NSA Gives Thumbs Up to Microsoft Surface Tablets – Fortune

An employee uses a Microsoft Corp. Surface tablet computer at the company's Office and Experience Center during a media event for the opening of the workspace in Hong Kong, China, on Friday, March 4, 2016. Bill H.C. KwokBloomberg via Getty Images

National Security Agency workers can now safely use Microsoft Surface tablets devices for data mining, intelligence gathering, or more humdrum work like checking email.

Microsofts ( msft ) Surface tablets and the tech giant's Windows 10 operating system are now officially part of the NSAs list of approved technologies that its employees can use when dealing with classified information.

It should be noted that as of now, the only Windows 10 devices that the NSA deems safe to use for its workers are the Surface tablets. The NSA has not yet approved other any other Windows 10-powered personal computers built by third-party vendors like HP Inc. ( hpq ) or Dell Technologies to its list of sanctioned devices .

Get Data Sheet , Fortunes technology newsletter.

The NSA, through its Commercial Solutions for Classified Program , routinely evaluates various corporate technologies to see if they meet the agencys tough guidelines for cyber security. Companies that want to be added to the NSAs list of approved technologies must show that they built their products to comply with various government cyber security standards and sign an agreement requiring them to fix vulnerabilities in a timely fashion, according to the NSA.

The CSfC program listing demonstrates Windows 10, as well as Surface devices (the only Windows 10 devices currently on the list), when used in a layered solution, can meet the highest security requirements for use in classified environments, wrote Rob Lefferts, a Microsoft director of program management for Windows Enterprise and Security, in a corporate blog .

For more about Microsoft, watch:

Besides Windows 10 or Surface tablets, several other Microsoft products are part of the NSAs approved list of technologies, including its Server 2016 software, the BitLocker encryption service, and older versions of Windows.

More here:

NSA Gives Thumbs Up to Microsoft Surface Tablets - Fortune

Posted in NSA

Former NSA chief: Trump is "the president our nation needs" on cybersecurity – ZDNet

Retired Gen. Keith Alexander, former director of the National Security Agency (NSA) said he was left "really impressed" with President Donald Trump after the recent closed-door White House meeting on cybersecurity.

"What I saw was a president who was now very focused and asked each person questions, listened to them, weighed what they said and how they said it... took in advice, commented back," Alexander said at the RSA Conference in San Francisco. "That's the president our nation needs -- somebody who is looking how to solve cybersecurity issues... He understood they're important, that we've got to fix government, got to get government and industry to work together."

Alexander was at the helm of the NSA when former government contractor Edward Snowden leaked information about the NSA's sweeping surveillance programs. He stepped down from the post in 2014 and now serves as CEO of the company he founded, IronNet Cybersecurity.

The White House cybersecurity meeting took place on January 31, the same day Trump was expected to sign a cybersecurity executive order. The EO signing, however, was unexpectedly canceled without explanation. Several current and former government officials with a range of viewpoints on cybersecurity were present at the meeting, including former New York City Mayor Rudy Giuliani, former Sen. Dan Coats, Trump's now-embattled national security adviser Gen. Mike Flynn and counterterrorism and homeland security adviser Tom Bossert.

Alexander told ZDNet that different points of view were expressed during the meeting, but it was "not confrontational at all."

In his remarks on stage, Alexander outlined some of the potential changes he'd like to see in federal cybersecurity policies. All agencies regardless of size should get sufficient resources to protect their digital assets, he said, pointing to the vulnerability of agencies like the Office of Management and Budget.

A review of all federal agencies, he said, suggests "we left them on their own to defend themselves as if they were individual people out there .. but they're not."

"Reading the Constitution, it says 'for the common defense,'" he continued. "It doesn't say for the defense of only those that are really big and critical -- for the rest of you, good luck."

Read more:

Former NSA chief: Trump is "the president our nation needs" on cybersecurity - ZDNet

Posted in NSA

Beverly Ann Beall, NSA worker and travel agent, dies – Baltimore Sun

Beverly Ann Beall, a retired National Security Agency briefer and world traveler, died of cancer Jan. 14 at her Stuart, Fla., home. She was 78 and lived in Stevenson.

Born in Baltimore, she was the daughter of Mabel Councilman, a homemaker, and her husband, Avery Gordy.

She was a graduate of Southern High School and attended college courses through the federal government at the NSA.

She joined the NSA out of high school and worked there until her retirement. She then became a travel agent and worked in several agencies in the Baltimore area.

Mrs. Beall, who was known as Bebe to her family, was a member of Green Spring Valley Hunt Club, where she enjoyed golf and games of bridge. She traveled the world on cruises and hiked in jungles of Cambodia and Vietnam. She belonged to the Town and Country Garden Club and had an interest in orchids.

She took trips to Maryland and Delaware beaches, and enjoyed fishing and searching for sea glass. She also did needlepoint and played pinochle with family members, and enjoyed walking along the boardwalks.

"She was as beautiful on the inside as she was on the outside," said her niece, Carol Hearrell of Farmington Hills, Mich.

Mrs. Beall survived two husbands. Wade Allen Poole died in the early 1970s. Her second husband, Richard Olin Beall, died in 2013 after they had been married for 30 years. Mr. Beall was the son of Sen. J. Glenn Beall Sr.

Mrs. Beall had requested that no funeral be held.

In addition to her niece, she is survived by a daughter, Laura Poole Mathiesen of Annapolis; two stepdaughters, Margot Beall King of San Francisco and Charlotte Ashley Beall of Seattle; a companion, Allen Durling of Annapolis; four grandchildren; and other nieces and nephews.

Jacques Kelly

See the original post here:

Beverly Ann Beall, NSA worker and travel agent, dies - Baltimore Sun

Posted in NSA

Former NSA contractor indicted in stolen data case – CNN

Harold Thomas Martin III, 52, faces 20 counts of willful retention of national defense information.

The indictment alleges Martin removed classified documents from 1996 to 2016. He is accused of keeping documents in his home or car.

