Project TITANIUM: The EU’s Plan to Decloak Cryptocurrency – Bitcoin Magazine

Project TITANIUM: The EUs Plan to Decloak Cryptocurrency

Monitor blockchains, deanonymize wallet addresses, surveil dark net markets, and stop terrorists and money launderers: thats the main thrust of the European Unions Project TITANIUM.

TITANIUM, which stands for Tools for the Investigation of Transactions in Underground Markets, is a three-year, 5 billion ($5.5 billion) project that will unite universities, private research firms and law enforcement agencies from the U.K., Germany, Spain, Austria, the Netherlands and Finland.

Project TITANIUM will develop tools and best practices for criminal investigations involving cryptocurrency in Europe, which, up to now, most law enforcement agencies have pursued on an ad-hoc basis.

The project plans to create forensic tools to spot clusters of addresses controlled by the same entity; identify mixers or tumbler addresses used for money laundering; crawl the webs, both clear and dark; and automate information gathering about illegal activities.

The projects coordinator, Dr. Ross King of the Austrian Institute of Technology, said that criminal and terrorist uses of cryptocurrencies and dark net markets evolve quickly. King also insisted that Project TITANIUM would respect citizen privacy.

Project TITANIUMs announcement comes just a few weeks after the ransomware worm WannaCry disabled hundreds of thousands of computers in more than 150 countries. As of June 15, 2017, the hardcoded wallet addresses used by the attackers have collected about 50 BTC in ransom payments.

The projects scope covers terrorism, as well as crime, and back-to-back attacks in Manchester and London have ignited calls for more sweeping government action to combat extremism.

On June 4, 2017, Prime Minister Theresa May called for international agreements to regulate cyberspace and to deny violent extremists safe spaces online. With terrorism in the background, cooperation on internal security matters like Project TITANIUM is likely to continue even after the U.K. formally exits the EU.

The call for more surveillance comes despite the fact that the United Kingdom already has one of the most wide-ranging surveillance laws, the Investigatory Powers Act, which went into force December 30, 2016.

Nicknamed the Snoopers Charter, the act requires ISPs keep record of all websites users visit for one year and allows police and other public agencies to check anyones history without a warrant.

Meanwhile, the EU is mulling a more direct approach to the problem of cryptocurrency. According to a proposed directive released on March 9, 2017, the EU could require exchanges and wallet providers to submit account owners identities to a central database.

The directive goes on that virtual currencies should not be anonymous, and that the anonymity or pseudo-anonymity of cryptocurrencies is more a hindrance than an asset for legitimate users.

The rules would not just apply to bitcoin, but all virtual currencies, and would effectively ban anonymous cryptocurrency, at least in the EU. The proposed directive is intended to combat money laundering and terrorism, despite scant evidence that cryptocurrencies play a prominent role in either.

Nevertheless, with or without evidence that they are empowering terrorists, the anonymous or pseudo-anonymous nature of cryptocurrencies is threatening to European lawmakers, and whether through legislation or projects like TITANIUM, they intend to decloak cryptocurrency.

Excerpt from:
Project TITANIUM: The EU's Plan to Decloak Cryptocurrency - Bitcoin Magazine

UK Financial Regulator Calls for Caution on Cryptocurrency Investing – CoinDesk

An official at the UK's top financial regulator has issued new comments calling for consumer caution on bitcoin and cryptocurrency investing.

As reported by Financial News, Financial Conduct Authority (FCA) director of strategy and competition Chris Woolard addressed the subject at a blockchain event held by the regulator last week. While affirmingthe regulator's enthusiasm for blockchain at the time, Woolard voiced concern about the recent meteoric growth observed in the cryptocurrency markets.

In particular, he arguedmore perhaps should be done to alert consumers that cryptocurrencies are not regulated financial instruments and, as such, they don't have the consumer protections associated with more mature assets.

According to the news source, Woolard said:

"I am not saying that we view digital currencies as an inherently bad thing but we do have to exercise a degree of caution."

Woolard went on to pledge that the FCA would continue to ring the alarm over potential suspicious actors in the industry a role it has long played. Among others, the FCA has previously issued warnings against a suspicious crypto trading website and a digital currency scheme called OneCoin that has drawn the ire of several global regulators.

Still, the FCA has proved to be among the more progressive regulators on the issue as well, granting US startup Circle Internet Financial, at the time a bitcoin brokerage, an e-money license in 2016.

