Archive for the ‘NSA’ Category

Netball back on court with Cape tourney – SowetanLIVE

The Spar Challenge in Cape Town next month will mark the first major netball event in the country after Netball SA (NSA) announced resumption of its activities yesterday.

NSA had suspended its programme at the height of the ongoing Covid-19 pandemic's second wave.

With SA set to host Africa's first International Netball Federation World Cup in Cape Town in 2023, the SA senior netball team needs every opportunity it can get to prepare for the world championships on home soil.

In the Spar Challenge, the Proteas will compete against Uganda, as well as against Proteas Under-21 and SA President invitational squad on March 24-30. The tournament will be played in a bio-bubble. An invitation has also been extended to Namibia and NSA is hoping for a positive response from the neighbouring nation.

Last year NSA hosted three successful bio-bubble events in Free State, North West and Limpopo and NSA president Cecilia Molokwane is confident even the next one will go through smoothly.

"The decision to resume playing was not an easy one. We are still in a pandemic and have to be careful about how we conduct our business. We have put measures in place to protect the lives of everyone involved," Molokwane said yesterday.

She emphasised the need to keep the Proteas busy and sharp as 2023 approaches.

The participating teams in the Challenge will assemble in the Mother City for pre-training on March 19-23.

The City of Cape Town's mayoral committee member, JP Smith, said the city would create a safe environment for the players, coaches and officials.

"As the home of netball for the next three years up to the 2023 World Cup, it is an opportunity to prepare the city for the world championships in a safe environment. No one knows what the future holds," Smith said.

The rest is here:
Netball back on court with Cape tourney - SowetanLIVE

Brutal assault in Kasganj: Cop mercilessly thrashed to death by liquor mafia, CM Yogi orders slapping of NSA – Times Now

The accused were members of the local liquor mafia (Representative Image).  |  Photo Credit: iStock Images

Kasganj: In an incident that has exposed the lawlessness in the state of Uttar Pradesh, a police officer was allegedly beaten to death by members of the liquor mafia. The accused did not stop here, they also thrashed a sub-inspector.

The incident took place when a police team led by Sub-inspector Ashok went to the Nagla Dhimar village which falls under the Sidhpura police station area of Kasganj.

The team went to the spot to serve a notice for attachment of property when they were allegedly attacked by a group of persons. The accused were members of the local liquor mafia.

A constable, identified as Devendra was allegedly beaten to death by the accused while the SI sustained injuries. After the incident, a team led by ASP Aditya Prakash Verma started conducting raids to nab the accused. Police reinforcements from nearby districts were also called to Kasganj.

After the incident, Chief Minister of Uttar Pradesh Yogi Adityanath ordered slapping the National Security Act (NSA) against the accused.

Continue reading here:
Brutal assault in Kasganj: Cop mercilessly thrashed to death by liquor mafia, CM Yogi orders slapping of NSA - Times Now

Netball also returns to action – Rekord East

After Netball South Africa (NSA) announced early in January that all planned netball activities had been suspended until further notice, there was good news last week for lovers of this popular sport.

NSA said in a statement that their Executive Committee have been reviewing the situation in the country after constant consultation with the relevant government departments.

Following the announcement by President Ramaphosa that the lockdown level three restrictions have been reviewed and relaxed, the Netball authorities have decided that netball activities should resume effective from Monday 08th February.

The decision to resume netball activities was not an easy one, because we are still amid a pandemic and we needed to be very careful on how we will do things going forward. This was a balancing act, because key to our list of priorities is ensuring that we preserve the lives of all our stakeholders whilst we play the sport we love. As the Executive together with our Events and Compliance teams, we have put measures in place that will enable us to make sure that we protect the lives of everyone, said Cecilia Molokwane, Netball South Africa President.

The first event that will take place is the SPAR Challenge, which was supposed to happen at the beginning of the year. The participating teams will be the SPAR Proteas, the SA Presidents XII, the SPAR Baby Proteas (under 21) and Ugandas national team, while Namibia yet to confirm participation.

The SPAR Challenge will take place under strict health and safety regulations. The tournament will happen in a biologically safe environment in Cape Town from the 24th to 31st of March 2021, after the teams gathered for a pre-training camp between the 19th and 23rd of March 2021.

Cape Town will be the home of Netball for the next three years leading up to the 2023 Netball World Cup.

NSA also encouraged local teams that would like to resume training and host coaching clinics to submit their risk mitigation plan to NSAs offices for approval. This is done to ensure that everyone adheres to the rules and regulations.

