35 Burst results for "Us National Security Agency"
TikTok reaches deal that would give Oracle oversight of U.S. operations
"And Tick Tock recently made headlines Everywhere when Resin Donald Trump signed an executive order. That would essentially ban the Chinese owned APP in the US for national security reasons. Unless it sells its operations here to an American company. And of course, if that were to happen. We would have nowhere to go to see a million potatoes singing. To Adele. And that would be a national tragedy. This week deal actually emerged between TIKTOK and American company Oracle but some people like Zachary say trump's tiktok policy effectively changes. Nothing. The argument goes like this. It will do little to protect Americans data from the Chinese government because there are still plenty of other ways China could get that data that this move is just a new kind of security theater basically. The hard work of data security according to this actually lies elsewhere. So, Zachary TIKTOK has been banned in Indiana a few other countries, but it's still pretty popular for now it's the most popular video sharing app i. can see why it seems like fun and there are mental creative. They're short I mean the whole nature of the medium has their time limited. What happened with Tiktok this week what happened this week? Should be clear but isn't. Basically, in August, the trump administration ordered via executive order whose legality remains highly questionable that the Chinese owner of Tiktok, a company called Bite Dance. Divest itself of Owning Tiktok within ninety days or face the prospect that tiktok would be shut down in the United States. I broke the deal I said you can't do business in the United States, which is at least potentially within the power of the US federal government based on national security concerns based on national security and the logistics are complicated that you probably could order apple and other people and servers that are hosting tiktok. that. They couldn't do it and it would defacto make it impossible for Tiktok to function. So that is what began a process where the owner of Tiktok, again, a Chinese company sought an alternative way to their cell, the US portion of Tiktok or what ended up happening major deals Rocking Wall Street this morning pushing futures higher. We find an American technology partner Oracle beat Microsoft and become the technology partner for TIC TACS US operations although will not. receive its coveted algorithm so that all took talks data would be kept in the United States on servers owned by an American company and not by Chinese company because the whole point of this was that all these people using Tiktok, these tens of millions, hundreds of millions that data was potentially vulnerable to being used and therefore misused by the Chinese government. How so So the fear was because technology companies in China by Chinese law are required if. By the Chinese government to turn over data relevant data that the Chinese government could tell the parent company of Tiktok, hand us all of your user data which user data of again tens of millions of Americans. and. Then China would have that data. So that was the concern right and and that's a legitimate fact the Chinese government could order that. The problem is, of course, one via our court system, an American court can order or prosecutor can subpoena data. From our companies. So it's not like what you and I do on Google or what we do on any technology provider is somehow. Unavailable. To government if government decides that it's in its interest to get it not to mention the the various many non-government actors, the vacuum, the stuff up and use it for their own purposes that is even more important I think probably more relevant to the China issue which is. Does it matter whether the data is in this case, potentially house by Oracle massive US hardware and software company versus being housed by servers in China. In terms of the ability of the Chinese government to obtain that data, it wanted to obtain it because not just third parties that hoover up data and use it in the whole buying selling and the data market, but just spying tools. Whether it's the NSA in the National Security Agency in the United States or various Israeli cybersecurity and or cyber spying companies or the Chinese government. Most of this data isn't that secure. Not. Like. Triple encrypted quantum encrypted defense department level communications. So likely true that if the Chinese government really wanted my teens Tiktok data, it doesn't really matter whether that data's House on servers in China owned by Chinese company or whether it was housed on American servers on buying American company. So I guess, then how do we get to this point? How did you know given what you just said why has this become such a big issue? How did it start? Yeah it's a good question I I'm not sure. There's a precise answer. It's part of a whole continuum of the trump administration in particular identifying China as a proximate threat to the United States and a whole series of ways competitively in terms of trade practices hence the hundreds of billions of dollars of Chinese imported goods that have been subject to American tariffs. It's part of a multi year campaign against this massive Chinese telecom equipment company called Wa wa, which has been a leader in next generation five G. Telecom equipment in a way that again, some of the same concerns have existed which is. That the Chinese government would would use the production of that equipment as a way to spy on who met from purchase adequate. And Look a few years ago. There was a a forced sale of gay dating APP Grindr, which was also owned by a Chinese company, and so there was an earlier precedent of forcing a Chinese company to sell an American APP Social App. Because, of data concerns and finally, there's the fact that for years long predating the trump administration. China has not allowed American social media companies like facebook. To function in China. So there's the tit for tat. You