Page 156«..1020..155156157158..170180..»

Category Archives: NSA

[MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration – Video

Posted: February 10, 2015 at 11:49 am


[MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration
CORRECTION : the Nitron runs on 15 volts total! The Booom Nitron mod includes a motor swap for the pusher and a separate battery source for the flywheel in order to get the higher ROF! my...

By: blastaway.eu

Here is the original post:
[MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration - Video

Posted in NSA | Comments Off on [MOD] NSA Blaster | Nerf Vortex Nitron / Strongarm Integration – Video

Edward Snowden Actor Revealed in Staged NSA Security Leak Story – Video

Posted: at 11:49 am


Edward Snowden Actor Revealed in Staged NSA Security Leak Story
This is the official authorized backup channel for the work of DallasGoldBug, Ed Chiarini, Jr. at http://WellAware1.com. I have written contracted permission...

By: RichardBDawson

More here:
Edward Snowden Actor Revealed in Staged NSA Security Leak Story - Video

Posted in NSA | Comments Off on Edward Snowden Actor Revealed in Staged NSA Security Leak Story – Video

Obama Keeps His Promise of Making More NSA Reform Promises – Video

Posted: at 11:49 am


Obama Keeps His Promise of Making More NSA Reform Promises
More than a year ago, President Barack Obama promised to rein in the NSA and announced a series of reforms to the agency #39;s surveillance programs. The promise...

By: WochitGeneralNews

Read the original here:
Obama Keeps His Promise of Making More NSA Reform Promises - Video

Posted in NSA | Comments Off on Obama Keeps His Promise of Making More NSA Reform Promises – Video

NSA: 10 Minute English: TEST (F) – Video

Posted: at 11:49 am


NSA: 10 Minute English: TEST (F)
A free supplementary sesson for Upper Intermediate English Language Students of Native Speakers Academy. We hope this will encourage you to not only further your contact with real English but...

By: Native Speakers Academy - Official Page

Read the original post:
NSA: 10 Minute English: TEST (F) - Video

Posted in NSA | Comments Off on NSA: 10 Minute English: TEST (F) – Video

nsa crank – Video

Posted: at 11:49 am


nsa crank
Recorded with ScreenCastify (http://www.screencastify.com), the screen video recorder for Chrome.

By: Zecatranium moonjuice gaming

Read more:
nsa crank - Video

Posted in NSA | Comments Off on nsa crank – Video

NSA approves Samsung and Boeing mobile devices for employee use

Posted: at 11:49 am

As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.

As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.

This move by the NSA is part of its Commercial Solutions for Classified program (CSfC) to enable government use of the same products that we in the private sector enjoy, rather than specially engineered government-only products that are often feature-poor, slow to market and expensive.

+RELATED: How the NSA is improving security for everyone +

Samsung's products include the Galaxy S4/S5, Galaxy S5 with KNOX, Galaxy Note 3, Galaxy Note 10.1 2014 Edition, Galaxy Note 10.1 2014 Edition with KNOX 2, Galaxy Note Edge with KNOX 2, Galaxy Tab S 8.4 and 10.5 LTE with KNOX 2, and the Galaxy Alpha with KNOX 2. For Samsung, Knox provides the added security features key to making the grade in the CSfC program.

Boeing's offering, which is not commercially available, is the Boeing Black smartphone. Sold only to government agencies and contractors working with government agencies, the Black smartphone is a sealed, tamper proof device.

The heightened level of security built into both product lines comes at a time when the world has seen a significant rise in cyberattacks upon the Android OS. For example, a recent FireEye Mobility Security Team study of the top 1,000 most downloaded free Android Apps found 68 percent susceptible to Man-in-the-Middle (MITM) attacks and contained one or more SSL vulnerabilities.

John Morrison, senior director, Samsung Research America says "the CSfC Program really stretches the boundaries of high security on mobility." He adds that "the innovation driven by the U.S. government results in more secure products in private sector hands."

In order for these products to be certified, the vendors must satisfy stringent security requirements. For example, the devices must generate asymmetric cryptographic keys used for key Establishment and Authentication; perform encryption/decryption in accordance with a specified cryptographic algorithm; perform cryptographic hashing in accordance with a specified cryptographic algorithm and message digest size; and they must restrict the ability to configure policies for passwords, session locking, device enabling/disabling, application installation, VPN protection or specify wireless networks.

A key example of the security issues surrounding BYOD smartphones and tablets is the camera that most have. Morrison says, "The issue for various government and commercial entities is that they have unique missions and therefore require customization or a different configuration for the devices they want to use. For example, while many commercial work sites that permit cameras to be available for use, there are many sites, both government and commercial, where the CAMERA MUST ALWAYS BE OFF."

Read the original post:
NSA approves Samsung and Boeing mobile devices for employee use

Posted in NSA | Comments Off on NSA approves Samsung and Boeing mobile devices for employee use

NSA director Admiral Michael Rogers pushes for transparency

Posted: at 11:49 am

By Cole del Charco | Published 10 hours ago

The man charged with cleaning up the National Security Agency after reports surfaced that the organization was monitoring millions of Americans and their communications had one message about personal cybersecurity at the Carolina Inn on Monday.

