Use of Zoom app with security weaknesses cause of concern – indica News

Anindya Banerjee(IANS)-

Defence Minister Rajnath Singh held a video conference with Chief of Defence Staff General Bipin Rawat and the chiefs of army, navy and air force on April 1. The armed forces and the MoD are fully prepared to face any situation, Singh tweeted.

Only issue was that Singh was using an app that has created the worldwide security scare due to its links to China.

Citizen Lab, a Canada-based independent research organization, has found that Chinese servers are being used to distribute encryption and decryption keys for video links on Zoom. In all probability, the Chinese servers were used by Singh for the video conference with the security forces brass, leaving it vulnerable to breach.

Its not just Singh, more Indian leaders are using this easy-to-use medium. In one such video conference with high-ranking officials, Commerce & Industry Minister Piyush Goyal can be spotted using the same platform Zoom. It shows Goyal talking to officials while using his MacBook Air.

On April 10, ICCR chief Vinay Sahasrabuddhe organized a virtual press conference with the Agriculture Minister where Narendra Tomar talked about how the government planned to minimize the loss for the sector. This too was organized through Zoom. In fact, a link for the same was also sent to participating journalists.

But why is Zoom problematic? We suspect keys may be distributed through these (Chinese) servers. A company primarily catering to North American clients that sometimes distributes encryption keys through servers in China is potentially concerning, given that Zoom may be legally obligated to disclose these keys to authorities in China, the Citizen Lab researchers warned.

The suspicion proved to be true. The chief executive of the video conferencing app apologized for falling short on security issues and promised to address concerns. Eric S Yuan, the founder, himself is a Chinese American.

Ex-NSA (National Security Agency) hacker Patrick Wardle identified a series of issues, including a flaw that leaves Mac users vulnerable to having webcams and microphones hijacked, the BBC reported.

In other words, Goyals MacBooks webcam and microphone could also be vulnerable, if this assertion of the former NSA hacker is true.

Meanwhile, Google has reportedly banned the Zoom app from all employees computers over security vulnerabilities and Singapore has banned teachers using Zoom after hackers posted obscene images on screens.

Earlier this month, according to a report by Reuters, Elon Musks SpaceX had also banned employees from using Zoom over security concerns.

According to a report by social media platform Blind, 12 percent users have reportedly stopped using Zoom and 35 percent professionals are worried that their information may have been compromised.

Pawan Duggal, Indias foremost cyber security expert, calls Zoom a glitzy timebomb. It looks nice, but its deadly, he reasons.

But Indian leaders seem oblivious to these statistics. Not only the Bharatiya Janata Party (BJP), but the Congress also holds video conferences through Zoom, where likes of Congress chief Sonia Gandhi has taken part. She used it to address the Congress Working Committee (CWC) as well as a meeting of state party chief.

In fact, all the virtual pass conferences of the Congress that take place at 1 p.m. are through Zoom. Chief Ministers Captain Amarinder Singh and Bhupesh Baghel, and senior leaders, like Anand Sharma and Ghulam Nabi Azad, continue to use Zoom.

Ever since the government announced a 21-day nationwide shutdown, forcing not just companies but also political parties to work from home, the company has seen a huge boom in India. The daily downloads for Zoom have increased from around 1,70,000 in the middle of February to nearly 2.5 million in late March.

Duggal told IANS, If you are a policymaker, public figure or corporate honcho, Zoom is not your go-to place. Its proven Zoom is not end-to-end encrypted. Its China link is concerning. It has a dubious privacy record. Indian leaders should learn from Britain where cabinet meetings on Zoom came online.

Though, government sources indicate the National Informatics Centre (NIC) has stepped in to suggest what app scan be used as mode of secure video conference.

However, the use of Zoom by the government, the security and the trade honchos as well as top politicians, that is conceded to be routed through China, should ring alarm bells across the corridor of power.

Related

Visit link:

Use of Zoom app with security weaknesses cause of concern - indica News

Posted in NSA

All you need to know about the all-new OnePlus 8 Series – TechPP

The all-new OnePlus 8 series is here, and it includes two smartphones: OnePlus 8 and OnePlus 8 Pro. While both devices have the same Snapdragon 865 chipset at their core, they do differ in some other aspects. For instance, the screen size 6.55-inch vs 6.78-inch; refresh rate 120Hz vs 90Hz; cameras quad vs triple, to name a few. So heres a quick roundup of all the features that the latest offerings from OnePlus have to offer.

1. Display a 6.55-inch Fluid AMOLED display with 90Hz refresh rate and HDR10+ support on the OnePlus 8 and a slightly bigger, 6.78-inch panel on the Pro, which comes with 120Hz refresh rate, QHD+ resolution, and HDR10+ support along with MEMC for a seamless viewing experience. Besides, the two offer a blue-light filter and adjust the brightness accordingly for low-light environments to ensure some level of eye protection.

2. Performance both, the regular OnePlus 8 and the Pro pack in the latest chipset, the Snapdragon 865 (with Adreno 650 GPU) from Qualcomm, which comes with the X55 modem to offer 5G connectivity with support for SA (Standalone) and NSA (Non-Standalone) modes. Moreover, both come coupled with the same 8/12GB of RAM and 128/256GB of UFS 3.0 internal storage. However, the RAM on the regular model is an LPDDR4X, compared to the LPDDR5 on the Pro.

To power the internals, the phones come with a 4300mAh and 4510mAh battery, respectively. But, the way they fuel up the juice is what separates the two. The vanilla OnePlus 8 comes with the OnePlus Warp Charge 30T charging, whereas, the Pro also gets two more charging modes in addition, namely: Warp Charge 30 Wireless and Reverse Wireless charging.

3. Camera a triple-camera array with a 48MP (Sony IMX586) primary sensor, a 16MP ultra-wide, and a 2MP macro lens, on the OnePlus 8, and a quad-camera setup with a 48MP (Sony IMX689) primary sensor, accompanied by a 48MP ultra-wide, an 8MP telephoto, and a 5MP color filter. The addition of color filter on the 8 Pro brings alongenhanced filters and effects to allow you to experiment with photography.

Moving to the front, the two devices share the same 16MP (Sony IMX471) sensor for selfies and face unlock.

4. Connectivity 5G (SA / NSA) and 4G VoLTE on both models, along with WiFi 6 (a/b/g/n/ac/ax), NFC, and Bluetooth 5.1 with support for aptX, aptX HD, LDAC, and AAC audio codecs.

5. Miscellaneous

Thats the all-new OnePlus 8 series for you!The OnePlus 8 starts at $699 for the 8GB + 128GB model and $799 for the 12GB + 256GB, whereas, the OnePlus 8 Pro comes at a premium and is priced at $899 for the 8GB + 128GB and $999 for 12GB + 256GB variant. Both phones will be available starting April 29.

Here is the original post:

All you need to know about the all-new OnePlus 8 Series - TechPP

Posted in NSA

What is the National Security Act, (NSA),1980 and when is it imposed? – Jagran Josh

Recently, the National Security Act,1980 or 'Rasuka' is imposed in various cases in different states of India. Recently, many offenders are arrested under this law for attacking corona warriors i.e. Doctors, Nurses, housekeeping staff and security personals.

Let us know in this article, what is the National Security Act (NSA), or Rasuka, when is it imposed and what kind of punishment provisions are there under it?

What is the National Security Act, 1980

The National Security Act (NSA) came into existence on 23 September 1980 during Indira Gandhi's government.

The National security Act, empowers the Central Government and State Governments to detain a person to prevent him/her from acting in any manner against the welfare and security of the country, damaging the Indian relations with foreign countries, obstructing the maintenance and supply of essential services to the community.

The suspect can be kept in jail for 12 months without any charge under the NSA. This is the most vital and critical provision of this whole act.

Provisions of the National Security Act, 1980 (NSA)

1. If a person, does not believe in the rule of law, harms the Indian relations with other countries of the world, disrupt the maintenance or supply of public services, attack police personnel on duty and creates the threat to the national security; can be arrested by the concerned government under this act.

Recently, Madhya Pradesh and Uttar Pradesh have registered FIR under this act against some anti-social elements.

2. Under NSA, the concerned officer has the power to keep the suspect in captivity for 5 days without assigning any reason while in special circumstances this period can be up to 10 to 12 days. After this, the officer needs the permission of the state government for further detention.

3. The arrested person is not entitled to the aid of any legal practitioner in any matter connected with the proceedings before an advisory board. This panel is constituted by the government for dealing with NSA cases.

4. This law empowers the central government to arrest or expel a foreigner to control his activity.

5. Some people have been booked under Rasuka for misbehaving with doctors, for transferring their corona infection to other healthy people and attacking the police personals in Uttar Pradesh, Madhya Pradesh, and Delhi.

Imprisonment under the NSA

The National Security Act (NSA), empowers the concerned government to keep a suspect in jail for 12 months without any charge. But this period can be extended if the government finds fresh evidence against the suspect.

If an officer arrests a suspect, he has to explain the reasons to the concerned state government. Until the state government approves this arrest, the maximum period of arrest cannot be more than twelve days.

Keep in mind that arrest orders can be issued by the District Magistrate or Commissioner of Police under their respective jurisdiction.

Chandrashekhar Ravana, the founder of 'Bhim Army', was also arrested under 'Rasuka' and kept in jail for a year but released later on.