The documents include highly classified materials from the National Security Agency, the US Cyber Command, the CIA and the National Reconnaissance Office. Among the documents are ones that reveal US military gaps, capabilities and operations, as well as ones that contained foreign intelligence collection methods, targeting information and technical user materials.

Martin's attorney had no comment when contacted by CNN.

FBI investigators haven't concluded what Martin's motivation was for stealing the documents. At a hearing in late October a public defender representing Martin said his client was a hoarder who was "completely out of control."

Before his arrest in August, Martin worked as a contractor to the National Security Agency through consulting firm Booz Allen Hamilton, which fired him after he was charged. He has a long history working with sensitive government intelligence, and served in the US Navy and Naval Reserves for more than 10 years, reaching the rank of lieutenant.

The information he had digitally in his car, the feds said, was equivalent to approximately 50,000 gigabytes, enough to store 500 million documents containing images and text.

The government said Martin had a document "regarding specific operational plans against a known enemy of the United States and its allies." That document was not only classified but marked need-to-know only, and Martin should not have been privy to that information, prosecutors said in court filings.

Also found were files containing personal information of government employees, and an email chain with "highly sensitive information" on the back of which were handwritten notes "describing the NSA's classified computer infrastructure and detailed descriptions of classified technical operations."

Among the documents the FBI believes Martin stole were some detailing a hacking tool that the NSA developed to break into computer systems in other countries, law enforcement sources said when he was arrested. Documents detailing the tools were posted on the Internet in recent months, though no connection to Martin has been offered.

Martin's attorneys have argued previously in court that he is not a flight risk because he does not have his passport and has a wife and home in Maryland. They noted his military service.

Martin will make his next appearance in court on February 14.

CNN's Steve Almasy contributed to this report.

See more here:

Former NSA contractor indicted in stolen data case - CNN

Posted in NSA

NSA Withholding Intelligence From ‘Untrustworthy’ Trump Administration, Former Analyst Claims – Haaretz

John Schindler claims NSA fears Trump administration cannot be trusted with sensitive information. 'Since January 20, we've assumed that the Kremlin has ears inside the SITROOM,' he cites Pentagon official as saying.

The National Security Agency has been withholding information from the White House, fearing that President Donald Trump and his staff cannot be trusted not to leak sensitive information, a former NSA analyst claims.

In a column written by John R. Schindler for The Observer, the security expert and former professor at the U.S. Naval War College claims that the NSA has stopped its decades-old practice of preparing special reports for U.S. presidents since Trump took office.

Schindler added that the NSA's concerns were shared across the American intelligence community, and it appears that other agencies are withholding intelligence from the White House as well.

According to Schindler, the intelligence community's fears were prompted by the ties of senior members of the Trump administration to the Kremlin, as well as "nagging questions about basic competence regarding Team Trump."

"Since January 20, weve assumed that the Kremlin has ears inside the SITROOM," Schindler cites a senior Pentagon official as saying, meaning the White House Situation Room where the president is briefed on intelligence matters.

Schindler's claims echo a January report on Yedioth Ahronoth by Israeli journalist Ronen Bergman, which said that Israeli intelligence officials are concerned that the exposure of classified information to their American counterparts under a Trump administration could lead to their being leaked to Russia and onward to Iran.

According to Bergman, the American intelligence officials implied that Israel should be careful when transferring intelligence information to the White House and the National Security Council (NSC) following Trump's inauguration at least until it is clear that Trump does not have inappropriate connections with Russia.

Want to enjoy 'Zen' reading - with no ads and just the article? Subscribe today

Go here to see the original:

NSA Withholding Intelligence From 'Untrustworthy' Trump Administration, Former Analyst Claims - Haaretz

Posted in NSA

Former NSA contractor indicted in stolen data case …

Harold Thomas Martin III, 52, faces 20 counts of willful retention of national defense information.

The indictment alleges Martin removed classified documents from 1996 to 2016. He is accused of keeping documents in his home or car.

The documents include highly classified materials from the National Security Agency, the US Cyber Command, the CIA and the National Reconnaissance Office. Among the documents are ones that reveal US military gaps, capabilities and operations, as well as ones that contained foreign intelligence collection methods, targeting information and technical user materials.

Martin's attorney had no comment when contacted by CNN.

FBI investigators haven't concluded what Martin's motivation was for stealing the documents. At a hearing in late October a public defender representing Martin said his client was a hoarder who was "completely out of control."

Before his arrest in August, Martin worked as a contractor to the National Security Agency through consulting firm Booz Allen Hamilton, which fired him after he was charged. He has a long history working with sensitive government intelligence, and served in the US Navy and Naval Reserves for more than 10 years, reaching the rank of lieutenant.

The information he had digitally in his car, the feds said, was equivalent to approximately 50,000 gigabytes, enough to store 500 million documents containing images and text.

The government said Martin had a document "regarding specific operational plans against a known enemy of the United States and its allies." That document was not only classified but marked need-to-know only, and Martin should not have been privy to that information, prosecutors said in court filings.

Also found were files containing personal information of government employees, and an email chain with "highly sensitive information" on the back of which were handwritten notes "describing the NSA's classified computer infrastructure and detailed descriptions of classified technical operations."

Among the documents the FBI believes Martin stole were some detailing a hacking tool that the NSA developed to break into computer systems in other countries, law enforcement sources said when he was arrested. Documents detailing the tools were posted on the Internet in recent months, though no connection to Martin has been offered.

Martin's attorneys have argued previously in court that he is not a flight risk because he does not have his passport and has a wife and home in Maryland. They noted his military service.

Martin will make his next appearance in court on February 14.

CNN's Steve Almasy contributed to this report.

See the rest here:

Former NSA contractor indicted in stolen data case ...

Posted in NSA

Former CIA Analyst Sues Defense Department to Vindicate NSA Whistleblowers – The Intercept

In 2010, Thomas Drake, a former senior employee at the National Security Agency, was charged with espionage for speaking to a reporter from the Baltimore Sun about a bloated, dysfunctional intelligence program he believed would violate Americans privacy. The case against him eventually fell apart, and he pled guilty to a single misdemeanor, but his career in the NSA was over.

