Page 10«..9101112..2030..»

Category Archives: NSA

NSA Hosts the Maryland Department of IT in cybersecurity workshop – National Security Agency

Posted: May 25, 2022 at 5:01 am

FORT MEADE, Md. The Maryland Department of Information Technology (DoIT) Executive team on Thursday took part in a series of cybersecurity workshops provided by the National Security Agency (NSA). These workshops focused on NSA cyber risk best practices and how they can be utilized to ensure security in the state cyber environment. The workshops provide information regarding risk management, cyber threats, and supply chain management.These workshops are one part of a continued partnership between the IT leadership of the State of Maryland and NSA. This partnership allows DoIT to further understand the best practices of the federal government and for both entities to share lessons learned. This is the second time the DoIT executive staff has visited NSA for a presentation from its federal partners on cybersecurity.DoIT and the State of Maryland are extremely lucky to have NSA expertise available to enhance our efforts to keep the State Government and all Marylanders safe from cyber threats said DoIT Secretary Michael Leahy.NSA is dedicated to fulfilling our commitment to help advise the State of Maryland on enterprise security," said Jason Jabers, NSA Fellow to DoIT. This workshop is one of the products of NSAs commitment to work with key partners to improve our nations cybersecurity posture.NSAs Jabers joined DoIT in October 2021 as a fellow who has been advising the state on enterprise data practice, policies, standards, and security. His main goal is to collaborate with the Governors Office, the Chief Information Officer, and other key government, academic, and private sector organizations on a comprehensive data architecture plan for the state.

Read the original:
NSA Hosts the Maryland Department of IT in cybersecurity workshop - National Security Agency

Posted in NSA | Comments Off on NSA Hosts the Maryland Department of IT in cybersecurity workshop – National Security Agency

5G Non-Standalone (NSA) Architecture Infrastructure Industry is Expected to Reach $8 Billion by 2028 -Qualcomm, Intel, Avago, Skyworks, Ericsson,…

Posted: at 5:01 am

New Jersey, United States,-Mr Accuracy Reportspublished new research on Global5G Non-Standalone (NSA) Architecture Infrastructurecovering micro level of analysis by competitors and key business segments (2022-2029). The Global 5G Non-Standalone (NSA) Architecture Infrastructure explores comprehensive study on various segments like opportunities, size, development, innovation, sales and overall growth of major players. The research is carried out on primary and secondary statistics sources and it consists both qualitative and quantitative detailing.

Some of the Major Key players profiled in the study areQualcomm, Intel, Avago, Skyworks, Ericsson, Samsung, NEC, Mediatek, Cisco, Marvell, Qorvo, Huawei, LG, NTT DoCoMo, SK Telecom, ZTE, Nokia

Get PDF Sample Report + All Related Table and Graphs @:https://www.mraccuracyreports.com/report-sample/192348

Various factors are responsible for the markets growth trajectory, which are studied at length in the report. In addition, the report lists down the restraints that are posing threat to the global 5G Non-Standalone (NSA) Architecture Infrastructure market. This report is a consolidation of primary and secondary research, which provides market size, share, dynamics, and forecast for various segments and sub-segments considering the macro and micro environmental factors. It also gauges the bargaining power of suppliers and buyers, threat from new entrants and product substitute, and the degree of competition prevailing in the market.

Global 5G Non-Standalone (NSA) Architecture Infrastructure Market Segmentation:

5G Non-Standalone (NSA) Architecture Infrastructure Segmentation by Type:

.

5G Non-Standalone (NSA) Architecture Infrastructure Segmentation by Application:

Smart Home, Autonomous Driving, Smart Cities, Industrial IoT, Smart Farming

Key market aspects are illuminated in the report:

Executive Summary:It covers a summary of the most vital studies, the Global 5G Non-Standalone (NSA) Architecture Infrastructure market increasing rate, modest circumstances, market trends, drivers and problems as well as macroscopic pointers.

Study Analysis:Covers major companies, vital market segments, the scope of the products offered in the Global 5G Non-Standalone (NSA) Architecture Infrastructure market, the years measured and the study points.

Company Profile:Each Firm well-defined in this segment is screened based on a products, value, SWOT analysis, their ability and other significant features.

