38 Burst results for "National Security Agency"

Fresh update on "national security agency" discussed on WTOP 24 Hour News

WTOP 24 Hour News

01:12 min | 5 hrs ago

Fresh update on "national security agency" discussed on WTOP 24 Hour News

"Metro area medical centers. 11 40, now the director of the National Security Agency, General Palmach Naka Soni, who was ordered over the weekend to install a former Trump White House operative is the agency's top lawyer has put that person on administrative leave. Michael Ellis has been placed on leave pending an inquiry by the Pentagon inspector general into the circumstances of his selection. As en ESA general counsel. Ellis was named to the post in November after a civil service competition but had not transitioned into the into the position pen. A completion of administrative requirements and concerns Binaca, Sony about, among other things, whether Ellis is selection was consistent with personnel policies that apply to senior career officials in the intelligence community. Naka Sony was ordered by then Acting Defense Secretary Christopher Miller to install Ellis by 6 P.m. Saturday and that raised eyebrows and further alarmed critics who feared it was an effort to embed a political appointee in a career civil service position, as one administration gave way to another Typically, the mood on Inauguration Day is one of celebration this year. Of course, it was different with tight security and few Spectators and it wasn't great for vendors. The streets of downtown D C were empty compared to past inaugurations,.

Michael Ellis General Palmach Naka Soni National Security Agency Trump White House General Counsel Sony Director ESA Pentagon Christopher Miller Binaca
Fresh update on "national security agency" discussed on WTOP 24 Hour News

WTOP 24 Hour News

00:45 min | 6 hrs ago

Fresh update on "national security agency" discussed on WTOP 24 Hour News

"Video showing a D C police officer being violently pinned against the doorway during the capital riot. Now a Connecticut man has been arrested and charged. The acting U. S attorney for D. C. Says a Connecticut man is charged with using a police riot shield. Crush Officer Hodges against the capital doorway. Televised images of the helpless officer alarmed a 10 year old girl in Billings, Montana, who reached out to D. C. Police tow learn that Officer Hodges is recovering and doing well. Patrick Edward McCoy of Ridgefield, Connecticut, is facing charges including assaulting, resisting or impeding officers, civil disorder, entering restricted buildings of grounds and violent entry or disorderly conduct, particularly on O w. T. O P knew of proud boys organizer has been arrested for his part in the riot at the U. S. Capitol, Self described organizer for the far right extremist group Proud Boys has been arrested in central Florida for taking part in the violent incursion at the U. S Capitol this month. 37 year old Joseph Big's faces several federal charges, including obstructing an official proceeding before Congress, the affidavit says. Biggs told FBI agents he had no knowledge about planning for the riot. But on the social Media app parlor he had told followers to dress in black to resemble the far left Antifa movement also arrested in Florida 37 year old Jesus Rivera, according to an arrest after David Rivera uploaded the video to Facebook, showing himself in the U. S Capitol crypt during the siege. Mike Rossi at Washington. Three National Guard members are dead in a helicopter crash. It was during a routine training flight in a western New York town. The U. H 60 Medical Evacuation helicopter crashed around 6 30 this evening south of Rochester. It flew out of the Army Aviation Support facility at Rochester International Airport. It was assigned to see company of the first Battalion, 171st General Support Aviation Battalion. Circumstances of the crash are now being looked at. The director of the National Security Agency, who was ordered over the weekend to install a former Trump White House operative as the agency's top lawyer has put that person on administrative leave tonight. The NSC director general Paul Mackey, Sony placed Michael Ellis on leave pending an inquiry by the Pentagon inspector general into the circumstances of his selection as an essay general counsel not to Sony was ordered Saturday by then acting Defense Secretary Christopher Miller to install Ellis by 6 P.m.. Ellis officially started the job just yesterday. Still ahead here on w T. O P. We have a couple of covert related stories. It's related to our sports teams. The caps have to pay a six figure fine, and the Washington football team shuts down its facility for a while. Stay with us A 10 43 your.

Connecticut Officer Hodges Officer Michael Ellis Biggs Washington David Rivera National Security Agency Sony U. S Capitol General Support Aviation Batta National Guard Rochester Rochester International Airpor Patrick Edward Mccoy Army Aviation Support U. S Jesus Rivera Billings Ridgefield
Fresh update on "national security agency" discussed on WTOP 24 Hour News

WTOP 24 Hour News

02:42 min | 13 hrs ago

Fresh update on "national security agency" discussed on WTOP 24 Hour News

"On this unique inauguration. Hey, Megan. Hey, Hillary, You know this was sort of in aside in the itinerary, but it's really quite the spectacle, with hundreds of cars and motorcycles processing with the president and vice president in their armored cars for secret Surgeon service agents. Walking alongside those cars and making their way slowly toward the White House. This is a much of an inaugural parade is we're going to get today like the majority of our daily offenses. Now the parade itself will be virtual. The inaugural committee has planned a virtual parade across America, which was modeled on the DNC's virtual roll call last summer. Interestingly, the tradition of the inaugural parade dates back to the very first inauguration of George Washington as he journeyed from Mount Vernon to New York City. Local militias joined his procession as it passed. Through towns along the way. Hence the different types of military that you're seeing and of different eras. Today, the virtual parade, which you'll see a w t o p dot com and on television will be hosted by actor Tony Goodwin, who played a president on TV and feature performance acts from all 50 States and several territories in D. C. Of course, we'll have to watch for Howard University, Showtime Marching Band and the University of Delaware Marching band is also going to perform in honor of the Bidens. After the parade at five o'clock, the president enters the Oval Office for the first time where we understand he plans to send sign rather a number of executive orders. And then he'll swear in his presidential appointees in a virtual ceremony. At that point, the virtual presidential what would be the presidential ball has turned into a prime time special that will begin this evening. Will, of course, be here for all of it, covering it Step by step, but really an interesting spectacle here as The militia and different military units and regiments make their way toward the White House Reporting live Mexican Cloherty. W T O P News, Alright making thanks so much way continue to watch the goings on. Near the White House. Is the presidential motorcade moves ever closer. Of course, President Biden is not wasting his time as today, but it's also hard to believe the two weeks ago. At this hour, the U. S Capitol was under a deadly attack on while President Biden stress unity during his inaugural address. He also struck a defiant tone about what happened on January 6th. Let's go live to Capitol Hill and W. T. O P S. Mitchell Miller. During his inaugural address, President Trump President Biden said the mob that attacked the capital was ultimately unsuccessful. And he vowed that nothing like it will ever happen again. We've learned again. Democracy is precious. Democracy is fragile. At this hour. My friends. Democracy has prevailed when President Biden and Vice President Kamila Harris left the U. S Capitol after the inauguration, They walk down the very steps that the rioters had stormed on the East side of the Capitol before breaking into the building itself. Also the Capitol police officer who was seen in a video Facing off against rioters had a role in today's inauguration. Eugene Goodman escorted Vice President Harris during today's ceremonies. There have been no serious security incidents here at the Capitol that we've heard about today. But the capital does remain ring by an unskilled herbal fence, as well as thousands of National Guard members reporting live on Capitol Hill. Mitchell Miller w T. O P News President Biden is not wasting time in the first hours of his term. He'll sign 15 executive actions that reverse former President Trump's orders on items ranging from immigration to the pandemic. The new president will end construction on the border wall and the ban on travel with some Muslim majority countries, rejoined the Paris Climate Accord and World Health Organization and revoke approval of the Keystone XL oil pipeline. How unusual is this Florrie of activity? Well, only two recent presidents signed executive actions on their first day in office and each just signed one coming up on double d t o P We will hear from w T O P. Capitol Hill correspondent emeritus Dave McConnell on this historic day of first for Vice president Kamila Harris 3 37. This week's cyber security report is presented by Ford. Annette Federal. Hello I'm Mike McConnell. I previously served as the director of the National Security Agency. And the director of national intelligence. Currently, I said on the Port Annette Federal Advisory Board, the government has embraced digital innovation for all its inherent benefits. Speed efficiency, higher productivity, but not always mindful of the inherent vulnerabilities. Cyber attacks are growing in volume and sophistication and traditional incomplete security is no longer enough. We need critical innovation experience in the government to ensure our.

President Trump President Bide President Trump Vice President Kamila Harris President Biden Vice President White House S. Mitchell Miller Tony Goodwin Capitol Police Executive Megan Port Annette Federal Advisory National Security Agency Hillary Mike Mcconnell Director University Of Delaware
U.S. Security Agencies: Massive Computer Hack Is 'Likely Russian'

KYW 24 Hour News

00:47 sec | 2 weeks ago

U.S. Security Agencies: Massive Computer Hack Is 'Likely Russian'

"Well, top national security agencies are confirming a rare joint statement about who was responsible for that massive hack of U. S. Government departments and corporations. Your CVS is Nora O'Donnell, the FBI and three other national security agencies put out a rare joint statement saying Russia was likely behind the cyber hacking of multiple government departments. Hacks appear to be part of a spying effort not to disrupt operations and now President Trump has questioned Russia's involvement, suggesting China may have been behind the attacks. This now makes clear that the intelligence community believes it is likely Russia. The statement says the hacks appeared to be intended for intelligence gathering, suggesting the evidence so far pointed to a Russian spying effort rather than an attempt to damage or disrupt US government

U. S. Government Nora O'donnell Russia President Trump CVS FBI China United States
"national security agency" Discussed on WCBS Newsradio 880

WCBS Newsradio 880

02:14 min | 2 weeks ago

"national security agency" Discussed on WCBS Newsradio 880

"45 Friday, partly sunny with a high of around 40. Now in New York City, 36 degrees, It is cloudy 5 40 WCBS on Wednesday, the sixth of January for government agencies have confirmed that Russia is likely behind the massive hack of U. S government departments and private corporations. The FBI, the National Security Agency, the office of the Director of National Intelligence, and the Cyber Security and Infrastructure Security Agency, issued a joint statement saying the operation is ongoing. Nearly a month after it was discovered. The announcement rejects President Trump's claim that China and not Russia. Might be to blame for the hack. The Wisconsin police officer who shot Jacob Blake in the back last summer will not be charged. Kenosha County District attorney Michael Gravely says he declined to file criminal charges against Officer Rustin, Chesky and other officers, saying he did not think he could prove Chesky and other cops were not acting in self defense. Blake was shot seven times after police responded to a domestic dispute. Cell phone video shows Blake walking away from officers and opening the door of an SUV moments before Chesky opened fire. Shooting left. Blake paralyzed WCBS news time. 5 41 Brad check sports next The all new one or 27 artist share, recently revealed to the Guardian that her life was saved by two fans while working on Broadway in the eighties. She responded by saying, I had a man tried to kill me. I thought he was going to shake my hand and he grabbed my arm and put it behind my back to fans who later became friends saw something was wrong and they started screaming and ran towards me, and he ran away. Now the place share references in the interview, had a short run in New York City in 1980 share played the part of the waitress Sissy. It all starts with just one thing. Make the switch to green soaps and personal products and also look for green cleaning products for the sink and shower, Find tips and more at one thing us dot com. What's your one thing? Did you know that the equivalent of a garbage trucks worth of plastic is dumped in the ocean every minute? £17.6 billion every year..

Jacob Blake Chesky Officer Rustin New York City Cyber Security and Infrastruct Russia National Security Agency President Trump Kenosha County Michael Gravely FBI Director of National Intellige Wisconsin officer U. S China
U.S. formally links Russia to massive 'ongoing' cyber attack

Tom and Curley

00:31 sec | 2 weeks ago

U.S. formally links Russia to massive 'ongoing' cyber attack

"That hacking attack on U. S government agencies last month? CBS is Norah O'Donnell says there's been an extraordinary development, The FBI and three other national security agencies put out a rare joint statement saying Russia was likely behind the cyber hacking of multiple government departments. The hacks appear to be part of a spying effort not to disrupt operations and now President Trump has questioned Russia's involvement, suggesting China may have been behind the attacks. This now makes clear that the intelligence community believes it is likely Russia on an

U. S Government Norah O'donnell CBS President Trump Russia FBI China
U.S. Security Agencies: Massive Computer Hack Is 'Likely Russian'

All Things Considered

00:53 sec | 2 weeks ago

U.S. Security Agencies: Massive Computer Hack Is 'Likely Russian'

"Most detailed comments so far, the U. S government says a massive hack into computer networks was likely carried out by Russia and will take a long time to fix. NPR's Greg Marie reports. The security breaches described his ongoing The lengthy statement issued on behalf of President Trump and National Security Agency says the hack was quote likely Russian in origin and that it will require a sustained and dedicated effort to remediated. The president suggested last month China might be responsible. Some 18,000 entities had their computer networks compromised is the hackers hit malware inside a software update provided by the Texas companies, Solar winds The statement says. Fewer than 10 U. S government agencies were hit, though it does not describe the extent of the damage. The hackers broke into email accounts, but it's not clear whether they breached classified systems.