Criticism of the National Security Act (Rasuka)

The National Crime Records Bureau (NCRB) does not include cases under the NSA in its data because very few FIRs are registered under this law. Therefore, there is no accurate information about the number of arrested persons under this act.

Under this law, a suspect can be arrested without giving any reason and even he/she is not allowed to hire a lawyer for some time. That is why this law is also compared to the British Rowlatt Act. According to many experts, the state governments have also used NSA as 'Extra-Judicial Power'.

So in conclusion, it would be wise to say that a law should be for the people; while people should not be for the law.

List of National Security Advisor in India

Union Territory of Delhi: A snapshot of the Economy

The rest is here:

What is the National Security Act, (NSA),1980 and when is it imposed? - Jagran Josh

Posted in NSA

February construction unemployment rates down in 37 states year over year – AZ Big Media

Estimated February not seasonally adjusted construction unemployment rates fell nationally and in 37 states, rose in 12 states and were unchanged in one state (Texas) on a year-over-year basis, according to an analysis of U.S. Bureau of Labor Statistics data released today by Associated Builders and Contractors.

As of February 2020, the construction industry employed 208,000 more workers nationally compared to February 2019 while the national NSA construction unemployment rate decreased from 6.2% to 5.5% over the same period, according to BLS numbers. This is an indication of the underlying strength of the construction industry prior to widespread concern over the impact of the coronavirus and reaction to it in the United States.

In February, large portions of the country experienced above-average temperatures. The Eastern third of the country, along with the Northern tier of states and the West Coast, had warmer than normal weather. This aided construction activity and employment, said Bernard M. Markstein, Ph.D., president and chief economist of Markstein Advisors, who conducted the analysis for ABC. These numbers were collected before actions were taken by many localities and businesses to control the spread of COVID-19 in the United States. These efforts to limit the impact of the coronavirus on the health of the nation and consequently on construction activity will begin to show in the data for March and April and beyond.

March national employment and unemployment figures released on Friday, April 3, along with the recent surge in unemployment insurance claims, indicate a large impact on the economy. The March employment and unemployment data were collected before many places issued stay-at-home recommendations. However, growing concern over the spread of the disease was adversely affecting employment. The NSA construction unemployment rate jumped from 5.5% in February to 6.9% in March, only the third time in the history of this number that it rose from February.

Because these industry-specific rates are not seasonally adjusted, national and state-level unemployment rates are best evaluated on a year-over-year basis. The monthly movement of rates still provides some information, although extra care must be used when drawing conclusions from these variations.

The national NSA construction unemployment rate increased 0.1% from January to February. Over the time since the data series began in 2000, the historical pattern generally has been an increase in rates from January with 12 increases, seven decreases and once unchanged. Among the states, 27 had higher estimated construction unemployment rates than in January, while 20 were lower and three were unchanged. At the same time, the nation and 23 states posted their lowest February construction unemployment rate on record.

The states with the lowest estimated NSA construction unemployment rates in order from lowest to highest were:

1. Florida, 2.8%

2. South Dakota, 3.1%

3. Oregon and Utah (tie), 3.2%

5. Maryland, 3.5%

Three of these statesFlorida, Maryland and Oregonwere in the top five in January. For the third consecutive month, Florida had the lowest construction unemployment rate among the states. This was also the states lowest February rate on record.

South Dakota had the second lowest rate in February, up from ninth lowest in January. This was the states lowest February rate on record.

Oregon and Utah tied for the third lowest rate in February. For Oregon, this was up from fourth lowest rate in January based on revised data (originally reported as tied with Utah for fifth lowest). It was also Oregons lowest February rate on record. For Utah, this was up from the seventh lowest rate in January, tied with Arizona, based on revised data (originally reported as tied with Oregon for fifth lowest). This was Utahs lowest February rate since the 2.3% rate in 2015.

Maryland had the fifth lowest rate in February, down from second lowest in January. Nevertheless, this was the states lowest February rate on record.

Colorado, which was third lowest in January, dropped to 13th lowest in February with a 4.3% rate. After reaching 3.8% in February 2019, it was the states lowest February rate since posting a 4.2% rate in 2000, making it the third lowest February rate on record for the state.

South Carolina and Texas, which tied for fifth lowest rate in January based on revised data (originally reported as third lowest for South Carolina, tied with Colorado, and seventh lowest for Texas, tied with Arizona), tied for eighth lowest in February with a 3.8% rate. For both states, it was their lowest February rate on record.

The states with the highest estimated NSA construction unemployment rates in order from lowest to highest were:

46. Missouri, 10.2%

47. Kentucky, 10.4%

48. Wyoming, 10.7%

49. Alaska, 10.9%

50. West Virginia, 15%

Three of these statesAlaska, Missouri and West Virginiawere also in the bottom five in January. West Virginia had the highest estimated construction unemployment rate in February, compared to third highest in January. After the 14.5% rate in February 2019, this was the states lowest February rate since the 14% rate in 2013. West Virginia also had the largest monthly increase in its rate among the states, up 3.1%.

Alaska had the second highest rate in February compared to highest in January. Nonetheless, this was the states lowest February rate on record.

Wyoming had the third highest rate in February compared to seventh highest in January. Wyoming had the largest year-over-year increase in its rate among the states, up 3.1%.

Kentucky had the fourth highest rate in February compared to sixth highest in January. This was Kentuckys second lowest February rate on record, behind the 10.3% rate in 2006.

For the second month in a row, Missouri had the fifth highest rate in February. This was the states lowest February rate since the 9.5% rate in 2016.

Iowa, which had the second highest rate in January, had the seventh highest in February with a 9.8% rate.

Montana, which had the fourth highest rate in January based on revised data (originally reported as third highest, tied with West Virginia), had the sixth highest in February with a 10% rate. This was the states second lowest February rate on record, behind the 6.7% rate in 2007. Montana had the second largest year-over-year drop in its rate among the states, down 3.1%, behind Washington states 3.3% decrease.

See the original post here:

February construction unemployment rates down in 37 states year over year - AZ Big Media

Posted in NSA

NSA Sheep Event and NSA Scotsheep 2020 postponed – Agriland.co.uk

The National Sheep Association (NSA) has announced plans to proceed with a revised summer schedule, after two of its flagship events were cancelled due to the Covid-19 lockdown.

After taking time to review current Government recommendations, the NSA said it was pleased to be able to announce new plans to proceed with its popular summer events, albeit a little later in the year than previously scheduled.

Many popular summer agricultural events including the Royal Highland Show, Balmoral Show, the Great Yorkshire Show, and the Royal Welsh Show have already been cancelled or postponed.

NSA Sheep Event, the flagship event of the organisation will now take place on Monday, October 19, 2020, once again at the Three Counties Showground, Malvern, Worcestershire.

NSA Sheep Event 2020 organiser, Helen Roberts said: The NSA prides itself on being a member-led organisation and delivering our iconic event is incredibly important to us.

However, with the Government advising against attending mass gatherings and further action relating to social distancing and self-isolation and unnecessary travel, NSA felt there was no other option at this time than to postpone our main event until October and we are very grateful to have this date made available to us.

This will be a difficult year for the nation as a whole. The NSA and many other associations and businesses will all be affected by the financial outcome of this scenario but we do hope both our members as well as all sheep farmers and the wider sheep industry will support as we now recommence plans for what we are confident will again be a fantastic event.

Also taking place this year is NSA Scotsheep, the main event of the industry in Scotland. Differing slightly from the NSA Sheep Event in Worcestershire, NSA Scotsheep is set to take place on-farm, kindly hosted in 2020 by Robert and Hazel McNee at their home at Over Finlarg, Tealing, Angus.

The event had been planned for early June but has now tentatively been moved to Wednesday, July 8 a date that the NSA Scottish Region executive committee is aware is rather hopeful in the current climate but one they still hope can be achievable.

NSA Scotsheep organiser Euan Emslie said: We have very tentatively set a new date which most importantly suits the hosts who need to fit this event around their farming operation.

NSA Scottish Region understands that this date is optimistic and that it may need to be reviewed again in light of the future situation with COVID-19, but in the hope that we can continue, we have lodged our application for the necessary licenses and will keep the situation under close review.

Should NSA Scottish Region not be granted a license for the July date, then NSA Scotsheep 2020 will regrettably have to be rescheduled until next year with a new date at the beginning of June.

NSA Scotsheep 2020 chairman Willy Millar added: We are really disappointed to have to postpone this event although current circumstances give us no choice.

The committee also realises that choosing a date in early July brings risks so we are looking at alternative dates for the first couple of weeks in June next year, should the restrictions on social distancing and gatherings of people not be lifted in the next few months.

Our firm belief is that NSA Scotsheep is a crucial event for the farming community and sheep industry in Scotland and further afield.

There is no doubt that people will be keen to get back to a more normal way of life as soon as possible while following government advice on the situation.

Plans for both NSA events are well underway with organisers promising many new and existing attractions.

Further updates on the future of both events will follow as needed.

RELATED STORIES

Excerpt from:

NSA Sheep Event and NSA Scotsheep 2020 postponed - Agriland.co.uk

Posted in NSA

National Storage Affiliates Announces Internalization of Its Largest PRO and Appointment of David Cramer as Its Chief Operating Officer – Business…

GREENWOOD VILLAGE, Colo.--(BUSINESS WIRE)--National Storage Affiliates Trust (NSA or the "Company") (NYSE: NSA) today announced the closing, effective March 31, 2020, of the previously announced internalization of the Company's largest participating regional operator ("PRO"), SecurCare Self Storage, Inc. ("SecurCare").