Manufacture by region:This Global 5G Non-Standalone (NSA) Architecture Infrastructure report offers data on imports and exports, sales, production and key companies in all studied regional markets

Market Segmentation: By Geographical Analysis

The Middle East and Africa(GCC Countries and Egypt)North America(the United States, Mexico, and Canada)South America(Brazil etc.)Europe(Turkey, Germany, Russia UK, Italy, France, etc.)Asia-Pacific(Vietnam, China, Malaysia, Japan, Philippines, Korea, Thailand, India, Indonesia, and Australia)

The cost analysis of the Global 5G Non-Standalone (NSA) Architecture Infrastructure Market has been performed while keeping in view manufacturing expenses, labor cost, and raw materials and their market concentration rate, suppliers, and price trend. Other factors such as Supply chain, downstream buyers, and sourcing strategy have been assessed to provide a complete and in-depth view of the market. Buyers of the report will also be exposed to a study on market positioning with factors such as target client, brand strategy, and price strategy taken into consideration.

Key questions answered in the report include:

Please click here today to buy full report @https://www.mraccuracyreports.com/checkout/192348

Table of Contents

Global 5G Non-Standalone (NSA) Architecture Infrastructure Market Research Report 2022 2029

Chapter 1 5G Non-Standalone (NSA) Architecture Infrastructure Market Overview

Chapter 2 Global Economic Impact on Industry

Chapter 3 Global Market Competition by Manufacturers

Chapter 4 Global Production, Revenue (Value) by Region

Chapter 5 Global Supply (Production), Consumption, Export, Import by Regions

Chapter 6 Global Production, Revenue (Value), Price Trend by Type

Chapter 7 Global Market Analysis by Application

Chapter 8 Manufacturing Cost Analysis

Chapter 9 Industrial Chain, Sourcing Strategy and Downstream Buyers

Chapter 10 Marketing Strategy Analysis, Distributors/Traders

Chapter 11 Market Effect Factors Analysis

Chapter 12 Global 5G Non-Standalone (NSA) Architecture Infrastructure Market Forecast

If you have any special requirements, please let us know and we will offer you the report as you want. you can also get individual chapter wise section or region wise report version like North America, Europe or Asia.

See more here:
5G Non-Standalone (NSA) Architecture Infrastructure Industry is Expected to Reach $8 Billion by 2028 -Qualcomm, Intel, Avago, Skyworks, Ericsson,...

Posted in NSA | Comments Off on 5G Non-Standalone (NSA) Architecture Infrastructure Industry is Expected to Reach $8 Billion by 2028 -Qualcomm, Intel, Avago, Skyworks, Ericsson,…

On Indias wheat export ban, US NSA said this…. – WION

Posted: at 5:01 am

Even as the food crisis looms large due to the Russian-Ukraine war coupled with climate change, United States National Security Advisor Jake Sullivan said that food security would be the topic of discussion in the third edition of the Quad Summit in Tokyo.

Sullivan was responding to a question if President Joe Biden will have a talk with Prime Minister Narendra Modi to reverse Indias decision to ban wheat exports.

Food security will be the topic of conversation at the Quad, Sullivan said on Sunday.

Ukraine and Russia account for 29 per cent of global wheat and 62 per cent of sunflower oil exports. The invasion has exacerbated food price inflation in emerging markets and developing economies and has impacted some of the poorest and most vulnerable countries.

Global food prices are almost 30 per cent higher than the same time last year, according to the UN.

India was forced to halt wheat exports after a brutal heatwave destroyed the crops, causing inflation and shortage in the country.

Watch |Indian PM Narendra Modi's Japan visit: 40 hours for 23 engagements

However, the Indian government had said that it would consider helping the nations that are in need.

Apart from the wheat export ban, the Quad summit will also likely discuss the Russian-Ukraine war where Indias stand has put it at odds with its allies.

Even though India has not outrightly condemned Russia, it had always sought for peaceful resolution of the conflict.

When Sullivan was asked if Biden wouldtalkwith Modi on this issue, he said, Well, they already had the opportunity to engage on that and the president had an extended discussion with PM Modi when they did a virtual Quad summit in March. They also got to speak about it when they had a short video bilateral 2+2 and when Indian ministers came to Washington.

So, it won't be a new conversation but a continuation of the conversation they have already had on how we see the picture in Ukraine and impacts of Russia's brutal invasion of Ukraine, apart from wider sets of concerns in the world including food security concerns. So, they will talk all of that through, will leave the specific, they had private and constructive exchanges. This will be similarly constructive and straightforward.