The SPAR Proteas team and SA Presidents XII team were announced in December 2020. Dr Elsje Jordaan, head coach of the SPAR Baby Proteas, will announce her final team before the SPAR Challenge. She will use this series to get some game time for her players and get combinations right ahead of the under 21 Netball World Youth Cup in Fiji at the end of the year.

Do you have more information about the story?

Please send us an email to[emailprotected]or phone us on 083625 4114.

For free breaking and community news, visit Rekords websites:Rekord East

For more news and interesting articles, like Rekord onFacebook,follow us onTwitterorInstagram

Continue reading here:
Netball also returns to action - Rekord East

Former NSA official explains how the agency ran offensive operations – Business Insider

Philip Quade has simple advice for cybersecurity teams across the world: Move fast to avoid breaking things.

Quade, former special assistant for cyber to the director of the National Security Agency, believes most security teams undervalue speed as part of their day-to-day operations and could benefit by adopting the NSA's "pedal to the metal" approach.

Now the chief information security officer at the security firm Fortinet, Quade is aiming to impart his strategy on private sector players. He discussed the guiding principals behind his approach as well as common cybersecurity pitfalls during an online panel hosted by AT&T cybersecurity director Theresa Lanowitz on Wednesday.

"NSA put the pedal to the metal, meaning it did things strategically," Quade told Lanowitz. "It was all fundamentally built around the philosophy of doing things very, very quickly."

Quade's three decades of experience at NSA gives him a unique perspective: As the agency's top-ranking cybersecurity official during the Obama administration, Quade oversaw both defensive and offensive operations, gaining insight into both sides of cyberwarfare.

The NSA's adherence to moving quickly powered its intelligence-gathering operations during those years, Quade said. Most people became familiar with the details of those operations in 2013 when Edward Snowden, an NSA subcontractor, leaked documents showing that the agency was collecting millions of Americans' mobile phone call records in search of terrorists. A subsequent federal law discontinued the practice.

"Everything that NSA did was completely authorized by the President, the courts and the Congress ... and ultimately when some of those things became more widely known, it scared the public a little bit and in the courts and Congress and the White House kind of recalibrated to be consistent with public interests," Quade said Wednesday. "But one of the fundamental strategies of NSA was being able to do things at speed and scale."

Three problems have proven particularly hard to solve for most cybersecurity teams: authenticating people's identities online, training their organizations' staff on cybersecurity basics, and patching vulnerabilities. Prioritizing speed in all three areas can be a useful framework for improving defenses, Quade said.

"If we could have solved what has solved the authentication problem from the beginning, we wouldn't be in business today. And what I mean is that lack of trustworthy authentication is the root cause of nearly all cybersecurity problems," Quade said.

Fortinet CISO and former special assistant for cyber to the director of the NSA Phil Quade Fortinet

One way to build speedier authentication defenses is to protect against "known unknowns" by adopting tools that detect unusual behavior on their networks like an employee attempting to log in at an unusual time or unfamiliar location and automatically shutting down the attempt.

Quade added that organizations should update software as often as possible to throw off attackers, noting that software patches posed an obstacle to the NSA's offensive operations when he worked there.

"As a person who was authorized by our overseers to do offensive operations against others, it was relatively easy to find vulnerabilities and develop exploits," he said. "But what made it really, really hard was when the systems were patched or when the systems changed."

Quade and Lanowitz both predict that security teams will increasingly adopt a "zero trust" model that assumes any device or account on its networks could be compromised at any times and builds in security checks accordingly. Fortinet announced a new suite of zero trust capabilities for its cybersecurity software on Thursday.

"Your network would be perfect if it wasn't for these carbon-based lifeforms that have to live on top of it," Lanowitz said.

Companies are more likely to need to prioritize zero trust in their security systems now in the wake of the COVID-19 pandemic, Lanowitz added. Employees are working from their home networks, which often lack the protections of corporate systems.

Read this article:
Former NSA official explains how the agency ran offensive operations - Business Insider

Time to End the Dual Hat? – Council on Foreign Relations

Erica D. Borghard is a senior fellow with the New American Engagement Center at the Scowcroft Center for Strategy and Security at the Atlantic Council.