Also effective April 1, 2020, Dave Cramer, previously president and chief executive officer of SecurCare, was appointed Executive Vice President and Chief Operating Officer of NSA. Further details are contained in NSA's current report on Form 8-K, filed with the SEC on February 24, 2020.

Tamara Fischer, President and Chief Executive Officer, commented, "Im pleased to announce that despite the unprecedented economic environment, the internalization of SecurCare was completed as originally scheduled. Our team really looks forward to working with Dave in his new role. Although SecurCare was one of our founding PROs and part of the NSA PRO platform since our inception, were excited to welcome the SecurCare team as official NSA employees.

Dave Cramer, NSAs new Executive Vice President and Chief Operating Officer, added, "Im excited to transition to the NSA management team and further develop the corporate operating platform. Although recent macro events present challenges for the economy as a whole, Im confident in our ability to navigate the current environment and continue to deliver sector-leading returns for the foreseeable future."

About National Storage Affiliates Trust

National Storage Affiliates Trust is a Maryland real estate investment trust focused on the ownership, operation and acquisition of self storage properties located within the top 100 metropolitan statistical areas throughout the United States. As of December 31, 2019, the Company held ownership interests in and operated 742 self storage properties located in 35 states and Puerto Rico with approximately 47.1 million rentable square feet. NSA is one of the largest owners and operators of self storage properties among public and private companies in the United States. For more information, please visit the Companys website at http://www.nationalstorageaffiliates.com. NSA is included in the MSCI US REIT Index (RMS/RMZ), the Russell 2000 Index of Companies and the S&P SmallCap 600 Index.

Go here to read the rest:

National Storage Affiliates Announces Internalization of Its Largest PRO and Appointment of David Cramer as Its Chief Operating Officer - Business...

Posted in NSA

TikTok popularity irrefutably correlated with US unemployment claims – The Tech

By Jen FoxApr. 1, 2020

Economists strive to form meaningful connections across socioeconomic indicators. Quantitative techniques from difference-in-differences estimation to the method of instrumental variables comprise this coveted realm of econometrics, weaving sense into our complex world.

Wielding the statistical powers vested in me by the impressive likes of Professors Joshua Angrist and Abhijit Banerjee, Ive concluded an incontrovertible correlation between initial weekly U.S. unemployment claims and the popularity of TikTok.

Reaching this conclusion required extensive investigation, as TikTok does not report on annual output nor provide malleable data tables for marginal user fluctuation. But finally, by running a linear regression of the logarithm of the relative volume of Google searches for Tiktok per week against that same weeks NSA-reported novel initial unemployment claims, a correlation once backed by instinct is now grounded as a statistical gospel.

Additionally, my two and a half years and singular virtual month of elite collegiate practice has enabled me to confirm the existence of a positive feedback loop. This spectacular natural phenomenon occurs when the product of a reaction leads to an increase in that reaction. As we increase the log of Google search interest in TikToks, we see an irrefutable rise in initial unemployment claims as reported on a weekly basis by the NSA. Similarly, the more initial claims accounted for, the greater relative interest in TikTok Google Trends reports.

We economists, of course, must always demonstrate constant vigilance in the face of distortive omitted variable bias. Omitted variables are those which contribute to our estimated effects, but which go unaccounted for by our statistical model. If not accounted for by control variables, they can bias our model in one direction or another, distorting our results with their overlooked influence.

As only an aspiring economist, I would ordinarily turn to my world-renowned MIT professors: an impressive class ranging from Ivy League graduates to Nobel laureates. Due to the current global pandemic, however, I realize that these elite academics already have enough on their plates, and that the morally responsible path forward is to individually and senselessly follow my own natural instinct. In the case of nationwide TikTok popularity and weekly initial unemployment claims, I have thus concluded that no omitted variables can possibly exist, and that this is a direct, perfect, and indisputable correlation.

These conclusions must leave you with burning questions. What does this mean for you, your health, and the health of your family? What does this mean for U.S. national security, and the future society we leave to our children and grandchildren?

Have no fear. Youre asking the right questions, and bold statistical models are here to comfort you with pragmatic answers.

Business-as-usual, we know, would spell certain disaster. As a result of the natural exponential rise in the video apps recent popularity, as well as our indisputable discovery of the two variables positive feedback loop, watching more and more TikToks would inevitably result in 100% nationwide unemployment. But ignoring TikToks, as weve all tried and failed to do, would easily lead to a decrease in overall nationwide health, especially in light of recent social isolation mandates.

Luckily, theres a path forward. If we want to continue getting our daily dose of TikTok without spiking its measured popularity and thus nationwide unemployment, we have to take our appreciation for these short video masterpieces offline. This entails downloading every TikTok ever made onto local drives and deleting the application from our phones forever.

We understand that this will be an incredibly difficult task for many Americans, and that lack of wireless bandwidth as we struggle to make this transition as a country will result in mass oversaturation of mental health hotlines. But this is the only way forward to preserve both our countrys economy and our enjoyment of the wonders of TikTok.

If you love your country, clear space on your hard drive and download every TikTok ever made as soon as possible. The entire U.S. economy depends on you. Every American is in this together. Statistics never lie. This is your Vietnam. Godspeed.

Read more here:

TikTok popularity irrefutably correlated with US unemployment claims - The Tech

Posted in NSA

NSA Ajit Doval met Nizamuddin event organisers, convinced them about threat it poses – MyNation

Bengaluru: The Nizamuddin event, which has become the talk of the town, is being considered as the most powerful tool of spreading the coronavirus.

An FIR has also been filed against the maulana for holding the congregation.

News has now emerged that National Security Advisor (NSA) Ajit Doval rushed to the event and requested the maulana to call off the event.

Reports add that Doval reached around 2.00 am on March 28-29 night and convinced Saad to call off the event as it would be spreading the virus.

It was on March 13 that around 3400 assembled at Nizamuddin Markaz as part of the religious event.

And on March 16, the CM of Delhi announced that there would be no gatherings of more than 50 people. Yet, there was no respect for his words. The event continued.

Four days later, 10 Indonesians who had attended the event test positive in Telangana.

On March 22, the much important event, Janata curfew took place. No gatherings were allowed.

A day later, around 1500 vacated the event.

On March 25, there were around 1000 people still in attendance.

A day later, an Indian preacher dies in Srinagar. This preacher was a part of the event.

On March 30, there were reports that six of those who attended the event died in Telangana.

Delhi CM Arvind Kejriwal has ordered an FIR be filed against the Maulana for holding an event of this magnitude despite the orders.

What makes anyones blood boil is how such congregations take place despite being fully aware that it is an invitation for the virus to spread.

It would be anyones guess that social distancing would have been compromised there and the health requirements not honoured.

Read more from the original source:

NSA Ajit Doval met Nizamuddin event organisers, convinced them about threat it poses - MyNation

Posted in NSA

4 candidates vie to be militarys next spy chief – POLITICO

The officers have since been vetted by Kernans shop and forwarded to Defense Secretary Mark Esper and Joint Chiefs Chairman Gen. Mark Milley, according to one of the people, who spoke on the condition of anonymity.

Esper, after receiving input from the U.S. intelligence community, will then make his choice and share the recommendation with the White House although the exact timeline remains fluid as the Defense Department reels from the coronavirus pandemic.

A DoD spokesperson referred comment about the process and the candidates to DIA, which declined to comment.

The selection will be made as President Donald Trump takes aggressive steps to reshape an intelligence community that he has often openly mocked and warred with, replacing veteran operatives with people considered to be loyalists.

In February, the president replaced acting Director of National Intelligence Joseph Maguire with U.S. Ambassador to Germany Richard Grenell, who previously had not served in any U.S. intelligence agency. The abrupt change set off more personnel moves that have prompted fears among career clandestine officials of a broader loyalty purge.

The Pentagon hasnt been immune. Last month, POLITICO reported that the White House is holding up Kathryn Wheelbargers nomination to become Kernans No. 2 because administration officials believe she hasnt been sufficiently loyal to Trump.

The moves are concerning to current and former defense officials, who believe the selection of a new military spy chief will now have to undergo a political test.

The fact is, ultimately, it's a presidential decision and a presidential appointment, a former senior defense official told POLITICO. I would hope that those advising him, and then the senior officials in DoD and in the intelligence community, focus on best athlete.

You need a professional. You need somebody that understands intelligence, that is experienced in it, and who will speak truth to power.

The next director will be responsible for overseeing an agency with about 17,000 employees spread across 140 countries, and which has been examined by both Pentagon brass and lawmakers over concerns that an accumulated glut of responsibilities has distracted from DIAs mission of providing military intelligence.

Here is more information on the candidates:

Air Force Maj. Gen. Jeffrey Kruse is the director for Defense Intelligence Warfighter Support, an organization under Kernans office. He served as head of intelligence at U.S. Indo-Pacific Command, a role that could help his chances as the Pentagon carries out the administrations strategy against China and Russia.

Another factor that could boost Kruses candidacy is the concept of service equity namely that the armed branches get turns filling significant general officer assignments. DIA hasnt had an Air Force chief since James Clapper from 1992 to 1995.