U. S Government Greg Marie President Trump National Security Agency NPR Russia China U. Texas
Joe Biden paints dire picture of U.S. national security agencies

WTOP 24 Hour News

00:49 sec | 3 weeks ago

Joe Biden paints dire picture of U.S. national security agencies

"President elect Joe Biden and Vice President elect Kamila Harris received a national security briefing today from their team of experts Speaking now, Biden says he has not received complete cooperation from all security agencies. For some agencies are teams received exemplary cooperation. From the career staff in those agencies from others. Most notably the Department of Defense. We encountered obstruction from the political leadership of that department. The truth is many of the agencies that are critical to our security have incurred Enormous damage. Many of member and hollowed out. Personnel capacity and in morale. Mr Biden also stressed the importance of the country's recommitting to global alliances after President Trump's presidency.

President Elect Joe Biden Vice President Elect Kamila Ha Biden Department Of Defense Mr Biden President Trump
Trump Contradicts Pompeo Over Russia’s Role in Hack

10 10 WINS 24 Hour News

00:52 sec | Last month

Trump Contradicts Pompeo Over Russia’s Role in Hack

"Administration, making a plus to shake things up at the Pentagon. This is President Trump downplaying the massive cyber attack on U. S. Federal government agencies. CNN reporting the organization's charged with cyber security, the U. S Cyber Command and the National Security Agency would be split up under the Trump plan, led by two different people. Currently, it's Led by one the same four star military officers in charge of both. It would require the approval of the chairman of Joint Chiefs of staff and now more on President Trump's response to that hack, which goes directly against what his own people are saying on Twitter. President Trump downplayed the hacks severity and said China, not Russia may be responsible. But Friday, his secretary of state Mike Pompeo, blamed Moscow saying it was quote Pretty clear Russia was behind it, a National Security Council spokesperson said. They are focused on circumstances surrounding the hack and limiting the damages, of course, wanted

President Trump U. S. Federal Government U. S Cyber Command National Security Agency Pentagon CNN Joint Chiefs Of Staff Mike Pompeo Russia Twitter China Moscow National Security Council
U.S. Cyber Agency: Computer Hack Poses 'Grave Risk'

Morning Edition

05:21 min | Last month

U.S. Cyber Agency: Computer Hack Poses 'Grave Risk'

"Days of relative silence, the U. S Cyber Security Agency now, says a major computer hack Poses a grave risk. This risk extends to all levels of government, federal, state and local thousands of private companies and organizations have also been impacted and to make it worse. The computer hack is still happening. NPR national security correspondent Greg Meyer is following the story and joins us. Good morning, Greg. Hi, Rachel. We've been hearing about this hack of government computers this week, but but this sounds even more ominous. Yeah, True of the U. S government was really blindsided when the story broke last weekend. President Trump still has yet to say a word. But we now have this assessment from the Cyber Security Agency at Homeland Security. And it makes clear this was an enormous breach, perhaps unprecedented, and it's still taking place. The Department of Energy is the latest government department to acknowledge it was breach, though it says the nuclear arsenal it manages was not at risk. But it's just important to understand. This year scale here. The hackers invaded computers at all levels of government and the private sector. Some 18,000 separate organizations for a little perspective. I spoke to Steve Ryan, he worked for more than 30 years that the National Security Agency and was the deputy director of the Threat Operation Center. This is big. This is bigger than anything we've ever experienced in this country. I don't know what I would put second to this well, So who's behind it? Well, the cyber experts are quite confident it's Russia. This was an extremely sophisticated, stealthy attack, using techniques that have never been seen before. So given this skill level and the targets it points to Russia's foreign intelligence service, the SPR and Attackers are known as cozy bear. You may recall one of those experts, Dmitri Alperovitch says the U. S needs to move quickly on two separate fronts. The first phase is to put out the fire contained the incidents and kick the Russians out of squid responsible. And then the second phase is really looking broader of how the Russians have had this level of access. It's our most sensitive networks really over the last at least nine months, so cyber experts are sure this is Russia is the broader Trump Administration. Well, they haven't given attribution at this point to anyone. And yesterday, Vladimir Putin had this long news conference. He sort of mock the notion that this country would be involved in something like this. But U. S intelligence agencies are starting classified briefings on Capitol Hill and the Republican chairman and the top Democrat on the Senate Armed Services Committee issued a joint statement saying that quote The cyber intrusion appears to be ongoing and has the hallmarks of a Russian intelligence operation. I mean, if that's the case, this isn't the first time why can't the U. S anticipate prevent these these types of attacks from Russia? Yeah. Rachel, this would be the third big Russian hack In the past five years. I got a glimpse of these U. S efforts to ward off cyber intruders. The National Security Agency invited me last year to its big, sprawling campus out in Fort Meade, Maryland. To see this new big integrated cyber center that it has the include this cavernous hall. It's ineffective War room with all these cyber warriors and big movie screens featuring this constantly updated information. I mean, this may well be the greatest concentration of cyber power anywhere in the world. And yet just months after I visited The hackers broke into computer systems all across the U. S. How I mean, I guess that's the million dollar question more than a million dollars, But I mean, how do hackers keep finding their ways into the systems? It was brilliant and simple. In this case, it was a software update. You know those little notices we all see on our computer screams, and we don't pay any attention to them. But the hackers sort of definitely loaded some malware onto a software update that's provided by a company called Solar Winds. It's a tech company from Austin, Texas. And it's not widely known outside the industry itself. But it provides that these network monitoring updates throughout the U. S. And from March through June 18,000 of its customers. Got this update. And so this allowed the hackers in the email systems and the suspicion is they've moved on and are operating more widely in the networks. The big question right now is did they get into classified government systems? But regardless fixing this will be very painstaking and expensive and urgent, right? Because you said earlier that there still there like they embedded into these systems, and they still exist. They still have a presence there. I mean, this is gonna be a long term problem. What action? Could the Trump Administration take in just the next few weeks? Well, we're still waiting for the president or any member of his men Administration to speak publicly. We've only seen some statements. On. We know President Trump entered office with a Russian hacking controversy. Now he'll be leaving office with this hacking controversy. One He doesn't want to discuss. President elect Joe Biden says he'll impose substantial cost. Yeah, but he knows Now he'll have this big problem on his hands on day one of his administration, NPR's Greg Marie, Thank you. My pleasure.

U. S Cyber Security Agency President Trump Greg Meyer U. S Government Cyber Security Agency Russia Steve Ryan Threat Operation Center U. Trump Administration National Security Agency Dmitri Alperovitch Rachel Senate Armed Services Committe NPR Department Of Energy Homeland Security SPR Greg Vladimir Putin
FireEye, a top U.S. cybersecurity company, says it was hacked

Heartland Newsfeed Radio Network

01:07 min | Last month

FireEye, a top U.S. cybersecurity company, says it was hacked

"A major. Us cybersecurity company with extensive government contracts says it has been hacked by a foreign country. Go the whole country now in a company blog posts. Ceo kevin are called it an attack by a nation with top tier offensive capabilities in a rare statement. Matt gorham assistant director of the fbi. Cyber division said that the agency is investigating the incident and preliminary indications show an actor with a high level of sophistication consistent with a nation state. That was the quote from his email. Fireeye works with a number of us federal agencies and states including the fbi the national security agency. The hackers primary goal appeared to be stealing information on fire is government clients according to the company's ceo. Interesting yeah well you never like hear about cybersecurity company being hacked because you would think they tend to be more secure than others. You would think they wouldn't admit it. Yeah which makes it even worse so we know what company not to use it for concerned about cyber security. They can't protect themselves.

Ceo Kevin Matt Gorham Cyber Division Fireeye FBI United States National Security Agency
FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State

Techmeme Ride Home

01:41 min | Last month

FireEye, a Top Cybersecurity Firm, Says It Was Hacked by a Nation-State

"If you're a regular listener of this podcast then you should know the name fire. I there the cybersecurity firm that it seems like i quote from half the time. When there's a major hacker security story in the world. Well fire. I is the security story today. Because they say some of their internal systems were hacked by nation state actors compromising its red team tools. Which fire uses to test the defenses of thousands of customers quoting the wall street journal fire. I declined to comment on. Who it believed was behind the breach of its hacking tools. Which experts said could potentially be leveraged future attacks against its customer base including a diverse array of us western national security agencies and businesses. A person familiar with the matter. Said russia is currently seen by investigators including us intelligence agencies as the most likely culprit but stressed that the investigation was continuing moscow foreign intelligence service known as the s vr and one of two russian groups that the democratic national committee ahead of the two thousand sixteen presidential election is believed to be responsible. The person said the russian embassy didn't immediately respond to a request for comment quote. I've concluded we are witnessing and attacked by a nation with top tier offensive capabilities. Kevin mandy the chief executive at fireeye and a former air force officers said a blog post published tuesday. The attackers taylor their world class specifically target attack. Fireeye and quote fire. I a company that has in years past helped businesses respond to some of the most serious hacks on record such as the two thousand fourteen hack of sony pictures. By north korea said it was working with the federal bureau of investigation and industry partners including microsoft in a continuing investigation into the

The Wall Street Journal Kevin Mandy Fireeye Democratic National Committee Russian Embassy Russia Moscow United States Air Force Taylor Federal Bureau Of Investigatio North Korea Sony Microsoft
"national security agency" Discussed on 10 10 WINS

10 10 WINS

02:52 min | Last month

"national security agency" Discussed on 10 10 WINS

"I'm sue Other our next report at 9 31 in 10 10 wins. Dangerous turned in the dispute over Staten Island Bar, the city is shut down for covert violations. Tendon wins. Rogers during has a story in this live report. Gambling in the co owner of a Staten Island bar has been arrested again, but this time not just for breaking covert rolls by serving patrons indoors. This time, Danny Presti allegedly drove his car into a sheriff's deputy who was thrown on top of the roof and had to go to the hospital. The bar is Max Public House, which is described itself as an autonomous zone. It's Facebook pages. 25 sheriff deputies. It's warm, prestige car. Meanwhile, supporters who think the bar should remain open plan a march for tomorrow evening. Roger Stern. 10 10 wins Live on Staten Island. Bar supporters plan a march tomorrow night getting school on coronavirus. Governor Cuomo has written an op ed talking about how low infection rates in the state schools can teach the larger community how to stop the spread. In this news Day PC compares infection rates in Long Island school, so those in the surrounding communities in all the ones he cites the infection rates of spar lower than the community around them. That the governor says is because schools follow basic rules. Students and teachers were masks. Practices will distance even washed their hands often. The governor says they're serious about doing their part. Follow says We should follow the example of schools to help fight the pandemic, noting that small unmasked indoor gatherings become the largest spreader of the virus is advice. Let's say smart and alive until we get there. Wins news time. 9 23 Defense Department officials pushing back against claims in the Biden Harris transition team that they were blocked from contacting intelligence agencies controlled by the Pentagon. Correspondent David Martin has assets, officials say members of the Biden transition team Attempted to contact several intelligence agencies like the National Security Agency and the Defense Intelligence Agency directly, rather than going through the Pentagon, which has authority. Over those agencies once the bottom team followed the proper procedures, these Pentagon officials say, Ask says was granted. Pentagon officials claim that the land a bureaucratic mix up not under the intent to slow roll the transition. Knew they were trick or treating. Police want your help finding five guys in masks. We robbed Brooklyn Club at gunpoint The morning after Halloween just after 5 a.m. November 1st that the Japan is nine and bar club in Bushwick. The five guys with guns walked in. Demanded a 24 year old man. Give up his jewelry, Cash, An Electron IX. He did. They ran. Nobody was hurt. Now The guys were caught on video. Some of them had Moscow er monster masks on some of the head more ordinary ones. Please urging anybody with info about this incident to call Crime stoppers. Wins news time. 9 24 So, yeah, everybody's getting a little bit bored with the work from home set up, so maybe a change of scene looking to shake.