Also read |WION @ Quad: Updates from Japan | Quad leaders to meet in Tokyo

When asked if President Biden would also raise human rights issues with PM Modi, the US NSA said, President Biden has been clear from the beginning in this administration that we will speak out when we see any form of departure or deviation from basic principles, fundamental freedoms, human rights, values of democratic institutions and rule of law.

Also read |WION reports from Tokyo: Quad leaders to meet under shadow of Ukraine war, China threat

That is true for a range of countries, and we dont single India out. We have found a way to pursue practical cooperation with countries who are democratic and non-democratic while at the same time being clear and consistent where our values lie.

WATCH WION LIVE HERE

See the original post:
On Indias wheat export ban, US NSA said this.... - WION

Posted in NSA | Comments Off on On Indias wheat export ban, US NSA said this…. – WION

How National Security Adviser, Monguno Looted Funds Meant To Tackle Insecurity To Acquire Multi-billion-Naira Properties In UK, US, DubaiNorthern…

Posted: May 21, 2022 at 6:27 pm

The Northern Ethnic Group Assembly (NEYGA) has detailed how theNational Security Adviser, Babagana Monguno allegedly looted funds meant to tackle insecurity in Nigeria to acquire properties worth billions of naira in Dubai, United Arab Emirates (UAE), UK and US.