Though Drake was largely vindicated, the central question he raised about technology and privacy has never been resolved. Almost seven years have passed now, but Pat Eddington, a former CIA analyst, is still trying to prove that Drake was right.

While working for Rep. Rush Holt, D-N.J., Eddington had the unique opportunity to comb through still-classified documents that outline the history of two competing NSA programs known as ThinThread and Trailblazer. Hes seen an unredacted version of the Pentagon inspector generals 2004 audit of the NSAs failures during that time, and has filed Freedom of Information Act requests.

In January, Eddington decided to take those efforts a step further by suing the Department of Defense to obtain the material, he tells The Intercept. Those documents completely vindicate those who advocated for ThinThread at personal risk, says Eddington.

The controversy dates back to 1996, whenEd Loomis, then a computer systems designer for the NSA, along with his team worked to move the NSAs collection capabilities from the analog to the digital world. The shift would allow the NSA to scoop up internet packets, stringing them together into legible communications, and automating a process to instantly decide which communications were most interesting, while masking anything from Americans. The prototype, called GrandMaster, would need to ingest vast amounts of data, but only spit out what was most valuable, deleting or encrypting everything else.

Then in the fall of 2001,four passenger airliners were hijacked by terrorists as part of a suicide plot against Washington, D.C., and New York City. The U.S. intelligence community faced a disturbing wakeup call: its vast collection systems had failed to prevent the attacks.

Yet, in response, the NSA simply started collecting more data.

The NSA sent out a bid to multiple defense contractors, seeking a program that could collect and analyze communications from phones and the internet. Science Applications Internal Corporation, or SAIC, won the contract, known as Trailblazer. Meanwhile, internally, NSA employees were developing a similar, less costly alternative called ThinThread, a follow-on to GrandMaster. ThinThread would collect online communications, sort them, and mask data belonging to Americans.

Those involved in ThinThread argue that their approach was better than a collect-it-all approach taken by NSA.

Bulk collection kills people, says Bill Binney, a former NSA analyst, who rose to be a senior technical official with a dream of automating the agencys espionage. You collect everything, dump it on the analyst, and they cant see the threat coming, cant stop it, he says.

Binney built a back-end system a processor that would draw on data collected by ThinThread, analyze it, look at whether or not the traffic was involves American citizens, and pass on what was valuable for foreign intelligence.

Bulk acquisition doesnt work, agrees Kirk Wiebe, a former NSA senior analyst, who was trying to help convince NSA of ThinThreads value at the time.

The analysts are drowning in data, and Binney and Wiebe believe ThinThread would have solved the problem by helping the NSA sort through the deluge automatically while protecting privacy using encryption.

But Binney and Wiebe say advocates of ThinThread hit every possible bureaucratic roadblock on the way, sitting in dozens of meetings with lawyers and lawmakers. In the meantime, Gen. Michael Hayden, the director of the NSA at the time, said he decided to fund an outside contract for a larger effort, focused on gathering all communications, not just those over the internet, as ThinThread was designed to do.

Additionally, while ThinThread masked American communications, Haydens legal and technical advisors were concerned the collection itself would be a problem. Some of Haydens senior officials at the NSA came from SAIC, the company that won contract to design a proof of concept for Trailblazer.

A tiny group of people at NSA had developed a capability for next to no money at all to give the government an unprecedented level of access to any number of foreign terrorists, Eddington says. Instead that system was shut down in favor of an SAIC boondoggle that cost taxpayers, by my last count, close to a billion dollars.

He argues the contract, and the incestuous relationship between the NSA chief and the contractor never received the scrutiny it deserved. It was clearly an ethical problem, Loomis said.

Ultimately, however, the NSA went with Trailblazer. Hayden rejected the ThinThread proposal because the intelligence communitys lawyers were concerned it wouldnt work on a global scale, and that it would vacuum up too much American data. Hayden has continued dismissing concerns years later as the grumblings of disgruntled employees. Hayden told PBS Frontline ThinThread was not the answer to the problems we were facing, with regard to the volume, variety and velocity of modern communications.

In 2002, Wiebe, Binney, Loomis, Drake, and Diane Roark, a Republican staffer on the House Intelligence Committee who had been advocating for ThinThread, united to complain to the Defense Departments inspector general, arguing that ThinThread, while still a prototype, would be the best surveillance system. The oversight body completed its report in 2004, which included major concerns about Trailblazer.

We talked about going for the nuclear option, Wiebe said, referring to discussions at the time about contacting the press.

But Drake went it alone, however, never telling his colleagues what he planned to do. Stories about the disagreements started showing up in news headlines based on leaks. The Bush administration in 2007 sent the FBI after the whistleblowers, raiding each of the whistleblowers homes who raised complaints to the Pentagon inspector general. Drake faced espionage charges after speaking to a reporter from the Baltimore Sun about the alleged mismanagement and waste in the NSA.

Though Drake wasnt sent to prison, he lost his career in government, and now works at an Apple store. The question of whether ThinThread would have provided a better capability than Trailblazer was never resolved.

While ThinThread never made it to production, some of the analytic elements, minus the privacy protections, made it into Fort Meade as part of a massive surveillance program now known as Stellar Wind.

But there may be a way to settle the debate. The watchdog agency tasked with oversight of the Department of Defense completed a full investigation into the battle between ThinThread and the Trailblazer. The Pentagon inspector general published a heavily redacted version of that investigation in 2011; that report is now the only public record available, aside from the account of the whistleblowers who exposed it.

Despite everything thats come out about its surveillance programs, the NSA still wont release the full ThinThread investigation. I dont really know what theyre trying to hide, said Loomis.

Loomis says he thinks those redactions were more for the sake of Haydens reputation than protecting real classified information. He eventually documented the saga in a self-published book called NSAs Transformation: An Executive Branch Black Eye.