Staten Island Bar Pentagon Governor Cuomo Staten Island Facebook Danny Presti Long Island school Biden Harris Rogers coronavirus Defense Department Defense Intelligence Agency David Martin Moscow Roger Stern. Japan National Security Agency Brooklyn Club
Edward Snowden Will Seek Russian Citizenship Ahead of Son's Birth

Lewis and Logan

00:38 sec | 2 months ago

Edward Snowden Will Seek Russian Citizenship Ahead of Son's Birth

"An American who revealed secrets of the National Security Agency wants to be a Russian citizen. Edward Snowden has said he's applying for a Russian passport for the sake of his unborn son. A whistle blower and his American wife, Lindsay Mills, revealed last week she is pregnant, Snowden wrote on Twitter. They were getting Russian citizenship to ensure they won't get separated from their son. In this time of pandemics and closed borders, he said they will remain American citizens and he hopes still to return to the U. S. Snowden is being living in Moscow since 2013. When he was given political asylum after he leaked documents revealing vast surveillance by the NSA.

Edward Snowden Lindsay Mills NSA Snowden U. S. Snowden Twitter Moscow
Snowden and his wife seek to be Russian-US dual nationals

The KFBK Morning News

00:18 sec | 2 months ago

Snowden and his wife seek to be Russian-US dual nationals

"Is applying for a Russian passport, the American whistle blower and former National Security Agency contractor leaked classified documents. It reveals the scale of surveillance in the U. S. Has been living in exile in Russia since 2013. He and his pregnant wife want dual U. S Russian citizenship

National Security Agency U. S. Russia
Is Russia interfering in the 2020 election? Yes

All Things Considered

05:26 min | 4 months ago

Is Russia interfering in the 2020 election? Yes

"Officials say Russia is at it again trying to disrupt the U. S election and give President Trump of boost through hacking and spreading falsehoods on social media, Just like in 2016. This time, Russia may not have to work as hard. Clinton what studies disinformation at the foreign policy Research Institute. Russia doesn't have to make fake news. They just repeat, you know what conspiracies air coming out of the White House and the administration. Americans, including the president of the United States are raising the possibility of violence, spreading falsehoods about the election online and casting doubt on the whole process to discuss the dangers. Foreign and domestic. We're joined by NPR, National security correspondent Greg Marie and our tech correspondent Shannon Bond. Good to Have you both Here. Hi. So Greg, let's start with you. Is Russia the only foreign threat or just the biggest right now It's the biggest foreign threat and the national security officials and analysts who are studying this a really, absolutely clear. Russia is the main foreign threat. It wants to help Donald Trump win reelection in China and Iran or the other countries that are also mentioned, but at a much lower level. Now there's a big difference. This time the national security establishment, private researchers and the media are all much more prepared for this kind of disinformation. This time, far more eyeballs are looking for fake social media accounts planted stories. Just to give you one example in the 2018 midterms. The National Security Agency sent cyber teams to Europe to shut down the Russian troll factory that had been involved in the 2016 elections. Soas Faras, We know no foreign campaign has gained any real traction. But is it possible that the 2020 playbook is more advanced and sophisticated and maybe escaping the notice of people who are looking for the kinds of things we saw in 2016? Definitely a possibility. Microsoft put out a big report. They said. It's the same Russian agency military intelligence that's added again, but they are using a different tactics. They were using a lot of pots and automated social media accounts last time. This time, they're going to great lengths to hide their tracks. They're trying to hire Americans who unwittingly will write stories for websites. So yes, the playbook has changed. So Shannon tell us about what's happening in the United States. What are you hearing from tech companies and the experts who study this? Well, they're very alarmed. I spoke with your wrath. He's in charge of sight integrity, a Twitter and he puts it really succinctly. The people who know the most about how to mislead Americans are other Americans. So what security researchers are warning is that you know the atmosphere is just so right for disinformation. Right now we're living with so much uncertainty and that opens the door for bad actors to undermine confidence and voting in the election results because of the changes that are happening during the pandemic. There's also worries that bad actors could use fears about coded to discourage voting, and they're really concerns about extremist groups that could use social media to incite violence. And this also creates opportunity for foreign actors to amplify this information that Americans are spreading like those baseless claims that we keep hearing about voting fraud from President Trump and domestic disinformation is more challenging in some way is for the platforms, then foreign meddling. No, if they're going to take action against somebody like the president that inevitably become sort of a political football. Those calls could be much tougher for Facebook and Twitter to make then taking down Russian bots, and we've seen some of that in the last few months. Tell us about what these companies are doing. Yeah, well, they're doing a lot more than they used Tio. Both Twitter and Facebook have new rules against misinformation about voting. Against casting doubt on results or making premature claims of victory in the aftermath of the election, especially Twitter, stepped up labelling posts from the president. That's something we just didn't see them do really, until the last few months. They also say they're working together their monthly meetings with the industry and government and law enforcement agencies to discuss these threats and their responses, and both companies say they have gamed out Mohr extreme measures that would stop really world risks like voters, depression and violence, but they don't give us a lot of details on what those might be. Can we say yet how that's going Well, Critics say Facebook especially is still just too slow at this. It doesn't label or remove posts in many cases until after they've spread widely. The Biden campaign sent Facebook a letter this week condemning it for not just taking down Trump's false claims about voting. It called Facebook quote the nation's foremost propagator of disinformation about the voting process. Facebook says it applies its rules impartially, and we should note that Facebook is among NPR's financial supporters. You know what I hear again and again about social media platforms. This isn't just a question of are they setting the right rules? It's how are they enforcing those rules? And meanwhile, Greg, the president of the United States, is repeatedly questioning the legitimacy of the election and saying things about voting that are just flatly false. How is that shaping this discussion? Yes, this has had an impact. The Russian goal for years and years has been to undermine the credibility of the U. S political system. And now we have a president declaring at campaign events that mail in ballots aren't credible that this is the most corrupt election in U. S history. It's a sharp contrast from what we hear from officials like FBI director Chris Ray. You say Election systems have been hardened, tested and retested, and it will be extremely difficult to tamper with votes as we enter this final month.

Facebook President Trump Russia Twitter United States Greg Marie Shannon Bond NPR White House U. S National Security Agency Clinton Microsoft Policy Research Institute Europe FBI Chris Ray
TikTok reaches deal that would give Oracle oversight of U.S. operations

POLITICO's Nerdcast

16:18 min | 4 months ago

TikTok reaches deal that would give Oracle oversight of U.S. operations

"And Tick Tock recently made headlines Everywhere when Resin Donald Trump signed an executive order. That would essentially ban the Chinese owned APP in the US for national security reasons. Unless it sells its operations here to an American company. And of course, if that were to happen. We would have nowhere to go to see a million potatoes singing. To Adele. And that would be a national tragedy. This week deal actually emerged between TIKTOK and American company Oracle but some people like Zachary say trump's tiktok policy effectively changes. Nothing. The argument goes like this. It will do little to protect Americans data from the Chinese government because there are still plenty of other ways China could get that data that this move is just a new kind of security theater basically. The hard work of data security according to this actually lies elsewhere. So, Zachary TIKTOK has been banned in Indiana a few other countries, but it's still pretty popular for now it's the most popular video sharing app i. can see why it seems like fun and there are mental creative. They're short I mean the whole nature of the medium has their time limited. What happened with Tiktok this week what happened this week? Should be clear but isn't. Basically, in August, the trump administration ordered via executive order whose legality remains highly questionable that the Chinese owner of Tiktok, a company called Bite Dance. Divest itself of Owning Tiktok within ninety days or face the prospect that tiktok would be shut down in the United States. I broke the deal I said you can't do business in the United States, which is at least potentially within the power of the US federal government based on national security concerns based on national security and the logistics are complicated that you probably could order apple and other people and servers that are hosting tiktok. that. They couldn't do it and it would defacto make it impossible for Tiktok to function. So that is what began a process where the owner of Tiktok, again, a Chinese company sought an alternative way to their cell, the US portion of Tiktok or what ended up happening major deals Rocking Wall Street this morning pushing futures higher. We find an American technology partner Oracle beat Microsoft and become the technology partner for TIC TACS US operations although will not. receive its coveted algorithm so that all took talks data would be kept in the United States on servers owned by an American company and not by Chinese company because the whole point of this was that all these people using Tiktok, these tens of millions, hundreds of millions that data was potentially vulnerable to being used and therefore misused by the Chinese government. How so So the fear was because technology companies in China by Chinese law are required if. By the Chinese government to turn over data relevant data that the Chinese government could tell the parent company of Tiktok, hand us all of your user data which user data of again tens of millions of Americans. and. Then China would have that data. So that was the concern right and and that's a legitimate fact the Chinese government could order that. The problem is, of course, one via our court system, an American court can order or prosecutor can subpoena data. From our companies. So it's not like what you and I do on Google or what we do on any technology provider is somehow. Unavailable. To government if government decides that it's in its interest to get it not to mention the the various many non-government actors, the vacuum, the stuff up and use it for their own purposes that is even more important I think probably more relevant to the China issue which is. Does it matter whether the data is in this case, potentially house by Oracle massive US hardware and software company versus being housed by servers in China. In terms of the ability of the Chinese government to obtain that data, it wanted to obtain it because not just third parties that hoover up data and use it in the whole buying selling and the data market, but just spying tools. Whether it's the NSA in the National Security Agency in the United States or various Israeli cybersecurity and or cyber spying companies or the Chinese government. Most of this data isn't that secure. Not. Like. Triple encrypted quantum encrypted defense department level communications. So likely true that if the Chinese government really wanted my teens Tiktok data, it doesn't really matter whether that data's House on servers in China owned by Chinese company or whether it was housed on American servers on buying American company. So I guess, then how do we get to this point? How did you know given what you just said why has this become such a big issue? How did it start? Yeah it's a good question I I'm not sure. There's a precise answer. It's part of a whole continuum of the trump administration in particular identifying China as a proximate threat to the United States and a whole series of ways competitively in terms of trade practices hence the hundreds of billions of dollars of Chinese imported goods that have been subject to American tariffs. It's part of a multi year campaign against this massive Chinese telecom equipment company called Wa wa, which has been a leader in next generation five G. Telecom equipment in a way that again, some of the same concerns have existed which is. That the Chinese government would would use the production of that equipment as a way to spy on who met from purchase adequate. And Look a few years ago. There was a a forced sale of gay dating APP Grindr, which was also owned by a Chinese company, and so there was an earlier precedent of forcing a Chinese company to sell an American APP Social App. Because, of data concerns and finally, there's the fact that for years long predating the trump administration. China has not allowed American social media companies like facebook. To function in China. So there's the tit for tat. You know you don't let our social media functioning companies function there. Why should we let yours function here? There's Several year campaign against China which the trump administration's pursued but I think has a good deal of democratic support I. Mean if it's close to a bipartisan sentiment that China, China's a threat as anything we have right now. Why Tiktok? Suddenly became a thing I may partly have to do with the fact that it suddenly became a very big deal in the United States. I mean, this was not a company that had any footprint several years ago and suddenly as. The APP does your so it may have had to do with something that got really big and is very noticeable. Salsa not that economically important. So a lot of people would be royally pissed off Tiktok were banned. It's not like tiktok is. An integral component. To the US economy either during covid or without covid. So it's an easier target. We'll be right back. Everyone wants to become a better leader this groundbreaking new book how to lead shows you how David M Rubenstein is one of the visionary founders of the Carlisle Group and host of the David Rubenstein Show where he speaks to leaders from every walk of life about who they are, how they define success and what it means to lead. Jeff bezos Richard Branson Warren Buffett Bill Gates Ruth Bader Ginsburg Phil Knight Oprah all of them and more are featured in how to lead this essential leadership playbook illustrates the principles and guiding philosophies of the world's greatest game changers discover the expert secrets to being. Effective innovative leaders. Walter Isaacson proclaims reading this invaluable trove of advice from the greatest leaders of our time is like sitting in an armchair and listening to the masters reveal their secrets, pick up a copy of how to lead wisdom from the world's greatest CEOS founders and Game Changers Bhai David Rubenstein available in Hardcover e book or audio, and we're back I get the kind of general personal security aspect of it. Where does the national security aspect of it come in? Is it because there's concern about people who worked at the Defense Department or the military whoever having to talk in in use in their households or people in the Defense Department are not allowed to use tiktok certainly not on their phones. For before this although they may have teenagers who That's vulnerability as well. So it wasn't primarily about like US government employees who might have sensitive data that tiktok would be the back door way that the Chinese government would spy on them but it was generalized sense of any foreign government that is using private American citizen data potentially for nefarious purposes represents a national security threat. Now, it clearly has not represented the kind of national security threat in the estimation of the White House right now when it's Russian. Manipulation of social media accounts the same principle should or would apply right. If you'RE GONNA ban, Tiktok you'd probably want to take action against the a variety of Russian media enterprises that are attempting to manipulate and hoover up American user data. Some of that data's you mentioned earlier in terms of third party is available to anybody for a price just because there's a marketplace for data. Which I think either most of us aren't aware of or frankly most probably don't care if politicos data on this podcast gets sold to fourteen vendors so that it can sell you and me products based on our other computer activity most people. Either like that, or don't care about that. But the national security concern is simply because it's a foreign government that could potentially. Use, our search history or browsing history nefarious. And again a, that might be true but be it's likely that all this kind of data is obtainable irrespective of whether or not a company called TIKTOK. Happens to have access to a lot of it. It's really interesting. So into this whole story comes oracle, you know huge hardware software firm but how did they get involved here? Yes. Oracle is is a multibillion dollar firm that has had the same public profile as Microsoft or Amazon or facebook or apple because most of its business is to other large companies, you know you and I don't tend to go out and buy Oracle piece of hardware because we don't need a hundred and fifty thousand dollars server or. Network system for our employees. They're largely corporate provider throw a huge provider to the Defense Department in terms of cheer equipment and material, and they're huge software company. They're one of the early Silicon Valley success stories and the billionaire founder Larry Ellison has been probably more conservative than not I don't know that I buy into the whole. This is a reward versus. A snub to the other potential main acquirer or partner for Tiktok, which was rumored to be Microsoft but this is an unusual. This doesn't usually fit oracle's business model. Well, that's that's interesting. So what is their interest in getting involved here perceived to be I'm not one hundred percent clear about that I mean look at could allow them to. Have a little bit more of a consumer facing brand. Again, I mean Oracle's. Primarily a software company primarily a database company. Maybe this could help them increase their databases. There's no way that this is a natural fit for goal. But at the same time north this a huge cost for Oracle, maybe it'll produce some American jobs. I mean. They're looking for growth just like everybody's looking for growth, and once you get to be the size of Oracle. Growth gets harder some of they're also looking for a DIFFERENT INDUSTRY TO BE President Chore? So. What exactly did they given? What did they get here that as of this conversation is not one hundred percent clear off so it was presented as or go by tiktok. That is not the case or at least it's not the case now and as possible. The deal will be scuttled or change given that all of this has to be approved by the government has to be approved by committee. Called Syfy S, which is the committee in charge of looking at global deals in terms of US national security, but it would seem that right now. The parent company of Tiktok saw own TIKTOK and get some of the economic benefits of TIKTOK. This Chinese company called by dance and that Oracle in turn will get a massive licensing deal to house Tiktok data and information on its own. Servers and using its own software. So the concern that the Chinese government would have access to that data would be allayed meeting under this agreement arrangement because the data would be managed by and it's housing would be arranged by a US company. The Chinese government could order by dance to turn over but by dance itself wouldn't actually have access to that data. It's interesting I mean based on what you said before it's they're they're they're moving this data from place a, it's not going to be in a different place and I guess the Chinese government will no longer have a key to the door. But as you said before there's many different ways that either the Chinese government or a lot of other. State or private actors can get hold on more or less any data they want to these days right? which kind of raises the question for point of all, this is ENA. It's certainly true. It would make it a little more challenging to get that data under that kind of arrangement. It seems like this a big fight over a big company. That's not actually really about. The literal subject of the conflict here. Yeah. It is totally fair to say that whatever the imbroglio about tiktok has very little to do with tiktok. And everything to do with US policy toward China. And the trump administration looking for some High profile optic to be able to say we're we're being tough on China and protecting American citizens. Again, the oddity of Tiktok is given that so many of its users or young adults. Who Don't vote although who would be? Extremely, Acetate it. If they woke up tomorrow and there's no TIKTOK meeting, it's probably not. The most popular move if what you're trying to do is gain support during a presidential election. So it's not entirely clear what constituency the served there wasn't like a huge congressional clamor for Oh my God. We're all big imperilled by these fifteen second videos. So where do you think things go from here in terms of into in terms of the real story behind all this in terms of the U., S., China relationship and the increasing in. them of that. So I think to some degree regardless of who wins the presidential election. there. Is a train that's left the proverbial station of increasing. Distrust and animosity between the United States and China. But within the context of an incredible amount of economic interdependence that you cannot just snap your fingers and several or at least not without massive massive harm to each part of that equation both the United States and China, and that's that's pretty unprecedented. Right? Right. That's like the Cold War analogy doesn't work because there was no economic relationship between the United States and the Soviet Union nineteen. Fifty S