Marine Corps Maj. Gen. Michael Groen is the deputy chief of Computer Network Operations at the National Security Agency. Prior to joining NSA, he served in two high-profile posts: head of intelligence for the Joint Staff and for the Marine Corps.

Army Lt. Gen. Scott Berrier is the deputy chief of staff for Army intelligence. He has held a variety of intelligence roles during his military career, including multiple stints in Afghanistan.

Navy Rear Adm. Trey Whitworth is the Joint Staffs director of intelligence. His official biography shows a lengthy list of tours at multiple organizations, including U.S. Africa and Central commands, as well as NSA.

Yet while Whitworths assignments are impressive, they dont align well with the administrations great power competition strategy, one person familiar with the process warned.

If I were betting, I would say it would be Kruse, the person told POLITICO, citing his recent regional expertise and his familiarity with the defense intelligence enterprise. The two-star is politically savvy and knows whats needed to modernize.

The former senior defense official declined to guess who might get the nod, calling all four stellar candidates.

They have all led large organizations. They all have a war zone experience. They've all served in combatant commands, the former official said. The intelligence community and DoD are pretty fortunate to be able to have that stiff of competition for a director.

The two people familiar with the process and the former defense official all said they expect Esper to make an announcement later this spring or over the summer though the coronavirus pandemic might end up delaying things, including Ashleys retirement and congressional consideration of his successor.

You want to give enough time for the Senate to do its due diligence and execute its process before the August recess, the former official told POLITICO. If you don't get it by then, you hope when they come back in September that they're able to take up the military nominations. But it being an election year, the Hill turns into a ghost town come early October.

The former official expressed confidence Esper can keep the White House from exerting political influence over the military appointment.

I hope so," this person said.

Originally posted here:

4 candidates vie to be militarys next spy chief - POLITICO

Posted in NSA

Ex-NSA hacker finds new Zoom flaws to takeover Macs all over again, together with webcam, mic, and root obtain – Mash Viral

Zoom, the well-liked video clip connect with service has experienced a range of privacy and security troubles in excess of the decades and weve observed many really not too long ago as Zoom has seen utilization skyrocket all through the coronavirus pandemic. Now two new bugs have been discovered that make it possible for hackers to just take manage of Macs which includes the webcam, microphone, and even total root entry.

Reported by TechCrunch, the new flaws were identified by Ex-NSA hacker Patrick Wardle, nowprinciple protection researcher at Jamf, who thorough his results on his website Goal-See.

Wardle goes as a result of a history of Zooms privacy and security concerns like the webcam hijacking we noticed very last summer months, the calls not basically currently being conclusion-to-end encrypted as the corporation promises, the iOS application sending person knowledge to Fb, and a lot more.

And Wardles newest bug discoveries suggest Macs are susceptible to webcam and mic takeover again, in addition to taking gaining root entry to a Mac. It does have to be a local attack but the bug tends to make it reasonably uncomplicated for an attacker to obtain full regulate in macOS by Zoom.

As these types of, today when Felix Seele also observed that the Zoom installer may possibly invoke the AuthorizationExecuteWithPrivileges API to conduct different privileged installation responsibilities, I determined to get a closer glimpse. Virtually quickly I uncovered numerous concerns, together with a vulnerability that sales opportunities to a trivial and trustworthy area privilege escalation (to root!).

Wardle describes the full process in specialized depth if you are fascinated but the flaw comes down to this:

To exploit Zoom, a community non-privileged attacker can basically substitute or subvert the runwithroot script in the course of an install (or enhance?) to obtain root access.

Then, a 2nd flaw Wardle discovered permits entry for hackers to entry a Macs digital camera and mic and even file the display screen, all without a consumer prompt.

Sad to say, Zoom has (for good reasons unbeknown to me), a precise exclusion that allows destructive code to be injected into its method space, in which stated code can piggy-back again off Zooms (mic and digicam) entry! This give malicious code a way to both file Zoom conferences, or worse, access the mic and digicam at arbitrary instances (devoid of the person obtain prompt)!

Zoom didnt answer to TechCrunch immediately after a ask for for remark. With the hundreds of thousands of folks utilizing Zoom with the latest world wellness disaster, hopefully, we see a deal with genuine speedy!

FTC: We use income earning car affiliate hyperlinks. More.

Check out 9to5Mac on YouTube for additional Apple information:

More here:

Ex-NSA hacker finds new Zoom flaws to takeover Macs all over again, together with webcam, mic, and root obtain - Mash Viral

Posted in NSA

Heres How The National Security Agency Will Protect Itself During A Pandemic – BuzzFeed News

Secret documents sketch out the worst-case scenario for a 1918-like pandemic and no effective response.

Posted on March 13, 2020, at 4:54 p.m. ET

The Department of Health and Human Services has recommended that intelligence community personnel have at least three months worth of food on hand in the event of an uncontrolled pandemic.

The recommendation was contained in an unclassified influenza contingency plan drafted in 2009 by the National Security Agency. It details the sweeping steps the spy agency should take to keep its personnel safe and working on critical intelligence matters in the event of such a crisis.

The 50-page document obtained by BuzzFeed News last July following a six-year Freedom of Information Act battle tracks closely with steps that have now been widely adopted by Americans facing the current coronavirus outbreak, which the World Health Organization officially declared a global pandemic this week. The contingency plan was drafted in response to a 2006 directive from then-president George W. Bush that called upon federal government agencies to implement a "national strategy" for a potential influenza pandemic.

The new coronavirus is a novel virus in the same family as those that caused SARS and MERS. So far it has spread to more than 132,000 people across the globe and killed 4,900 people, mostly in China. While the coronavirus is much more deadly than influenza, a flu pandemic can also have devastating impacts. The 1918 Spanish flu killed almost 50 million people worldwide.

Since 2013, BuzzFeed News has filed more than two dozen public records requests with multiple federal agencies seeking their influenza pandemic plans. Many agencies have refused. As recently as Thursday, the Securities and Exchange Commission cited an exemption under FOIA that applies to "the internal personnel rules and practices of an agency.

The NSA did not respond to a request for comment about whether the contingency plan it issued a decade ago has been updated and if it can be applied to the coronavirus pandemic. However, an official with the Office of the Director of National Intelligence, which oversees the intelligence community, told BuzzFeed News the agency intends to implement guidance issued by the Office of Personnel Management to ensure the intelligence communitys mission remains uninterrupted.

The IC has numerous missions requiring a global workforce presence, the official said, referring to the intelligence community. Agencies are developing preparation and response plans consistent with federal guidelines and regulations.

During a pandemic, the NSA's 2009 plan states that every time affiliates civilian or military personnel assigned to work at that agency enter a government building they would be screened for fever or other flulike symptoms, in an area outfitted with special airflow and filtration capabilities. The plan also limits employee travel and requires a physicians clearance to return from work after illness. In a crisis, the plan would give NSA leadership the ability to quarantine individuals, campuses or NSA headquarters.

Some workers would be asked to do jobs they dont normally do to staff critical mission functions for the NSA. During a pandemic, the agency would make evacuation payments to workers so they can reach a safe haven and continue working. The NSA also planned to provide access to psychologists or social workers to address stress.

The plan pointed out that simple steps, such as social distancing and proper hand-washing, are effective at slowing the spread of the virus. And the plan said that the goal of public health officials should be to slow down the rate of infection and limit the burden on medical staff and hospitals.

The plan is supplemented by a PowerPoint presentation titled Pandemic Planning that was written by the Department of Health and Human Services and contains specific recommendations for the intelligence community.

In one slide, HHS made stark predictions about a possible viral outbreak. We dont know when the next pandemic will occur, which influenza virus will cause it, or how severe it will be, the document stated.

A slide titled Pandemic Severity Index ranks threat levels. The top level is at Category 5 at which at least 2% of infected people die. Assuming a 1918-like pandemic and no effective response, the document said, more than 1.9 million Americans would die and 9.9 million others would require hospitalization.

Another slide titled Pandemic Policy to Maintain the IC Mission Objectives suggests that intelligence officers based overseas leave foreign countries early, return home and have enough food for 12 weeks and stockpile masks and medication.

HHS updated its pandemic influenza plan in 2017.

Original post:

Heres How The National Security Agency Will Protect Itself During A Pandemic - BuzzFeed News

Posted in NSA

National Storage Affiliates Trust (NSA) distance from 20-day Simple moving Average is -15.14% : What to Expect? – The InvestChronicle

Lets start up with the current stock price of National Storage Affiliates Trust (NSA), which is $30.37 to be very precise. The Stock rose vividly during the last session to $32.3 after opening rate of $31.08 while the lowest price it went was recorded $28.73 before closing at $29.93.

National Storage Affiliates Trust had a pretty favorable run when it comes to the market performance. The 1-year high price for the companys stock is recorded $38.22 on 02/18/20, with the lowest value was $27.16 for the same time period, recorded on 04/22/19.

Price records that include history of low and high prices in the period of 52 weeks can tell a lot about the stocks existing status and the future performance. Presently, National Storage Affiliates Trust shares are logging -20.53% during the 52-week period from high price, and 11.82% higher than the lowest price point for the same timeframe. The stocks price range for the 52-week period managed to maintain the performance between $27.16 and $38.22.

The companys shares, operating in the sector of financial managed to top a trading volume set approximately around 748525 for the day, which was evidently higher, when compared to the average daily volumes of the shares.

