Today – HSToday
National Security Agency (NSA) affiliates across the Enterprise banded together to donate more than 172,700 pounds of food thats 86+ tons to theFeds Feed Families (FFF)campaign this year.
The 2022 Feds Feed Families campaign ran from June through August. The theme this year was Fighting hunger. Giving hope.
The contributions we are able to make individually and together will give hope to so many who are less fortunate, said GEN Paul M. Nakasone, Commander, USCYBERCOM, Director, NSA/Chief, CSS.
This years FFF goal was to collect 140,000 pounds a little more than 10% increase from the previous year.
Donations started off slow, but NSA affiliates rose to the occasion and surpassed last years donations by nearly 36%, FFF Program Manager Ciera Barnes said.
The Cryptologic Centerswere instrumental in helping the Agency reach its goal, collecting over 138,000 pounds.
NSA/CSS Georgia came out on top with more than 82,900 pounds, of which 78,600 pounds were converted from online donations. The Department of Agriculture uses a standard conversion formula for all participating agencies that every $1 donated equates to five pounds.
NSA/CSS Utah collected 19,465 pounds, with an astounding 19,000 pounds received from online donations.
NSA/CSS Colorado (NSAC) collected 14,340 pounds, of which 3,650 pounds were non-perishable donations. NSACs goal this campaign was to reintroduce in-kind donations to the workforce following restrictions in 2021.
NSA/CSS Texas increased its online donations by 10,500 pounds and brought in a total of 13,931 pounds when combined with non-perishable donations. Similar to NSAC, the focus this campaign was to reintroduce in-kind donations to the workforce following restrictions related to the COVID-19 pandemic.
NSA/CSS Hawaii also increased its online donations to over 5,625 pounds this year. The Cryptologic Centers total donations received was 6,729 pounds. Sugar Grove Research Stations 1,550 pounds of donations in 2022 was almost triple the donations received last year.
Overall, when combined with current Combined Federal Campaign pledges, NSA collected more than 1.07 million pounds of food in this years campaign, an overall 2.35% increase from 2021.
NSA/CSS Washington (NSAW) donated more than 33,800 pounds of food and toiletry items to the Maryland Food Bank, a Combined Federal Campaign charity located in Baltimore. The Maryland SPCA received nearly 740 pounds of pet food, treats, and toys collected during the Community Dog Walk, second annual Family Bike Ride, and various Stuff the Truck events around NSAW.
I am once again impressed and touched by the generosity of the NSA family, said Barry Boseman, chief of the State and Local Affairs office.
Read more at NSA
See the rest here:
NSA Affiliates Donate More Than 86 Tons of Food To Help Fight Hunger - HS Today - HSToday
What is the NSA actually doing in China? – Tech Monitor
The breach was deft, even artful. It began, according to Chinas National Computer Virus Emergency Response Centre (NCVERC), with a man-in-the-middle attack earlier this year on the networks of Northwestern Polytechnical University (NWPU) in Xian. A type of breach that allows hackers to intercept electronic communications mid-transit, the attackers then used a total of 40 zero-day exploits and viruses to strengthen and advance their position within the institutions network. By the time they were discovered, the groups access to the universitys systems was near-total and even extended to a national telecommunications firm.
This attack was one of five that NCVERC has attributed in recent months to the US National Security Agency (NSA). I want to stress that what the US has done has seriously jeopardized the security of Chinas critical infrastructure, and institutional and personal information, said Mao Ning, a spokesperson from the countrys foreign ministry, who went on to urge the relevant US authorities to stop organising such breaches. Even so, its the kind of conduct that the Chinese government has publicly stated it has come to expect from the worlds leading superpower, with another government spokesperson excoriating the US as truly the hacking empire of the world.
