Archive for the ‘NSA’ Category

Massachusetts NSA – Drama Free Dating in Massachusetts …

Seems like a dream come true for those who want no commitments whatsoever. Loveawake.com does not only provide contacts that are game for flings, but it is also free. This means that you do not have to provide your credit card number. So, the user is totally uncommitted, not even having to commit important financial information to our site. You may even think of Loveawake.com as a sort of dating social network in the most accurate sense. It is like Facebook for those whose aim is mainly to find someone from United States to hook up with. Loveawake also has features that allow Massachusetts users to get to know some of the other members before the hookup itself.

The match up that Loveawake offers is no-nonsense. Users browse for possible hookups by looking at profiles that resemble those of mainstream social networks'. You get to read about the person according to what the person chooses to share. So, some may actually look for something a little deeper than a few dates here and there. Still, the match-ups are not really based on anything scientific. But hey, even in real life it is like that. You first see someone and find that person attractive. Then, once you have gone on a few dates, you get to know each other better, if that is what you are looking for. For most of Loveawake's Massachusetts users though, the personality part may just be important to find someone they will have fun with. You can even pick someone who is the opposite of your personality, if that is your choice.

Here is the original post:
Massachusetts NSA - Drama Free Dating in Massachusetts ...

Uttar Pradesh: Cleared of NSA, catering staff cant be hired back – The Indian Express

HAVING spent more than three months in jail on charges under the National Security Act (NSA), Naushad cant believe his luck. The 24-year-old was released on May 14 after the Union Home Ministry recommended that the NSA against the Meerut youth be revoked.

Naushad had been arrested by the Meerut police on February 20 after the local chief of the Hindu Jagran Manch (HJM), Sachin Sirohi, lodged an FIR on the basis of a viral video apparently showing him spitting on dough while making rotis at a wedding in Meerut on February 16. The HJM accused Naushad of spreading coronavirus.

Back at his home, Naushad says, I have been working as a cook since I was 15 and I could never do such despicable thing. The case against me was fabricated and I was jailed for no fault of mine.

While the video and subsequently the arrest had made much news, Naushads release was a quiet affair, with news that he was back home emerging nearly a month after he was let out.

The HJM had traced down Naushad following the video, and beaten him up badly before he was arrested. When the 24-year-old was produced before a magistrate on February 21, he was thrashed again, this time by lawyers. He was booked under the NSA on March 4.

On Saturday, Sirohi told The Sunday Express, The video came at a time when the coronavirus was at its peak in the second wave as a large number of people were dying (Meerut, in fact, saw cases go down to almost none in February, with a fresh rise starting towards mid-March). His act (of spitting) infuriated us and I could not restrain HJM workers from thrashing Naushad.

Confirming that the NSA charges against Naushad had been dropped, Meerut DM K Balaji said: A man facing NSA charges can send a representation pleading innocence to three places the advisory board, the state government and Centre. In Naushads case, the advisory board and the state rejected his plea but the Centre decided in his favour and ordered his release.

Union Home Ministry sources confirmed the same.

B D Pandey, Superintendent, Chaudhary Charan Singh Karagaar (prison) in Meerut, said, Naushad was brought to the jail on March 1.He was released after the NSA was revoked and we received an order of his release from the District Magistrate.

Meerut SSP Ajay Sahni claimed they had invoked the NSA to maintain peace in the town.

We got inputs from local intelligence unit that Naushads early release could cause a law and order problem in Meerut, which was home to a record number of deaths and corona cases during the second wave in March.

Imtiyaz Alam, the owner of the catering outlet for which Naushad worked before he was arrested, said what happened was very unfortunate.

Naushad is a good worker, but we cannot hire him for the time being because of the controversy involving him, he told The Sunday Express.

Read the rest here:
Uttar Pradesh: Cleared of NSA, catering staff cant be hired back - The Indian Express

Iris ID to showcase contactless iris-based biometric systems at the National Sheriffs’ Association’s NSA 2021 Annual Conference and Exhibition -…

Iris ID, the globally renowned company in iris recognition technology for over 20 years, will showcase its top products for law enforcement agencies at the National Sheriffs Association's (NSA) annual conference and exhibition NSA 2021 Annual Conference and Exhibition, slated to take place from June 22-24, 2021, at the Phoenix Convention Center. Iris ID will occupy booth #114 at the exhibition.

