Archive for the ‘NSA’ Category

‘NCIS’: The Real Reason Bishop Quit the ‘NCIS’ Team – Showbiz Cheat Sheet

Ellie Bishop (Emily Wickersham) made an unexpected exit during the NCIS Season 18 finale. If Bishops exit has you puzzled, well explain what happened. Heres the real reason Bishop left the NCIS team.

Bishop was accused of leaking classified NSA documents about a secret operation where Syrian refugees were used as bait to lure an Al-Qaeda leader out of hiding. The information leak, which occurred 10 years ago while she was still working with the NSA, appeared to get into the hands of arms dealers.

Director Leon Vance (Rocky Carroll) tried to defend Bishop. He told her to go home until things settled down. However, she came back to the office and said she was responsible for the information leak. Bishop then quit and left the building. McGee goes after her to ask her what happened.

At first, Bishop says she doesnt want to talk about what happened with the NSA leak, but McGee (Sean Murray) refuses to back down. You and I have been through too much together for you to box me out like this, says McGee. Bishop decides to talk, telling McGee she wasnt in agreement with the NSAs treatment of Syrian refugees. However, McGee doesnt understand how capturing Al Qaeda leaders could be wrong.

Bishop explains capturing the leaders wasnt what was wrong. She didnt agree with the methods used for making the captures. Using innocent people as pawnsthats wrong, says Bishop. However, McGee says he dug deeper into the NSA intel and found that some of the refugees were foreign fighters using civilians as a cover. Bishop says the information is just from one source and it was unreliable.

McGee asks Bishop if she has regrets about the leaked documents. She says her only regret is not releasing the documents sooner. However, McGee says she should have thought about filing a whistleblower report. McGee goes to Gibbs house to talk about Bishop. Hes upset because Bishop could face up to 20 years in prison for what she did. He asks Gibbs how he can help her, but he says theres really nothing he can do.

Torres (Wilmer Valderrama) has a difficult time with the investigation into Bishop. He was in denial, not wanting to believe the accusations. Torres insists shes being framed.

When Torres tracks Bishop down, he learns the truth. Odette planted the leaked documents in the arms dealers bag. Now, Bishop is on her way to continue training with her. The information leak was all part of an operation led by Odette. Bishop needed to be a disgraced NCIS agent to move on to wherever shes going next. Torres assumes her next step is probably CIA or Homeland Security.

When Torres asks Bishop why she pushed him away, Bishop explains it was all about doing what was best for her. She was given an opportunity to join Odette and work with her, so she took it. If we worked regular 9-5 jobs, things could be different, she tells Torres. I didnt mean for us to happen. With that, Bishop kisses Torres and walks away.

Follow Sheiresa Ngo on Twitter.

Here is the original post:
'NCIS': The Real Reason Bishop Quit the 'NCIS' Team - Showbiz Cheat Sheet

Pakistan FM threatens to not shake hands with Afghanistan NSA over brothel house remark – Republic World

Pakistan Foreign Minister Shah Mehmood Qureshi lashed out at Afghanistan's National Security Advisor for allegedly calling the former's country a 'brothel house'. Shah Mehmood Qureshi's remarks come a month after Afghanistan's NSAHamdullah Mohib allegedly made the remark during a public speech in Nangarhar province nearly a month ago. Asking NSAHamdullah Mohib to listen carefully, the Pakistan Foreign Minister threatened him that no Pakistani would shake hands if the former did not desist himself from making such remarks & levelling accusations.

As per ANI, Pakistan has conveyed to Afghanistan that it would no longer conduct official business with NSAHamdullah Mohib due to his outburst against Islamabad. A statement issued by the Pakistan Foreign Ministry called the NSA's allegations baseless and added that such remarks undermine trust and mutual understanding between Islamabad and Kabul. Qureshi said that Pakistani officials from the prime minister to the army chief to the foreign minister had visited Kabul for peace yet the NSA had still likened Pakistan to a "brothel house".

"You should be ashamed and you should be guilty at your words and my blood is boiling ever since your speech in Nangarhar," he added.

"Correct your behaviour and reflect on it. I say this to the international community that if this behaviour continues, then this person, who calls himself the national security adviser of Afghanistan, will actually be playing the role of a spoiler [for peace]."

President Biden in April announced that all American troops would be withdrawn from Afghanistan by September 11 this year, thus bringing to end the country's longest war, spanning across two decades. The US and the Taliban signed a landmark deal in Doha on February 29, 2020, to bring lasting peace in war-torn Afghanistan and allow US troops to return home from America's longest war. Under the US-Taliban pact, the US has agreed to withdraw all its soldiers from Afghanistan in 14 months.