When it comes to the year-to-date metrics, the National Storage Affiliates Trust (NSA) recorded performance in the market was -9.67%, having the revenues showcasing -9.18% on a quarterly basis in comparison with the same period year before. At the time of this writing, the total market value of the company is set at 1.81B, as it employees total of 459 workers.

During the last month, 3 analysts gave the National Storage Affiliates Trust a BUY rating, 2 of the polled analysts branded the stock as an OVERWEIGHT, 3 analysts were recommending to HOLD this stock, 0 of them gave the stock UNDERWEIGHT rating, and 1 of the polled analysts provided SELL rating.

According to the data provided on Barchart.com, the moving average of the company in the 100-day period was set at 34.26, with a change in the price was noted -4.23. In a similar fashion, National Storage Affiliates Trust posted a movement of -12.23% for the period of last 100 days, recording 398,791 in trading volumes.

Total Debt to Equity Ratio (D/E) can also provide valuable insight into the companys financial health and market status. The debt to equity ratio can be calculated by dividing the present total liabilities of a company by shareholders equity. Debt to Equity thus makes a valuable metrics that describes the debt, company is using in order to support assets, correlating with the value of shareholders equity. The total Debt to Equity ratio for NSA is recording 2.19 at the time of this writing. In addition, long term Debt to Equity ratio is set at 2.19.

Raw Stochastic average of National Storage Affiliates Trust in the period of last 50 days is set at 18.91%. The result represents downgrade in oppose to Raw Stochastic average for the period of the last 20 days, recording 18.91%. In the last 20 days, the companys Stochastic %K was 15.94% and its Stochastic %D was recorded 22.01%.

Considering, the past performance of National Storage Affiliates Trust, multiple moving trends are noted. Year-to-date Price performance of the companys stock appears to be encouraging, given the fact the metric is recording -9.67%. Additionally, trading for the stock in the period of the last six months notably deteriorated by -6.35%, alongside a boost of 7.96% for the period of the last 12 months. The shares increased approximately by 1.84% in the 7-day charts and went up by -16.06% in the period of the last 30 days. Common stock shares were lifted by -9.18% during last recorded quarter.

The rest is here:

National Storage Affiliates Trust (NSA) distance from 20-day Simple moving Average is -15.14% : What to Expect? - The InvestChronicle

Posted in NSA

Even With Corona Virus, the Show Must Go On – Wheeling Intelligencer

When I was in Houston recently for our National Speakers Association (NSA) Winter Conference, one of the topics discussed was the corona virus. For professional speakers, it is a big concern since speaking at conventions or conferences is a major source of their income. Canceled meetings mean lost revenues.

A panel of experts told the attendees to expect many meetings to cancel out of caution, especially international meetings. They also gave us hope. Several years ago, one of the panelists had been to the region of China where the virus initiated. He told us the population in that region is over 20 million.

The number of reported virus cases in that region is approximately 200,000.

A person in that high-risk region has a very small chance of getting the virus and an even lower chance of being killed by it. We probably have a higher chance of getting the flu. This doesnt mean we shouldnt be concerned or take common sense precautions.

The panel made the point that speaking is a delivery system. This is a time to be creative. There are other ways to communicate information, such as webinars or video conferences, to name just two. The point is, we cant control the spread of the corona virus and we cant control the decision of an organization or company to cancel a convention or conference.

We cant control the actions of others. We do have control of our own actions and how we react to a problem.

Lynnda and I left Houston on a Sunday and flew to Orlando. We went straight to Epcot at Walt Disney World for a test run. We are both recovering from knee surgery and are coming back to Disney in a month with our youngest son and his family of four children. We wanted to make sure we could navigate the parks and rides without the need of a wheelchair or other assistance.

There is a lot of walking involved. Could we do it? Waiting for Lynnda to get her purse inspected at Epcot security, I got a call from my friend, Ben at IHSMarkit. He told me that out of concern for attendee safety, the World Petrochemical Conference in New Orleans the week of March 23 was canceled. As predicted at NSA, I was impacted by the corona virus.

WPC is a big deal for Shale Crescent USA. We have been preparing for months. We are a major sponsor. We were doing a lunch presentation. Last year our lunch presentation was packed to standing room only. I had meetings set up with six major companies all prospects for coming to our region. Historically WPC has been our best source of prospects and leads. All of this gone with one phone call we had no control over.

The panel of experts told us at NSA that if a conference is canceled, the reasons for people attending remain. That creates opportunity.

Most likely if WPC had been held, attendance would be lower. There would have been an increased risk for us of being infected, especially from a foreign source.

A number of other meetings have already been canceled. Some companies have restricted travel. We were going to meet our son in-law from Baltimore at the Orlando airport hotel. He was flying in for a one- day meeting. It was canceled.

At Shale Crescent USA, we have a choice. We can do nothing and feel sorry for ourselves or we can do something.

The WPC attendees have needs. We can help. We believe the show must go on. We decided to take control and seize the opportunity. We have begun to reschedule our WPC meetings with U.S. companies. We are still working on our presentation to turn it into a webinar or video conference. We can reach out to the same people and companies that would have been in attendance at our luncheon.

Asian companies will be more difficult, since we cant meet individually right now. There is a 12- to 14-hour time difference, so some of our webinars and video conferences could be at some odd night time hours. We may be able to get some of these companies to attend Select USA in June and meet with them at that time. There are always other possibilities we havent considered.

What does this mean to you? Life and business are full of surprises, some of them bad. There are circumstances and people we have no control over.

We have 100% control over our attitude and our actions. Doing nothing or having a personal pity party is not an option if we want to succeed.

We will all be impacted by the corona virus in some way. We are seeing lower gasoline prices due to reduced Chinese demand. We are also seeing lower stock market prices impacting our net worth, 401K or retirement. Business travel is already being restricted. Companies and individuals depending on China for products are impacted. We cant change these macro impacts. We can decide how we choose to react to them.

The corona virus is like any other problem we have no control over. We can choose to take control of our attitude and our actions. We can use our creativity. Some of what we do will fail. We can try something else. We can choose not to quit. I dont know what the result of our actions at Shale Crescent USA will be. The show must go on.

We will move forward.

I do know Lynnda overcame her surgery and I overcame my injury to have three great days without needing a wheelchair at Disney World. The show did go on. We believe we are ready for the grandkids. All things are possible.

Greg Kozera, gkozera@shalecrescentusa.com is the director of marketing and sales for Shale Crescent USA. He is a professional engineer with a masters degree in environmental engineering who has over 40 years experience in the energy industry. Greg is a leadership expert and the author of four books and numerous published articles.

Today's breaking news and more in your inbox

Why are so many public officials rushing to close public schools and ban big gatherings?Why are some companies ...

At the conclusion of the recent Business and Health Expo, vendors were handed a survey form pertaining to the ...

Its 2020, and while most minds might be on the upcoming elections, theres another way you can have your voice ...

We all need incentive. If we dont have it, everything grinds to a halt in our lives. But if we do have it, it is ...

You may have heard of the butterfly effect. The late Edward Lorenz, an American mathematician and ...

I wasnt afraid. Yet I heard the concern in my parents voice when they talked about it. I was just a ...

Read more here:

Even With Corona Virus, the Show Must Go On - Wheeling Intelligencer

Posted in NSA

Over Objections From Privacy Advocates, Tame Surveillance Bill Sails Through the House – Reason

It took all of a day after the text was released for the House of Representatives to vote for a surveillance reform and reauthorization bill that privacy groups (and some members of Congress) say doesn't go nearly far enough.

On Tuesday evening, Reps. Jerry Nadler (DN.Y.) and Adam Schiff (DCalif.) released the text of the USA Freedom Reauthorization Act. On Wednesday evening, it sailed through the House by a vote of 278136.

The bill renews but revises the USA Freedom Act, which was passed in 2015 after Edward Snowden revealed that the National Security Agency (NSA) had secretly been collecting and storing massive amounts of Americans' phone and internet records. The USA Freedom Act was a compromise between those who pointed out these acts violated Americans' privacy and Fourth Amendment rights and those who insisted the United States needed the info to fight terrorism. The law allowed the NSA and FBI to access these collected records under more strict guidelines and authorized the use of roving wiretaps to keep track of "lone wolf" terrorists.

The USA Freedom Act sunsets this weekend, and privacy activists on both the left and the right have used the opportunity to push for stronger protections from secret surveillance and unwarranted data collection.

Last night's vote suggests we will not see tougher reforms. The bill does include some milder (but nevertheless welcome) changes. It ends the records retention program entirelynot as big a deal as it might sound, since the NSA has already abandoned it. The Foreign Intelligence Surveillance Amendment (FISA) Court will have modestly expanded powers to bring in outside advisers when the feds want a warrant and to review decisions.And the attorney general will have to sign off on any secret surveillance warrant applications that target federal officials or federal candidates for office. But the bill does not grant civil libertarians' demands for limits on how business records can be secretly collected and used, for stronger protections against secret surveillance of First Amendmentprotected activities, and for a stronger role for those outside advisers.

