House backs limits on NSA spying | Fox News

WASHINGTON House libertarians and liberals banded together for a surprise win in their fight against the secretive National Security Agency, securing support for new curbs on government spying a year after leaker Edward Snowden's disclosures about the bulk collection of millions of Americans' phone records.

The Republican-led House voted 293-123 late Thursday to add the limits to a $570 billion defense spending bill. The provision, which faces an uncertain fate in the Senate, would bar warrantless collection of personal online information and prohibit access for the NSA and CIA into commercial tech products.

Proponents of the measure described them as government "backdoors" that give intelligence agencies an opening to Americans' private data.

"The American people are sick of being spied on," said Rep. Thomas Massie, R-Ky., who joined with libertarian Republicans and liberal Democrats to push the measure.

Rep. Tulsi Gabbard, D-Hawaii, railed against "this dragnet spying on millions of Americans."

The House was expected to pass the defense bill Friday. It still must be reconciled with a still-to-be written Senate version.

In the showdown between privacy and security, the House earlier this year overwhelmingly passed the USA Freedom Act that would codify a proposal made in January by President Barack Obama, who said he wanted to end the NSA's practice of collecting and storing the "to and from" records of nearly every American landline telephone call under a program that searched the data for connections to terrorist plots abroad.

Massie, Gabbard and other lawmakers complained that the legislation didn't go far enough, necessitating their amendment to the defense bill. The chairman of the House Judiciary Committee, Rep. Bob Goodlatte, R-Va., and other Republican and Democratic leaders pushed back, arguing that the amendment undercut their reform package that was a year in the making.

During hours of debate and votes Thursday, the House also endorsed several new roadblocks to Obama's long-sought effort to close the U.S. prison at Guantanamo Bay, Cuba.

Republicans and some Democrats repeatedly have blocked any effort to shutter the post-Sept. 11 prison to house terror suspects, and congressional furor over Obama's trade last month of five Taliban leaders for Army Sgt. Bowe Bergdahl prompted a bipartisan effort to add fresh obstacles.

Read more here:
House backs limits on NSA spying | Fox News

New Snowden Revelations on NSA Spying in Germany – SPIEGEL …

Just before Christmas 2005, an unexpected event disrupted the work of American spies in the south-central German city of Wiesbaden. During the installation of a fiber-optic cable near the Rhine River, local workers encountered a suspicious metal object, possibly an undetonated World War II explosive. It was certainly possible: Adolf Hitler's military had once maintained a tank repair yard in the Wiesbaden neighborhood of Mainz-Kastel.

The Americans -- who maintained what was officially known as a "Storage Station" on Ludwig Wolker Street -- prepared an evacuation plan. And on Jan. 24, 2006, analysts with the National Security Agency (NSA) cleared out their offices, cutting off the intelligence agency's access to important European data streams for an entire day, a painfully long time. The all-clear only came that night: The potential ordinance turned out to be nothing more than a pile of junk.

Residents in Mainz-Kastel knew nothing of the incident.

Of course, everybody living there knows of the 20-hectare (49-acre) US army compound. A beige wall topped with barbed wire protects the site from the outside world; a sign outside warns, "Beware, Firearms in Use!"

Americans in uniform have been part of the cityscape in Wiesbaden for decades, and local businesses have learned to cater to their customers from abroad. Used-car dealerships post their prices in dollars and many Americans are regulars at the local brewery. "It is a peaceful coexistence," says Christa Gabriel, head of the Mainz-Kastel district council.

But until now, almost nobody in Wiesbaden knew that Building 4009 of the "Storage Station" houses one of the NSA's most important European data collection centers. Its official name is the European Technical Center (ETC), and, as documents from the archive of whistleblower Edward Snowden show, it has been expanded in recent years. From an American perspective, the program to improve the center -- which was known by the strange code name "GODLIKELESION" -- was badly needed. In early 2010, for example, the NSA branch office lost power 150 times within the space just a few months -- a serious handicap for a service that strives to monitor all of the world's data traffic.

NSA Sites in Germany

Wiesbaden

In the US Army's so-called Storage Station in the Wiesbaden district of Mainz-Kastel, the European Technical Center (ETC) can be found, a facility that is also used by the NSA. Only five kilometers away, in the Clay Kaserne located in the Erbenheim district of Wiesbaden, the Consolidated Intelligence Center is currently under construction, a site that will likely provide a new home to the signal intelligence specialists currently working in Mainz-Kastel. The new center is costing the Americans $124 million. Click here to access the documents.