As recently as last week, the agency further revealed it has increased its commitment to industry startups through a 'sandbox' initiative by helping to incubate nine new blockchain and distributed ledger startups.

Disclosure: CoinDesk is a subsidiary of Digital Currency Group, which has an ownership in Circle.

Chris Woolard image via Innovate Finance/YouTube

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

Original post:
UK Financial Regulator Calls for Caution on Cryptocurrency Investing - CoinDesk

It looks like cryptocurrency mining is driving up Nvidia graphics card prices too – PC Gamer

We pointed out a couple of weeks ago that cryptocurrency miners are largely to blame for the scarcity of AMD Radeon RX 580 and 570 graphics cards. That has not changedfinding an RX 580/570 in stock and without a grossly inflated price tag is a near-impossible taskbut what has changed is that miners now seem to be driving up the price of Nvidia's GeForce GTX 1060 and 1070 cards too.

A user on Reddit lamented that GTX 1060 pricing is "skyrocketing," which is an exaggeration of the situation, though not totally off base.

"I just checked Jet and their cheapest 6GB 1060 was $280 when yesterday it was $246. On Newegg, the cheapest was $226 and now it's $270? Is this because of mining? Should I buy one now before the prices get higher? I'm freaking out guys!," Lions_for_Life posted.

He also pointed out that he had the opportunity to grab a GeForce GTX 1060 card the other day for $210, only to now see that prices have jumped across the board. Is there any merit to his claim? We decided to do some digging and as it turns out, he appears to be onto something.

One of the cheaper GTX 1060 cards out there is MSI's GTX 1060 Aero ITX 6TG OC. It is the least expensive 6GB 1060 on Newegg, which as the Reddit user noted is priced at $270. Over at Amazon, only third-party vendors offer the same card, albeit starting at $294yikes!

We headed over to CamelCamelCamel to see how this card has been trending, and sure enough the asking price is as high as it's ever been.

About a month and a half ago, this same card sold for around $220 on Amazon, via third-parties. So in other words, pricing has risen 34 percent in the span of about six weeks.

A similar situation seems to playing out in GeForce GTX 1070 territory as well. Take the Asus GeForce GTX 1070 8GB ROG Strix OC Edition (STRIX-GTX1070-O8G-GAMING). Amazon has this one in stock for $470, versus $399 as recently as May 22. Have a look:

For the most part, this fluctuated between $420 and $450 for several months for dipping down to $399, but has now ballooned to a new high.

So what does all of this mean? We can't say with 100 percent certainty that cryptocurrency miners are the culprit, but it sure seems that way. That's where AMD's hardware partners pinned the blame the shortage of Radeon RX 580 and 570 cards, and with those being out of stock, it makes sense that miners would turn to alternative hardwarein this case, GeForce GTX 1060 and 1070 cards.

In case you're new to all of this, cryptocurrency participants use graphics cards to "mine" various coins, which can be traded for Bitcoin and then sold for actual cash. The right hardware can pay for itself within months, and at that point anything that is mined is pure profit (minus the power bill).

This was not an issue for gamers over the past few years because miners had turned to ASIC hardware built specifically for mining. However, GPUs are popular again because of newer hashing algorithms, like Ethereum's DaggerHashimoto or ZCash's Equihash, which are resistant to ASIC hardware. On top of that, there has been a spike in the value of Ethereum and Bitcoin lately, the latter of which recently topped the $3,000 mark for the first time.

Another reason we're seeing this play out among Pascal cards is that Nvidia GPUs are proving nearly as profitable as AMD GPUs with some cryptocurrencies. While AMD's GPUs are still generally better, some of Nvidia's card's are cheaper and consume less power.

Hopefully AMD and Nvidia both can get handle on things by increasing production and/or building a separate set of cards specifically intended for miners. Otherwise, your best bet is to pounce on a good deal when you find one, as the aforementioned Reddit user wishes he had done.