The vote did not follow party lines. There is a consistent group of Democrats and Republicans who support strong privacy and Fourth Amendment protections, even if they don't see eye to eye on most other issues. Among the 60 Republicans who voted against the limper reforms were Louis Gohmert of Texas, Thomas Massie of Kentucky, Jeff Duncan of South Carolina, and Tom McClintock of California. Among the 75 Democrats who voted no were Zoe Lofgren of California, Alexandria Ocasio-Cortez of New York, Ted Lieu of California, Rashida Tlaib of Michigan, and Tulsi Gabbard of Hawaii. Independent Justin Amash of Michigan also voted against the bill.

But they're the minority. The larger, more establishment-minded leadership of Congress seems fine with kicking the can down the road yet again (the law will sunset once more in 2023) and reforming as little as they can get away with.

One of the more notable "yea" votes comes from Rep. Devin Nunes (RCalif.). A vocal defender of the president, Nunes has long insisted that the feds and the FISA Court abused their powers when they snooped on Trump aide Carter Page. (Subsequent investigation shows he was right to be concerned.) Nunes has even gone so far as to call for the entire FISA Court to be dismantled. Yet when it came time to vote, he, like he has done historically, voted to preserve the wider surveillance authorities.

This bill wouldn't have done anything to stop the FBI from wiretapping Page. He was neither a candidate for office nor a federal official at the time. But it will make it harder for the feds to wiretap Nunes.

The legislation heads over to the Senate now, where Rand Paul (RKy.) is trying to use his influence over Trump to stop the bill and demand stronger reforms. A tweet from Trump suggests Paul has the president's ear:

We went through this once before. That time, Trump wound up approving legislation that actually expanded the feds' authority to secretly spy on American citizens. Let's hope this isn't yet another case where the people in power care only about whether they are the ones being surveilled.

Read this article:

Over Objections From Privacy Advocates, Tame Surveillance Bill Sails Through the House - Reason

Posted in NSA

Four priorities of the education agenda – The Daily Star

If over the next two decades Bangladesh is to maintain its impressive 6-plus percent annual GDP growth, special policy level attention must be given to educational investment. Higher spending and better accountability of education officials for good management and results should be the focusand four priorities must be on the education agenda.

First, the government should consider spending on universal education as an investment instead of treating schools as cost centres. Recent experience from the Delhi's Legislative Assembly election and the stunning victory of the Aam Admi Party (AAP), defying the political tide, demonstrates that higher spending in public education combined with good school management pays off. It has resulted in better learning outcomes, higher student attendance and improved school infrastructures, which earned the APP political credits. This is a lesson worth noting for Bangladesh.

Second, all providers of primary and secondary educationpublic, non-state and privateshould focus on student learning outcomes, not just enrolment, dropouts and completion. Great strides have been made in Bangladesh in bringing children including girls into schools. A National Student Assessment (NSA) is undertaken every two years on a nationwide sample of grade three and five students and schools by the Directorate of Primary Education. NSA measures student learning in Bangla (the first language) and arithmetic against basic skills specified in the curriculum. NSA showed that more than half of class three and class five students did not perform at grade level in Bangla and arithmetic. In other words, after five years of primary education, the majority of students do not acquire literacy and numeracy at a functional level, handicapping them for further education or vocational skill training.

Education researchers and academics suggest two measures to help children achieve the essential competencies specified in the curriculum: i) Attract and retain enough capable teachers in the system and support and motivate them to perform in classrooms according to set performance standards; and ii) Discontinue the present high stake, nationwide public examinations at the end of grade five and eight which push students to memorise guidebooks and spend time and money on private tutorsand force teachers and parents to aid and abet this distortion of learning.

Testing is not a substitute for good teaching. School-based formative assessment of learners should be emphasised. The assessment of system, school and teacher performance can be better done through an adaptation of the NSA approach, without putting young children in tough competition with their peers.

Third, Bangladesh should consider joining OECD's Programme for International Student Assessment for Development (PISA-D). It is a pilot project that aims to make cross-country assessment more accessible and relevant to a wider range of countries. PISA measures key knowledge and skills that are essential to function in modern societies across countries.

In today's global world, Bangladesh has to compete in the world market and be at par in skills and competencies with other countries. Up to 700,000 young workers, almost half of all new entrants to the workforce every year, go abroad as migrant workers. These individuals as well as those staying at home must acquire the skills and capabilities necessary to adapt to the changing needs of the global market.

Cambodia, a country facing quality issues similar to Bangladesh, has joined PISA-D in its bid to improve student learning and assessment capacity. Its focus is on equipping young learners with 21st century skills that are in demand globally. Cambodia is being assisted by UNICEF-sponsored Southeast Asia Programme on Learning Metric (SEA-PLM). Bangladesh can benefit greatly by joining PISA-D.

Fourth, school level education planning, budgets, governance and management need to move progressively towards meaningful decentralisation and devolution of authority, where accountability lies with district, upazila and individual institutions. No other education system with the size and scale of Bangladeshwith 40 million students, a million teachers and 200,000 institutionsis run in such a top-down way as it is done here. The decisions that should be taken by the schools or local education authorities are often taken in Dhakafrequently the buck is even passed onto the highest level of the government.

Schools of the 21st century must be responsive and adaptive to the diverse needs and circumstances of students all across the country. Given that Bangladesh wants to join the rich countries club by 2041, it needs to pursue these four strategic steps.

Mohammad Shahidul Islam is an education policy researcher at the University of Toronto, and former Senior Education Adviser of USAID in Bangladesh and Afghanistan.

Link:

Four priorities of the education agenda - The Daily Star

Posted in NSA

Ensuring the Cybersecurity and Resilience of the Defense Industrial Base – Lawfare

Editors note: This post article is part of a series exploring the findings and recommendations of the U.S. Cyberspace Solarium Commission.

Cyber-enabled intellectual property theft from the Defense Industrial Base (DIB) and adversary penetration of DIB networks and systems pose an existential threat to U.S. national security. The DIB is the [t]he Department of Defense, government, and private sector worldwide industrial

complex with capabilities to perform research and development and design, produce, and maintain military weapon systems, subsystems, components, or parts to meet military requirements. It is a compelling example of a cross-domain challenge that lies at the intersection of cyberspace and conventional domains of warfare. This is because adversary behavior in cyberspace has broader ramifications, such as the potential to erode the United Statess conventional military advantage, undermine deterrence, and provide emerging nation-state competitors with an edge over the U.S. in military contingencies and conflicts. The threat is multifaceted. Intellectual property theft can enable adversaries to replicate cutting-edge U.S. defense technology without comparable investments in research and development. Adversary access to the DIB could inform the development of offset capabilities. It could even provide insights or access points that enable adversaries to thwart or manipulate the intended functioning of key weapons and systems designed and manufactured within the DIB.

As the sector-specific agency for the DIB, the Department of Defense takes the lead within the federal government for working with this critical infrastructure sector. The 2018 Department of Defense Cyber Strategy identifies defense of the DIB as a crucial imperative, noting that the Defense Department will defend forward to halt or degrade cyberspace operations targeting the Department, and collaborate to strengthen the cybersecurity and resilience of [the Defense Department], [Defense Critical Infrastructure], and DIB networks and systems. There are a number of federal entities involved in identifying, prosecuting and thwarting cyber threats to the DIB. These include the recently established Cybersecurity Directorate within the National Security Agency (NSA); the DIB Cybersecurity Program; and law enforcement and counterintelligence entities such as the FBI, the Air Force Office of Special Investigation, the Naval Criminal Investigative Service, U.S. Army Counterintelligence and the Department of Defense Cyber Crime Center.

Nevertheless, vulnerabilities within the DIB persist and there are gaps in existing efforts. Two critical shortcomings are, first, that there is no truly shared and comprehensive picture of the threat environment facing the DIB and, second, that efforts to rapidly detect and mitigate threats to DIB networks and systems are lacking. Adversaries operate in cyberspace across multiple areas and sectors within the defense industry. This means that, while an advanced threat actor may be targeting a number of entities within the DIB, any given target can only observe the adversaryits capabilities, tools, techniques and indicators of compromiseas it operates on its own assets, if at all. However, to gain insight into adversaries as strategic organizations, the Defense Department needs a consistent and coherent picture of where, how and why they are operating.

These gaps drive two important recommendations advocated by the Cyberspace Solarium Commission. First, through legislation, Congress should require companies within the DIB, as part of the terms of their contract with the Defense Department, to participate in a threat intelligence sharing program that would be housed at the department component level. Information sharing programs do exist, but they are insufficient. For example, the departments Cyber Crime Center and the DIB Cybersecurity Program are largely voluntary, although DIB entities have some mandatory reporting requirements. Existing programs also tend to benefit the larger prime contractors, which have the ability to share and consume threat information. But small and sub-prime contractors play vital roles in the supply chain, and vulnerabilities within these entities can have cascading negative implications. Finally, the Defense Department lacks a complete view of its supply chain, which may include non-U.S. companies. There are no mandatory reporting requirements that require prime contractors to disclose to the department the identities of their subcontractors.

The ultimate end state of this information sharing program is to leverage fused, real-time information from DIB network owners and operators, coupled with U.S. government intelligence collection products, to create a comprehensive picture of adversary organizations and an improved understanding of the adversaries own intelligence collection requirements. This would help the Defense Department and the intelligence community anticipate where adversaries will seek to collect against DIB targets. And, importantly, this information would need to be communicated to DIB network owners and operators so that they can proactively defend against impending threats, as well as support the threat-hunting efforts described further below.