Chinese Government United States Tiktok China Zachary Tiktok Oracle David M Rubenstein Defense Department Donald Trump Executive National Security Agency Partner Microsoft Indiana Apple Adele
Trump not ready to OK TikTok deal, admits US won't get cut

POLITICO's Nerdcast

06:21 min | 4 months ago

Trump not ready to OK TikTok deal, admits US won't get cut

"Basically, in August, the trump administration ordered via executive order whose legality remains highly questionable that the Chinese owner of Tiktok, a company called Bite Dance. Divest itself of Owning Tiktok within ninety days or face the prospect that tiktok would be shut down in the United States. I broke the deal I said you can't do business in the United States, which is at least potentially within the power of the US federal government based on national security concerns based on national security and the logistics are complicated that you probably could order apple and other people and servers that are hosting tiktok. that. They couldn't do it and it would defacto make it impossible for Tiktok to function. So that is what began a process where the owner of Tiktok, again, a Chinese company sought an alternative way to their cell, the US portion of Tiktok or what ended up happening major deals Rocking Wall Street this morning pushing futures higher. We find an American technology partner Oracle beat Microsoft and become the technology partner for TIC TACS US operations although will not. receive its coveted algorithm so that all took talks data would be kept in the United States on servers owned by an American company and not by Chinese company because the whole point of this was that all these people using Tiktok, these tens of millions, hundreds of millions that data was potentially vulnerable to being used and therefore misused by the Chinese government. How so So the fear was because technology companies in China by Chinese law are required if. By the Chinese government to turn over data relevant data that the Chinese government could tell the parent company of Tiktok, hand us all of your user data which user data of again tens of millions of Americans. and. Then China would have that data. So that was the concern right and and that's a legitimate fact the Chinese government could order that. The problem is, of course, one via our court system, an American court can order or prosecutor can subpoena data. From our companies. So it's not like what you and I do on Google or what we do on any technology provider is somehow. Unavailable. To government if government decides that it's in its interest to get it not to mention the the various many non-government actors, the vacuum, the stuff up and use it for their own purposes that is even more important I think probably more relevant to the China issue which is. Does it matter whether the data is in this case, potentially house by Oracle massive US hardware and software company versus being housed by servers in China. In terms of the ability of the Chinese government to obtain that data, it wanted to obtain it because not just third parties that hoover up data and use it in the whole buying selling and the data market, but just spying tools. Whether it's the NSA in the National Security Agency in the United States or various Israeli cybersecurity and or cyber spying companies or the Chinese government. Most of this data isn't that secure. Not. Like. Triple encrypted quantum encrypted defense department level communications. So likely true that if the Chinese government really wanted my teens Tiktok data, it doesn't really matter whether that data's House on servers in China owned by Chinese company or whether it was housed on American servers on buying American company. So I guess, then how do we get to this point? How did you know given what you just said why has this become such a big issue? How did it start? Yeah it's a good question I I'm not sure. There's a precise answer. It's part of a whole continuum of the trump administration in particular identifying China as a proximate threat to the United States and a whole series of ways competitively in terms of trade practices hence the hundreds of billions of dollars of Chinese imported goods that have been subject to American tariffs. It's part of a multi year campaign against this massive Chinese telecom equipment company called Wa wa, which has been a leader in next generation five G. Telecom equipment in a way that again, some of the same concerns have existed which is. That the Chinese government would would use the production of that equipment as a way to spy on who met from purchase adequate. And Look a few years ago. There was a a forced sale of gay dating APP Grindr, which was also owned by a Chinese company, and so there was an earlier precedent of forcing a Chinese company to sell an American APP Social App. Because, of data concerns and finally, there's the fact that for years long predating the trump administration. China has not allowed American social media companies like facebook. To function in China. So there's the tit for tat. You know you don't let our social media functioning companies function there. Why should we let yours function here? There's Several year campaign against China which the trump administration's pursued but I think has a good deal of democratic support I. Mean if it's close to a bipartisan sentiment that China, China's a threat as anything we have right now. Why Tiktok? Suddenly became a thing I may partly have to do with the fact that it suddenly became a very big deal in the United States. I mean, this was not a company that had any footprint several years ago and suddenly as. The APP does your so it may have had to do with something that got really big and is very noticeable. Salsa not that economically important. So a lot of people would be royally pissed off Tiktok were banned. It's not like tiktok is. An integral component. To the US economy either during covid or without covid. So it's an easier target.

Chinese Government China United States Tiktok Oracle American Court Apple National Security Agency Executive Google Bite Dance Partner WA Prosecutor
China slams Australian Government for 'blatant irrational behavior' over foreign interference investigation

Bloomberg Daybreak: Asia

00:27 sec | 4 months ago

China slams Australian Government for 'blatant irrational behavior' over foreign interference investigation

"Has slammed the Australian government for what it calls blatant, irrational behavior over a foreign interference investigation is an ABC in Australia's story China's Foreign Ministry saying it has embroiled a group of Chinese academics and journalists. In the country. The Chinese media outlets alleged that Australian National Security Agency's had raided the homes of four Chinese state media reporters in June, sees their equipment in order them to stay silent about the probe.

Australian National Security A Australian Government ABC China Australia
Intellectual-Property Assets Are Getting More Valuable