There are currently 2,500 American troops left in Afghanistan, the lowest level of American forces in the war-torn country since 2001. Since the US-led invasion that ousted the Taliban after the September 11, 2001 attacks, America has spent more than USD 1 trillion in fighting and rebuilding in Afghanistan. About 2,400 US soldiers have been killed, along with tens of thousands of Afghan troops, Taliban insurgents, and Afghan civilians.

The rest is here:
Pakistan FM threatens to not shake hands with Afghanistan NSA over brothel house remark - Republic World

BJP expels hooch tragedy accused from party; NSA to be invoked against five arrested – The New Indian Express

By PTI

ALIGARH:The BJP on Monday expelled Rishi Sharma, the alleged kingpin in the hooch tragedy case, from the party.

District president of BJP Rishipal Pal Singh has cancelled Rishi Sharma's primary membership, a party press release said.

Aligarh Police has started the process of charging all the five main accused including Sharma, who was arrested on Sunday, under the stringent National Security Act and the Gangster Act, Senior Superintendent of Police Kalanidhi Naithani said.

The accused are being interrogated and are expected to reveal the entire network of the liquor mafia, police sources said.

They said Rishi Sharma was in disguise and was hiding among a group of sadhus at an ashram at Garhmukteshwar near Hapur to evade the police.

Police had managed to trace his whereabouts from the video footage of one of his close associates with whom he was last seen when the news of the liquor tragedy, which has claimed at least 35 lives, started trickling on the night of May 27.

During the past week, police raided the premises of several of Sharma's associates in different states including Himachal Pradesh.

After they traced him to Garhmukteshwar Ashram on Saturday evening, a police party rushed there only to discover that he had escaped.

With the help of some informers, he was tracked down at the Aligarh-Bulandshahr border where he was ultimately nabbed after a manhunt lasting nine days.

Read the original:
BJP expels hooch tragedy accused from party; NSA to be invoked against five arrested - The New Indian Express

US NSA says will push China to be more transparent on COVID-19 – Oneindia

International

oi-Vicky Nanjappa

| Published: Tuesday, June 8, 2021, 10:59 [IST]

Washington, June 08: The United States in coordination with the international community will continue to press China to be transparent and forthcoming with information on the origins of COVID-19, National Security Advisor Jake Sullivan has said.

He also said that at the same time, the US will also launch its own review and process.

"We are going to continue to press in coordination with the international community, China to be transparent, to be forthcoming with data and information, we're not going to just stand by and accept that they've said they're not going to participate," Jake Sullivan told a White House news conference on Monday.

This would be also one of the topics of discussion with foreign leaders as President Joe Biden departs on his maiden overseas trip -- after assuming office -- this week, he said.

Biden is scheduled to leave on his maiden official overseas trip on Wednesday during which he will hold discussions with top global leaders, including at the G-7 summit in the UK and the NATO meetings.

Meanwhile, at a Congressional testimony, Secretary of State Tony Blinken said that there are two possible scenarios on the origins of the coronavirus.

One is that it emerged from a laboratory and the other is that it was naturally occurring, he said.

"President Biden has ordered a comprehensive government-wide review to try to get to the bottom of what happened," Tony Blinken said in response to a question from Congressman Steve Chabot, a member of the House Foreign Affairs Committee.

"He initiated an initial review back in March. The results concluded that it was likely to be one of these two scenarios. He's now asked on a 90-day basis for the entire government to really dig into everything we have, including working with experts to see if we can make a determination," he said.

Tony Blinken said that at the same time, the US is pressing the World Health Organization to move forward with its phase two study to understand the origins.

Congressman Chabot said the COVID-19 pandemic has made it clear that the economic interdependence with the Chinese Communist Party (CCP) threatens American lives and prosperity.

The CCP is continuing to poison economic ties that were previously thought to be benign, he said.

"They're degrading Hong Kong's legal and financial system, contaminating supply chains with Uyghur forced labour and extracting technology from corporations as the cost of admission to China's market," Chabot said.

Tony Blinken alleged that since the beginning of this crisis, China has failed to meet its basic responsibilities in terms of sharing information, providing access and doing that in real-time with transparency.

"That was true at the start. It remains true, unfortunately, today," he said.

"What you're seeing is, through the work that's being done, for example, at the WHO, the work that we're doing, and the concerns expressed by countries around the world that there is a strong chorus insisting that China will make good on its responsibilities to provide the information," Tony Blinken said.

He exuded confidence that there is going to be an increasing international demand that countries, including China, meet their responsibilities when it comes to providing information, access, and transparency on global health, including Covid.

"There are just many in Congress who are skeptical of whether or not China is going to grant access to the labs, and we're trying to understand what the next up is going to be if and when China says that lab access won't be granted," Congressman Lee Zeldin asked.

Congresswoman Ann Wagner said that as the US continues to combat the Covid pandemic, it must be united in ensuring that the Peoples' Republic of China cannot use this time of uncertainty to further undermine global prosperity, stability, and the rule of law.