Read more:
New Snowden Revelations on NSA Spying in Germany - SPIEGEL ...

Hackers Build Spy Tools From Leaked NSA Designs

Admiral Michael 'Mike' Rogers, director of the National Security Agency (NSA) and commander of U.S. Cyber Command, pauses during a Bloomberg Government cyber-security conference in Washington, D.C., U.S., on Tuesday, June 3, 2014.

Image: Andrew Harrer/Bloomberg via Getty Images

By Lorenzo Franceschi-Bicchierai2014-06-20 20:53:05 UTC

The NSA doesn't just have powerful Internet surveillance technologies, it also has old-school spying tools like bugs and gadgets that give the spies a wide array of ways to hack into a target's computer or cellphone.

Some of these James Bond-like tools were revealed last year when Der Spiegel published a 48-page catalog, created in 2008 by the NSA and later obtained by the German newsmagazine. Now, a group of hackers is trying to build these NSA spying gadgets with open source hardware.

The group, who has named the project the 'NSA Playset', wants to show other hackers and makers how to build the spying tools and to protect against them.

"To someone who is not an expert in the field, the capabilities in the catalog might seem far-fetched or ultra high-tech," one of the hackers who's part of the project, Michael Ossmann, told Mashable. "What we want to show is that these capabilities are very much achievable and practical. And by pointing out how easy they are to achieve, we hope that we can raise awareness of security threats in our computer system."

The idea to work on this project came from security researcher Dean Pierce, who wanted to see how easy it would be to make the devices with Ossman and others joining the initiative shortly after. The hackers soon realized that most of the NSA tools in the catalog weren't that hard to reproduce.

"There's nothing really unique in what the NSA is doing, they just have the dollars to make more sophisticated equipment," Josh Datko, the founder of Cryptotronix, an open source hardware company, and also part of the NSA Playset project, told Mashable. "It's kind of surprisingly easy to recreate them."

Ossmann has been focusing on something called "retro reflector." An implant that when attached to a computer's VGA cable, for example, can capture and transmit what's being displayed on a screen and send it over-the-air to a nearby spy. Ossman explained that it's essentially a "bug."

Read more:
Hackers Build Spy Tools From Leaked NSA Designs

House votes 293-123 to cut funding for NSA spying on …

In a surprising vote late Thursday night, a strong majority of the House of Representatives voted to cut funding to NSA operations that involve warrantless spying on Americans or involve putting hardware or software "backdoors" into various products. The amendmentto a defense appropriations bill, offeredby Reps. James Sensenbrenner (R-WI), Zoe Lofgren (D-CA), and Thomas Massie (R-KY), passed 293 to 123.

The amendment specifies that, with a few exceptions, none of the funds made available by this Act may be used by an officer or employee of the United States to query a collection of foreign intelligence information acquired under section 702 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1881a) using a United States person as an identifier.

In addition, none of the funds made available by this Act may be used by the National Security Agency or the Central Intelligence Agency to mandate or request that a person...alter its product or service to permit the electronic surveillance...of any user of said product or service for said agencies. Since Edward Snowden began leaking documents about the NSA's tactics in June of last year, security experts have worried about reports of intentional weaknessesleft in widely used cryptography specifications.

The amendment is acontrast to the USA Freedom Act passed last month. That bill was initially intended to reform the NSAbut, in its final form, still permitted the spy agency to access itsvast trove of phone call metadata. Becausethe item passed tonight was an amendment to an appropriations bill, it went to the floor without being scrutinized by the intelligence committee, which is "basically a proxy for the intelligence community, as Julian Sanchez of the Cato Institute explained to Wired.

The amendment still has to beapproved by the Senate in order to take effect in 2015.

Read more here:
House votes 293-123 to cut funding for NSA spying on ...

Microsoft: NSA security fallout ‘getting worse’ … ‘not blowing over’

Maximizing your infrastructure through virtualization

Microsoft's top lawyer says the fallout of the NSA spying scandal is "getting worse," and carries grim implications for US tech companies.

In a speech at the GigaOm Structure conference in San Francisco on Thursday, Microsoft general counsel Brad Smith warned attendees that unless the US political establishment figures out how to rein in its spy agencies, there could be heavy repercussions for tech companies

"What we've seen since last June is a double-digit decline in people's trust in American tech companies in key places like Brussels and Berlin and Brasilia. This has put trust at risk," Smith said.