know you don't let our social media functioning companies function there. Why should we let yours function here? There's Several year campaign against China which the trump administration's pursued but I think has a good deal of democratic support I. Mean if it's close to a bipartisan sentiment that China, China's a threat as anything we have right now. Why Tiktok? Suddenly became a thing I may partly have to do with the fact that it suddenly became a very big deal in the United States. I mean, this was not a company that had any footprint several years ago and suddenly as. The APP does your so it may have had to do with something that got really big and is very noticeable. Salsa not that economically important. So a lot of people would be royally pissed off Tiktok were banned. It's not like tiktok is. An integral component. To the US economy either during covid or without covid. So it's an easier target. We'll be right back. Everyone wants to become a better leader this groundbreaking new book how to lead shows you how David M Rubenstein is one of the visionary founders of the Carlisle Group and host of the David Rubenstein Show where he speaks to leaders from every walk of life about who they are, how they define success and what it means to lead. Jeff bezos Richard Branson Warren Buffett Bill Gates Ruth Bader Ginsburg Phil Knight Oprah all of them and more are featured in how to lead this essential leadership playbook illustrates the principles and guiding philosophies of the world's greatest game changers discover the expert secrets to being. Effective innovative leaders. Walter Isaacson proclaims reading this invaluable trove of advice from the greatest leaders of our time is like sitting in an armchair and listening to the masters reveal their secrets, pick up a copy of how to lead wisdom from the world's greatest CEOS founders and Game Changers Bhai David Rubenstein available in Hardcover e book or audio, and we're back I get the kind of general personal security aspect of it. Where does the national security aspect of it come in? Is it because there's concern about people who worked at the Defense Department or the military whoever having to talk in in use in their households or people in the Defense Department are not allowed to use tiktok certainly not on their phones. For before this although they may have teenagers who That's vulnerability as well. So it wasn't primarily about like US government employees who might have sensitive data that tiktok would be the back door way that the Chinese government would spy on them but it was generalized sense of any foreign government that is using private American citizen data potentially for nefarious purposes represents a national security threat. Now, it clearly has not represented the kind of national security threat in the estimation of the White House right now when it's Russian. Manipulation of social media accounts the same principle should or would apply right. If you'RE GONNA ban, Tiktok you'd probably want to take action against the a variety of Russian media enterprises that are attempting to manipulate and hoover up American user data. Some of that data's you mentioned earlier in terms of third party is available to anybody for a price just because there's a marketplace for data. Which I think either most of us aren't aware of or frankly most probably don't care if politicos data on this podcast gets sold to fourteen vendors so that it can sell you and me products based on our other computer activity most people. Either like that, or don't care about that. But the national security concern is simply because it's a foreign government that could potentially. Use, our search history or browsing history nefarious. And again a, that might be true but be it's likely that all this kind of data is obtainable irrespective of whether or not a company called TIKTOK. Happens to have access to a lot of it. It's really interesting. So into this whole story comes oracle, you know huge hardware software firm but how did they get involved here? Yes. Oracle is is a multibillion dollar firm that has had the same public profile as Microsoft or Amazon or facebook or apple because most of its business is to other large companies, you know you and I don't tend to go out and buy Oracle piece of hardware because we don't need a hundred and fifty thousand dollars server or. Network system for our employees. They're largely corporate provider throw a huge provider to the Defense Department in terms of cheer equipment and material, and they're huge software company. They're one of the early Silicon Valley success stories and the billionaire founder Larry Ellison has been probably more conservative than not I don't know that I buy into the whole. This is a reward versus. A snub to the other potential main acquirer or partner for Tiktok, which was rumored to be Microsoft but this is an unusual. This doesn't usually fit oracle's business model. Well, that's that's interesting. So what is their interest in getting involved here perceived to be I'm not one hundred percent clear about that I mean look at could allow them to. Have a little bit more of a consumer facing brand. Again, I mean Oracle's. Primarily a software company primarily a database company. Maybe this could help them increase their databases. There's no way that this is a natural fit for goal. But at the same time north this a huge cost for Oracle, maybe it'll produce some American jobs. I mean. They're looking for growth just like everybody's looking for growth, and once you get to be the size of Oracle. Growth gets harder some of they're also looking for a DIFFERENT INDUSTRY TO BE President Chore? So. What exactly did they given? What did they get here that as of this conversation is not one hundred percent clear off so it was presented as or go by tiktok. That is not the case or at least it's not the case now and as possible. The deal will be scuttled or change given that all of this has to be approved by the government has to be approved by committee. Called Syfy S, which is the committee in charge