Drake told The Intercept in an email that efforts to uncover the Pentagon inspector generals ThinThread investigation were a large part of his defense. Since then, the Office of Special Counsel concluded last March that the Department of Justice may have destroyed evidence that might have helped exonerate him.

In the meantime, however, hope is fading that the entire story of ThinThread will emerge from behind the government door of secrecy. Weve been trying for 15 or 16 years now to bring the U.S. government the technical solution to save lives, but they fight us left and right, said Wiebe.

Eddington says the ThinThread controversy demonstrates the lack of oversight of the intelligence community. The mentality that gave us this system is still in place, he says. We could see this become de facto permanent, he said.

See the rest here:

Former CIA Analyst Sues Defense Department to Vindicate NSA Whistleblowers - The Intercept

Posted in NSA

NSA contractor indicted for stealing elite cyberweapons over 20 years – TechTarget

A former NSA contractor was indicted by a federal grand jury on charges of stealing elite cyberweapons and sensitive government data over the course of 20 years.

According to the U.S. Department of Justice (DoJ) indictment, Harold Thomas Martin worked as a contractor for seven different companies during those 20 years. Each company, including Booz Allen Hamilton Holding Corp where former NSA contractor and whistleblower Edward Snowden also worked, was tasked with projects through the U.S. Department of Defense and the National Security Agency (NSA).

"Martin held security clearances up to top secret and sensitive compartmented information at various times, and worked on a number of highly classified, specialized projects where he had access to government computer systems, programs and information, including classified information," federal prosecutors wrote in a statement. "Over his many years of holding a security clearance, Martin received training regarding classified information and his duty to protect classified materials from unauthorized disclosure."

Leo Taddeo, CSO for Cryptzone, said it shouldn't be surprising that an NSA contractor could steal data for 20 years without anyone knowing.

"One of the challenges of protecting digital assets is that the owner doesn't always know he wasrobbed.That's not the case with say, a TV or a car.If those items are stolen, the victim notices the empty parking space or blank spot on the wall pretty quickly and calls the police," Taddeo told SearchSecuirty via email."Digital evidence can be copied and 'stolen' without the owner ever knowing unless very specific safeguards are in place and regularly monitored."

Martin was arrested in October 2016 and law enforcement reportedly seized 50 TB of federal data from his home in Glen Burnie, Md. This data, which officials said could amount to the largest theft of classified federal information in history, included documents from U.S. Cyber Command, the CIA and cyberweapons from the NSA's elite hacking team -- the Office of Tailored Access Operations (TAO) -- all stolen while Martin was an NSA contractor.

The DoJ's indictment charged Martin on 20 criminal counts, each of which could carry a maximum penalty of 10 years in prison. Federal officials have not commented on what Martin did with the stolen data, but former TAO agents confirmed NSA-made cyberweapons were leaked in a dark web auction by a group called the Shadow Brokers. It is still unclear what, if any, connection there is between Martin, the Shadow Brokers and the advanced persistent threat group, the Equation Group, which has been associated with using TAO exploits in the wild.

Willy Leichter, vice president of marketing for CipherCloud, based in San Jose, Calif. said insider threats are an issue for all enterprises.

"This latest news reinforces an unfortunate truth -- security has traditionally focused on securing the perimeter, but internal controls are often sorely lacking," Leichter told SearchSecurity. "Now that network perimeters are disappearing with cloud and mobile technology, it's forcing many organizations to look more carefully at their internal controls to classify and protect sensitive data."

Taddeo noted that recent NIST guidelines put in place following the OPM breach, which was blamed on an attack that used credentials stolen from a federal contractor, could help mitigate future issues like this.

"The new NIST guidelines are intended to ensure federal contractors, like Martin's employer, Booz Allen, have the proper safeguards in place," Taddeo said. "These security controls will help, but not guarantee, that this type of theft does not happen in the future."

Learn more about why mitigating insider threats remains a major concern.

Find out why the Shadow Brokers cancelled the auction of NSA cyberweapons.

Get info on how to address the Equation Group vulnerabilities.

Read the rest here:

NSA contractor indicted for stealing elite cyberweapons over 20 years - TechTarget

Posted in NSA

New Russia revelations pose new problems for Trump’s NSA – MSNBC


MSNBC
New Russia revelations pose new problems for Trump's NSA
MSNBC
Michael Flynn, Donald Trump's National Security Advisor, has maintained close ties to Moscow in recent years, even getting paid by the Kremlin's propaganda outlet. It therefore caused quite a stir a month ago, when the Washington Post noted that Flynn ...
National security adviser Flynn discussed sanctions with Russian ambassador, despite denials, officials sayWashington Post
Flynn Is Said to Have Talked to Russians About Sanctions Before Trump Took OfficeNew York Times
Face the Nation transcript January 15, 2017: Pence, Manchin, GingrichCBS News

all 154 news articles »

Original post:

New Russia revelations pose new problems for Trump's NSA - MSNBC

Posted in NSA

Ex-NSA contractor stole secrets for nearly two decades: feds – New York Post

Ex-NSA contractor stole secrets for nearly two decades: feds
New York Post
The documents included sensitive NSA briefings and reports, including a 2009 draft of a signals intelligence directive that outlined methods and procedures for protecting the US and a 2014 report containing information on foreign cyber-intrusion ...

Link:

Ex-NSA contractor stole secrets for nearly two decades: feds - New York Post

Posted in NSA

Microsoft Gets NSA Approval For Windows 10 And Surface – Tom’s Hardware

Microsoft announced that the NSA has cleared Windows 10 and the Surface tablet for classified use. The company also teased security improvements that will be discussed at the annual RSA Conference next week, where security experts from all over the world will gather.