Intelligence Matters

37:14 min | 5 months ago

Intellectual-Property Assets Are Getting More Valuable

"As a foreign intelligence agency were responsible for understanding a broad range of threats. Presented by governments to the United States, one of those threats include our cyber threats how nations may be using cyber to achieve their national objectives that might be intellectual property theft for example, to counter department offensively valid by accelerating foreign governments ability to actually productized particular RDA for weapon that may be targetting critical infrastructure of a country. As part of threatening that country or as part of putting pressure on a given country. How are we doing against the cyber threats are we? Barely keeping up, are we catching up? Are we getting ahead of the game or? Is it always going to be hard for the defender. Overall technology is getting more secure. Technologies Belt more securely today. So. The fundamental resilience is is improving known. You have open source products. We have lots of is looking at a given technology and helping find vulnerabilities and address them. That being said for an ever-more connected economy in ever more connected society, and as we build more connections, sometimes systems that were not necessarily built for those kinds of connections we bring and introduce new risks on the third poll the positive side there's far more awareness about those risks and how to approach addressing them identifying what are the most important assets to protect. Seems to be an effort on the part of NSA to kind of open up a blackbox and Kinda shut the reputation no such agency we want to be trusted to achieve or we believe we can uniquely contribute to team USA on either the first step. Is conveying who we are conveying the culture. That's here the commitment to American values. Certainly. When a part of our mission is an intelligence mission in a democracy, you have an obligation to ensure that the Americans. We serve feel they understand the values by which we live. And neuberger is the current director of the national security. Agency's Cybersecurity Directorate. She has held a variety of jobs in both the public and private sectors. We just sat down with an to talk about her career, her and her director. It's multiple responsibilities and how she sees a cyber threats facing our country. I'm Michael Morale and this is intelligence matters. So an welcomed to intelligence matters, it is great to have you on the show. It's great to be here. So I think the place to start and is with your career before you joined the national security. Agency. You had a career in the private sector. Can you tell us about that and tell us what you did in the private sector and then what drew you into government, service. Sure. So I was in running technology at a at a financial services company during that time period when financial services companies really moved off mainframe environments to the Web. Decline server technology. So that piece of both taking an operations and emission and its associated technology and people and culture really Shaked shaped the way I approach a lot of those problems today. And I was raised in in a family where my dad came as a refugee all my grandparents came as refugees to the US and they just. Constantly instilled in US how grateful we should be for the opportunity to be born in America and raised in America, with its freedoms with its ability to pursue one's dreams and and that we owed it for that and. I was driving home from from work in. In two, thousand six, we just done a large acquisition of. Companies of banks, custodian operations. And on the radio, they were talking about the bombing of mosque. Samara Moscow in smaller rock and just the. Soldiers dying civilians dying and the troubles there and I I still don't know why but I thought of my dad and. That's myself. Perhaps now's the time to repay a little bit of of that in some way and. I've been a graduate student at Columbia had a I had a professor tell me about the White House fellows program and encouraged me to apply and I kind of I have to admit was a bit of the New Yorker Countless New York ever. kind of put that aside and for whatever reason I just felt that calling at that moment called him and said I'll apply and fast forward I was assigned to the Pentagon. With zero military background. And you learned a lot about the culture very drawn to that shared commitment and spent a year in the Pentagon worked for the navy and then came to NSA. Couple years later. What did they doing at the Pentagon and the Navy? So I was the deputy chief management officer, the Navy essentially, the Navy had a number of broad enterprise wide technology efforts which they were working again, bring that you people mission. Technology Triangle. And they asked me to help work on a couple of working directly for the secretary of the Navy figure out why a of them were struggling and then help them get on track. So I worked on that and I often get asked by people. How did YOU END UP AT NSA? A pretty funny story in that I had a seventy six year old and I was commuting from Baltimore and the. The work life balance was a bit tough and I met somebody and he asked me about. How he was doing and I commented that I really love the work but it was a little hard for me to do the juggle. And he said, you know I happen to know that NSA standing up you director NSA standing up cyber command and I know they need people with your kind of of background. So how about if I make a phone call there? And I went for an interview commute was thirty minutes and it sounds so foolish but. That was pretty much what it took. Interesting interesting. So the private sector and then the Department of Defence which is as you know this huge enterprise and then NSA and this is a this is not an easy question I know about kind of the similarities and differences of those three different experiences. It all begins with people. In every organization missions have to adapt and change They adopted change in the private sector because perhaps you have a competitor, perhaps the customer spaces adapted. Certainly financial services saw that we're the scale of data was just increasing the scale of trains was increasing and the traditional manual processes couldn't keep up. So we automation with needed to reduce errors and help us keep on track with we're trading was going. Technology could deliver on that, but the the business of the organization had to change to fully take advantage of the technology and the way people did that mission and use technology had to change along the way. So I think in each of those organizations that taught me that for that, that triangle has to be kind of guided together to get to an outcome mission technology and people if you really want to be able to fully. Whether it's take advantage of a market or stay ahead of an adversary in our own mission here in the ICU dod that triangle has to work together and you have to communicate every those three planes together when talking about why the changes needed. So an in your tenure at NSA, you've served as its first chief risk officer. The assistant deputy director of operations, the head of the Russia's small group, and now the head of the Cybersecurity Directorate. Can you take us through your trajectory there how did your responsibilities differ from roll to roll? Absolutely, and so I came into an Santa's small team part of a small team that was standing up cyber command, the chief risk officer role was. was created after the media leaks period of two, thousand, thirteen where we learned that. Really appreciating risk mount looking at in a holistic way across partnership risk operational. Risks Technology risks. We learned that we needed to adapt the way we looked at risk and then change according to that. So I think in each of those roles. Either, the adversary was changing around us a threat was changing around us. We. Wanted to take advantage fully of an opportunity and I was responsible for taking the big picture strategic goals, translating those two measurable outcomes and objectives and helping you know contribute, communicate the why and then bringing the team of people along to get their each other's efforts was a bit different. But you know. We talked about the risk of doing the risk of not doing weighing that appropriately we talked about the insuring that as we approached new missions policy and technology move together, and certainly when we looked at the elections work in two, thousand, eighteen, the Russia's small group work we saw we're adversaries of have used influence operation since the time of Adam and Eve perhaps would have changed was again the ability to use social media to both focus and directed to have larger impact. So focusing on the Russia's small group for just a second and what was that what was the what was the mission and what were your responsibilities with regard to the two thousand eighteen election's to the extent that you can talk about that. Absolutely. So the mission was ensuring the integrity of the two thousand eighteen midterm elections ensuring that we I understood the threat second that we appropriately tipped all the information we had about the threat to key partners across the US government. Certainly, FBI from a counter infants perspective digest from Cybersecurity of elections, infrastructure perspective, and they finally that we would support Cyber Command. If if authorized to impose costs, it's were attempts to disrupt. Disrupt the election. So. After the two thousand eighteen election's president trump publicly confirmed that cyber command played a role in deterring the Russians in two thousand eighteen are they're important lessons from what happened in two thousand eighteen about how we as a country can defend ourselves against this this insidious threat. Yes. So you know across the government, we look at two key polls. Integrity one is attempts to malignly influence population whether that is to highlight social discord to highlight issues that divide the population or to. Hand up sheer inappropriate. You know share information as part of shaping individuals ideas, and then the second is potentially interfering hacking into elections infrastructure as part of efforts to change the vote and I think the first pieces, the value of resiliency. The sense that you know once trust is lost, it's very hard to regain. So the knowledge for the American public that there are hundreds of people across the US government committed to and working to ensure the integrity of our elections. When it comes to counter influence though the biggest resilience as each of us. As Americans when we're reading something asking who might be trying to influence me what is the source of that information I fully confident in that source of that information. And then finally the role of the role of technology and the role of Public Private Partnership. In as part of elections integrity. So for us in the intelligence community were constantly watching for which adversaries maybe seeking to to shape a populations thinking to shape an election and then rapidly tipping that to partners or. To the private sector to ensure that they're both aware of techniques and our countering them on their platforms. So we've since learned shocked last week the updates from deny that the Russians continue to engage in election interference, the Chinese, the Iranians, and the punchline of all that for me is it's really hard to deter. Foreign interference right and I'm wondering if it's something special about foreign interference or if it's more about cyber at the end of the day and the difficulty of seeing cyber attributing it if you see it, how do you think about that question absolutely I think it is more about cyber than about elections from a cyber perspective when we look at fully both protecting cyber infrastructure and then to your second point about attribution, there's complexity laying what we call the red on top of the we may see threats. That are talked about strategic perspective and then we partners across the US government a looking to see where does that present itself? Where are the given vulnerabilities in a given infrastructure? The powers when you can lay the two together and say, here is a nation state that has intent to interfere in whatever that is an election critical infrastructure. I Pete Best and then translate that to the tactical level to say that network scanning or that vulnerability in hardware or software may well be used to achieve the objective putting that in place, and then most importantly preventing it because at the end of the day riding report about a victim and notifying the victim is far less satisfying than being able to put that together and prevent the adversary cheating their objective. So we've already started to shift now into your new role, right which was relaunched in October I believe. So be great if you could, and if you could explain for our listeners I, what NASA's two main missions are. Again and then cybersecurity and the difference between them just to give folks here level set absolutely. So Ns as a foreign intelligence agency were responsible for understanding a broad range of threats. Presented by governments to the United States, one of those threats include our cyber threats how nations may be using cyber to achieve their national objectives as that might be intellectual property theft for example, to counter the department defensively Thallady by accelerating foreign governments ability to to actually productized particular rnd for weapon that may be targetting critical infrastructure of a country. As part of threatening that country or as part of putting pressure on a given country. So that is the threat information on the second side. And say has cybersecurity mission. We're celestial known We build the keys codes and cryptography that's used to protect all of US government's most sensitive communications thinking nuclear command control weapon systems, the president's communications with allies, and we provide technical advice to mitigate those same threats that I talked about. So the really the he integration of the two missions where we think the magic is where we can say here's what we think adversaries are seeking to do, and here's how from a cybersecurity perspective we recommend you protect against. So so what motivated and the relaunch of the directorate and has its mission changed at all really good question. So we recognize that we were at a crossroads with national security as both technology and society ships were happening. We saw only kinds of technology that people want to from small satellites to Internet of things and each of those presents huge advancements. But they also present cybersecurity risk. Along with that, we saw various nation surtees. New Technologies think North Korean crypto currencies to get around sanctions to achieve their own objectives and we said we really need to up our game to more quickly be understanding those threats and ensuring that. We could both provide advice to build new technologies as early as possible, but also to counter adversaries use of those same technologies to achieve their national security. We're GONNA take a quick break to hear from our sponsor. Dumb. We'll be right back with more discussion with an neuberger. At Lockheed Martin, we're on a mission. Your mission. Not just the next mission but the one that's two steps ahead. That's why we've not only taken the lead in hyper sonics, but we're helping you integrate technology faster than. It's why we're not only developing the laser weapons systems you'll need but deploying them in the field. Our mission is to build the integrated solutions you can depend on because the world is depending on you. So and what are the what are the primary areas of Focus for your directorate? What kind of people work there? What's their skill set and what kind of customers do you serve? Questions. So the first parties. Operationalizing Intelligence. How do we ensure that from the intelligence that we see we took anything that's unique. And timely quickly so that we can prevent the victim. So that's the first, the first piece of of work, our areas of focus are. Both understanding that giving guidance encryption, we believe encryption. A key protection particularly in telecommunications environment that in many cases is entrusted. So both in building the government's special encryption, modernizing that as well as providing advice and insights on how to best use. Encryption the text of people who work cure are like we see him any organizations abroad gamut we have intelligence analyst. We have country-specific experts have a broad swath of technical experts, encryption network technologies, hardware, and software vulnerability analysts as well but the power is weird that can be integrated where you can say. How do you build on route of trust all the way through to an end point? Had you properly defend network and take a step back and do risk analysis to say? We are the gaps in your resilience and we're should your next dollar investment to closest gaps Right, and then what about customers is your is, is it just the Department of Defense? Is that the US government is even broader than that? How do you think about who it is you're working for? Yup Great Question. So there's a specific set work we do for what we call national security systems systems carrying classified information national security information the director. Vanessa is also the national manager for National Security Systems, that's the authority under which as I mentioned, we have we build the keys codes and cryptography responsible for distributing threat information as well. So those are across the US government with a particular focus on duty. Weapons Systems. And Related Systems. A second set of key partners and customers are dhs I. D. H., S. and its role supporting critical infrastructure. And, the sector specific agencies, and like I said the the real magic of understanding the critical infrastructure, we're it's key gaps and vulnerabilities are and being able to marry that up with what a foreign government may be intending to do and providing focused insight. Across the US government, there is broad use of commercial technologies, particularly duty and and national security system. So you may have seen when we're issuing advisories were also issuing advice on how to secure and configure those commercial technologies well because we see that. Those are used all across. Sensitive, systems as well. Your director has issued I think a dozen or so. Advisories about cybersecurity threats. Can you talk about why you guys do that? What the criteria is for quitting one of those out and then how do you think about the impact they have? Do You keep metrics on that? How do you think about? Advisories absolutely. So. Our advisories other way we really do them for three reasons. One is if we see a nation state actor using a particular vulnerability against the system care about we find that it really drives urgency of action people run faster when they're pursued, and if we can say, this nation state actor is using this vulnerability. Here's the mitigation advice to protect yourself against that we see impact and I'll talk about that how we measure that impact at the end. The second thing is there's a deep expertise here because we build and we break encryption. So encryption related technologies like the peons like you. You may recall the windows ten cryptographic vulnerability in January. Those are areas we focus on because we know those are sometimes hard to understand technically hard to implement. So if we can give very practical advice, them will issue those as well to help that be put in place, and then the third would be where there's a timely need and we're getting a lot of questions and we feel that putting out a product helps guide people and thinking about how to think about security I'll give an example. As. As covid. Pressed a lot of organizations across the US government particularly duty as well to move to telework. We started getting a lot of questions about secure collaboration. which commercial tools were safe to us and our goal was teaching people how to evaluate what safe to us. So we issued a product we're laid out the different attributes like. Code is available for review its end to end Krypton and a few other such attributes, and then we rated different secure collaboration publicly available tools against them and the cool part was we had companies call and say, well, you didn't get something quite right or can we be included as well and we said absolutely, we issued a second version and then we have another one coming out next week because our goal was making it as useful as possible and also helping teach people. How to assess. Different. Products for security. You ask the question about how we measure impact. So there's three different measures we've been using. The first is, do we see patch rates go up? They'll do we see for vulnerabilities that we've talked about here is a foreign actor might be using a boehner ability to achieve an objective. Can we watch those patriots go up and it was really cool to see. And a number of cases we've we've watched that increase. The second piece is there is a very capable and active cybersecurity industry has the information shared enable them to better protect. Sensitive US government national security systems networks, and you know in the case of the Xm vulnerability that we issued, we're advisory where we talked about the particular unit of Russian intelligence using the XML male vulnerability. It was really great to see five different cyber-security entities using that to identify other. Russian intelligence infrastructure and then take that down. So that was success for us that we made it harder for that adversary to achieve its objectives, and then the third one is really the feedback on the number of downloads and the feedback from administrators saying this was useful. This was unique timely and actionable could act on it, and then in May you guys took what I thought was an unprecedented step of actually openly attributing the exploitation of vulnerability to the Russian, Gru. and. That seemed to rare to me and I'm wondering why you decided to actually name Russia in this instance. So I it is rare because as you noted earlier, implicitly attributions hard. You may have seen a prior product where we highlighted one st state using another country's. Infrastructure to achieve its objective and then highlight he just hard attribution is. So when it's done, it needs to be done with precision to be confident. In that and we chose to do it because. We see that it makes targeted network owners more quickly patch and secure and build the resilience of their systems network administrators have way more vulnerabilities to address than they have time for or frankly money for and way more alerts than they can act on. So we can say this particular vulnerability is being used by a nation State Intelligence Service. We see them we see network administrators moving quickly and addressing it, and that's a fundamental goal. Fundamental goal is improving cybersecurity. If you kind of step back and look at look at the big picture here, you know, maybe from a thirty five thousand foot level how are we doing? The cyber threats are we barely keeping up? Are we catching up? Are we getting ahead of the game or? Is it always going to be hard for the defender. In this game in because the guy on the offense can always come up come up with something new how you think about sort of where we are in the history of of the threat of cyber and defense against it. I think we points overall technology is getting more secure. Technologies built more securely today. So the fundamental resilience is is improving you know when you have open source products, we have lots of is looking at a given technology and helping find vulnerabilities and address them. That being said were an ever more connected economy in an ever-more connected society, and as we build more connections, sometimes two systems that were not necessarily built for those kinds of connections. Data Systems. In that way, we bring and introduce new risks. On the third poll on the positive side, there's far more awareness about those risks and how to approach addressing them identifying what are the most important assets to protect and ensuring good practices are in place and it's far easier than ever to put that in place. So I think it's a mixed story on the one hand more more technologies built more securely, and there are communities of individuals working together to ensure their secure on the other hand far more. Technology some of which. Is connected in ways that bring risk in ways that we always have to and I guess the third part, which is where we started adversary seeking to take advantage of those risks to achieve their objectives. So. If you if you were standing in front of a large multinationals board of directors in you're talking to them about cybersecurity. What's the one or two things that you would absolutely want them to take away from from your conversation? What is the tangible thing you most want to protect and what's the intangible thank you most want to protect. So if you're drug company, what is the intellectual property that's going to be your next potentially big drug big driver of economic growth, big driver of healing, and then second what's the biggest intangible? Thank perhaps, that's your reputation. The way you treat your employees, the price, the prices that you charge and what you're, what you're. How much you mark that up. Make sure that you're protecting both carefully make your your cyber security commensurate with with the risk presented to you if you lose either one. And you mentioned you mentioned Skater Systems and I'm not sure that all my listeners know what those are just explain that and then is there something? Is there something special about protecting data system from protecting? Normal network absolutely. So Skater Systems are essentially control systems for the core areas of infrastructure in a given country in a given company. So think power systems clean water drug manufacturing. and. Those are. Those are often complex system. So what's unique about them is you know those systems over the years were often built four reliability in the event of a bad storm that power system would come back online with confidence as. More technologies got connected. So for example, the ability to measure. Use of power the ability to measure confidence in in water and chemical level. Some of those systems got connected to network systems that provide a way to access them. One of the joint products we recently issued between Ns. WAS An ICS product because there had been some public articles about. a given attack against skater systems in the Middle East, and we wanted to ensure that we together with. One of our closest partners was providing technical advice to. Skate entities in the US based on what we were learning about those attacks. So interest, a couple more questions you've been terrific with your time. Seems to be an effort on the part of an essay to kind of open up the black box and showed the reputation no such agency right. Your conversation with me thinking example of that why is that a priority for for the agency and for General Nakasone? I in the cybersecurity mission fundamentally if we're not trusted we can't achieve our intact. People take advice from those they trust and the power of. Across the US Government Team USA work cyber. There each organization plays its position within that role. You Know My counterpart at Digest Chris Crabs often talks about them being the national risk managers. At an essay, we believe what we can bring uniquely is that integration of intelligence series of seeking to do what their capabilities are, what their infrastructure looks like and how to defend against cyber security advice to counter that, and that's always continuing because technologies change adversaries, goals change, and the resilient always has to be increased to meet that. So we want to be trusted to achieve what we believe. We can uniquely contribute to team USA on cyber. The first step to doing that is conveying, we are conveying the culture that's here the commitment to American values, and certainly WanNa part of our mission is an intelligence mission. In a in a democracy, we have an obligation to ensure that the Americans we serve. Feel they understand the values which we live. So your your former colleague and my really good friend Glenn Gerstl road. Op Ed about a year ago about what he saw the. Profound implications of the Digital Revolution on national security, and he raised a lot of concerns and among those was the sheer pace and scale and volume of technological change and. And data that's GONNA force intelligence agencies including NSA to fundamentally change how they do business I was GonNa say thinking big picture about those kinds of challenges. What are you trying to tackle I? Would've the adjustments look like, how do you? How do you think about the challenge that Glenn laid out? Absolutely, so I from the perspective of large amounts of data and ensuring, we can make sense of them. Ensuring that we can do big data analysis to help. Triage the information we identify and determine what are people are big assets put their time on to determine he's and how to act on them. So for example. We we're looking at machine learning to classify malware and we're certainly looking at. Machine learning potentially to help us identify vulnerabilities scale particularly when we look at systems that represent thirty years of technology like muffins systems, how do you secure a weapon system? That's been out there and represent each phase of technology and have confidence in its resilience and in command and control. And then finally. We have an obligation to both bring those technologies to be on our mission and understand how adversaries might use that and manage that accordingly. So for example, as we think about artificial intelligence and the potential to automatically. Direct weapon. In the United States we have strong values around how we would think about automation versus human control. In other countries around the world, there might be different ways that those kinds of decisions are approached. So how do we ensure that we both? Bring that integration of. Compliance and technology to the way we pursue it but also be aware of those gaps and keep an eye on the risks of those gaps. And you mentioned you mentioned people and you mentioned people a couple of times and and just took two questions about that. One is given the competition that you face with all of these cyber security firms and. Your folks must be very attractive to them, and their skills are quite valuable in their private sector. How how difficult is it for you to recruit and retain talent? Really thoughtful question because you asked two questions in their recruit entertained. So. From the recruit side, we get really great people. On the routine side. We have a really compelling mission. and. What brings keeps people. Here is the sense that they're contributing to something bigger than themselves. That is challenging fulfilling. It's on us as organizational leaders to ensure that each person has that opportunity to contribute what they can uniquely bring chew to that mission. And one of the one of the cool aspects of the Cybersecurity standup has been people who have left to call in and say, Hey, I'd like to come back I learned a lot. In the private sector, the missions, calling me and like to contribute again, and we've hired a number of them back and continuing to increase that and part of the message we have when people if people do decide to leave is to say that is great. You will continue to contribute to the nation's security. You'll learn a lot in the five at sector, and if you ever want to come back the doors open. What do you? What do you want the American people to know about the women and men who work for you. That, they're committed to the values. That this country was established for. That there are significant threats to the United States, our allies and to those values, and that not always can we talk about those threats because? By impact sometimes intelligence community, even the security mission has to operate in those shad in the show does so. Trust our values, trust that we are proud Americans. We swear an oath to the Constitution of the United States, and if you do question it or if you want to learn more roll up your sleeves and come into the for a few years and get to know what yourself because each person has unique abilities and a unique ability to contribute to their to their country in whatever way they choose whether that's government are in the private sector. But if you ever doubt it come on in and work here and and raise your voice and be a part of it. It sort of takes you back to what your parents taught you to. It really does it my dad grew up in in communist Hungary and In the beginning when I came into government, he would call me on the phone sometimes and switched to a foreign language and. I realized that for him growing up in another country. Is that complete trust of government that I American born? You know have that doesn't mean it's trust and verify it's from verify but there are things that I take for granted growing up in this society that I don't know if he ever will. So being able to look at things through his eyes and through mind make me realize how fortunate we are to be here and how much we have obligation to. To ensure it stays that way. And thank you so much for joining us and thank you for your service. Thank you so much for your time.