According to the group, Monguno's wife is currently in the US and only comes to Nigeria to stack money from her husbands office in anticipation of her husband's return to America to join his family ahead of handing over to his successor.In a statement sent to SaharaReporters, the group also claimed the NSA never wants the insecurity in the country to end because he benefits from it.The group also lamented that Monguno has not been brought to justice despite his alleged shady dealings.It added that the country's fight against insecurity will not come to an end if the NSA is not penalised.The statement reads: "It has become pertinent to notify members of the public that the Service Chiefs are not just ready to perform their functions, but also willing to cough out their 'whole nine yards' as a result, but this zeal and or quest is being prevented by the NSA - who is only masterminding lootings at the detriment of members of the Armed Forces and the teaming population."According to findings, the NSA has through General Emeka Onwamegbu and the current Director of Finance and Accounts acquired properties in the United Kingdom, Dubai, United Arab Emirates and the United States of America. They both acquired properties worth billions (of naira) in the countries mentioned above."Mongunus wife who has since relocated to the United States of America only comes to Nigeria to stack money from her husbands office in anticipation of her husband travelling to America to join his family, ahead of handing over to his successor, just like former Anambra State Governor Obiano State did a couple of months ago."It's crystal clear that Mongunu does not want the insecurity in Nigeria to be brought to its logical end, because of the illegitimate financial gains he usually earns from it. It would be recalled that he instigated former Governor of Borno State Shettima not to allow insurgence to come to an end because of the expected money coming to the state for reconstruction through the then planned establishment of the North Eastern Development Commission."Mongunu claimed that the money earmarked for reconstruction would be stopped should there be peace in the state. That was why the gains of the Armed Forces during the 6 weeks postponement of elections in 2015 were reduced to nothing and insecurity has enveloped the whole country. The military cannot succeed in their fight against insurgency as long as Mongunu remains in office as the NSA."Nigerians must be reminded of what the Royal Father, retired Commodore (Kunle) Olawunmi said about Mongunu for being one of the sponsors of Boko Haram. Mongunu as the National Security Officer succeeded in stopping regular addresses on the State of the Nation by the Minister of Information, Lai Mohammed. He also rubbished Governor Umar Zulum for not dancing to his beats. Governor Zulum and (Nasir) El-Rufai are never in his good books."Intelligence report reveals that he uses electronic monitoring equipment in his office to monitor all telephone conversations of governors like El- Rufai, Zulum, (Kayode) Fayemi, (Hope) Uzodinma, (Babajide) Sanwo-Olu and (Abdullahi) Ganduje."At a point, he surreptitiously planned to embarrass the Kano State Governor. the Peoples Democratic Party Governors are not spared. He is never comfortable with the Presidents nephew, vibrant young man called 'Tunde'. He believed that Tunde was exhibiting too much influence on the President to the extent that he is the only one that can administer drugs to Mr President. He has severely tarnished the image and performance of the present Honourable Minister of Defence, General Magashi with a view to personally replacing him as the next Minister of Defence in the last year of this administration."Mongunu who does not enjoy any immunity has continued to dent the image of Mr President who deemed him worthy of the position he's enjoying. In an attempt to curb his excesses, the EFCC (Economic and Financial Crimes Commission) Chairman wanted to expose his involvement in corruption, the NSA threatened to snuff live out of the Chairman with open confrontation."It would be recalled that Mongonu deployed Armed Men of the Armed Forces and Police to prevent EFCC staff from marking the following properties in Abuja. Since the beginning of the investigations, sources said the NSA had been using his office, making frantic efforts to frustrate the investigations over fears that the multi-billion-naira properties were linked to him."It would also be recalled that on Wednesday, May 27, 2021, soldiers allegedly on the orders of the NSA had threatened to shoot officials of the EFCC that came to mark properties seized from Mr Mohammed at Sun City Estate, Lokogoma, Abuja."Unfazed by the NSAs pressure to stop the investigation, the operatives of the anti-graft agency swung into action."It would be recalled also that the EFCC had obtained an interim forfeiture from a Federal High Court in Abuja on March 11, 2021, and proceeded to mark eight properties belonging to the military officer in Abuja. Justice Folashade Ogunbanjo had in a suit marked FHC/ABJ/CS/007/2021 ordered the interim forfeiture of eight properties linked to Mr Mohammed, who is a trusted front or aide to the NSA."Some of the properties in Abuja include: a house at 7 Gods Own Estate, Road 1, Wamba District; a fenced plot at 1 Jubril Aminu Crescent, Katampe Extension; a plot at Kubwa Express Road directly opposite Abuja Model City Gate; a house at Block SD 22, Road 5, Kabusa Garden Estate, Abuja; Plot 15, 21st Crescent, Second Avenue, Gwarinpa; 3 Liverpool Close, Sun City Estate and; 25 Osaka Street, Sun City. Whilst properties in Kano valued at N10.9 billion were recently forfeited on orders of an Abuja Federal High Court, those properties in Abuja linked to General Mongunu through his proxy deals were yet to be charged to Court by EFCC or ICPC (Independent Corrupt Practices and Other Related Offences Commission) specially. His properties in the United States of America including his personal residence at 12712 Shoppes Ln Fairfax, Virginia, VA 22033 USA were to be forfeited to the Federal Government of Nigeria."Is there any difference between Diezani (Alison) Madueke under Peoples Democratic Party and Mongunu under All Progressives Congress? Mongonu has rubbished the performance of the Office of the National Security Adviser under the President's administration. It is most surprising that a corrupt person like Mongonu without constitutional immunity has not been brought to courts in Nigeria to defend his illegal acquisition of properties in many countries using proxies and Bureau De Change operators."The nation is watching ICPC and EFCC leadership who are afraid of embarrassing the President in bringing Mongonu to justice. Northern Youths have been clamouring for his removal for the loss of many lives in the North. And because he has not been removed, insecurity has enveloped the country because of his inability to do the needful. It must however be noted that his failure is largely because he was not an intelligence trained officer in the Nigerian Army. You cannot give what you dont have."The National Security Adviser is yet to be brought to Court like others implicated in the Presidential Arms Panel Committee Report - in which Mongonu was to account for N3,000,000,000 while holding sway as Chief of Defence Intelligence. EFCC under (Ibrahim) Magu was quick to arraign persons implicated in the Committees Report (but) failed to charge Monguno to Court. Mongonu as the National Adviser to the President has no immunity under the Constitution (1999 as amended) of the Federal Republic of Nigeria. Mongonu should be charged to Court now by the EFCC and ICPC based on various allegations against him."Insurgency in Nigeria would not end if the advice of HRM, retired Commodore Olawunmi against Mongonu is not dealt with. Nigerian soldiers and innocent civilians will continue to die as a result of the ineffective coordination by the National Security Adviser."

Read more here:
How National Security Adviser, Monguno Looted Funds Meant To Tackle Insecurity To Acquire Multi-billion-Naira Properties In UK, US, DubaiNorthern...