"The longer we wait or the less we do the worse the problem becomes," he explained. "We are seeing other governments consider new procurement rules procurement rules that could effectively freeze out US-based companies."

This could already be happening. China banned Microsoft's Windows 8 operating system from a recent public sector procurement contract. Two weeks later, a report by the Middle Kingdom's state-backed media quoted Chinese analysts and academics warning of the dangers of using Windows 8. "It's a big challenge for our cybersecurity," said one academic.

The Chinese government is also rumored to be considering a ban on IBM servers as well, due to security issues.

If the US government does not work to clear up the rules around how it intercepts data both at home and abroad, how deeply its spy agencies penetrate tech from its domestic companies, and how it accesses overseas data held by American companies, then there's a real danger that US companies could suffer, Smith implied.

"Last fall people in Washington, including at the White House and Congress, had a view that this was an issue that needed to be addressed but might blow over. ... it is not blowing over ... in June of 2014 it is clear it is getting worse not better," he said.

"I do believe if we don't have a world where governments respect each other's world we're instead going to have a world where governments are tempted to keep American providers out," he said. Since the NSA revelations occurred, networking giant Cisco has seen quarter-on-quarter declines in its business in China, for example.

See original here:
Microsoft: NSA security fallout 'getting worse' ... 'not blowing over'

Privacy, Secure Sharing and the Holy Grail of Encryption – HackSurfer Hangout – Video


Privacy, Secure Sharing and the Holy Grail of Encryption - HackSurfer Hangout
Peter Long, the CEO of ARKpX (formerly Lockbox) is joining us this Thursday to chat about the world of mobile and the cloud when it comes to cybercrime and cybersecurity. We #39;ll be chatting...

By: HackSurfer

More here:
Privacy, Secure Sharing and the Holy Grail of Encryption - HackSurfer Hangout - Video

Cloud Encryption Best Practices for Financial Services

In many industries, cloud computing is now vital to remaining competitive. The cloud typically offers superior flexibility, scalability, accessibility, and high availability, enabling businesses to grow more agile and responsive. Regulatory compliance concerns often make banks and other financial service providers slower to adopt the cloud, but even in the financial services industry, the cloud will soon become a necessity.

Banks are already seeing attractive use cases for cloud computing, as Bank Systems & Technology's Bryan Yurcan and Jonathan Camhi pointed out late last year. Cloud-based payment processing is one hot topic. Cloud-based document management is another. Analytics for business insight and fraud detection are also growing popular. However, all of these applications will require a thorough understanding of the regulatory restrictions and how to comply with them. One of the most essential tools to make sure your cloud adoption meets regulatory requirements is cloud data encryption.

What to Protect PCI DSS mandates the protection of customer account data, which you'll need in order to process payments in the cloud. Per PCI DSS 3.0, that data includes:

PCI DSS requires organizations to "use strong cryptography and security protocols" for the transmission of sensitive cardholder information. Some of these fields are more sensitive than others, however. PANs are more sensitive than expiration dates, for example, while verification codes and PINs are so sensitive that PCI DSS outright forbids the storage of them after the transaction is completed. Your cloud data encryption strategy should include the ability to apply varying strengths of encryption at a granular, policy-based level so that you can apply the appropriate amount of protection to each data type.

Here are some best practices that can help you use cloud data encryption to safely make the most of the cloud.

Cloud Data Encryption Best Practices

Use cloud data encryption that preserves your cloud application functionality To enjoy the benefits of cloud computing, develop a cloud data encryption strategy that secures your data but also preserves the functionality of the cloud applications you've chosen. Tools like CipherCloud's Searchable Strong Encryption can help, as can encryption and tokenization schemes that retain the original format of the data while hiding the actual values.

How does your organization use cloud encryption to remain compliant? Let us know your thoughts in the comments

Paige Leidig is SVP at CipherCloud. He has 20 years of experience in technology, marketing, and selling enterprise application solutions and managing trusted customer relationships. As SVP of Marketing, he is responsible for all aspects of marketing at CipherCloud. Paige was previously in the Office of the CEO at SAP, where he was responsible for leading and coordinating SAPs acquisition and integration activities on a global basis. He has managed a number of marketing initiatives at SAP, including responsibility for all go-to-market activities for SAPs Cloud applications portfolio. Preceding his SAP career, Paige held senior management positions with Ariba, Elance, and E*Trade.

See more here:
Cloud Encryption Best Practices for Financial Services