Being cleared for classified use could help Microsoft do business with government agencies, independent contractors, and other groups that handle sensitive data. A place on the NSA's list of approved devices also gives Microsoft bragging rights--and the company put 'em to good use in its blog post:

Our customers are the most security-conscious in the world and demonstrating our commitment to meeting their needs is incredibly important to us. Today, Im excited to share that both Windows 10 and Surface devices including Surface Pro 3, Surface Pro 4 and Surface Book have been added to the NSAs Commercial Solutions for Classified Programs (CSfC) list. The CSfC program listing demonstrates Windows 10, as well as Surface devices (the only Windows 10 devices currently on the list), when used in a layered solution, can meet the highest security requirements for use in classified environments.

But that doesn't mean Microsoft is done battening down the hatches of its software and hardware. The company also teased a number of security improvements that have either recently debuted or are expected to be released this year. These include more control over devices via Surface Enterprise Management Mode (SEMM), expanded device management, and updates to Windows Defender Advanced Threat Protection (WDATP), among others.

Many of those updates share a common goal: letting businesses use Windows 10 to control end points and defend against common threats. Microsoft said updates to SEMM will let companies disable a tablet's camera or microphone, for example, whereas updated Windows Analytics will let them know if software updates are being installed like they should be. To abuse the obvious pun--Windows is getting some bars, locks, and other reinforcements.

Microsoft also touted some of the operating system's existing features, such as Windows Hello, which allows people to sign in to their PC via facial recognition or fingerprint scan instead of a password. Combine that with a feature that automatically locks a PC when a paired smartphone leaves its vicinity--which is already available to Windows Insider program members--and Microsoft can help prevent careless mistakes on Windows 10 devices.

More information about these updates is available from Microsoft's blog post, and still more will be revealed in the days leading up to the RSA Conference that will run February 13-17. The bottom line is this: Windows 10 and Surface got a vote of confidence from the NSA, and over the next couple months, Microsoft will make it easier for businesses to manage their own security instead of relying on their employees' competence.

Read more from the original source:

Microsoft Gets NSA Approval For Windows 10 And Surface - Tom's Hardware

Posted in NSA

Confirmed: The NSA Got Hacked – The Atlantic

After a never-before-seen group announced it was in possession of a trove of malware developed by the elite hacking arm of the National Security Agency early this week, professional security researchers began working to try and determine whether the code the group released was truly developed by the NSA.

Working off of hints they found in the code, which was released by a group calling itself the Shadow Broker, researchers guessed it was authenticbut new documentation straight from the source appears to confirm the codes provenance.

According to NSA documents obtained by Edward Snowden and reviewed by The Intercept, several elements in the released code line up with details in the agencys own manuals and materials.

One manual, for example, instructs agents to use a specific 16-character string, ace02468bdf13579, to track a certain strain of government-developed malware as it makes its way through networks. That string shows up character-for-character in one of the leaked hacking tools, SECONDDATE.

The tool allows the NSA to execute man-in-the-middle attacks, which intercept traffic on a network as its traveling from its origin to its destination. The agency used it to redirect users who think theyre browsing safe websites to NSA-run servers that infect their computers with malwareand then back to their destination before they know what happened. In a slide deck, the NSA used cnn.com as an example of the sort of site it could exploit to deliver its malicious code.

The documents released by The Intercept reveal that SECONDDATE has been used to spy on systems in Pakistan and in Lebanon, where it gained access to data belonging to Hezbollah.

Its still not clear how the tools leaked from the NSA. Snowden speculated on Twitter that the tools could have been found on a server it used to infect a target, but former NSA staffers interviewed by Motherboard said the leak could be the work of a rogue insider, claiming that some of the files in the leak would never had made it to an outside server.

Go here to see the original:

Confirmed: The NSA Got Hacked - The Atlantic

Posted in NSA

Ex-NSA Contractor Accused Of Taking Classified Information Is Indicted – NPR

A federal grand jury has indicted Harold Thomas Martin III, the former NSA private contractor who prosecutors say spent decades stealing national security secrets, on charges that could see him serve a lengthy prison term if he's convicted.

When federal prosecutors charged Martin, a 52-year-old U.S. Navy reservist, with using his Top Secret security clearance to amass a huge cache of paper and electronic documents, the Justice Department called the case "breathtaking in its longevity and scale."

Martin has been in custody since a search of his home in suburban Maryland turned up "six bankers boxes' worth of paper documents and 50,000 gigabytes of electronic materials," as NPR's Carrie Johnson reported.

As Carrie notes, the charges of "willful retention of national defense information" that Martin now faces come from a section of the Espionage Act.

Martin worked at the Pentagon and the NSA for the contractor Booz Allen Hamilton. The government says that from December 1993 through Aug. 27, 2016 the date of his arrest Martin worked for at least seven different private companies and was assigned as a contractor to work at "a number of government agencies."

If he's convicted, Martin could face a maximum sentence of 10 years in prison for each of the 20 counts against him, according to the the U.S. Attorney's Office in Maryland. The defendant is slated to appear in federal court in Baltimore at 11 a.m. ET on Tuesday.

Read this article:

Ex-NSA Contractor Accused Of Taking Classified Information Is Indicted - NPR

Posted in NSA

Prosecutors to seek indictment against former NSA contractor as … – Washington Post

Federal prosecutors in Baltimore are expected to seek an indictment as early as this week against a former National Security Agency contractor who is accused of carrying out the biggest theft of classified information in U.S. history.

The indictment against Harold T. Martin III is expected to contain charges of violating the Espionage Act by willfully retaining information that relates to the national defense, including classified data such as NSA hacking tools and operational plans against a known enemy of the United States, according to individuals familiar with the case.

Martin, 52, was arrested Aug. 29 at his home in Glen Burnie, Md., and he has been held in a detention facility since. A U.S. District Judge last fall declined Martins request to be released from jail pending an eventual trial or resolution of the case, ruling that he was a flight risk.

In a complaint unsealed in October, the government charged Martin with felony theft of government property and the unauthorized removal and retention of classified materials, a misdemeanor. The prosecutors said then that they expected that the indictment would also include charges of violations of the Espionage Act, offenses that carry a prison term of up to 10 years for each count.

Such charges, prosecutors said, if run consecutively, could amount to a sentence as high as 30 years to life in prison.