Original post:
It looks like cryptocurrency mining is driving up Nvidia graphics card prices too - PC Gamer

National Bank of Abu Dhabi Adopts Ripple Cryptocurrency Software – Investopedia

Although it is often overlooked by investors more eager to focus on Bitcoin and Ethereum, Ripple has several factors in its favor in comparison with the rest of the cryptocurrency field. The currency, now sporting the third-largest market capitalization in the industry, is designed for seamless transactions which can be settled by banks in real time. The result is that transaction fees can be kept down for both banks and individual customers. Considering that long transaction settlement times and unstable fees have been two of the largest barriers to cryptocurrencies generally breaking into the broader financial world, Ripple seems poised to become a favorite among financial institutions. Now, the National Bank of Abu Dhabi has announced its adoption of the Ripple protocol for some of its transactions. Will this be the impetus that Ripple needs to garner more attention around the world?

Late last week, the National Bank of Abu Dhabi announced plans to adopt the Ripple protocol for all cross-border transactions. According to Live Bitcoin News, the National Bank has indicated a particular interest in enhancing the experience of its customers, and bank leaders seem to have agreed that blockchain technology can be a useful way of doing this. When it comes to selecting from different blockchain technologies, Ripple has won out, and perhaps for good reason. Ripple is focused on facilitating cross-border transactions and may be used to complete transfers across multiple distributed ledgers.

The National Bank of Abu Dhabi will reportedly integrate the Ripple protocol into its existing infrastructure. The result is that regional customers of the bank will have the ability to transfer funds to beneficiary accounts instantly. All of their transactions will take place in real time. That the United Arab Emirates, the home of the bank in question, is one of the top remittance-sending countries in the world, suggests that the Ripple technology will be put into broad use through this partnership.

Ripple technology has gained increasing levels of attention in recent months as banks around the world have shown interest in its real-time payment flows. It is likely that other banks will be watching the results of the Abu Dhabi integration carefully to see how Ripple's distributed ledger system holds up under pressure. In the meantime, Ripple's currency, XRP, has grown considerably in price but has failed to see the same recent rally results that Ethereum and Bitcoin have. Should the technology prove successful in this latest partnership, perhaps Ripple will see concurrent benefits to its currency prices as well. If that is the case, Ripple may see even more banks around the world looking to enter into partnerships.

View original post here:
National Bank of Abu Dhabi Adopts Ripple Cryptocurrency Software - Investopedia

WikiLeaks: CIA Spying on Home Wi-Fi Routers – Newsmax

Home Wi-Fi routers made by Linksys, DLink, Belkin and other top tech firms have been used by the CIA to monitor the flow of internet traffic, documents revealed by WikiLeaks show.

The infected routers spy on the internet-connected devices' activities without the user knowing, turning them into "covert listening points," the Daily Mail reports.

A 175-page CIA user manual for setting up the spying activity dubbed "Cherry Blossom," reads in part:

"The Cherry Blossom (CB) system provides a means of monitoring the internet activity of and performing software exploits on targets of interest. In particular, CB is focused on compromising wireless networking devices, such as wireless (802.11) routers and access points (APs), to achieve these goals.''

It also explains how a maneuver called "tomato'' can steal the routers' passwords if a default feature known as a universal plug and play is left on.

The manual, according to the Daily Mail, is about 10-years-old.

2017 Newsmax. All rights reserved.

Visit link:
WikiLeaks: CIA Spying on Home Wi-Fi Routers - Newsmax

Julian Assange and WikiLeaks Accused of Censorship by ‘Risk’ Documentarian Laura Poitras – IndieWire

More than a month after Risk was released in theaters, the documentarys story continues to evolve. The latest development is especially dramatic: Laura Poitras and the films other two producers have published an op-ed in Newsweek accusing Julian Assange and WikiLeaks of censorship.

READ MORE:Risk Takes On Julian Assange: The Dramatic Story Behind Laura Poitras Oscar Follow-Up

Poitras, Brenda Coughlin and Yoni Golijovwrite that Assange and WikiLeaks the subject of their film have sent cease-and-desist letters to Neon, the distributor of Risk, demanding that they stop the films release. They find that hypocritical to say the least: In WikiLeaks efforts to prevent the distribution of Risk, they are using the very tactics often used against them legal threats, false security claims, underhanded personal attacks, misdirection and with the same intentions: to suppress information and silence speech, they write.

READ MORE:Risk: Laura Poitras Yanks Screenings For Last-Minute Edits Following New Julian Assange Developments

All the participants in Risk agreed for years to be in the film, they continue. We have no obligation to seek WikiLeaks or Assanges authorization to release the film. In fact, our rights under the First Amendment are protected precisely because we are engaging in independent journalism.

The scope of Risk shifted and evolved as new developments came to light. Read the full op-ed here.