Posted in NSA | Comments Off on How National Security Adviser, Monguno Looted Funds Meant To Tackle Insecurity To Acquire Multi-billion-Naira Properties In UK, US, DubaiNorthern…

NSA to be imposed on those who do not remove illegal parking stands, property will be confiscated – News Track English

Posted: at 6:26 pm

Lucknow: TheYogi Adityanath government in Uttar Pradesh has decided to take action on illegal parking stands. CM Yogi Adityanath has ordered the removal of all illegal parking stands from the entire state in 48 hours during a review meeting on road safety. At the same time, CM Yogi has also ordered to put gangsters on the operator who did not remove the illegal parking stand and confiscate the property. CM Yogi Adityanath made it clear that roadside restaurantson the highway without parking will also have to be closed.

CM Yogi ordered to earmark the location for street vendors so that there are no shops on the roads. He said speed breakers should not be made 'waist breakers'. Wherever standard reverse speed breakers have been made in the state, they should be removed. CM Yogi said that 'waist breaker' speed breakers can be fatal for sick people and pregnant women. Only tabletop speed breakers should be made. He said that do not let anyone of mafia tendency get involved with any contract-lease. If a single mafia joins, his entire gang will create a base of illegal activities.

In a stern tone, CM Yogi said that breaks the back of every mafia. He said to remove illegal roadside restaurants with inadequate parking from the roadside. The roads connected to highways, expressways, PWD, urban development or any other department should also eliminate illegal encroachments.

Ajay Kothiyal, CM face of AAP in Uttarakhand, resigned from the party

Congress to now preparing for new 'camp' after Chintan Shivir, will brainstorm again in June

Farmers movement started on Mohali-Chandigarh border, Bhagwant Mann arrived to talk.

Go here to see the original:
NSA to be imposed on those who do not remove illegal parking stands, property will be confiscated - News Track English

Posted in NSA | Comments Off on NSA to be imposed on those who do not remove illegal parking stands, property will be confiscated – News Track English

2023: NSA Puts Top Politicians On Watch List – – The Tide

Posted: at 6:26 pm

Ahead of the 2023 general elections and other off-season elections in the country, the Office of the National Security Adviser (ONSA) has placed politicians who exhibit tendencies to subvert the electoral process on the watch list.Accordingly, the ONSA said heads of security and law enforcement agencies have been tasked to step up close monitoring and profiling of political actors no matter how highly placed.The National Security Adviser (NSA), Maj. Gen. Babagana Monguno (rtd), disclosed this in his remarks at the meeting of the Inter Agency Consultative Committee on Election Security organised by the Independent National Electoral Commission (INEC) in Abuja.Monguno said that his office had noted with utmost concern, the growing uncertainty heralding the conduct of party primaries for the 2023 general elections.This is in addition to the unabated spate of violence that threatened the upcoming off-cycle gubernatorial elections in Ekiti and Osun states, arising from internal party wrangling, increasing acrimony and bickering among political actors as well as the inability of various contending political blocs to amicably resolve differences in line with democratic tenants, he said.Mungono who was represented by Sanusi Galadima, said the disturbing development had already culminated in intense power play capable of heightening unnecessary political tension across the country.More worrisome according to him is the unguarded utterances by some highly respected individuals and groups which, more often than not, amplify divisive narratives to the detriment of national security and stability.Accordingly, he said, Heads of security and law enforcement agencies have been tasked to step up close monitoring and profiling of political actors no matter highly placed who exhibit tendencies to subvert the electoral process, even as thugs and their sponsors would equally be trailed for possible arrest and prosecution.He emphasised the need for INEC to enjoin political parties to consistently abide by prescribed rules as outlined in their respective manifestoes.Earlier in his remarks, the INEC chairman, Prof. Mahmood Yakubu, lamented the general security situation in the country and its impact on the electoral process which according to him is a source of concern to the commission.Yakubu said the commission was however confident that with nine months to the 2023 general election, there was enough time to respond to the security challenges and secure the nation for elections to take place nationwide. He said the timetable for the election has also been released.Let us not wait until a few weeks to the election before we realise that time is not on our side and begin to seek for extension of timelines. The time to act is now.We wish to reassure the security agencies that we will continue to work cooperatively with you to ensure the success of all forthcoming elections and electoral activities, he said.