The Justice Department declined to comment Monday.

In court hearings and filings, prosecutors have characterized Martins actions as highly damaging to national security. Over the course of 20 years working with various federal agencies, Martin took irreplaceable classified material on a breathtaking scale, said Zachary A. Myers, an assistant U.S. attorney with the District of Maryland, at a detention hearing in October.

Myers said Martin took many thousands of pages of classified material as well as 50terabytes of digital data, much of which has special handling caveats.

Martin previously worked in the Navy, leaving active duty in 1992 and then held a variety of tech jobs with government contractors. He worked at the NSA from 2012 to 2015, where he was an employee of the intelligence contractor Booz Allen Hamilton.

For some portion of that time, Martin was in the NSAs elite hacker unit, Tailored Access Operations, which makes and deploys software used to penetrate foreign targets computer networks for foreign espionage purposes.

Some U.S. officials said that Martin allegedly made off with more than 75percent of TAOs library of hacking tools an allegation which, if true, would be a stunning breach of security.

James Wyda, one of Martins defense attorneys, declined to comment.

His attorneys have previously portrayed him as a patriot who took material home to become better in his job, not to pass them to a foreign spy agency and betray his country. The desire to improve became a compulsion, Wyda argued at the detention hearing.

This is the behavior of a compulsive hoarder who could not stop gathering and possessing the documents he treasured, Wyda said.

Martins theft was discovered more than a year after another breach at TAO, in which a longtime employee was discovered to have taken without authorization significant quantities of the units hacking tools. The breach was not thought to be as serious as Martins, but it caused concern within the intelligence community.

View original post here:

Prosecutors to seek indictment against former NSA contractor as ... - Washington Post

Posted in NSA

US indicts NSA contractor with taking top-secret information over 2 decades – Fresno Bee

US indicts NSA contractor with taking top-secret information over 2 decades
Fresno Bee
Investigators zeroed in on Martin exactly two weeks after a group calling itself the Shadow Brokers posted a batch of what it claimed were NSA hacking tools, a major embarrassment to the agency. How the Shadow Brokers obtained the tools is not clear.

Original post:

US indicts NSA contractor with taking top-secret information over 2 decades - Fresno Bee

Posted in NSA

Report: NSA contractor allegedly stole armory of elite hacking tools … – CyberScoop

Former NSA contractor Harold T. Martin III, who remains in jail awaiting a court case for allegedly carrying out the biggest theft of classified information in U.S. history, reportedly compromised more than 75percent of hacking tools that were stored in a secretive library used by the agencys elite hacking unit.

Federal prosecutors in Baltimore may seek an incitement against Martin as early as this week, according to The Washington Post. The incident is expected to contain charges of violating the Espionage Act.

Individuals familiar with the case told the Post that Martin willfully retained information pertaining to national security, which includes classified NSA data and operational plans. Violations of the Espionage Act can carry a prison term of up to 10 years for each count.

A criminal complaint unsealed by the court in October showed that government lawyers were originally seeking to charge Martin with felony theft of government property and the unauthorized removal and retention of classified materials, which would result in a misdemeanor. Recent reports suggest a steeper penalty for Martin, who worked in the U.S. intelligence community for more than a decade as a defense contractor.

Zachary Myers, an assistant U.S. attorney with the District of Maryland, said during a detention hearing in October that Martin stole irreplaceable classified material on a breathtaking scale, roughly amounting to 50 terabytes worth of digital information.

Martins defense attorneys have consistently defended their client, describing him as a patriot that simply hoarded documents he deeply treasured. Martin, they say, acted on his own volition and was not acting on the instruction of a foreign power.

Last Fall, a U.S. District Judge declined Martins request to be released from jail pending an eventual trial or resolution of the case. At the time, the judge ruled that Martin posed a flight risk.

Link:

Report: NSA contractor allegedly stole armory of elite hacking tools ... - CyberScoop

Posted in NSA

NSA Executive Explains Logistics of Possible Cyber Command Split – MeriTalk (blog)

If the National Security Agency and Cyber Command were to split, NSA Executive Director Corin Stone explained thatany disagreements between the agencies would be decided by the secretary of defense and the director of national intelligence, to ensure fair judgment.

There have been conflicting opinions on the decision on whether to split the NSA from U.S. Cyber Command, which have traditionally operated as separate agencies under a dual-hat system with the same head. Stone said that Cyber Command is tasked with protecting Department of Defense networks, and the NSA conducts foreign signals intelligence and protects other national security systems, which are already separate jobs.

If the dual hat splits, it wont make a huge difference, frankly, Stone said in the Steptoe Cyberlaw Podcast last week.

Stewart Baker, former National Security Agency general counsel and partner at Steptoe & Johnson, questioned what would happen if the two agencies disagreed on a course of action. For example, how would the situation be resolved if Cyber Command wanted to take down an enemys network but the NSA wanted it to remain open because it was collecting useful intelligence information from the network.

It makes it more sensible to have a civilian head, Baker said, referring to the current head of both the NSA and Cyber Command, Adm. Michael Rogers.

Baker said that it would be unfair if the military branch, Cyber Command, received more authority from a leader with a military background.

Stone said that this wouldnt be the case because in the event of a disagreement between the different agencies, the two would voice their reasoning to the secretary of defense and the director of national intelligence, who would then make a decision together.

The NSA is also trying to monitor what information goes in and out of the agency without alienating employees.

The NSA has suffered from security leaks due to employeesEdward Snowden and Harold Martin, which has forced the agency to focus more on what data is leaving Fort Meade. The NSA has also had to consider intimidating its trustworthy employees during the dip in morale following these security leaks.

Its about defeating the enemy and making sure were not doing anything to enable [them], Stone said.

Snowden and Martin, both NSA contractors, were charged with stealing classified government information. Stone said that monitoring the movement of information has become more difficult with the use of flash drives and other technology that makes data mobile.