"We should have acknowledged that right from the onset of this devastating crisis. The Chinese Communist Party, or CCP, suppressed, they misrepresented and they falsified information necessary to prevent a pandemic," she said.

Holding the CCP accountable is the only way to deter the release of another deadly virus on the global community in the future and to ensure that the communist party stops violating international law and provide compensation to millions of Americans who suffered tragic unthinkable losses over the course of this pandemic, Ann Wagner said.

Ann Wagner had introduced the Compensation for Americans Act in the 116th Congress, which establishes a compensation fund for those affected and allows the president to freeze Chinese assets to bring the communist party to this negotiating table.

"It also gives the United States a comprehensive toolbox of punitive measures to further incentivise China's cooperation. I will again be introducing this legislation in the 117th Congress and I hope my colleagues will support my efforts to ensure that the United States leads the way in holding the CCP accountable," she said.

For Breaking News and Instant Updates

Allow Notifications

You have already subscribed

Story first published: Tuesday, June 8, 2021, 10:59 [IST]

Go here to see the original:
US NSA says will push China to be more transparent on COVID-19 - Oneindia

Zero Trust is the Only Way: President Bidens Executive Order Simplified – Security Boulevard

President Bidens May 12 Executive Order made into policy what the NSA and leading cyber experts have long been advocating. Zero trust is the fundamental cybersecurity principle for combatting sophisticated cyber attacks. The prevention, detection, assessment, and remediation of cyber incidents is a top priority and essential to national and economic security, President Biden says in his Executive Order. The Federal Government must lead by example. To do so, President Biden calls upon federal agencies and contractors to remove barriers to sharing threat information, deploy multi-factor authentication and encryption, and move towards Zero Trust security systems. On February 25, the NSA issued similar guidance, Embracing a Zero Trust Security Model.Communication and collaboration systems, including email, file sharing, and messaging systems, are a favorite target of attackers. Its easy to see why communications are where sensitive data lives and a successful attack on a communication system can give an attacker access to a trove of valuable information. As such, communication and collaboration systems are the logical first place to apply Zero Trust principles for improved cybersecurity.But what is Zero Trust and how is it different from legacy cybersecurity systems? In short, Zero Trust assumes that hacks are inevitable. It eliminates trust in perimeter defenses and ensures that data is secure if and when the network is breached.The NSA correctly identifies that the majority of cybersecurity defense strategies are based on perimeter defenses. The NSAs guidance states traditional perimeter-based network defenses with multiple layers of disjointed security technologies have proven themselves to be unable to meet cybersecurity needs The Zero Trust model eliminates trust in any one element, node, or service by assuming that a breach is inevitable or has already occurred. They go on to say that the NSA strongly recommends that a Zero Trust security model be considered for all critical networks and Defense Industrial Base critical networks and systems.Legacy cybersecurity systems try to prevent breaches by strengthening the perimeter around data. In effect legacy systems build taller and taller walls around networks through password protections and firewalls. The SolarWinds and Microsoft Exchange Server hacks that dominated their respective news cycles earlier this year only succeeded because of that treacherous logical fallacy. Taller walls do not mean a secure system.Modern hackers are sophisticated and inventive; it is only a matter of time before they outwit even the most robust defenses and breach the network perimeter. With perimeter defense based systems, once that breach occurs data is exposed. SolarWinds and Microsoft assumed that robust perimeter defenses will work, that administrators will be secure, and that passwords will protect accounts. This years attacks demonstrate that those assumptions are incongruous with the reality of todays cyberthreat landscape.Communication systems, particularly email and file sharing, are the most frequent target of hackers. Zero Trust communication and collaboration systems assume that breaches are inevitable. Despite best efforts, hackers will make their way into the network. Zero Trust systems ensure that, even when that inevitable breach occurs, data is protected. Access is limited within the network, so that a single point of failure cant bring down the whole organization. In line with their name, Zero Trust systems trust nothing and no one. Passwords arent trusted. IT administrators arent trusted. Anonymous communications arent trusted.Here are the five fundamental ways in which a modern Zero Trust system differs from a Legacy system.

Emails and files are stored on servers. Legacy systems assume that it is possible to protect servers and thereby protect data. Countless hacks have demonstrated that to be a faulty assumption.A Zero Trust system assumes that the server will be breached. It employs end-to-end encryption, meaning that data is never decrypted on the server. The server is unable to decrypt data, so when an attacker succeeds in compromising the server they see nothing but encrypted gibberish. Theyre unable to read emails, unlike in the case of Microsofts Exchange Servers, and theyre unable to access intelligible data, unlike in the case of the SolarWinds attack.This is where we come to a clear deficit in President Bidens Executive Order. The order reinforced the very dangerous and widely held misperception that encryption in transit and at rest is zero trust. That is not the case. Most legacy systems already encrypt data in transit and at rest. But what they dont do is ensure that the server doesnt have access to the keys used to decrypt the data when its in use. When an attacker breaches the server, they can find those decryption keys and access the data despite its encryption at rest. End-to-end encryption ensures that the server is unable to decrypt the data. Period. When an attacker breaches the server there is no way for them to decipher the gibberish of encrypted data that they find. They have compromised the server, but your data remains secure.