The annual conference is an opportunity for the members of the nation's more than 3,000 sheriff's departments to learn and share information related to all parts of their mission, including law enforcement, jail operations, prisoner transport and courthouse security.

Tim Meyerhoff, Director, North America, Iris ID, said biometric technology plays an increasingly important role in helping sheriff's deputies complete their jobs daily. Tim said, Rapid and accurate identification of people is a major law enforcement need.

Tim adds, There is no room for error when it comes to booking and release of those charged with crimes. And our contactless iris-based biometric systems, the most accurate on the market, are ideal as departments continue battling the COVID-19 virus.

Among its many products, Iris ID will highlight three widely used by law enforcement organisations.

iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field

The iCAM M300 is a lightweight, handheld device used by law enforcement to enroll and identify people in the field. The iCAM M300 offers access to the three primary modes of biometric identification iris, facial and fingerprint with communication protocols including NFC, Wi-Fi, Bluetooth, GPS, 4G LTE and more. The iCAM 300 also provides magstripe and contactless card support and offers an MRZ reader to verify ePassports.

Iris ID iCAM R100 readers replace the need for PINs, access control cards and RFID fobs to enter integrated smart lockers and key management cabinets protecting keys, weapons, evidence and other valuable assets stored by sheriff's departments.

Law enforcement agencies across the U.S., including the Los Angeles County Sheriff's Department, the York County (Penn.) Sheriff's Office and the U.S. Border Patrol use Iris ID biometric technology.

Iris ID iCAM 7S series product is currently included in the Los Angeles sheriff booking stations. It is used to add iris-based identity authentication capabilities, resulting in more accurate release of individuals as a persons iris is much less susceptible to damage than their fingerprints.

Read more:
Iris ID to showcase contactless iris-based biometric systems at the National Sheriffs' Association's NSA 2021 Annual Conference and Exhibition -...

Why did Denmark help the US spy on its European allies? – The Conversation UK

Systematic wiretapping of close allies is unacceptable, came a recent comment from Danish Defence Minister Trine Bramsen. And yet, it appears this is exactly what Denmark has been doing. Bramsen was responding to reporting that revealed the Danish Defence Intelligence Service (Forsvarets Efterretningstjeneste, or FE) had cooperated with the US National Security Agency (NSA) to enable spying on several European partners and close allies.

Considering the major reputational costs that would surely have been evident from the outset, why did Denmark agree to this partnership? Why would it allow the NSA to use Danish data cables to spy on senior officials in France, Germany, Norway and Sweden, including German chancellor Angela Merkel?

For a Danish audience this scandal is part of a longer story. In 2019, the independent board overseeing Danish intelligence services (Tilsynet med Efterretningtjenesterne, created in 2014 after the Edward Snowden leaks) received information about the FE collaborating with the NSA. The board produced a report in August 2020 criticising the intelligence service for serious wrongdoings.

Still little is known of the boards strictly confidential four-volume report, which was submitted to Bramsen, but its press statement publicly criticised the FE for initiating operational activities in violation of Danish law, including byobtaining and passing on a significant amount of information about Danish citizens.

As a result of the report, five top intelligence officials were removed from office. A few months later, media reports revealed that the collaboration had enabled the NSA not only to spy on neighbouring countries officials, but also Danish ministries and defence companies.

The exact nature of the retrieved information and how it was used is unclear but the fact that any information of this kind was gathered at all is in complete contrast to the FEs purpose to prevent and counter threats to Denmark and Danish interests.

The most recent media reporting suggests in more detail that the FE had collaborated with the NSA to allow the US to spy on neighbouring countries though Danish internet cables between 2012 and 2014. It was revealed that the NSA was purposefully targeting high-ranking European officials, using their phone numbers as selectors to identify data of interest.

Denmarks geographical location makes the country attractive for the NSA, not least because it hosts several key underwater cables for neighbouring countries. These cables can be used to get information about not only internet access, chats and messaging services, but also text messages and phone calls.

When considering why Denmark would allow itself to become a conduit for espionage against its allies, its worth remembering that, as a small country, it is dependent on security guarantees from other states. Denmark has aligned itself closely with the US the worlds largest military superpower not just through NATO, but also bilaterally. For Denmark, the cooperation with the US and the NSA is crucial, both in terms of technology and access to intelligence.