Such highly charged accusations made against the US are nothing new and, indeed, there is a rich seam of claims dating back to the Snowden revelations of the NSA making a mockery of Chinese cybersecurity by hacking civilian computers while maintaining a sophisticated network of informants. There is also, admittedly, a whiff of plausibility in some of the new claims: NWPU has, in the past, been described by the US Justice Department as an institution thats heavily involved in military research and works closely with the Peoples Liberation Army. Even so, the new reports have been viewed with suspicion by cybersecurity experts. Indeed, a common thread between all of these reports is the use of threat intelligence and technical details designed to mimic the ways in which Western cybersecurity companies produce evidence and attribution of state-sponsored cyberattacks.
In April for example, another spokesperson for Chinas Foreign Affairs Ministry responded to a question from Global Times a state-funded media outlet about a report from NCVERC on alleged US cyberattacks on allied countries. The report points out that if existing international internet backbone network(s) and critical information infrastructure contain software or hardware provided by US companies, it is highly likely that various types of backdoor(s) could be installed, making them targets of US government cyberattacks, said Wang Wenbin.
His statement was strikingly similar to the way in which the US has previously warned about the risks in allowing Chinese telecommunications giant Huawei to work on critical national infrastructure around the world. Theres likely a cynical motive behind such attributions, argues Robert Spalding, CEO of Sempre and a former US Air Force Brigadier General. The CCP wants to lay the foundation for saying that the US is guilty of what they blame China for, he says.
The timing of these reports release is also crucial to understanding Chinas intentions, argues Chih-yun Huang, a cyber threat intelligence analyst at Team T5, a Taiwanese cybersecurity firm. On 30 August, the American cybersecurity company Proofpoint released a study on recent cyberattacks on the Australian government and wind turbine fleets in the South China Sea, with the trail leading to a group called TA423/Red Ladon. According to Proofpoint researchers and the US Department of Justice, the group is a China-based, espionage-motivated threat actor targeting a variety of organisations in response to political events in the Asia-Pacific region, with a focus on the South China Sea.
Several weeks later, Global Times published an exclusive detailing how the NSA allegedly conducted its cyberattack on NWPU, which aimed at infiltrating and controlling core equipment in Chinas infrastructure and stealing private data of Chinese people with sensitive identities. Huang believes the timing of the story is suspicious, and likely a tit-for-tat accusation.Indeed, other industry experts have pointed out a pattern where Chinese cybersecurity companies publish reports on US cyberattacks, followed by exclusive stories run by Global Times, indicating a coordinated campaign between the state, private sector and the media.
Other cybersecurity experts have also argued that these reports are a patchwork effort at best, mentioning malware that has existed in the public domain for over five years. For her part, Huang notes that many of the reports issued by NCVERC omit crucial information like IP addresses and other indicators of compromise. In that sense, these reports are not credible because we cant confirm whether its true or not, she says.
However, focusing on the technical credibility of these reports misses the broader point about Chinas efforts to push out detailed threat intelligence on alleged American offensive hacking operations. The interesting thing is that you wont be able to find an English version of these reports, says Huang. Its probably part of wider anti-US propaganda efforts intended to stir the emotions of the domestic population of China, or even the wider Chinese diaspora.
But Huang also believes that what she has seen in the last few months is just the beginning, and that propaganda efforts to portray Chinese cybersecurity as vulnerable to attack from Western powers will likely become more sophisticated in the future as US-China relations continue to deteriorate. They will find new ways to make it more persuasive, she says the best lies, after all, contain elements of truth. China might find ways to make these reports more legitimate by providing more technical details, for example.
While publishing cyber threat intelligence reports about American hacking adventures represents a new front in US-China relations, such methods fall squarely within the long-held tradition of accusing the West of double standards.
There have been multiple times when the US accuses China of human rights violations of Uyghurs and you would see China retaliating with the USs poor human rights record, for example, says Huang. As long as the Western cybersecurity industry continues to keep a close eye on Chinas activities, I think China will continue to fight back through propaganda whenever they feel attacked.
Read more:
What is the NSA actually doing in China? - Tech Monitor