Here is the original post:
2023: NSA Puts Top Politicians On Watch List - - The Tide

Posted in NSA | Comments Off on 2023: NSA Puts Top Politicians On Watch List – – The Tide

Cow slaughter stirred up in Kanpur, police took meat sample… NSA will be imposed on the accused – News Track English

Posted: at 6:26 pm

Lucknow: Tension prevailed in the area after beef was allegedly found in a cowshed in Kanpur, Uttar Pradesh. The Bithoor police, who reached the cowshed located in Bani village of Chaubepur block of Kanpur, came to know about the matter and started investigation. Meat was found in a sack in the room built inside the cowshed. Some remains were found in the drain. After getting the information, the Commissioner of Police, who reached the spot, said that the accused have been identified. Action will be taken against them under NSA.

According to the information, when the laborers digging the pond near the cowshed in Bithoor Kanpur, after the information went inside the cowshed, two unknown persons started running away from there. Both of them left the bike inside the cowshed in a hurry. After the meat was found in the cowshed, the villagers informed the Bithoor police about it. As soon as the information was received, the Bithoor police reached the spot and started investigation. The team of doctors reached the spot and sent the meat sample for examination and the remains were buried by digging a pit.

Bajrang Dal's district coordinator Naresh Tomar said that complaints of such incidents were being received for a long time. Today we have come here on the information of such incident and we demand strict action from the police against the accused. Police Commissioner Vijay Singh Meena, who reached the spot, said that we had got information about beef being found inside the cowshed. The two accused fled from the spot after seeing the villagers. Both have been identified. Meat sample has been taken for testing. NSA will be imposed against the accused, strict action will be taken against them.

Hackers blew three and a half lakh rupees from the bank account of the female judge of the sessions court

4 days after killing the married girlfriend, the lover committed suicide by jumping in front of the train

The bride who went to the parlor for make-up did not return..., the barati kept dancing at the door and then..."

Read more:
Cow slaughter stirred up in Kanpur, police took meat sample... NSA will be imposed on the accused - News Track English

Posted in NSA | Comments Off on Cow slaughter stirred up in Kanpur, police took meat sample… NSA will be imposed on the accused – News Track English

Allies Issue Cybersecurity Advisory on Weaknesses that Allow Initial Access – National Security Agency

Posted: May 17, 2022 at 6:47 pm

FORT MEADE, Md. The Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA) and the FBI, along with allied nations, published a Cybersecurity Advisory today to raise awareness about the poor security configurations, weak controls and other poor network hygiene practices malicious cyber actors use to gain initial access to a victims system.Weak Security Controls and Practices Routinely Exploited for Initial Access also includes best practices that can help organizations strengthen their defenses against this malicious activity.As long as these security holes exist, malicious cyber actors will continue to exploit them, said NSA Cybersecurity Director Rob Joyce. We encourage everyone to mitigate these weaknesses by implementing the recommended best practices.Some of the most common weaknesses include not enforcing multifactor authentication, incorrectly applying privileges or permissions and errors within access control lists and not keeping software up to date. The advisory recommends mitigations that control access, harden credentials, establish centralized log management and more.CISA produced the advisory with help from NSA and other partners. That includes the FBI, the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NCSC-NZ) and Computer Emergency Response Team (CERT NZ), the Netherlands National Cyber Security Centre (NCSC-NL), and the United Kingdom National Cyber Security Centre (NCSC-UK) on the advisory. Many of the same cybersecurity authorities collaborated to release a complementary advisory on 27 April, which highlighted the top routinely exploited vulnerabilities from 2021.Read the full report here. Visit our full library for more cybersecurity information and technical guidance.

Here is the original post:
Allies Issue Cybersecurity Advisory on Weaknesses that Allow Initial Access - National Security Agency

Posted in NSA | Comments Off on Allies Issue Cybersecurity Advisory on Weaknesses that Allow Initial Access – National Security Agency

The NSA Swears It Has No Backdoors in Next-Gen Encryption – WIRED

Posted: at 6:47 pm

A group of human rights lawyers and investigators called on the Hague this week to bring what would be the first ever cyber war crimes charges. The group is urging the International Criminal Court to bring charges against the dangerous and destructive Russian hacking group known as Sandworm, which is run by Russias military intelligence agency GRU. Meanwhile, activists are working to block Russia from using satellites controlled by the French company Eutelsat to broadcast its state-run propaganda programming.

Researchers released findings this week that thousands of popular websites record data that users type into forms on the site before they hit the Submit buttoneven if the user closes the page without submitting anything. Google released a report on an in-depth security analysis it conducted with the chipmaker AMD to catch and fix flaws in specialty security processors used in Google Cloud infrastructure. The company also announced a slew of privacy and security features for its new Android 13 mobile operating system along with a vision for making them easier for people to understand and use.