Stay on top of the latest breaking film and TV news! Sign up for our Festivals newsletter here.

More:
Julian Assange and WikiLeaks Accused of Censorship by 'Risk' Documentarian Laura Poitras - IndieWire

Wikileaks … Good or Bad? Trump says bad …VERY BAD!!! – WWL First News

And welcome back don't forget coming up this afternoon LSU in the college World Series. There continued to play that he won it's Saturday against Florida State University. So they're playing organ state the beavers today and that is. Going to be a big match up 5:30 pregame 6 o'clock first pitch because both teams are on. Winning streak cell issue is he says seventeen game winning streak and Oregon State. He 22. Game winning streak on the lost four games all season as a coach pulmonary said the Los four's so. They can be beat. We have a chance. And he was joking about it so you're telling us there's a chip. Is basically what he said all right let's go back to John industrial age on I think we got two phone there on. Yeah I them yeah I can hear you now okay go ahead which which. Erica. I don't have a floor. And you're telling people are and classified information. And you don't have a source. Art. I disagree about putting. He brings out your sources are unclassified in. So cal which are source because they're making. Me more big deal. If so. If the president was under and investigation. What does it matter at this point if you let that people knowing who your sources. I mean it's not it's it'd it'd. I want to sources that I mean it's cot side. That's a different situation. Though love easily construct that jets or confusion. And just fight against each other further political. And I don't like being manipulated. Politicians actually ordered me. And I don't I don't wanna be manipulated and I actually throughout the at a time you've given me information that incorrect. I think up fine and there. Because union to start checking your sources and that is going I mean you're about to be responsible. Boy. Teller a note going on in our country and you're not doing so I think firing. Her. Are you talk about you personally the media that that puts them a cut all if you're syndicated. On our. I try to get I try to get as many facts as I can and sometimes I can't find them and sometimes a little bit and I've got something wrong John. But what I'm saying it. You don't want earned. They're cute that you give that information okay. And then you need it we need to have some recourse to stop this stuff. That that is a part of all part of freedom of the prestige. That they don't I dinosaurs. Are. While then we just as you can have it both ways as wooden thing. Where you have you have the media controlled by a Vigo or you reports. Actually care about flies because our investigators say I'm agent named sources and then and then out there on who you're source says. And I can go. Well they don't they can ask but. But they don't have to deal of those sources because we've seen people go to jail for not giving up their sources. And don't put it it's on. I yeah. Aren't in yet. Her daughter or rather. I'm just beat and the final battle as a good. But the thing there. To hold you responsible. When you do irresponsible. Or. And and it. That's like crying fire in the year and so he. Some have vault have lost their jobs by putting out false stories are related proven false and notice hired him anymore is it for is being reporters that mean that has happened. That's a very that's an excellent take care of the problem. And I think that's fine if you contain you know he'd wait aren't well I mean our remote straps absolutely. I don't want freedom law. And are allocated difference between freedom of law and freedom of speech. And I don't believe for mobile and I think ally ticket keeps telling that same line. Leo freedom of lying also be freedoms the and I mean there are you don't. Our. Dog if I tell you you know if you like your kids allergies up league east. Whether he's right or not he's got the Freedom Party to decide it. Catch you if you're but I posting went. I understand were saying if you're if you're supposed to be trusted news source in your doing it then we got to. OK. And I I think were on the same page on which is. Having fun playing doubles with our. Current and important right John excellent golf. Our thanks for you know will take a break and be right baca Chris. Sin LC hang on a good view as well as the person calling it a lot of techs also final four to 60170. Or you could tech city 78 Seve will be right back starting for Garland on WW well. And welcome back to WWL. 504260187. He's a number calling detects an 87870. Tonne and for garlic got a text that says. Trump decided to attack American democracy in American democracy decided to attack trump right back surprise surprise we were warned. That trump was not qualified to be president. Well the played devil's advocate for that according to the US constitution article two section one. These are the qualifications for president which. Prom mat so I don't know which are considered to be qualified that's up to used to what they are qualified but basically to be president of the United States. It just says no person except a natural born citizen or a citizen of the United States at the time of the adoption of this constitution. Shall be eligible to the office of president neither shall any person be eligible to that office who shall not have attained the age of 35 years between these older net. And been fourteen years a resident within the United States which he had. The only amendment to that has been in the term limit amendment no person shall be elected to the office of the president that is the US constitution amendment. It's. 22 section one. Or ratified February 271951. Overs and chubby elected the office of the president more than twice. And no person who has held the office of president or acted as president for more than two years of return. To which some other person was elected president Shelby elected to the office of the president more than once so those are basically altercations. Yet be over 35. Born in this country. I've lived here for fourteen years as a natural born citizen. Been a resident for at least fourteen years so that's it. There's no qualifications about going to law school was no qualifications about. Offices held previously or being in government before. So. Again he met the qualifications. If you wanna say to be president whether. He met the qualifications of what we've previously seed is to be a president. Then maybe you've got an an argument there let's see let's go to Chris and oral take Chris thanks for call to be Nabil. Thanks for and yeah I do think leaks can be a good thing. For example if they polar. And unknowing public during an election. A large portion. The media it is colluding with the political. Party. Exact example from the point 160 election when WikiLeaks released John pedestrian emails and it was on news essentially. Puppeteer. A large majority of the mainstream media he did his agenda across to lie to make it seem like there are. And I also against him against Ernie and Bernie Sanders correct. Well most of them is again Sanders to read it cheaper and yet that her that. The cheaper and standard and beat the owners who donated to the DNC. Because well. Speak for Bernie Sanders. And the attendant made it look like or support the cultural every time they had a article adult child patients and mole wearing. Oh big redneck GO how infuriating that would. But it and Chris Chris here's the point it didn't work because trump got elected. And nothing done to stop our owners are now in doubt you but even if they even if they held them responsible right now it's still wouldn't change the outcome of the election is what Johnson. Well it would help and to alleviate some disgusting rhetoric that's being poured on on trial because mainstream media is still in debt that it DNC. And you think your partner. I don't I don't know I am to be it continues to have court and court packs because. It. And Chris. Chris yeah yeah because Chris Chris let me let me let you know now Chris might ultimately club to explain. They have them on because they represent that side and that we have the heritage group on the represents the other side. John Podesta was not held accountable for his nets doing. And and saddened I need to know that to me to hold them accountable that's up to if if this investigation is. Harry Rosenberg said it can go into that way and they can hold him accountable if they want to. But he did see you too on alert the public that he now works in Washington Post which is sort or. A lot of and and I think that's. Then that's been said before and that's why send it to you believe the leaks. So again. That information is out there. So do you believe them or not. Do you think they're good thing or not only one event a figure party or not. We'll take a break be right back in wrap it all up starting for Garland Wanda did a deal.