The FE is highly dependent on the NSA to combat terrorism. Through the NSA, it gains access to advanced technology such as the program Xkeyscore, used to search through and filter the raw data from the cables. It also seems that the FE had access to information about planned terror attacks via the NSA.

Even though progress has been made on the European side in regard to increasing cooperation on security and defence matters, Nato and particularly the US continue to be Denmarks most important security guarantor.

Since the 1990s, but particularly since 9/11, Danish foreign policy has been described as super-atlanticist prioritising building common values and interests with the US. This strong and seemingly unwavering support for the American world order means Denmark is willing to pursue costly and risky policies to support the superpower.

Additionally, Denmark remains to a large extent outside European Union security and defence cooperation because of its defence opt-out. Negotiated after the Danish population rejected the Maastricht Treaty in a referendum in 1992, the defence opt-out prevents the country from participating in those parts of the EUs foreign and security policy that affect defence and any military cooperation at EU level.

This puts the relationship to the US (and Nato) at the forefront of Danish security and defence decision-making. Nor does the EU (yet) have the strength to defend itself against Russia and China should the need arise, which in part explains the draw of the US partnership.

The French government described the allegations against Denmark as extremely serious, with President Emmanuel Macron pointing out that this is not acceptable between allies, and even less between allies and European partners.

Merkel agrees, but has struck a more conciliatory tone, seeing a good basis not only for the resolution of the matter, but also to really come to trusted relations. However, Peer Steinbrck, former German opposition leader and candidate for chancellor, called it a political scandal.

Even closer to home, Norwegian Prime Minister Erna Solberg said it is unacceptable if countries which have close allied cooperation feel the need to spy on one another. Peter Hultqvist, Swedens defence minister, has demanded full information.

Much of these events date back to the time of the Snowden years, when it was revealed that even Germanys foreign intelligence agency cooperated with the NSA to spy on its neighbours. It thus remains to be seen how much damage will really be done to Denmarks relations with the rest of Europe. A government-commissioned investigation is due to report back later in 2021.

However, it may be that this scandal might provide an opportunity for Denmark to take an honest look at its security and defence priorities and its relations with European allies. A recent poll shows that 66% of Danes believe that Europe cannot always rely on the US and needs to look after its own defence capabilities. This puts Denmarks super-atlanticist orientation into question and suggests its most important strategic partners may lie closer to home.

Read more:
Why did Denmark help the US spy on its European allies? - The Conversation UK

Ushering in a Transparent Revolution in Cybersecurity – The Cipher Brief

Thomas Warrick was DHS Deputy Assistant for Counterterrorism Policy from August 2008 to June 2019 and is now Director of the Future of DHS Project at the Atlantic Council.

Javed Ali held senior counterterrorism positions at DHS, the FBI, the Office of the Director of National Intelligence, and the National Security Council. He is a Towsley Policymaker in Residence at the University of Michigan.

OPINION Eyebrows were raised when the Biden administration initially chose veterans of the usually secretive National Security Agency (NSA) for all four top cybersecurity positions in the most diverse administration in U.S. history.

The two leaders who face confirmation hearings on ThursdayChris Inglis as National Cyber Director and Jen Easterly as director of the Department of Homeland Securitys Cybersecurity and Infrastructure Security Agency (CISA)deserve confirmation by the Senate. They, along with NSA senior executive Anne Neuberger, the Deputy National Security Adviser for cybersecurity, and Amit Mital, who in April replaced NSAs Michael Sulmeyer as senior director for cybersecurity, could be the right people to help lead what needs to be a transparent revolution in cybersecurity.

Given NSAs reputation for secrecy, this might seem odd. In fact, what these NSA veterans share, apart from strong individual qualities, is their knowledge that what is needed now in civilian cybersecurity is significantly increased transparency and an emphasis on enhanced information-sharing. As national security practitioners, they knowas do we (between the two of us we have more than fifty years experience) that while secrecy has its place, especially in protecting sources and methods, it also has its limits. And given the need in cybersecurity for information-sharing, speed, and strong collaboration between the public and private sectorsa critical feature that sets cybersecurity apart from other aspects of national securitydefaulting to a secretive and insular approach would be a mistake.

The first reason to expect a revolution in transparency is that strong cybersecurity requires a robust partnership between the government and the many technology stakeholders who own information technology infrastructure, platforms, and services that adversaries target.