United States Director NSA Cybersecurity Directorate Russia USA Theft National Security Systems New Technologies President Trump Navy Michael Morale Neuberger FBI Pete Best Nasa Department Of Defense Lockheed Martin Chief Risk Officer
Russian Hackers Tried To Steal Coronavirus Research, Intelligence Agencies Say

News, Traffic and Weather

00:29 sec | 6 months ago

Russian Hackers Tried To Steal Coronavirus Research, Intelligence Agencies Say

"U. S. National Security Agency and other Western intelligence outfits are accusing Russian hackers with trying to steal Corona virus vaccine research. The warning that the group a PT, 29 also known as cozy Bear. Suspected of having ties to the Kremlin's domestic and foreign intelligence services is tryingto hack researchers working on the vaccine. The allegation which the Kremlin denies. Potentially MOHR EVIDENCE a Russian aggression towards America after its targeting of the US election in

Kremlin U. S. National Security Agency Mohr United States America
Russia is hacking virus vaccine trials, US, UK, Canada say

KRLD News, Weather and Traffic

00:21 sec | 6 months ago

Russia is hacking virus vaccine trials, US, UK, Canada say

"If fighting the virus weren't enough, the National Security Agency says researchers working TTO find vaccines are also fighting off Russian hackers. Spy agencies in the U. S. Canada and Great Britain say the same Russian groups that attacked the 2016 election are now actively trying to steal data from scientists working on a cure for Cove in

National Security Agency Great Britain Canada
EU court invalidates data-sharing pact with US

AP News Radio

00:50 sec | 6 months ago

EU court invalidates data-sharing pact with US

"The European union's top court has ruled that an agreement that allows a big tech companies to transfer data to the U. S. is invalid and that national regulators it needs take tougher action to protect users data the ruling doesn't mean an immediate halt to old data transfers outside the EU there is another legal mechanism that some companies can use but it means that the scrutiny over data transfers will be ramped up and that the EU and the US may have to find a new system that guarantees that Europeans data is afforded the same protection in the US as it is in the E. U. the case began after former US National Security Agency contractor Edward Snowden revealed in two thousand and thirteen that the American government was snooping on people's online data and communications center shockingly London

European Union United States E. U. Edward Snowden American Government London Us National Security Agency
"national security agency" Discussed on WTMJ 620

WTMJ 620

01:46 min | 1 year ago

"national security agency" Discussed on WTMJ 620

"Car courageous moment is a special special warning for you and I thought the word was out about this more than it actually has been but the NSA the National Security Agency found major security flaw in windows ten windows ten a very dominant computer operating system in the U. S. and the NSA I just kept quiet and use that to spite but instead save let Microsoft no Microsoft his put up an update people who have automatic updates for security patches on their windows computers got the update in most cases overnight last night right if you did not get a new update on your windows ten computer you may not have it set up for automatic updates please take time today to do this because you don't even have to be qualified hacker like apparently anybody the security holes so great anybody with even rudimentary skills can get into your and follow so all you need to do is go to update settings and then when you get there you'll see update in security check for updates and then you download and install now so you know how windows were C. click this window then click that when the cook that when then bam it's there and then you're able to download the security patch because this is a really important update for you to get we talked to security experts to see how.