More here:
Wikileaks ... Good or Bad? Trump says bad ...VERY BAD!!! - WWL First News

How WikiLeaks Has Survived While Julian Assange Has Been Holed Up in London – Sputnik International

The Australian-born Julian Assange founded WikiLeaks in2006 and he has been a wanted man ever since.

Designed asa "not-for-profit media organization," it was dreamed upby Assange, because he felt mainstream media was not properly holding governments toaccount and was too scared oflosing its advertising or being closed downif it exposed serious wrongdoing.

AP Photo/ Markus Schreiber

In this Oct. 4, 2016 file photo, WikiLeaks founder Julian Assange participates via video link at a news conference marking the 10th anniversary of the secrecy-spilling group in Berlin. WikiLeaks said on Monday, Oct. 17, 2016, that Assange's internet access has been cut by an unidentified state actor.

Assange had registered the domain name, a play onWikipedia, in1999 and it was always his intention toget hold ofhighly confidential material.

On its website it says: "WikiLeaks specializes inthe analysis and publication oflarge datasets ofcensored or otherwise restricted official materials involving war, spying and corruption."

For the US government, and many others, that statement alone makes it a hostile organization which threatens the secrecy which the CIA, the Secret Service and the US diplomatic corps rely on.

When WikiLeaks published its most damaging revelations inthe spring of2010 diplomatic cables which had been leaked byUS soldier Bradley Manning Assange was threatened bythe US withprosecution underthe 1917 Espionage Act.

In August 2010 the Swedish prosecutor's office issued an arrest warrant forAssange, inconnection withallegations ofrape and molestation bytwo women dating fromincidents earlier that summer.

In May 2012, Britain's Supreme Court ruled that he should be extradited toSweden and the followingmonth Assange accepted Ecuador's offer ofsanctuary and vanished behindthe doors ofthe Latin American nation's embassy. He has been there ever since.