The European Union is considering child protective legislation that would require scanning private chats, potentially undermining end-to-end encryption at a massive scale. Plus, defenders from the cybersecurity nonprofit BIO-ISAC are racing to protect the bioeconomy from digital threats, announcing a partnership this week with Johns Hopkins University Applied Physics Lab that will help fund pay-what-you-can incident response resources.

But wait, theres more. Each week we round up the news that we didnt break or cover in-depth. Click on the headlines to read the full stories. And stay safe out there.

The United States is completing development of a new generation of high-security encryption standards that will be robust in the current technical climate and are designed to be resistant to circumvention in the age of quantum computing. And while the National Security Agency contributed to the new standards' creation, the agency says it has no special means of undermining the protections. Rob Joyce, the NSAs director of cybersecurity, told Bloomberg this week, There are no backdoors." The NSA has been implicated in schemes to backdoor encryption before, including in a situation in the early 2010s in which the US removed an NSA-developed algorithm as a federal standard over backdoor concerns.

An extensive investigation by Georgetown Laws Center on Privacy & Technology reveals a more detailed picture than ever of US Immigration and Customs Enforcement agency surveillance capabilities and practices. According to the report, published this week, ICE began developing its surveillance infrastructure at the end of the George W. Bush administration, years before it was previously thought to have begun these efforts. And researchers found that ICE spent $2.8 billion on surveillance technology, including face recognition, between 2008 and 2021. ICE was already known for its aggressive and invasive surveillance tactics during the Donald Trump administrations anti-immigration crackdowns, but the report also argues that ICE has played a key role in the federal governments larger push to amass as much information as possible about people in the United States.

Our two-year investigation, including hundreds of Freedom of Information Act requests and a comprehensive review of ICEs contracting and procurement records, reveals that ICE now operates as a domestic surveillance agency, the report says. By reaching into the digital records of state and local governments and buying databases with billions of data points from private companies, ICE has created a surveillance infrastructure that enables it to pull detailed dossiers on nearly anyone, seemingly at any time.

In a legal settlement this week, the face recognition and surveillance startup Clearview AI agreed to a set of restrictions on its business in the US, including that it wont sell its faceprint database to businesses or individuals in the country. The company says it has more than 10 billion faceprints in its arsenal belonging to people around the world and collected through photos found online. The settlement comes after the American Civil Liberties Union accused Clearview of violating the Illinois Biometric Information Privacy Act. The agreement also stipulates that the company wont be allowed to sell access to its database in Illinois for five years. This settlement demonstrates that strong privacy laws can provide real protections against abuse, Nathan Freed Wessler, a deputy director of the ACLU Speech, Privacy, and Technology Project said in a statement. Despite the privacy win, Clearview may continue to sell its services to federal law enforcement, including ICE, and police departments outside of Illinois.

Costa Rican president Rodrigo Chavessaid on Sunday that the country was declaring a national emergency after the notorious Conti ransomware gang infected multiple government agencies with malware last week. Sunday was the first day of Chaves' presidency. Conti leaked some of a 672 GB trove of stolen data from multiple Costa Rican agencies. In April, the Costa Rican social security administration had announced that it was the victim of a Conti attack. At this time, a perimeter security review is being carried out on the Conti Ransomware, to verify and prevent possible attacks," the agency tweeted at the time.

Go here to see the original:
The NSA Swears It Has No Backdoors in Next-Gen Encryption - WIRED

Posted in NSA | Comments Off on The NSA Swears It Has No Backdoors in Next-Gen Encryption – WIRED

Data sharing and the Budapest Convention. NSA says new encryption standard won’t have backdoors. New York enacts measures to protect power grid. – The…

Posted: at 6:47 pm

At a glance.