Almost all the cyber infrastructure in the United States is outside the hands of the federal government, in the hands of private industry, state and local governments, academia, and other non-federal sectors. Conversely, much of the information about cyber threats or adversaries intentions and capabilities is in the hands of the federal intelligence and law enforcement communities. As both the Cyberspace Solarium Commission and the Future of DHS Project concluded, cyber operators in this non-federal space need high-fidelity, often classified intelligence to first identify threats to their networks and then to justify actions to their C-Suite executives to defend them. Increasing the speed of sharing is now vital. Recent attackslike those against Colonial Pipeline and JBS Foodsshow that government and private operators need to exchange information, including attribution, in real-time and at network speeds. Hostile nation-states and criminals will hold U.S. national security and prosperity at risk unless the federal government and private sector open up to each other.

Second, the federal cybersecurity enterprise needs the trust of the American people.

For the private sector and government to work together at network speeds, it is essential there be trust, communication, and a shared understanding of desired outcomes. This is one reason security veterans know that NSA is not the right agency to lead civilian cybersecurity. NSA is trusted within the government, but for historical reasons, not so much outside it. This is why the role of DHSs CISA is so important, and why confirming Jen Easterlywhose career spans both cyber and non-cyber threats, and both the government and private sectorsis critical.

Third, to keep the peoples trust, civilian cybersecurity effortsand the information that private citizens provide the government to help secure our networksmust never be used for partisan political purposes.

Like the military and the intelligence communitiesfrom which NSA comesthe federal cybersecurity enterprise needs to be, to the greatest extent possible, nonpartisan and above politics. The same needs to be said about election security, another CISA responsibility.

The fourth aspect of the coming transparency revolution is that the federal cybersecurity enterprise needs to adopturgentlya consumer-focused side that the American people can trust and rely on for impartial advice on personal cybersecurity.

Its good the federal cybersecurity enterprise works with corporations that provide our networks, social media platforms, and major software products. Increasingly, though, the American people need authoritative, understandable cybersecurity information.

In cybersecurity, every American is now on the front linestargetable by hostile nation-states, confidence tricksters, criminals intent on stealing money, and those wanting to sow hatred and division. This reality totally upends previous concepts of national security and political economy. In a bring your own device world, your iPhone or Android phone can be exploited to target you and your workplace, school, or neighbors. You need to know which apps transmit personal data overseas to servers under the effective control of the Chinese Communist Party, or how to instantly recognize the telltale signs of Russian or Iranian disinformation. Your social media feed can be manipulated in non-transparent ways to change how you vote, shop, or even think. Government cybersecurity needs to communicate effectively with individual Americans protect themselves from cyber threats without turning us into a nanny state.

Fifth, and most importantly, cybersecurity needs to be re-scaled by government, by non-federal stakeholders, and by everyday Americans.

The finest cybersecurity policies in the world are useless if theyre not adequately resourced. No matter what you may think of NSA, it is one of governments most successful examples of having learned the importance of scale.

The Cyberspace Solarium Commission said Congress must invest significant resources in CISA and the private sector needs to increase cybersecurity spending. Top cybersecurity experts Richard Clarke and Rob Knake found that successful companies spent 8% of their IT budgets on cyber defense. Today, most dont. CISAs current budget, enacted during the Trump administration, is $2billion, plus $650million added in President Bidens Covid-19 relief bill. In March, House Homeland Security ranking Republican John Katko called for CISA to become a $5billion agency. He is in the right ballpark.

The Russian Sunburst hack into SolarWinds in 2020 and recent ransomware attacks from Russian-based criminal groups show what capable, well-resourced adversaries can do against systems that are vulnerable to cyber exploitation. We should be deeply concerned about adversaries exploiting gaps and seams in the ability of overseas-focused agencies like NSA to collect cyber intelligence inside the United States. Just because there hasnt been a cyber Pearl Harbor or a cyber 9/11 doesnt mean that one is impossible. It means only that weve been luckyso far. Cybersecurity today takes serious resources, trust, and transparency. Swift Senate confirmation of Inglis and Easterly is essential to help bring this revolution about.

Read more expert-driven national security perspectives, insight and analysis in The Cipher Brief

Visit link:
Ushering in a Transparent Revolution in Cybersecurity - The Cipher Brief