of looking at global deals in terms of US national security, but it would seem that right now. The parent company of Tiktok saw own TIKTOK and get some of the economic benefits of TIKTOK. This Chinese company called by dance and that Oracle in turn will get a massive licensing deal to house Tiktok data and information on its own. Servers and using its own software. So the concern that the Chinese government would have access to that data would be allayed meeting under this agreement arrangement because the data would be managed by and it's housing would be arranged by a US company. The Chinese government could order by dance to turn over but by dance itself wouldn't actually have access to that data. It's interesting I mean based on what you said before it's they're they're they're moving this data from place a, it's not going to be in a different place and I guess the Chinese government will no longer have a key to the door. But as you said before there's many different ways that either the Chinese government or a lot of other. State or private actors can get hold on more or less any data they want to these days right? which kind of raises the question for point of all, this is ENA. It's certainly true. It would make it a little more challenging to get that data under that kind of arrangement. It seems like this a big fight over a big company. That's not actually really about. The literal subject of the conflict here. Yeah. It is totally fair to say that whatever the imbroglio about tiktok has very little to do with tiktok. And everything to do with US policy toward China. And the trump administration looking for some High profile optic to be able to say we're we're being tough on China and protecting American citizens. Again, the oddity of Tiktok is given that so many of its users or young adults. Who Don't vote although who would be? Extremely, Acetate it. If they woke up tomorrow and there's no TIKTOK meeting, it's probably not. The most popular move if what you're trying to do is gain support during a presidential election. So it's not entirely clear what constituency the served there wasn't like a huge congressional clamor for Oh my God. We're all big imperilled by these fifteen second videos. So where do you think things go from here in terms of into in terms of the real story behind all this in terms of the U., S., China relationship and the increasing in. them of that. So I think to some degree regardless of who wins the presidential election. there. Is a train that's left the proverbial station of increasing. Distrust and animosity between the United States and China. But within the context of an incredible amount of economic interdependence that you cannot just snap your fingers and several or at least not without massive massive harm to each part of that equation both the United States and China, and that's that's pretty unprecedented. Right? Right. That's like the Cold War analogy doesn't work because there was no economic relationship between the United States and the Soviet Union nineteen. Fifty S
Trump not ready to OK TikTok deal, admits US won't get cut
"Basically, in August, the trump administration ordered via executive order whose legality remains highly questionable that the Chinese owner of Tiktok, a company called Bite Dance. Divest itself of Owning Tiktok within ninety days or face the prospect that tiktok would be shut down in the United States. I broke the deal I said you can't do business in the United States, which is at least potentially within the power of the US federal government based on national security concerns based on national security and the logistics are complicated that you probably could order apple and other people and servers that are hosting tiktok. that. They couldn't do it and it would defacto make it impossible for Tiktok to function. So that is what began a process where the owner of Tiktok, again, a Chinese company sought an alternative way to their cell, the US portion of Tiktok or what ended up happening major deals Rocking Wall Street this morning pushing futures higher. We find an American technology partner Oracle beat Microsoft and become the technology partner for TIC TACS US operations although will not. receive its coveted algorithm so that all took talks data would be kept in the United States on servers owned by an American company and not by Chinese company because the whole point of this was that all these people using Tiktok, these tens of millions, hundreds of millions that data was potentially vulnerable to being used and therefore misused by the Chinese government. How so So the fear was because technology companies in China by Chinese law are required if. By the Chinese government to turn over data relevant data that the Chinese government could tell the parent company of Tiktok, hand us all of your user data which user data of again tens of millions of Americans. and. Then China would have that data. So that was the concern right and and that's a legitimate fact the Chinese government could order that. The problem is, of course, one via our court system, an American court can order or prosecutor can subpoena data. From our companies. So it's not like what you and I do on Google or what we do on any technology provider is somehow. Unavailable. To government if government decides that it's in its interest to get it not to mention the the various many non-government actors, the vacuum, the stuff up and use it for their own purposes that is even more important I think probably more relevant to the China issue which is. Does it matter whether the data is in this case, potentially house by Oracle massive US hardware and software company versus being housed by servers in China. In terms of the ability of the Chinese government to obtain that data, it wanted to obtain it because not just third parties that hoover up data and use it in the whole buying selling and the data market, but just spying tools. Whether it's the NSA in the National Security Agency in the United States or various Israeli cybersecurity and or cyber spying companies