But despiteall this WikiLeaks did not fold. So how was it able tosoldier on?

As WikiLeaks grew Assange realized he had tocooperate withlike-minded individuals and he worked withpeople likeDaniel Domscheit-Berg, inGermany, and others.

But Assange's abrasive personality makes him a hard person toget alongwith and Domscheit-Berg quit in2010, setting uphis own site, OpenLeaks, withlittle success.

A source withknowledge ofhow WikiLeaks operates said:

"WikiLeaks hasn't operated withoutJulian. It doesn't exist independently ofhim atall. It consists ofhim and whoever he has persuaded tohelp him atany point," the source told Sputnik.

"If there's money, some ofthem get paid a little. If not, they're just volunteers. There have never been more thana handful ofhelpers. There have been times when it was Julian alone," they added.

"For the last five years, he has been running things frominside the Ecuadorean embassy."

WikiLeaks reportedly employs a small paid staff, who work invarious secret locations and is supported byaround a thousand volunteers.

In December 2010, the US government forced PayPal and a number ofcredit card companies tostop accepting donations forWikiLeaks.

WikiLeaks has also been the target ofseveral Denial ofService attacks byhackers, possibly employed bythe US government.

REUTERS/ Toby Melville

WikiLeaks founder Julian Assange holds a copy of a U.N. ruling as he makes a speech from the balcony of the Ecuadorian Embassy, in central London, Britain February 5, 2016.

Bradley Manning, the soldier who has undergone a sex change and is now known asChelsea Manning, was released fromprison last month afterPresident Obama commuted the sentence.

Go here to read the rest:
How WikiLeaks Has Survived While Julian Assange Has Been Holed Up in London - Sputnik International

The NSA Has Done Little to Prevent the Next Edward Snowden … – Motherboard

When Edward Snowden walked out of the NSA in 2013 with thumb drives full of its most secret files, the agency didn't have a reliable list of peoplelike Snowdenwho had privileged access to its networks. Nor did it have a reliable list of those who were authorized to use removable media to transfer data to or from an NSA system.

That's one of the alarming revelations in a Department of Defense Inspector General report from last year. The report, which was ordered by Congress, reviewed whether the NSA had completed some of the most important initiatives it has started in response to the Snowden leak to make its data more secure. The New York Times obtained the DOD IG report via FOIA.

The most shocking detail in the report is that even at the new National Security Agency data center in Utah, "NSA did not consistently secure server racks and other sensitive equipment" in data centers and machine rooms. At the Utah Data Center and two other facilities, the report stated, "we observed unlocked server racks and sensitive equipment." The finding that the NSA wasn't locking down all its server racks was first disclosed and reported in a House Intelligence Committee Report on Edward Snowden's leaks released in December.

But the more fundamental problem revealed in the report is that the NSA has done little to limit the number of people who have access to what are supposed to be the most protected hardware the NSA has.

The IG report examined seven of the most important out of 40 "Secure the Net" initiatives rolled out since Snowden began leaking classified information. Two of the initiatives aspired to reduce the number of people who had the kind of access Snowden did: those who have privileged access to maintain, configure, and operate the NSA's computer systems (what the report calls PRIVACs), and those who are authorized to use removable media to transfer data to or from an NSA system (what the report calls DTAs).

The government's apparent lack of curiosity is fairly alarming

But when DOD's inspectors went to assess whether NSA had succeeded in doing this, they found something disturbing. In both cases, the NSA did not have solid documentation about how many such users existed at the time of the Snowden leak. With respect to PRIVACs, in June 2013 (the start of the Snowden leak), "NSA officials stated that they used a manually kept spreadsheet, which they no longer had, to identify the initial number of privileged users." The report offered no explanation for how NSA came to no longer have that spreadsheet just as an investigation into the biggest breach thus far at NSA started. With respect to DTAs, "NSA did not know how many DTAs it had because the manually kept list was corrupted during the months leading up to the security breach."

There seem to be two possible explanations for the fact that the NSA couldn't track who had the same kind of access that Snowden exploited to steal so many documents. Either the dog ate their homework: Someone at NSA made the documents unavailable (or they never really existed). Or someone fed the dog their homework: Some adversary made these lists unusable. The former would suggest the NSA had something to hide as it prepared to explain why Snowden had been able to walk away with NSA's crown jewels. The latter would suggest that someone deliberately obscured who else in the building might walk away with the crown jewels. Obscuring that list would be of particular value if you were a foreign adversary planning on walking away with a bunch of files, such as the set of hacking tools the Shadow Brokers have since released, which are believed to have originated at NSA.