Any leaks, any unauthorized disclosures has an impact on morale, Stone said. Weve got a dedicated workforce. Theyre extremely sophisticated technical experts working very long hours on tough, tough problems, sometimes for years at a time and when someone is a peer or a colleague or someone they knew or someone they didnt know decides to break trust with the U.S. government, with the American people, and with their peers and colleagues, thats something that does deal a blow to morale.

Stone said that there has to be some layer of trust between the agency and employees because carrying flash drives has become commonplace and the agency cant inspect every one. Stone also said that the employees at NSA especially care about protecting citizen information.

The NSA is also working to increase transparency following these leaks by encouraging employees to discuss its mission with the public to be less of a mystery. This method also helps with hostile audiences, according to Baker.

If somebody is standing there and theyre talking like you, and they sound like you, and theyre just an ordinary person like you, its hard to hate them, Stewart said.

The NSAs current organizational system, which was revamped in 2016 under the name NSA21, integrates offensive and defensive cyber operations. Stone said that she believes that the focus on each side is balanced and allows the agency to tackle threats faster.

We have already seen more agility based on that integration, Stone said.

NSA has updated its goals in other ways, including fostering creativity and providing more support to its personnel throughout their careers. Stone said that the NSA has been supporting its employees by focusing on diversity efforts.

The NSA runs free GenCyber camps for students from elementary through high school to learn about cybersecurity. The NSA has also been reaching out to students at Historically Black Colleges, such as Morgan State University and Howard University, to consider careers at the agency.

Stewart said that the NSA already has some level of diversity because of the many different military and civilian backgrounds of its employees. Stone said there was more that could be done, but agreed in that respect.

We do have a level of diversity thats extraordinary, Stone said.

Read the original here:

NSA Executive Explains Logistics of Possible Cyber Command Split - MeriTalk (blog)

Posted in NSA

Overnight Cybersecurity: Ex-NSA contractor indicted over alleged … – The Hill

Welcome to OVERNIGHT CYBERSECURITY, your daily rundown of the biggest news in the world of hacking and data privacy. We're here to connect the dots as leaders in government, policy and industry try to counter the rise in cyber threats. What lies ahead for Congress, the administration and the latest company under siege? Whether you're a consumer, a techie or a D.C. lifer, we're here to give you ...

THE BIG STORIES:

--NSA CONTRACTOR INDICTED: A federal grand jury on Wednesday issued an indictment of a former National Security Agency contractor accused of stealing thousands of pages of classified documents. Herald Thomas Martin III, 52, was charged with 20 counts of "willful retention of national defense information," according to a statement released by the Justice Department shortly after the indictment was returned. Martin worked at the NSA between 2012 and 2015 while he was an employee at the consulting firm Booz Allen Hamilton. The indictment alleges that Martin had been stealing and maintaining mounds of highly classified information starting as early as 1996, until his arrest last August.

To read the rest of our piece,click here.

--FBI NOT ANTICIPATING IMMEDIATE CHANGE ON ENCRYPTION: Donald TrumpDonald TrumpTrump is not the first president to criticize judiciary Trump to dine with Adelson at White House Election autopsy: Latinos favored Clinton more than exit polls showed MORE's White House has discussed encryption policy with the FBI, a bureau official indicated Wednesday. James Baker, the FBI's general counsel, said he is unaware of any planned changes on encryption policy under the new administration. "There have been some discussions, obviously, about this," he said at an encryption policy at an event in Washington, D.C. "It is a big topic and one that people have discussed," he continued. "I am not aware of any policy change or even a determination at this point in time, given how soon we are into the new administration."

To read the rest of our piece,click here.

--NATO'S NEW CYBER GUIDE: NATO on Wednesday released the first major revision to the Tallinn Manual, the closest thing there is to a rulebook for nation-led cyber operations. Like the original 2013 manual, the new version is the result of a study by NATO to gauge consensus opinions from international law experts on what types of cyber statecraft are acceptable. "Let me assure you, the manual will sit on the desk of every legal advisor in every ministry of defense and every ministry of foreign affairs in the entire world," Director and General Editor Michael Schmitt said at a press briefing before its launch at the Atlantic Council headquarters in Washington. Both manuals pull together law originally developed to cover fields ranging from armed conflicts to outer space to extrapolate the likely legal consequences for cyber operations. But while the first draft covered war-like cyber attacks between nations, the new draft adds legal analysis of peacetime operations.

To read the rest of our piece,click here.

A POLICY UPDATE:

--SENATORS MAKE PLAY ON RUSSIAN SANCTIONS: A bipartisan group of senators is moving to check President Trump on Russia by bolstering congressional oversight before he can lift sanctions.

Sens. Lindsey GrahamLindsey GrahamBannon and Priebus: The odd couple that holds Trump's keys to success GOP lawmakers urge Trump to get tough on Russia Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to limit Trump on Russia MORE (R-S.C.), Ben CardinBen CardinSenate Foreign Relations takes hard line on Russia Corker, Cardin slam Trump's Russia comments Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to limit Trump on Russia MORE (D-Md.), Marco RubioMarco RubioWhite House: Trump not open to 'Gang of Eight' immigration bill Corker, Cardin slam Trump's Russia comments Will Trump shift on entitlements? MORE (R-Fla.), Sherrod BrownSherrod BrownGOP states move to block sanctuary cities after Trump order Overnight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to limit Trump on Russia Overnight Defense: McCain, Spicer spar over Yemen raid | Senate bill would limit Trump on Russia sanctions | Trump cozies up to military MORE (D-Ohio), John McCainJohn McCainMeghan McCain defends father: 'How dare anyone question the honor of my father' Bannon and Priebus: The odd couple that holds Trump's keys to success The Hill's 12:30 Report MORE (R-Ariz.) and Claire McCaskillClaire McCaskillOvernight Cybersecurity: Ex-NSA contractor indicted over alleged theft | NATO's new cyber guide | Senators move to limit Trump on Russia Overnight Defense: McCain, Spicer spar over Yemen raid | Senate bill would limit Trump on Russia sanctions | Trump cozies up to military Senators move to limit Trump on Russia sanctions MORE (D-Mo.) introduced legislation Wednesday setting up a period of congressional oversight before Trump could roll back financial penalties.