He warned the audience to use caution when sharing information online.

We need to know that someone out there has an interest in you, he said. You need to sit down and think about what we are comfortable with.

Admiral Michael S. Rogers, director of the NSA and commander of the U.S. Cyber Command, visited Chapel Hill as part of a speaker series co-sponsored by UNCs Department of Peace, War and Defense and the Triangle Institute for Security Studies.

He added that he wants the NSA to prioritize conversations with citizens as the agency looks to combat national cybersecurity problems.

A world of great security but limited freedom, I have zero interest in the U.S. being a part of. But a world of limited security but great freedom, with my two sons, I have no desire in the U.S. being a part of. We need a balance between freedom and security, he said.

He said the NSA treats cyberwarfare like nuclear warfare.

Rogers then defined the job of the NSA, saying it collects foreign intelligence and defends U.S. information.

We are a foreign intelligence agency, he said. We do not collect information from U.S. citizens. I must get that authority from a judge. We do not violate the law.

See the original post:
NSA director Admiral Michael Rogers pushes for transparency

Posted in NSA | Comments Off on NSA director Admiral Michael Rogers pushes for transparency

U.K. Court Says NSA-GCHQ Data-Sharing Was Illegal

Posted: February 8, 2015 at 11:48 pm

A U.K. court has for the first time ruled that intelligence sharing activities between the NSA and the equivalent government intelligence agencyin the U.K., GCHQ, wereunlawfulin the past on the grounds that theybreached European human rights law.

The court case was heard bythe U.K.s Investigatory Powers Tribunal (IPT), the judicial oversight body which handles complaints relating to domestic intelligence agencies. The complainants werefour pro-privacy and civil liberties groups: Privacy International, Liberty, Amnesty International and Bytes for All.

The data sharing in the frame refers tothe NSAs Prism (where it collects data direct from U.S. Internetcompanies) and Upstream (where it taps directly into Internet cables to gather data) programs, and to theU.K.s use of RIPA (Regulation of Investigatory Powers Act) warrants to tap into U.S.-gathered signals intelligence. The existence of the NSA programs wasrevealed by documents released into the public domain by whistleblower Edward Snowden, back in 2013.

In a press release following todays IPT judgement Privacy Internationalnotes it is the first time the courthasruled against theintelligence and security services in its 15 year history.

However, in a twist that can only be described as Kafka-esque, the IPT still deemsU.S.-U.K.dragnet surveillancedata-sharing activities to be legal now andsinceDecember 2014, when it ruledin another judgement thatGCHQ access to NSA data-gathering was legal from then on on the grounds that the disclosure of the data-sharing programs (which, let us not forget, only came to light as a result of Snowdens whistleblowing) has allowed for adequate signposting of the secret policies governing how data flows between internationalspy agencies, and for adequate arrangements to ensure legal compliance.

Some of these secret governance policy disclosures were made to the court in an earlier case brought to the IPT by Privacy International et al.But asThe Guardian notes, some of the most sensitive evidence about interceptions was heard in private court sessions which excluded therights groups, and prevented wider public scrutiny. But thats judicial oversight, in the IPTs eyes hence itsfinding ofadequate arrangements.

The IPTsjudgement notes:

prior to the disclosures made andreferred to in the Tribunals Judgment of 5 December 2014, the regime governingthe soliciting, receiving, storing and transmitting by UK authorities of privatecommunications of individuals located in the UK, which have been obtained by US authorities pursuant to Prism and/or (on the Claimants case) Upstream, contravened Articles 8 or 10 ECHR [European Convention on Human Rights], but now complies.

(i) Having considered the arrangements below the waterline, as described in this judgment, we are satisfied that there are adequate arrangements in place for the purpose of ensuring compliance with the statutory framework and with Articles 8 and 10 of the Convention, so far as the receipt of intercept from Prism and/or Upstream is concerned.

View original post here:
U.K. Court Says NSA-GCHQ Data-Sharing Was Illegal

Posted in NSA | Comments Off on U.K. Court Says NSA-GCHQ Data-Sharing Was Illegal

NSA Whistleblower William Binney the 3 words that will put you on the NSA List – Video

Posted: at 7:48 am


NSA Whistleblower William Binney the 3 words that will put you on the NSA List
1/25/2015 On Love Guns Freedom Radio Show Luca Zanna interviews Mr. William Binney, American Patriot and NSA whistleblower who has been exposing the crimin...

By: Gianluca Zanna

Continue reading here:
NSA Whistleblower William Binney the 3 words that will put you on the NSA List - Video

Posted in NSA | Comments Off on NSA Whistleblower William Binney the 3 words that will put you on the NSA List – Video

Life of a NSA Cadet – Video

Posted: at 7:48 am


Life of a NSA Cadet
We were assigned to create a video in COMP1, so our section decided to make a video regarding our daily routines here in UCLM as a NSA cadet. All shots are t...

By: jamescondaa

See the article here:
Life of a NSA Cadet - Video

Posted in NSA | Comments Off on Life of a NSA Cadet – Video

Page 156«..1020..155156157158..170180..»