The program should contain a number of key elements. First, drawing on the Defense Departments new Cyber Maturity Model Certification (CMMC) regulation, the requirements associated with participation would be tied to a firms level of maturity. In addition, there should be incentives around participation, particularly for small- and medium-sized companies. Second, there should be defined frameworks that guide specifically delineated information sharing, such as incident reporting and reporting on the use of subcontractors. Third, participation in the program should automatically entail consent by DIB entities for the NSA to query in foreign intelligence collection databases on DIB entities and provide focused threat intelligence to them, as well as enable all elements of the Defense Department, including the NSA, to directly tip intelligence to the affected entity. Finally, as it develops, the program should aim to support joint, collaborative, and colocated analytics, as well as drive investments in technology and capabilities to support automated detection and analysis.

The second committee recommendation is that Congress should direct regulatory action that the executive branch should pursue, through the Defense Federal Acquisition Regulation Supplement, to require companies within the DIB to create a mechanism for mandatory threat hunting on DIB networks. This would be as part of the terms of a companys contract with the Defense Department. Threat hunting is the act of proactively searching for cyber threats on assets and networks. This recommendation is meant to address the detection and mitigation of adversary cyber threats to the DIB, going a step beyond the intelligence sharing recommendation described above. As reflected in the new CMMC regulation, companies at different levels of maturity vary in their internal capacity to conduct threat hunting. There are several vehicles to support threat hunting, such as allowing Defense Departmententities to conduct threat hunting on DIB networkswith prior coordination with network owners and operatorsor enabling companies to contract with department-approved third-party entities to conduct threat hunting. Data generated from these activities should be fed back to the department and to the NSAs Cybersecurity Directorate. Threat hunting on these networks, particularly those that are assessed to be of interest to an adversary, enables network owners and operators, as well as the Defense Department, to have increased confidence in the security of such assets. Additionally, if threat activity is identified, it brings all parties attention to the breach so that they can work in concert to contain, remediate, and assess any potential damage and information exposure.

Every major U.S. strategy document frames the current environment as defined by a revival of great power competition. During historical periods of great power competition, strategic outcomes were often driven by advantages and innovation in military weaponry and technology. Therefore, failure to protect and secure the DIB, which drives the United Statess technological edge and military advantage, could have deleterious long-term consequences and is an example of how adversary activities in and through cyberspace on a routine basis can affect strategic outcomes.

See the original post here:

Ensuring the Cybersecurity and Resilience of the Defense Industrial Base - Lawfare

Posted in NSA

To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force – Lawfare

Editors note: This post is part of a series exploring the findings and recommendations of the U.S. Cyberspace Solarium Commission.

The Cyber Mission Force is the locus of the Department of Defenses efforts to counter, disrupt and impose costs for malicious adversary behavior in cyberspace. Three key changes enabled it, under Title 10 authorities, to conduct cyber effects operations more routinely outside of the Defense Departments information network and outside of a defined area of hostilities in support of campaign plans. The first was the debut of the 2018 Department of Defense Cyber Strategy, which introduced the strategic concept of defend forward. The second was the 2019 National Defense Authorization Act (NDAA), which defined cyberspace operations as a traditional military activity. The third was National Security Presidential Memorandum-13 (NSPM-13), which, as described by the Pentagons General Counsel in March 2020, allows for the delegation of well-defined authorities to the Secretary of Defense to conduct time-sensitive military operations in cyberspace. Together, these changes reflect a significant shift in strategic thinking from the 2015 Department of Defense Cyber Strategy, and from operational engagement limited to the kinetic battlefield, such as Joint Task Force ARES. However, while the Cyber Mission Forces operational goals have grown in scope and scale commensurate with the threat environment, its force size and structure have remained constant. Therefore, one of the Cyberspace Solarium Commissions key recommendations is to ensure the Cyber Mission Force achieves the appropriate resourcing, force size and capability mix.

Planning and conducting cyber operations and campaigns demands a significant investment in resources, human capital, access and tool development, and time. Yet, the core component of the cyber force across the joint services is essentially the size of one conventional army brigade. The Cyber Mission Force reached full operational capability in the spring of 2018; this includes 133 teams comprising a total of approximately 6,200 individuals. These teams are responsible for a plethora of diverse missions, including national mission teams that defend the nation by countering malicious adversary activity, combat mission teams that support the missions of the geographic combatant commands, cyber protection teams that defend the Defense Departments information network, and cyber support teams that conduct analysis in support of the national mission teams and combat mission teams.

However, full operating capability requirements were determined in 2013, well before the U.S. experienced or observed key events that subsequently shaped our understanding of the urgency and salience of the threat posed by malicious adversary behavior. Examples of such activity include Russia conducting cyberattacks against Ukraines power grid in 2015, as well as Russian cyber-enabled interference in the 2016 U.S. presidential elections. The full operating capability requirements were also determined prior to the development of the Defense Departments defend forward strategic concept, which broadened the scope of what it means for the Cyber Mission Force to defend the nation in cyberspace short of war.

This raises a number of critical questions. First, is the Cyber Mission Force appropriately sized and resourced given current and future mission requirements? The Cyber Mission Force is tasked with conducting a diverse set of missions, at scale, and must also have sufficient capacity to maintain steady-state operations while surging to respond to an emerging crisis.

Second, is the allocation of resources across teams within the Cyber Mission Force matched to the prioritization of threats? For example, if U.S. strategy identifies the most salient and significant threat to be malicious adversary behavior against the homeland below the threshold of armed attack, it follows that the national mission teams, which make up the Cyber Mission Force and are the operational arm of U.S. Cyber Command, should merit additional teams.

Finally, concurrent with an increase in the size of the Cyber Mission Force, how can the U.S. ensure that supporting entities, particularly the National Security Agency (NSA) in its combat support agency role, are also appropriately resourced? The NSA provides critical intelligence support to cyber operations conducted by Cyber Mission Force teams, particularly at the tactical and operational levels. As the Cyber Mission Forces operations and needs grow, intelligence collection demands corresponding resourcing.

There has been some progress in assessing Defense Department cyber personnel, structure and organizations, particularly in Sections 1652, 1655, and 1656 of the recently passed FY2020 NDAA. However, Congress must also ensure that the Cyber Mission Force, in particular, conducts a force structure assessment and troop-to-task analysis that takes into account the increasing scope and scale of Cyber Mission Force missions compared to previous fiscal years and projected into the future, as well as an assessment of resource requirements for the NSA in support of this aspect of its mission. This is why the commission recommends that Congress should request in the next Cyber Posture Review, and quadrennially thereafter, that the Defense Department provide an assessment of the requirements to grow the Cyber Mission Force, including projected force size and mixture necessary to sustain all Defense Department missions in cyberspace. The results of this assessment should drive resource allocation, force size and mix, and continued congressional oversight of these efforts.

Further, the threat environment and rapid pace of technological change in cyberspace demand speed and agility. These realities drove additional recommendations from the commission. Here, we highlight three in particular that, taken together, would enhance the flexibility of acquisitions and decision-making to enable adaptability, and rapid response and maneuver.

First, Congress should establish a major force program funding category for U.S. Cyber Command. Congress requires the Defense Department, according to 10 U.S.C. 221, as part of the Future Years Defense Program, to annually submit a budget that includes estimated expenditures and appropriations projected over a 5-year period. This program is currently organized into 12 different major force program funding categories that represent a total amount of dollars, manpower and forces appropriated for each category. A new major force program funding category for U.S. Cyber Command, similar to what currently exists for U.S. Special Operations Command, would provide U.S. Cyber Command with acquisition authorities over goods and services unique to the commands needs. It should also provide a process to expeditiously resolve combatant command/service funding disputes.

Second, Congress should request that the Defense Department provide in the next Cyber Posture Review an analysis of, and recommendations for, the conditions under which further delegation of cyber-related authorities is appropriate to U.S. Cyber Command, as well as to other Defense Department components, such as the NSA. The pace of cyberspace operations may require delegated authorities under certain conditions to pursue and deliver effects against adversary targets. This would, when appropriate, remove friction and support rapid response and maneuver. Importantly, this recommendation does not call for new authorities within the scope of Title 10. Rather, it is focused on the cyber-related authorities that already exist within the Defense Department but may be fragmented across different elements (for example, functional combatant commands, geographic combatant commands and the various services). Examples of these authorities include those that support planning and implementing offensive cyber operations, such as information operations-related authorities that include creating, procuring and deploying personas. Relevant authorities to review for delegation to the NSA should include those authorities that enable the agency to rapidly tip relevant foreign intelligence collection to private entities within the Defense Industrial Base and their service providers to support the latters own defensive operations.

Finally, as part of the next Cyber Posture Review, the Defense Department should produce a study that assesses and provides recommendations for amendments as necessary to the Standing Rules of Engagement and Standing Rules for Use of Force for U.S. forces. These rules have not been updated in more than a decade, despite major changes in technology and the strategic environment. The commission, in particular, recommends assessing how these rules apply to activities in cyberspace below the level of war or armed conflict, and how unique aspects of cyberspace (for example, the absence of high seas and the definition of territory) affect their current application. Importantly, this recommendation should not be construed as necessarily calling for a loosening of the rules under all conditions. Rather, updating and clarifying how these apply in cyberspace where U.S. forces are already operating in day-to-day competition is as important for risk mitigation as for reducing operational friction.