or the Chinese government. Most of this data isn't that secure. Not. Like. Triple encrypted quantum encrypted defense department level communications. So likely true that if the Chinese government really wanted my teens Tiktok data, it doesn't really matter whether that data's House on servers in China owned by Chinese company or whether it was housed on American servers on buying American company. So I guess, then how do we get to this point? How did you know given what you just said why has this become such a big issue? How did it start? Yeah it's a good question I I'm not sure. There's a precise answer. It's part of a whole continuum of the trump administration in particular identifying China as a proximate threat to the United States and a whole series of ways competitively in terms of trade practices hence the hundreds of billions of dollars of Chinese imported goods that have been subject to American tariffs. It's part of a multi year campaign against this massive Chinese telecom equipment company called Wa wa, which has been a leader in next generation five G. Telecom equipment in a way that again, some of the same concerns have existed which is. That the Chinese government would would use the production of that equipment as a way to spy on who met from purchase adequate. And Look a few years ago. There was a a forced sale of gay dating APP Grindr, which was also owned by a Chinese company, and so there was an earlier precedent of forcing a Chinese company to sell an American APP Social App. Because, of data concerns and finally, there's the fact that for years long predating the trump administration. China has not allowed American social media companies like facebook. To function in China. So there's the tit for tat. You know you don't let our social media functioning companies function there. Why should we let yours function here? There's Several year campaign against China which the trump administration's pursued but I think has a good deal of democratic support I. Mean if it's close to a bipartisan sentiment that China, China's a threat as anything we have right now. Why Tiktok? Suddenly became a thing I may partly have to do with the fact that it suddenly became a very big deal in the United States. I mean, this was not a company that had any footprint several years ago and suddenly as. The APP does your so it may have had to do with something that got really big and is very noticeable. Salsa not that economically important. So a lot of people would be royally pissed off Tiktok were banned. It's not like tiktok is. An integral component. To the US economy either during covid or without covid. So it's an easier target.
China slams Australian Government for 'blatant irrational behavior' over foreign interference investigation
"Has slammed the Australian government for what it calls blatant, irrational behavior over a foreign interference investigation is an ABC in Australia's story China's Foreign Ministry saying it has embroiled a group of Chinese academics and journalists. In the country. The Chinese media outlets alleged that Australian National Security Agency's had raided the homes of four Chinese state media reporters in June, sees their equipment in order them to stay silent about the probe.
Intellectual-Property Assets Are Getting More Valuable
"As a foreign intelligence agency were responsible for understanding a broad range of threats. Presented by governments to the United States, one of those threats include our cyber threats how nations may be using cyber to achieve their national objectives that might be intellectual property theft for example, to counter department offensively valid by accelerating foreign governments ability to actually productized particular RDA for weapon that may be targetting critical infrastructure of a country. As part of threatening that country or as part of putting pressure on a given country. How are we doing against the cyber threats are we? Barely keeping up, are we catching up? Are we getting ahead of the game or? Is it always going to be hard for the defender. Overall technology is getting more secure. Technologies Belt more securely today. So. The fundamental resilience is is improving known. You have open source products. We have lots of is looking at a given technology and helping find vulnerabilities and address them. That being said for an ever-more connected economy in ever more connected society, and as we build more connections, sometimes systems that were not necessarily built for those kinds of connections we bring and introduce new risks on the third poll the positive side there's far more awareness about those risks and how to approach addressing them identifying what are the most important assets to protect. Seems to be an effort on the part of NSA to kind of open up a blackbox and Kinda shut the reputation no such agency we want to be trusted to achieve or we believe we can uniquely contribute to team USA on either the first step. Is conveying who we are conveying the culture. That's here the commitment to American values. Certainly. When a part of our mission is an intelligence mission in a democracy, you have an obligation to ensure that the Americans. We serve feel they understand the values by which we live. And neuberger is the current director of the national security. Agency's Cybersecurity Directorate. She has held a variety of jobs in both the public and private sectors. We just sat down with an to talk about her career, her and her director. It's multiple responsibilities and how she sees a cyber threats facing our country. I'm Michael Morale and this is intelligence matters. So an welcomed to intelligence matters, it is great to have you on the show. It's great to be here. So I think the place to start and is with your career before you joined the national security. Agency. You had a career in the private sector. Can you tell us about that and tell us what you did in the private sector and then what drew you into government, service. Sure. So I was in running technology at a at a financial services company during that