National Security Agency Microsoft
"national security agency" Discussed on 760 KFMB Radio

760 KFMB Radio

01:47 min | 1 year ago

"national security agency" Discussed on 760 KFMB Radio

"Today's color courageous moment is a special special warning for you and I thought the word was out about this more than it actually has been but the NSA the National Security Agency found major security flaw in windows ten windows ten a very dominant computer operating system in the U. S. and the NSA I just kept quiet use that to spy but instead save let Microsoft no Microsoft has put up an update people who have automatic updates for security patches on their windows computers got the update in most cases overnight last night but if you did not get a new update on your windows ten computer you may not have it set up for automatic updates please take time today to do this because you don't even have to be qualified hacker like apparently anybody the security holes so great anybody with even rudimentary skills can get into your and follow so all you need to do is go to update settings and then when you get there you'll see update in security check for updates and then you download and install now so you know how windows works you click this window then click that when the cook that when then bam it's there and then you're able to download the security patch because this is a really important update for you to get we talked to security experts to see how important.

National Security Agency Microsoft
"national security agency" Discussed on News 96.5 WDBO

News 96.5 WDBO

01:43 min | 1 year ago

"national security agency" Discussed on News 96.5 WDBO

"Moment is a special special warning for you and I thought the word was out about this more than it actually has been but the NSA the National Security Agency found major security flaw in windows ten windows ten a very dominant computer operating system in the U. S. and the NSA could just kept quiet and use that to spy but instead eight let Microsoft no Microsoft has put up an update people who have automatic updates for security patches on their windows computers got the update in most cases overnight last night but if you did not get a new update on your windows ten computer you may not have it set up for automatic updates please take time today to do this because you don't even have to be qualified hacker like apparently anybody the security holes so great anybody with even rudimentary skills can get into your and follow so all you need to do is go to update settings and then when you get there you'll see update in security check for updates and then you download and install now so you know how windows works you click this window then click that when the click that when then bam it's there and then you're able to download the security patch because this is a really important update for you to get we talked to two security.

National Security Agency Microsoft
"national security agency" Discussed on News 96.5 WDBO

News 96.5 WDBO

01:38 min | 1 year ago

"national security agency" Discussed on News 96.5 WDBO

"About this more than it actually has been but the NSA the National Security Agency found major security flaw in windows ten windows ten a very dominant computer operating system in the U. S. and the NSA I just kept quiet use that to spite but instead eight what Microsoft no Microsoft has put up an update people who have automatic updates for security patches on their windows computers got the update in most cases overnight last night but if you did not get a new update on your windows ten computer you may not have it set up for automatic updates please take time today to do this because you don't even have to be qualified hacker like apparently anybody the security holes so great anybody with even rudimentary skills can get into your and follow so all you need to do is go to update settings and then when you get there you'll see update in security check for updates and then you download and install now so you know how windows works you click this window then click that when the cook that when then bam it's there and then you're able to download the security patch because this is a really important update for you to get we talked to two security experts.

National Security Agency Microsoft
"national security agency" Discussed on KNX 1070 NEWSRADIO

KNX 1070 NEWSRADIO

06:10 min | 1 year ago

"national security agency" Discussed on KNX 1070 NEWSRADIO

"Guest appearance for the defense of the president and will any Republicans dared defy president trump we will go in depth and who knew the National Security Agency can be a good internet citizen seriously and parents brace yourselves you may soon be able to give birth to your own baby Yoda the more baby iota stories on the show the better the show as absolutely what is the U. S. navy keeping from us when it comes to UFO sighting apparently lots of they're telling us what they know reportedly out of the question so we will go in depth try to find something else seething Dodgers fans are still out for Astros blood even after Major League Baseball came down hard on Houston for their cheating during the twenty seventeen World Series and do you trust Google more than your trust teachers or even Tom Hanks the answer may surprise you you can trust us and if I trust Tom Hanks play do you do okay no but we started the trial of the century or at least I guess it could be and it starts next week in the U. S. Senate Christopher McGarry and covers the White House for the Los Angeles Times Sir Christopher everybody is I guess getting psyched up for this trial is it going to play out and meet the expectations it could is if it becomes as much of a focus on bringing new witnesses to the trial right new information it could be extremely explosive if you do not have new witnesses it'll mostly be a rehash of what we already learned during the house investigation and what is everybody saying about the chances we could get someone else's and most of the discussion is centering around John Bolton right exactly so it's it's very much up in the air whether or not we get witnesses and you have to listen to the Republicans very carefully for example John Cornyn the senator access that today I'm in favor of having witnesses which sounds like he might be a vote for having John Bolton there but what he really said was I'm not in favor of having you wait I'm in favor of having some what so you know you could have a situation Republicans say well let's hear again from some people we've already heard from but not actually try to break any new ground still as you know the Chief Justice of the Supreme Court will preside over all of this obviously he has never presided over anything like this is he like rehearsing or something I'm not quite sure but he might be you know almost nobody ever get the chance to do one of these things you're almost always you know completely and uncharted waters because it's so rare that you have an impeachment proceeding at all what are the next steps Sir how does it look like over the next couple of days because of the speaker has to appoint see who's gonna take charge here she also has to transmits the articles over that that's not that difficult as it's been made out to be right you can just send them over her was strategic reasoning behind her delay and a lot of people now are saying that maybe that didn't a office yeah it's it's hard to say you know what is going to be the final outcome of her decision to hold on to it you know he she did not extract any concessions from Mitch McConnell at this point as far as having new witnesses that the Senate trial anything over the articles is really just a pro forma staff so I I would expect over the next couple days you're gonna see a lot of house cleaning a lot of people getting things set up and not until next week with the real action starts here's the thing even if they do have new witnesses even if they say something that perhaps as explosive that runs counter to what the president has been saying does anybody seriously think there's any chance at all that this Republican run Senate is going to convict and remove Donald Trump from office it's gonna be hard to imagine given the way Republicans have stood behind trump so far that being said we can't predict the future you have no idea what can happen historian who's written about Watergate reminded me that it seemed like until the very end that president Nixon was going to get away with Watergate until the smoking gun tape came out so one something like that does happen things can fall into place very very quickly and very surprising way that being said there's no sign of that right now until then there's always executive privilege they can still be asserted right to limit some of this testimony if there are witnesses exactly so but it but it's really unclear how that will play out if this was a court case you could see the question executive privilege get litigated all at spring court and that could take months but in the Senate trial since it's a a political process it might just be a vote of the Senate to decide whether to respect the religious thing or not and that could be a a very different situation and to go back to the chief just as in correct me if I'm wrong unlike in the courtroom with the judge really has the final say he can be overridden by a what a majority vote of the Senate it is hard to say exactly what will happen because Mitch McConnell's not released the final rules for the Senate trial you he gets to play a key role in actually you know setting up the landscape of how everything's going to work but in many situations such as calling witnesses your comes down to a majority vote you know obviously not like you would see in a courtroom Chris McCarron covers the White House for the LA times now when you do you think of the National Security Agency you think of cloak and dagger right you think of like dark corners oaks July's since pies whole thing but do you ever think of it as being just nice I mean like nice like where do you work that was a very nice well apparently the NSA did something nice and the cyber security experts you're freaking out.

president National Security Agency
"national security agency" Discussed on WTOP

WTOP

03:22 min | 1 year ago

"national security agency" Discussed on WTOP

"DC metro area medical centers five forty one the National Security Agency has discovered a major flaw in Microsoft Windows operating system and tipped off the company rather than exploit it for its own intelligence needs something an essay might have done in the past Microsoft made available software patch to fix things up and credited the agency for discovering this the company says it is not seen any evidence that hackers of use the technique to cause any damage Microsoft says if your computer has automatic updates they are enabled and you're already protected five forty two when you do your taxes this spring you might be surprised by some changes in the tax laws we are joined by WTOP financial contributor berry glass one of Glassman well services who says the best way to avoid tax problems he's better planning happy new year good to see you bright battery to see you let's talk taxes that's always fun yeah any time of year I'm sure tax laws have changed over the past few years how should we address our paychecks now that it's the beginning of the year so anyone who is employee income meaning you get a paycheck from an employer the employer withholds taxes each and every paycheck well how did they magically know the right amount to withhold and why do they get it so wrong that you get huge refunds are big money well it goes back to the form you filled out years ago when you started with your company the W. for it was the least expects sightings part of the first day and you were told to fill this out with how many exemptions you have been based on that figure your employer the payroll companies been calculating your tax withholding ever sense now since then maybe years later you've got married young kids you got a mortgage and several raises and you've never updated the form years later no not not only do have greater tax deductions but the tax laws have changed so you shouldn't be surprised if that amount isn't really so accurate when you do your taxes so what our listeners need to do about this Barry well one of two things first you need to update your W. four it's actually an easy experience even if the tax laws hadn't change your life likely changed over the a past bungee years I you can download the forms fill it out and then headed to your HR department the challenge is for people who earn a radic paychecks especially people who are in commission so let's say you are in a small salary and you get for being paychecks throughout the year as far is commissions well the payroll department will think that your small paychecks are all you are in throughout the year so the would hold very little and then the big paychecks the assume you are in that all throughout the year in your resilient air and the would hold a huge amount and there's no way to get that number right for those people it actually makes sense to planet throughout the year and work with your HR department to change it throughout the year what's your last comment here the W. for has two sides to it it's two pages the second page is actually a re worked easy to understand worksheet that you can just plug in your estimated numbers and you'll know exactly how much to hold well you're getting into tax time so happy almost tax time there you know I thank you that is Barry Glassman WTOP financial contributor of glass and wealth services the capital's make a deal to keep a key player that's thirty seconds away the US navy needs a multi mission forget so they turn to the experts can't be every Marinette marine is a proud partner of the navy with the world's most capable and innovative multi mission forget in operation.

National Security Agency
"national security agency" Discussed on KQED Radio

KQED Radio

02:33 min | 1 year ago

"national security agency" Discussed on KQED Radio

"Just how far America's NSA the National Security Agency and its allies had penetrated foreign communication networks they were even allegedly topping German chancellor Angela Merkel's phone Edward Snowden leaks surprise the Chinese that you know the NSA could read much more than they thought similarly almost everything yeah seemingly almost everything and then the second one is there they're also concerned that the Americans will build a quantum computer first and that would allow them to read everything the Chinese have and stop the Chinese reading American secrets to understand how this happens we need to imagine a scenario with three players are always three players Alice and Bob were trying to communicate securely and E. E. V. E. is for the eavesdropper the person in the middle trying to steal the key of the message currently one of the most secure ways to send messages involves something called public key encryption Bob wants to send information Alice he likes it up with the key and sends it to Alice but only Alice has the key to unlock the box and the security of the system rests on the assumption that it would take longer than the lifetime of the universe for classical computer to hack is public key however if you had a quantum computer it could crack Alice's private key within milliseconds as opposed to the lifetime of the universe for Bob analysis the sounds scary but there is a bright side one of give you a threat and a gift he says if you use a quantum computer I can hack all your stuff but if you switch your staff to quantum TV then and even a quantum computer can't tacky and that's because of super positioning if Bob and Alice have a quantum network I think what happens when eve tries to capture their messages the eavesdropper tries to measure the full time. in flight she inadvertently destroys the information that he that their caring and she reveals herself to the two parties they know somebody's trying to eavesdrop asal observation itself will destroy the information that's quantum mechanics you look at it and the gun you've collapsed the superposition this is the price in the race to build quantum computers totally secure communications if you look at patents in quantum cryptography the Chinese are at there's an imbalance of power the Chinese have been developing and network and which will eventually include satellites where they will establish quantum cryptographic he's all across China either by fiber.