The legislation, known as the Russia Sanctions Review Act, would require Trump to notify Congress before he lifts sanctions tied to the invasion of Ukraine or Russia's meddling in the White House race.

"To provide relief at this time would send the wrong signal to Russia and our allies who face Russian oppression. Sanctions relief must be earned, not given," said Graham, a frequent GOP critic of the president.

To read the rest of our piece,click here

A LIGHTER CLICK:

--FAR MORE THAN YOU COULD EVER WANT TO KNOW ABOUT ALUMINUM CANS. A palate cleansinginformational videofor stressful times. (Via Boing Boing)

A REPORT IN FOCUS:

--ENCRYPTION CHALLENGES FOR FBI 'MANAGEABLE': The challenges that data encryption pose for law enforcement are manageable, according to a new analysis by a Washington, D.C., think tank, to be released later Thursday.

The research from the Center for Strategic and International Studies, which was shared with The Hill, found no instances in which encryption played a "determinative role" in recent major terrorist attacks in Europe and the United States.

The think tank also concluded that encryption does not play a major role in terrorists' efforts to recruit followers over the internet.

The report comes at a moment of heightened concern over cybersecurity and a debate about encryption and federal authorities' access to secured communications.

To read the rest of our piece,click here.

WHO'S IN THE SPOTLIGHT:

--EVERYBODY: Here are16 people to watch in tech, including a bunch of cybersecurity folk.

IN CASE YOU MISSED IT:

Links from our blog, The Hill, and around the Web.

Most Americansthink they know more about cybersecuritythan Donald Trump or Hillary ClintonHillary Rodham ClintonElection autopsy: Latinos favored Clinton more than exit polls showed Violence, hypocrisy and clichs: The Democratic party in 2017 Dem campaign chief: 'No question' we'll pick up House seats in 2018 MORE. (The Hill)

A digital liberties group is pushing the EU toabandon its data transfer pactwith the U.S. (The Hill)

President Trump and Intel tout new$7 billion investmentto create 10K jobs. (The Hill)

FTC names a deregulation supporterhead ofits Bureau of Consumer Protection. (The Hill)

DHS is bringingmarket-ready techto the RSA conference. (The Hill)

ForcePoint Security Labs spots a reconnaissancehacking campaigntargeting U.S. based embassies. (ForcePoint blog)

Republicans flock to "Confide,"a secure messaging app, to avoid email breaches. (Axios)

Websites should let youcut and paste passwords.(Troy Hunt)

The Virginian cybersecurity firmInvincia is soldto the Brit behemoth Sophos. (Washington Post)

If you'd like to receive our newsletter in your inbox,please sign up here.

Read the original here:

Overnight Cybersecurity: Ex-NSA contractor indicted over alleged ... - The Hill

Posted in NSA

Ex-NSA contractor may be indicted as early as this week – NY Daily … – New York Daily News

NEW YORK DAILY NEWS

Updated: Monday, February 6, 2017, 11:39 PM

Federal prosecutors seeking an indictment against a former National Security Agency contractor accused of stealing top secret information and hacking into government networks may happen as early as this week.

Harold Thomas Martin III, 52, is expected to be charged with violating the Espionage Act by taking classified data, NSA hacking tools and plans against a known enemy of the U.S., sources familiar with the investigation told The Washington Post.

The charges could land him a prison sentence of 30 years to life, prosecutors said. They argue Martins actions of removing classified material have been damaging to national security.

Assistant U.S. Attorney Zachary Myers said Martin took many thousands of pages of classified information and more than 50 terabytes of highly sensitive data, the Post reported.

Obama commutes sentence of WikiLeaks source Chelsea Manning

Martins lawyers defended him as a patriot who had no intentions of harming his country.

"This is the behavior of a compulsive hoarder who could not stop gathering and possessing the documents he treasured, defense attorney James Wyda said, according to the newspaper.

The FBI discreetly arrested Thomas at his Glen Burnie, Md. home on Aug. 29 and has since been held at a detention facility.

Investigators found hard-copy documents and digital information stored on multiple devices that were marked as U.S. government property, a criminal complaint states.

Edward Snowden's Russian permit extended by at least two years

Martin, a former Navy lieutenant, worked for the consulting firm Booz Allen Hamilton the same company that employed whistleblower Edward Snowden, who leaked classified NSA information in 2013.

Link:

Ex-NSA contractor may be indicted as early as this week - NY Daily ... - New York Daily News

Posted in NSA

Head of NSA to brief senators on cyber threats | TheHill – The Hill

Senators on the Armed Services Committee will be briefed by a top intelligence official on cyber threats Tuesday morning.

The hearing, which will beclosedto the public, will feature testimony from Adm. Michael Rogers, who holds the dual-leadership role at U.S. Cyber Command and the National Security Agency (NSA).

The closed-door briefing will give lawmakers an opportunity to press Rogers on the intelligence communitys recent findings about Russias cyber attacks aimed at the U.S. presidential election.

The committee last received testimony from Rogers and other intelligence officials on foreign cyber threats to the United States in January, ahead of the intelligence communitys release of a report on Russias meddling in the U.S. presidential election.

The CIA, FBI and NSA concluded in theinvestigationthat Russian President Vladimir Putin ordered a cyber and disinformation campaign to undermine the U.S. democratic process, harm Hillary Clintons electability and aid now-President Donald TrumpDonald TrumpColbert: I'd 'love' to headline WH correspondents' dinner Team Trump should get in the union-busting business Green Party blasts Dems on DeVos confirmation MORE.

The Pentagon and other government agencies have been challenged to secure computer systems and infrastructure as cyber threats from nation states and other hostile actors have increased.

Trump waspoisedto sign an executive action overhauling cybersecurity across the government last week, though it was ultimately postponed.

Original post:

Head of NSA to brief senators on cyber threats | TheHill - The Hill

Posted in NSA