Taken together, these recommendations will empower the Cyber Mission Force and U.S. Cyber Command to plan for cyber operations above the level of armed conflict as well as to rapidly maneuver against and engage adversaries below it.

Excerpt from:

To Defend Forward, the U.S. Must Strengthen the Cyber Mission Force - Lawfare

Posted in NSA

Is an *NSYNC Reunion Any Closer to Reality? Weve Been Talking, Says Lance Bass – Variety

What does Justin Timberlake really think about an *NSYNC reunion? And would JC Chasez consider taking the group on the road without him? Those were two burning questions posed by fans on The Daily Popcast With Lance Bass, airing this week and sort of answered.

A return to the *NSYNC original lineup Timberlake, Chasez, Bass, Chris Kirkpatrick and Joey Fatone would be the ideal way to mark 20 years since No Strings Attached was released, selling over 2.4 million copies in its first week, a record for the time.

Weve been talking about it, Bass tells Variety. No plans have been made. If there will even be plans, who knows? I think if we did anything, it would be for the fun of it the world needs something fun to listen to and I think we could bring some positivity to it. Thats what we need right now. It could be something simple to test it out, and if it works, it works and if it doesnt, it doesnt.

Bass, 40, says fans will get clearer answers on where the group stands on the idea when he releases his interviews, one day at a time starting today. One member will also interview Bass for Fridays edition of the Popcast, while Saturdays anniversary special features co-hosts Peachy Keen (Jess Keener) and Giggles (Lisa Delcampo) asking the singers hilarious rapid-fire questions.

Ive done Joey and JC so far and theyre very different interviews, Bass adds. JCs the hardest to nail down and more mysterious, so it was interesting to get into his head. Youll definitely hear his opinion on the reunion and if itll happen.

Bass is also thrilled about getting a rare insight into Timberlakes thoughts on topics the two have never discussed in their 25-year friendship. Hes the only [bandmate] I havent interviewed before, so Im super-excited to delve into what his lifes like now, talk about No Strings Attached and that era, ask what that [solo] transition was like and get his opinions on the future of *NSYNC, says Bass. I want to pull the curtain back and show you who Justin is who my best friend was years ago. He was 14 years-old when I met him. A bond thats incredible. We experienced things most people didnt go through and I love the juxtaposition of what we were then to now, and how weve all grown into who we grew into its all because we influenced each other at such a young age.

Its not surprising how impactful the young singers friendships were given the tumultuous wave they rode together preceding NSAs release. While working on the follow-up to 1997s self-titled debut, the group as well as their peers, the Backstreet Boys became suspicious of their then-manager Lou Pearlmans financial dealings. Both bands took legal action, with *NSYNC successfully cutting ties with Pearlman and RCA, signing with Jive Records and retaining their name.

It was a crazy time because we didnt know where our careers were going and every expert around us said, Your careers over kids, recalls Bass, who produced the film Boy Band Con, a 2019 documentary about Pearlman. That hurts when youre that young and have worked so hard. The last thing you want to hear is the head of the label saying, Guys, you might have one more album in you if you just stick with Lou Pearlman. It was a scary moment. We thought our careers were done. So many crazy thoughts went through our heads, but when we finally got our name back and ended our relationship with Lou, everything started flowing.

NSA spawned two of *NSYNCs biggest hits, Bye Bye Bye and Its Gonna Be Me, which featured writing credits by Max Martin, Andreas Carlsson and the Cheiron Studios team. The album also featured songs by Richard Marx and Diane Warren.

While *NSYNC followed up with 2001s Celebrity, the quintet announced a hiatus in 2002, and in recent years have only reconvened on stage to honor Timberlake and his Video Vanguard Award at the 2013 MTV VMAs. He was absent from Coachella 2019, where the four joined Ariana Grande for a surprise appearance, having just wrapped his Man of the Woods tour.

It was at Coachella where Bass met an artist hed never heard of Lizzo who would become key to one of his biggest 2020 projects, collaborating with Richard Bransons Virgin Fest. Lizzo and A$AP Rocky are headlining the Los Angeles music and environmental awareness event in June.

Richard Branson and myself are big space geeks and tech people, so we wanted to create something that entertained people by bringing in the Lizzos and Anderson.Paaks but also showed the future, Bass elaborates. Its about doing right [for] the environment and what next cool futuristic thing will help our planet. It reminds me of the World Fair, where people used to go to see new stuff, with a little mix of Coachella!

Bass love for podcasts will feature at Virgin Fest, where The Daily Popcast and Bass favorite hosts will broadcast live from the Bubble Tap VIP Area, a nod to his Bubble Tap Trailer mobile wine business. Its one of several boozy endeavors, including his West Hollywood bar Roccos WeHo and upcoming mixers line, J.A.X. (Just Add X X being your favorite spirit), a collaboration with Vanderpump Rules star Jax Taylor, launching at Virgin Fest.

The fun thing has been coming up with J.A.X flavors because theyre unique, taste great, are low-calorie and have vitamins, says Bass, whos also producing a film about *NSYNC superfans who put their lives on hold in order to follow the band on tour. The dangerous part is you cant taste the alcohol. Itll sneak up on you.

As for whether J.A.X or Bubble Tap have been loosening lips in-studio during Bass *NSYNC interviews: I havent done Justin or Chris yet, so maybe Ill bring some in then they can give me testimonials!

More:

Is an *NSYNC Reunion Any Closer to Reality? Weve Been Talking, Says Lance Bass - Variety

Posted in NSA

NSA Offers Suggestions on Restructuring the IRS – CPAPracticeAdvisor.com

The National Society of Accountants (NSA) has responded to anIRS request for comments on the proposed IRS restructuring contained in the Taxpayer First Act (TFA). The suggestions come as a response to the solicitation for industry commentary presented at the Taxpayer First Act discovery meeting held on January 15, 2020 which was attended by NSA and other national organizations.

While given the opportunity to be signatory on a letter drafted by various other industry organizations, the NSA opted to deliver an independent response. NSAs suggestions draw from decades of advocacy and a strong relationship with the IRS, the Office of the National Taxpayer Liaison, IRS Tax Forums, the Electronic Tax Administration Advisory Committee, and the Internal Revenue Service Advisory Council.

NSAs suggestions included:

NSAs membership of tax and accounting professionals appreciates the opportunity to provide input in the process and we welcome the open dialogue environment the IRS has established. We are committed to assisting the agency in any way possibleto achieve the requirements of the TFA, wrote NSA CEO John Rice. We stand ready to help.

Download a copy of NSAs response to the IRS here: https://www.nsacct.org/viewdocument/irs-suggestions-for-irs-restructuri

More here:

NSA Offers Suggestions on Restructuring the IRS - CPAPracticeAdvisor.com

Posted in NSA

NSA whistleblower petitions Trump for clemency | TheHill – The Hill

Reality Winner, theNational Security Agency (NSA) whistleblower jailed for leaking classified information on Russias interference in the 2016 election, petitioned President TrumpDonald John TrumpSchiff blasts Trump for making 'false claims' about Russia intel: 'You've betrayed America. Again.' Poll: Sanders leads 2020 Democratic field with 28 percent, followed by Warren and Biden More than 6 in 10 expect Trump to be reelected: poll MORE for clemency Monday.

Winner's attorney Alison Grinter said in a press conference in Dallas that she will submit the petition to the federal office of the pardon attorney, who advises the president on pardons.

She also plans to send 4,500 letters of support, including ones from privacy and free press advocates,according to The Intercept.

Winner was sentenced to five years and three months starting in August 2018 after admitting to giving classified information about Russias attempts to hack local elections before the 2016 election to an investigative news website, The Guardian reported.

Our national healing process cannot begin until we forgive our truth-tellers and begin the job of rebuilding what was taken from us: election security, accountability for those who endeavor to undermine our democracy; and safeguarding the American right to government by and for the people, Grinter said at the conference. None of this can begin in earnest while we are still punishing those who tell us the truth.

The petition alleges that Winner's imprisonment is costly, unnecessary to protect the public, burdensome to her health and wellbeing, and not commensurate with the severity of her offense.

The president previously commented on Winners sentencing in an August 2018 tweet, in which he specifically criticized then-Attorney General Jeff SessionsJefferson (Jeff) Beauregard SessionsOn the Trail: Senate GOP hopefuls tie themselves to Trump Trump looms as flashpoint in Alabama Senate battle Trump tweets test Attorney General Barr MORE and called Winners crimes small potatoes compared to what Hillary ClintonHillary Diane Rodham ClintonSchiff blasts Trump for making 'false claims' about Russia intel: 'You've betrayed America. Again.' The problem with Trump's Middle East peace plan Trump's Intel moves spark Democratic fury MORE did," in an apparent reference to the private email server Clinton kept as secretary of State.

Ex-NSA contractor to spend 63 months in jail over classified information. Gee, this is small potatoes compared to what Hillary Clinton did! So unfair Jeff, Double Standard.

Winner has said in a 2018 interview with CBS News that she cant thank him enough for the tweet.

"I don't like to assume anything as to what's going on in his head, but the 'small potatoes' was a breath of fresh air. It really made me laugh. It reminded me of me and my own family. We try to make a joke out of everything. We laugh every single day no matter how bad things get, and he really gave a whole sense of humor to the thing 'cause it is quite bizarre," she said.

Read more here:

NSA whistleblower petitions Trump for clemency | TheHill - The Hill

Posted in NSA