The extraordinary scope and scale of the SolarWinds breach, in which presumptive Russian threat actors gained access to dozens of federal government networks, have reinvigorated outstanding questions about the continued viability of the dual-hat authority structure that governs the National Security Agency (NSA) and U.S. Cyber Command. In the midst of revelations about the SolarWinds breach, it was rumored that the Trump administration would push through an end to one individual sitting at the top of the NSA and Cyber Command in the waning days of the administration. This hasty proposal garnered significant resistance, especially in Congress, and the four legislative commissioners on the U.S. Cyberspace Solarium Commission issued a statement strongly opposing the dual hat split. Yet, this is unlikely to be the end of the debate, and some have argued that, among other things, the NSAs support to Cyber Commands operational requirements could haveinadvertently contributed to the intelligence failure of not anticipating or uncovering the SolarWinds incident. However, calls for the immediate separation of the dual hat are premature. The Biden administration should take a deliberate approach that weighs a number of important equities and concerns.

More on:

Cybersecurity

National Security Agency (NSA)

U.S. Department of Defense

When Cyber Command was created in 2009 under U.S. Strategic Command, it was vested with a leadership structure in which the same individuala four-star flag or general officerwould simultaneously serve as the director of the NSA with Title 50 authorities [PDF] and commander of Cyber Command with Title 10 authorities. The decision was likely made for a number of reasons. Cyber Command was a new organization with few resources, including personnel, access, and tools, and NSA could help it develop. There is also a high potential of overlap between military and intelligence operations in cyberspace and a dual-hatted leader could deconflict and reconcile competing prerogatives and interests across NSA and Cyber Command.

Net Politics

CFR experts investigate the impact of information and communication technologies on security, privacy, and international affairs.2-4 times weekly.

How long the dual hat would last was always uncertain. For instance, in 2016 there were reports that the Director of National Intelligence and Secretary of Defense at the time were recommending its separation. However, in the 2017 National Defense Authorization Act (NDAA), Congress established in law specific conditions to be metto which the Chairman of the Joint Chiefs of Staff and Secretary of Defense would have to certifythat would enable the dual hats separation to proceed. The question of separation remerged in 2018 after Cyber Command was elevated to a unified combatant command and the Cyber Mission Force achieved full operational capability. However, in the 2020 NDAA Congress amended the existing requirements to raise the bar for its split. Of note, Congress added an additional requirement beyond Cyber Command achieving full operational capabilitywhich at that point had already occurredto include having a demonstrable capability to carry out all of the Defense Departments missions in cyberspace. Congress also strengthened the requirement for Cyber Command to be able to develop its own accesses and capabilities. At this point, there has been no certification to Congress that the conditions specified in law have been met.

Separating NSA and Cyber Command is more of a question of when than if. Since its establishment, Cyber Command had considerably developed in terms of organization, personnel, capabilities, and operational experience. At the same time, with the introduction of the defend forward [PDF] concept, in which cyber forces maneuver outside of U.S.-controlled cyberspace, the scope of its mission has expandedas have the demands placed on the NSA for tactical intelligence support to Cyber Commands operations. Given this, the responsibility for both an operational combatant command with a growing mission set, as well as an intelligence agency with critical cryptological and signals intelligence missions, could be optimally performed by two distinct individuals rather than one.

That said, the Biden administration will have significant discretion to shape the timing and sequencing of what is likely an inevitable split of the dual hat. While the law does stipulate six conditions that would need to be met to precipitate the dual hats separation, Congress did not provide much guidance in terms of metrics corresponding to those conditions. In other words, the type of evidence that would confirm or deny Cyber Commands operational maturity remains underspecified, giving considerable latitude to the executive branch to shape the timing and conditions under which certification would occur.

In evaluating these issues, the Biden administration should take into account three considerations. First, given the implications of the SolarWinds breach, it should immediately conduct a comprehensive review of the SolarWinds intelligence failure, to include assessing the extent to which competing Cyber Command and NSA equities over the prioritization of military versus intelligence missions could have played a role. Second, it should develop measures of effectiveness for Cyber Command that go beyond existing readiness metrics to inform decision-making around the timing of the split. Finally, pursuant to the 1986 Goldwater-Nichols Act, the NSA is designated as a combat support agency to provide intelligence support to military operations. In the context of dual-hatted authorities, this function is inherently integrated into the NSA-Cyber Command structure. Therefore, in assessing the conditions under which to separate the dual hat, the Biden administration should conduct a review of how NSA would function in its combat support agency role when split from Cyber Command and provide recommendations to preserve the continuity and institutionalization of that role.

More on:

Cybersecurity

National Security Agency (NSA)

U.S. Department of Defense

Digital and Cyberspace Update

Digital and Cyberspace Policy program updates on cybersecurity, digital trade, internet governance, and online privacy.Bimonthly.

Taken together, this suggests that, while there are compelling reasons consider splitting the dual hat, the road ahead should be slow and methodical.

See original here:
Time to End the Dual Hat? - Council on Foreign Relations