America National Security Agency Angela Merkel Alice Bob China chancellor Edward Snowden eve
"national security agency" Discussed on KBOI 670AM

KBOI 670AM

02:42 min | 3 years ago

"national security agency" Discussed on KBOI 670AM

"Fact that they were unable to get rid of trump in six months that was a key element of this they really believed they would be able to do this hell jimmy kimmel jimmy kimmel last night after the north korea talks were announced jimmy comes a wooden matter won't matter trump's not going to be president by may so we'll have to worry about this meeting it isn't going to happen because trump's they're going to be president by them why would jimmy kimmel who's a genuine the clowned himself guy now why would he be so who was telling them this well we know he's got a pipeline that chuck schumer's office but now who else but they have they have totally corrupted themselves and they've done it willingly and the media has allowed itself to become pawns in tools of the cia the fbi the national security agency the media is now the exact opposite of what their sacred constitutional requirement is they're supposed to be there holding truthful and powerful people accountable instead they have been suborned they have been subordinated they have been control have been taken over and subsumed by the very people they're supposed to be looking out for it's an amazing thing the media has been rendered a bunch of sycophants willingly they did it willingly now the question is can they rolled back clocked turn back time and once again assume and how what once you have gone down the path for a year and a half of reporting what ever the intel community and the obama administration people want you to report how do you how do you turn w turned have one run how do you now how do you stop what you're doing them all of the sudden reporting report truthfully on the democrats i mean some in the media are very worried about what i just said because they know it they are very concerned they can't leftist reporters who are not buying into any of this relationship with the intelligence community is oh four and that and they're they're pretty radical leftist glenn green wall steven cohen of the nation is a bunch of them out there that are not at all happy with what chuck todd in the cnn people have allowed to happen to them at the.

trump president fbi obama administration chuck todd jimmy kimmel north korea chuck schumer intel steven cohen cnn six months
"national security agency" Discussed on KVNT Valley News Talk

KVNT Valley News Talk

01:57 min | 3 years ago

"national security agency" Discussed on KVNT Valley News Talk

"A wiretap of america kim's it has to be renewed every ninety days so they went back they had a total of four that we know of times that they that they omitted information to this court in and i that's a major problem because we don't have the typical checks and balances that we would have with a traditional court even if you had a sealed worn for a while because this is classified information we can know who they are asking for a while tab wiretaps on we don't know what information there presenting there's no opportunity for due process if you're the person being spied upon by your own government right because it would give in the reason that its classified or the information classified is a give could give away methods and information obviously a methods and techniques that we use so when we go out an and i wanna make something clear to everybody fis as stands for the foreign intelligence surveillance act that was signed in 1978 by uh president carter them this followed by president reagan in 1980 which sign the executive order one two three three three which was intelligence stabbing intelligence oversight within the intelligence community and the fear was that as we move dennis electron a gathering piece that we not spy on americans and k and there's a separation reason the fbi is involved is that the military a excuse me national security agency i and the military do the collecting part writing and they are very adept to doing that but any kind of information that is turned over our found credible on an american that has to go to the fbi pozzi come itartass entitled tin separate the military from criminal investigation so that information goes to the fbi the fbi them pursues that information.

america kim president president reagan fbi carter executive ninety days
"national security agency" Discussed on WCBM 680 AM

WCBM 680 AM

02:36 min | 3 years ago

"national security agency" Discussed on WCBM 680 AM

"Exploitation of the national security agencies to obtain that information for purely political reasons and it was a run through the obama white house if the highest levels were talking about uh the attorney general loretta lynch you're talking about the national security adviser susan rice who basically is already admitted under oath that she ordered wiretapping free the the court that goes right to the top two president obama who cannot plead that he was oblivious to this but gave his approval basically for the clinton campaign to use the national security age and seize in order to discredit the trump campaign and preventing them from being president and then you have recent catch messengers that pass through the fbi by peter stroke and saying essentially we have to do everything possible to prevent a trump presidency so this memo the implications of the memo are that the entire premise of this more investigation that was but you know of course uh in uh uh in started by uh rod rosenstein the deputy attorney general when jeff sessions recused himself the entire planet much of the investigation was built on the illegal improper activities run through the national security agency for political purposes to discredit the trump campaign is concerned that the memo may have been altered what's our take on that the case take on bad is basically it whether it w you know i i period or a comma or something else which changed or not i don't know but what i do know is they are terrified of the incredible embarrassment at the highest levels of the fbi and the justice department all right john john curtains online columnist dot com i ought to get john and howard lundi together for debate done the liberal against the conservative i would be interesting google has joined the one hundred billion dollar club also the the company of gugel reported that a top two hundred billion dollars in annual sales for the first time in google twenty year history a hundred billion dollars the number of people in the united states and canada who checks facebook every day drop between the third and fourth quarter of last year the first such quarterly dropping company history facebook usage in north america has been largely flat for the last several years by the way the earth's magnetic poles as we've been reporting could me about the.

gugel canada howard lundi john john curtains rod rosenstein clinton attorney north america facebook united states loretta lynch google jeff sessions deputy attorney general peter stroke fbi president obama susan rice two hundred billion dollars
"national security agency" Discussed on 1410 WDOV

1410 WDOV

02:36 min | 3 years ago

"national security agency" Discussed on 1410 WDOV

"Exploitation of the national security agencies to obtain that information for purely political reasons and it was one through the obama white house if the highest levels we're talking about uh the attorney general loretta lynch you're talking about the national security adviser susan rice who basically is already admitted under oath that she ordered wiretapping through the fis the court that goes right to the top two president obama who cannot plead that he was oblivious to this but gave his approval basically for the clinton campaign to use the national security agencies in order to discredit the trump campaign and prevent him from being president and then you have recent text messages that pass through the fbi by peter stroke and saying it essentially we have to do everything possible would prevent a trump precedents say so this memo the implications of the memo are that the entire premise of this muller investigation that was but you know of course uh in uh uh in started by uh rod rosenstein the deputy attorney general when jeff sessions recused himself the entire plant mus of the investigation was built on illegal improper activities run through the national security agency for political purposes to discredit the trump campaign concerned that the memo may have been altered what's our take on that road that k retake on values basically it whether it will you know a a period or a comma or something else which changed or not i don't know but what i do know is they are terrified of the incredible embarrassment at the highest levels of the fbi and the justice department all right john john curtis online columnist dot com i ought to john and howard loom together for debate on the liberal against the conservatives would be interesting gugel has joined the one hundred billion dollar club also debt the paired company of gugel reported that a top two hundred billion dollars in annual sales for the first time in google twenty year history a hundred billion dollars the number of people in the united states in canada who checks facebook every day drop between the third and fourth quarter of last year the first such quarterly drop in company history facebook usage in north america has been largely flat for the last several years by the way the earth's magnetic poles as we've been reporting could be about the.

united states howard john rod rosenstein muller clinton attorney north america facebook canada loretta lynch gugel jeff sessions deputy attorney general peter stroke fbi president obama susan rice
"national security agency" Discussed on WXAV 88.3 FM

WXAV 88.3 FM

02:27 min | 3 years ago

"national security agency" Discussed on WXAV 88.3 FM

"National security agency which was supposed to gather intelligence on foreign governments and they turned it on americans it was the beginning of the domestic spine program that has mushroomed since nine eleven most people don't understand about journalism that is one thing to get the story than is another matter entirely to get it into the paper much less on page one and we'll get to that but was your heart pounding was your sense that holy mackerel it was interesting i felt you know kind of two feelings one i was shocked that this was happening but then i was also related as a reporter because i realize this was the story of a lifetime this was the stories don't get any bigger than this i i begin to realize this was what sight her she had found in the 1970s or what woodward and bernstein had found with watergate this with was that was why i got into journalism you've described the national security reporting biz as a kind of bizarre game a contest everybody's in it nobody has a name take us into it if you can yeah i i started covering the cia in 1995 first for the los angeles times in on a few years later for the new york times really in hindsight kind of a perfect time to start covering the cia because the cold war had just ended and aldrich ames had just been arrested as a russian spy he'd been a cia officer and the budget of the intelligence community was being cut by clinton and so there was like a whole generation of senior cia people who were leaving the cia in they on a lot of them wanted to talk and i began to think of them like you know a few oversaw tom stoppard's play arisen cranston golden sterner daedra we're rosencrantz and killed in sterner minor characters in hamlet and stoppard's tells the play from their point of view in this play in which both of them die at the end but you watch the play from from their point of view as a very fatalistic and cynical view of hamlet and i always thought that these see hey guys we kind of like that jason kao does a reporter like you build out the story as big as the nsa listening to all of us for presentation to the new york times and at what point you you say guys.

reporter woodward bernstein cia los angeles times new york times cold war aldrich ames officer clinton tom stoppard jason kao rosencrantz
"national security agency" Discussed on WCBM 680 AM

WCBM 680 AM

02:15 min | 3 years ago

"national security agency" Discussed on WCBM 680 AM

"To this you know we have our going through some weird strange times these days aren't we it it does appear to be that way yeah are we being manipulated to do you think you know i'm going to get into the things that have changed since last night 11 in a minute with you but in your opinions is all this necessary what's happening well look you mean and all of the preparations we've made for terrorist attack and all the investment we've made intuitive got the question yeah sort of this is going to be a follower by injustice suck okay well i would say two chink so nine eleven we really have constructed what what i call a security in dos real complex that's a now it gets to what eisenhower talked about one in his last speech to the nation when he talked about the militaryindustrial complex but there's a difference there and that's because the military typically out relieved directed against our enemy um but this complex uh is comprised seven including intelligence agency and it's not just the one you know about like the cia the fbi at the national security agency it's all will also be really lesswellknown moms like the bureau of intelligence state and the office of intelligent outer intelligence with the energy department and the national geospatial intelligence agency so you know of a if i try to separate all out all the she could have to do broadly speaking uh there is a national intelligence program that would be uh the fbi and cia and their separate from that a military intelligence program that would be like the defence until it in the national security agency but not all that clear because you have the cia and it seems to be in the middle of it has national mission and it has military missions like uh the drone assassinations carried out got going basis a number of countries uh so to me the security industrial complex uh if you really more than if it includes not just oh the department it includes also the department of homeland security sure and many elements of state and local police and and get this georgy the.

dos eisenhower fbi cia bureau of intelligence state military intelligence department of homeland
"national security agency" Discussed on Intercepted with Jeremy Scahill

Intercepted with Jeremy Scahill

01:49 min | 3 years ago

"national security agency" Discussed on Intercepted with Jeremy Scahill

"Now's regular listeners to the show no last week the intercept published a leaked top secret intelligence assessment from the national security agency and that assessment outlined alleged russian cyber attack efforts late last year on companies that make software used in us elections that document was provided to the intercept completely anonymously within moments of the intercept publishing the story the us justice department announced that they had arrested a twenty five year old government contractor named reality lee winner for transmitting defense information under the espionage act almost instantly the government move to unseal all of the fbi affidavits and other government assertions in this case it was clearly aimed at pushing a narrative it was aimed at convicting the alleged source in the court of public opinion before she even appeared in court and it was aimed at ramming through the justice department's allegations as fact the government has continued to selectively release allegations against the alleged source including alleged quotes from her journal and the contents of her conversations in jail the cheese allegedly had with her family she is currently being held without bond as the government attempts to destroy her in the media this is absolutely horrid and thus far the reporting on the alleged source of this document has come entirely from the assertions of the trump justice department now i know that many people have questions about what happened here and have questions that they want the intercept to answer and people have a right to know the answers to those questions.

us government contractor justice department fbi twenty five year
"national security agency" Discussed on WINS 1010

WINS 1010

02:07 min | 3 years ago

"national security agency" Discussed on WINS 1010

"And national security agency director michael rogers declining to elaborate on their initial carefully worded statement coins man named kevin rousseau is accused of posing as a fourteen year old girl online so he could convince boys and descending him sexually explicit photos and videos brazil pleaded not guilty the sexual exploitation of a child and other charges in federal court in iceland burst to get to say as many as fifty boys may have been involved they say he threatened to publicise the images if they stopped sending them he is being held without bail the mother of bill cosby's accuser took the stand in his sexual assault trial the defence spent a long time trying to cast doubt on andrea constanze credibility they went over phone records from her work cell phone asking why she kept communicating with cosby after the alleged assault constanze said it was work related mostly to do with the temple university women's basketball team she was unshaken as angela grusa suggested that she in cosby had an ongoing relationship and that there was a romantic environment that cosby's home during one dinner constand remained composed and said she was just there to eat regarding an incorrect data on a police report constand said she was confused in nervous steve cast inbound pretend ten and norristown pennsylvania court appearance for the suspect act accused of shooting a five year old in their head headbowed in hands cuffed behind his back michel kilo as stood alongside his lawyer who entered a not guilty plea to the attempted murder charge relating to the shooting of five year old gia heat hunter the boy is fighting for his life doctors performed surgery after a bullet hit him in the head on washington street thank you prosecutor felicity lung told the judge that kilos was firing at someone else and hit the little boy who is leaving a nearby building with his father after celebrating his birthday key lies as being held without bail julia poppa tinted wins in the bronx wins news time twelve twenty five hello now i.

brazil prosecutor washington attempted murder pennsylvania norristown steve temple university andrea iceland director michael rogers julia poppa felicity lung constand angela grusa constanze assault bill cosby kevin rousseau five year fourteen year