The Council of Europe has announced that the Second Additional Protocol to the Convention on Cybercrime (also known as the Budapest Convention) was opened for signature at a conference of the Councils Committee of Ministers.. The protocols goal is to encourage the sharing of electronic evidence like subscriber info and traffic data among council member states through direct cooperation with service providers and registrars. Representatives from member states including Austria, Finland, Italy, Spain, and Sweden were present at the signing, as well as non-member states including the US and Japan. Secretary General Marija Pejinovi Buri explained, The Second Protocol brings the Budapest Convention up to date with current, technological challenges, so that it remains the most relevant and effective international framework for combating cybercrime in the years ahead. Justice Minister of Italy, Marta Cartabia, added, The use of ICT (Information and Communication Technologies) by organised crime in all sectors (sexual exploitation, drug trafficking, smuggling, terrorism) represents a further challenge for our judicial authorities and for our institutionsThe Second Additional Protocol, therefore, responds to the need for greater and more efficient co-operation between States and between the States and the private sector, clarifying the cases in which the service providers will be able to provide the data in their possession directly to the competent authorities of other countries. The Protocol is open for signature by Parties to the Convention and will be implemented once ratified by five States.

Ilia Kolochenko, Founder of ImmuniWeb, a member of Europol Data Protection Experts Network and EU CyberNet Member, commented on the importance of the Protocol:

As of today, The Budapest Convention remains the most comprehensive and the most important international treaty designed to combat cybercrime. The Convention, among other things, harmonizes the criminalization of computer offences, accelerates collaboration between law enforcement agencies and facilitates the preservation and seizure of digital evidence stored in a foreign country.

"The 20-year old Convention, however, certainly requires some updates to stay ahead of the rapidly evolving technology landscape and novel tactics deployed by sophisticated threat actors. Despite reasonable concerns expressed by the EU EDPB in relation to possible privacy risks created by the long-awaited Second Protocol, the Protocol brings several major improvements.

"Enhanced mutual assistance in emergency situations is probably the most crucial development. While procedurally its not yet crystal clear how the emergency assistance provisions will be implemented by signatory countries, the provisions definitely bring a sound legal framework to remove some bureaucratic barriers that have been hindering mutual legal assistance in cross-border investigations when time was of the essence.

"Other provisions, such as disclosure of domain name owners and subscriber information, will probably have a less palpable impact, as many countries have already established tenable processes and procedures related thereto. Novel provisions on joint investigation teams will undoubtedly boost multiagency and multijurisdictional cooperation, however, the recent success of numerous joint operations, conducted by national authorities led by Europol and Interpol, convincingly demonstrates that joint investigations work pretty well today.

"That being said, in 2022, the challenges remain pretty similar to 2001. First, countries like Russia, China, India and most African countries are not signatories of the Convention. It is impossible to effectively investigate and prosecute cybercriminals without frictionless cooperation with those states, representing over 3 billionInternet users. Second, the Convention does not create specific duties binding upon national law enforcement agencies, but rather encourages governments to adopt necessary legislation and implement the requisite infrastructure. Third, most law enforcement agencies are already overwhelmed with an avalanche of domestic cases and will unlikely prioritize external requests even if the law provides so. Thus, we will probably observe more countries passing national laws to authorized legal hacking by police to obtain digital evidence in a rapid, licit and straightforward manner.

The US National Institute of Standards and Technology (NIST) is working on establishing quantum encryption standards for the nation, and some might be concerned the advanced technology might be used by another agency, NSA, for surveillance. NSAs director of cybersecurity Rob Joyce attempted to put such worries to rest by promising there will be no backdoors that could allow for spying. Joyce told Dark Reading, Those candidate algorithms that NIST is running the competitions on all appear strong, secure, and what we need for quantum resistance. Weve worked against all of them to make sure they are solid.

The Assembly of the US state of New York on Wednesday passed legislation aimed at securing the states energy grid against cyberattack. The bill was introduced by Assemblyman and chair of his chamber's Energy Committee Mike Cusick, who explained, "New York's energy grid is a prime target for hackers and cyber criminals across the globe...The passage of this legislation is a crucial step in our fight against cyber crime and our efforts to bolster the resiliency of our grid. GovTech notes that the bill will also provide a path for future legislation protecting infrastructure, and gives the state's Division of Homeland Security and Emergency Services the power to collaborate with state and federal agencies. Once passed by the Senate, the bill will be reviewed by Governor Kathy Hochul, who in February launched the "Joint Security Operations Center, a collaboration of federal and local partners offering a statewide view of the cyberactivity.

Read the original here:
Data sharing and the Budapest Convention. NSA says new encryption standard won't have backdoors. New York enacts measures to protect power grid. - The...

Posted in NSA | Comments Off on Data sharing and the Budapest Convention. NSA says new encryption standard won’t have backdoors. New York enacts measures to protect power grid. – The…

Page 10«..9101112..2030..»