NSA headquarters in Maryland. Image: MJB/Flickr

The government's apparent lack of curiosityat least in this reportabout which of these was the case is fairly alarming, because it is a critically important question in assessing why NSA continues to have serious data breaches. For example, it would be important to know if Hal Martin, the Booz Allen Hamilton contractor accused of stealing terabytes of NSA data in both hard copy and digital form, showed up on these lists or if he simply downloaded data for decades without authorization to do so.

Even given the real concern that Russia or someone else might have reason to want to make the names of PRIVACs and DTAs inaccessible at precisely the time the NSA reviewed the Snowden breach, the NSA's subsequent action does provide support for the likelihood the agency itself was hiding how widespread PRIVAC and DTA access was. For both categories, DOD's Inspector General found NSA did not succeed in limiting the number of people who might, in the future, walk away with classified documents and software.

With PRIVACs, the NSA simply "arbitrarily" removed privileged access from some number of users, then had them reapply for privileged access over the next 3 months. The NSA couldn't provide DOD's IG with "the number of privileged users before and after the purge or the actual number of users purged." After that partial purge, though, NSA had "a continued and consistent increase in the number of privileged users."

As with PRIVACs, the NSA "could not provide supporting documentation for the total number of DTAs before and after the purge" and so was working from an "unsubstantiated" estimate. After the Snowden leak, the NSA purged all DTAs and made them reapply, which they did in 2014. The NSA pointed to the new number of DTAs and declared it a reduction from its original "unsupported" estimate. When asked how it justified its claim that it had reduced the number of people who could use thumb drives with NSA's networks when it didn't know how many such people it had to begin with, the NSA explained, "although the initiat[iv]e focused on reducing the number of DTA, the actions taken by NSA were not designed to reduce the number of DTAs; rather they were taken to overhaul the DTA process to identify and vet all DTAs." The IG Report notes that the NSA "continued to consistently increase the number of DTAs throughout the next 12 months."

When, in 2008, someone introduced a worm into DOD's networks via a thumb drive, it decreed that it would no longer use removable media. Then, after Chelsea Manning exfiltrated a bunch of documents on a Lady Gaga CD, the government again renewed its commitment to limiting the use of removable media. This report reveals that only in the wake of the Snowden leaks did the NSA get around to developing a vetted list of those who could use thumb drives in NSA's networks. Yet as recently as last year, Reality Winner (who, as an Air Force translator, was presumably not a privileged access user at all) stuck some kind of removable media into a Top Secret computer, yet the government claims not to know what she downloaded or whether she downloaded anything at all (it's unclear whether that Air Force computer came within NSA's review).

When contacted with specific questions about its inability to track privileged users, the NSA pointed to its official statement on the DOD IG Report. "The National Security Agency operates in one of the most complicated IT environments in the world. Over the past several years, we have continued to build on internal security improvements while carrying out the mission to defend the nation and our allies around the clock." The Office of Director of National Intelligence did not immediately respond with comment to my questions.

Yet this issue pertains not just to the recent spate of enormous data breaches, which led last month to the worldwide WannaCry ransomware attack using NSA's stolen tools. It also pertains to the privacy of whatever data on Americans the NSA might have in its repositories. If, three years after Snowden, the NSA still hasn't succeeded in limiting the number of people with the technical capability to do what he did, how can NSA ensure it keeps Americans' data safe?

Original post:
The NSA Has Done Little to Prevent the Next Edward Snowden ... - Motherboard

Euro MPs back end-to-end encryption for all citizens – BBC News


BBC News
Euro MPs back end-to-end encryption for all citizens
BBC News
A European Parliament committee wants end-to-end encryption to be enforced on all forms of digital communication to protect European Union (EU) citizens. The draft legislation seeks to protect sensitive personal data from hacking and government ...
EU Proposes Enforcing Data Encryption and Banning BackdoorsMac Rumors
EU proposes banning encryption backdoorsEngadget
End-to-end encryption plan puts Europe on collision course with UKZDNet
The INQUIRER -ComputerWeekly.com -iDrop News -European Parliament
all 26 news articles »

Read the original post:
Euro MPs back end-to-end encryption for all citizens - BBC News