Legacy systems authenticate user identity using passwords. If a hacker can compromise a users password, they can virtually assume their identity and access that users data.Zero Trust systems understand that having guessable, stealable, breachable passwords is an invitation to hackers. Instead of using passwords to authenticate user identity, Zero Trust systems use private encryption keys stored on users devices. These keys are unguessable and tied to users physical devices, thwarting the possibility of a remote attack.

Legacy systems have all-powerful administrators who can independently carry out privileged actions, like accessing user accounts. Given their immense power, these IT administrators can serve as a single point of failure to bring down a whole network.Zero Trust systems understand that administrators are humans and humans are fallible. Administrators can be compromised or even go rogue. Zero Trust systems dont make their security dependent on the absence of human error. Instead, Zero Trust systems cryptographically distribute trust among a group of administrators.Similar to the strategy used to secure nuclear launch codes, cryptographic distribution of trust breaks up users access keys into fragments. Each admin gets a fragment and all the fragments together are required in order to carry out administrative activities. No single administrator can expose data or endanger the network.

Traditional email systems give attackers unlimited access to users. The attacker can flood the user with a barrage of phishing or spoofing attempts over an unbounded period of time and it only takes one user falling for one of those endless attempts to cause a breach.Zero Trust systems restrict communications to only pre-approved and authenticated communication partners, protecting against human error. A user cant fall for a phishing/spoofing attack if that communication is never able to reach them in the first place.The principle of restricting communication to only pre-approved people already exists everywhere from popular social media applications like LinkedIN and Facebook to secure communication applications like Whatsapp and Signal. For enterprises, PreVeil protects your teams communications from outside individuals. Making your team inaccessible to bad actors prevents data exfiltration more effectively than even the best corporate cyber hygiene policy.

Legacy systems are ineffective at exposing network infiltrators. As seen in the SolarWinds attack, hackers can enter a network and then cover up their tracks. This allows them to hide out as ghosts in a system, siphoning data over long periods of time before anyone even notices that the network is compromised.A good Zero Trust system employs tamper-proof logs to ensure that bad actors can be swiftly identified and cannot erase their tracks during an attack. All actions in the system must be logged automatically. Moreover, Zero Trust logs use cryptographic techniques similar to those used in blockchains to ensure that log entries are tamper-proof and cannot be deleted by anyone.These security principles arent theoretical constructs. Many Zero Trust principles, like end to end encryption and restricting access, are widespread in consumer systems like WhatsApp and Signal. These messaging systems are not designed for enterprises, however, so they dont have a concept of IT administrators or activity logs.PreVeil, an enterprise email and file sharing system, employs all five of the Zero Trust principles outlined above. Like consumer messaging systems WhatsApp and Signal, PreVeil is easy to deploy, intuitive to use, and inexpensive. PreVeil can be added to legacy communication systems, like Gsuite and Outlook365, without any changes to the existing IT system. The user experience is seamless for email and file sharing, with the simple addition of an encrypted inbox to existing accounts. Theres no new interface to learn, no new email address to update. Most importantly, in addition to bringing state of the art security, PreVeil helps organizations meet CMMC, NIST800-171, and ITAR compliance requirements for storing and sharing controlled unclassified information in email and files.In response to major breaches like those seen earlier this year with SolarWinds and Microsoft Exchange there is increased regulation for the defense and healthcare industries, as well as any industries handling financial and personal data. Organizations often respond to increased regulation by taking the steps required to become compliant without addressing the fundamental information security weaknesses that necessitated these new regulations. As the old adage goes, they miss the forest for the trees.This is a major moment in cybersecurity. The widespread accessibility of user-friendly, affordable Zero Trust systems like PreVeil makes achieving compliance and upgrading to true security easily achievable in one fell swoop. Ask us your questions on security or compliance our experts are ready to help.

The post Zero Trust is the Only Way: President Bidens Executive Order Simplified appeared first on PreVeil.

*** This is a Security Bloggers Network syndicated blog from Blog PreVeil authored by Orlee Berlove. Read the original post at: https://www.preveil.com/blog/zero-trust-is-the-only-way-president-bidens-executive-order-simplified/

More here:
Zero Trust is the Only Way: President Bidens Executive Order Simplified - Security Boulevard