time period when financial services companies really moved off mainframe environments to the Web. Decline server technology. So that piece of both taking an operations and emission and its associated technology and people and culture really Shaked shaped the way I approach a lot of those problems today. And I was raised in in a family where my dad came as a refugee all my grandparents came as refugees to the US and they just. Constantly instilled in US how grateful we should be for the opportunity to be born in America and raised in America, with its freedoms with its ability to pursue one's dreams and and that we owed it for that and. I was driving home from from work in. In two, thousand six, we just done a large acquisition of. Companies of banks, custodian operations. And on the radio, they were talking about the bombing of mosque. Samara Moscow in smaller rock and just the. Soldiers dying civilians dying and the troubles there and I I still don't know why but I thought of my dad and. That's myself. Perhaps now's the time to repay a little bit of of that in some way and. I've been a graduate student at Columbia had a I had a professor tell me about the White House fellows program and encouraged me to apply and I kind of I have to admit was a bit of the New Yorker Countless New York ever. kind of put that aside and for whatever reason I just felt that calling at that moment called him and said I'll apply and fast forward I was assigned to the Pentagon. With zero military background. And you learned a lot about the culture very drawn to that shared commitment and spent a year in the Pentagon worked for the navy and then came to NSA. Couple years later. What did they doing at the Pentagon and the Navy? So I was the deputy chief management officer, the Navy essentially, the Navy had a number of broad enterprise wide technology efforts which they were working again, bring that you people mission. Technology Triangle. And they asked me to help work on a couple of working directly for the secretary of the Navy figure out why a of them were struggling and then help them get on track. So I worked on that and I often get asked by people. How did YOU END UP AT NSA? A pretty funny story in that I had a seventy six year old and I was commuting from Baltimore and the. The work life balance was a bit tough and I met somebody and he asked me about. How he was doing and I commented that I really love the work but it was a little hard for me to do the juggle. And he said, you know I happen to know that NSA standing up you director NSA standing up cyber command and I know they need people with your kind of of background. So how about if I make a phone call there? And I went for an interview commute was thirty minutes and it sounds so foolish but. That was pretty much what it took. Interesting interesting. So the private sector and then the Department of Defence which is as you know this huge enterprise and then NSA and this is a this is not an easy question I know about kind of the similarities and differences of those three different experiences. It all begins with people. In every organization missions have to adapt and change They adopted change in the private sector because perhaps you have a competitor, perhaps the customer spaces adapted. Certainly financial services saw that we're the scale of data was just increasing the scale of trains was increasing and the traditional manual processes couldn't keep up. So we automation with needed to reduce errors and help us keep on track with we're trading was going. Technology could deliver on that, but the the business of the organization had to change to fully take advantage of the technology and the way people did that mission and use technology had to change along the way. So I think in each of those organizations that taught me that for that, that triangle has to be kind of guided together to get to an outcome mission technology and people if you really want to be able to fully. Whether it's take advantage of a market or stay ahead of an adversary in our own mission here in the ICU dod that triangle has to work together and you have to communicate every those three planes together when talking about why the changes needed. So an in your tenure at NSA, you've served as its first chief risk officer. The assistant deputy director of operations, the head of the Russia's small group, and now the head of the Cybersecurity Directorate. Can you take us through your trajectory there how did your responsibilities differ from roll to roll? Absolutely, and so I came into an Santa's small team part of a small team that was standing up cyber command, the chief risk officer role was. was created after the media leaks period of two, thousand, thirteen where we learned that. Really appreciating risk mount looking at in a holistic way across partnership risk operational. Risks Technology risks. We learned that we needed to adapt the way we looked at risk and then change according to that. So I think in each of those roles. Either, the adversary was changing around us a threat was changing around us. We. Wanted to take advantage fully of an opportunity and I was responsible for taking the big picture strategic goals, translating those two measurable outcomes and objectives and helping you know contribute, communicate the why and then bringing the team of people along to get their each other's efforts was a bit different. But you know. We talked about the risk of doing the risk of not doing weighing that appropriately we talked about the insuring that as we approached new missions policy and technology move together, and certainly when we looked at the elections work in two, thousand, eighteen, the Russia's small group work we saw we're adversaries of have used influence operation since the time of Adam and Eve perhaps would have changed was again the ability to use social media to both focus and directed to have larger impact. So focusing on the Russia's small group for just a second and what was that what was the what was the mission and what were your responsibilities with regard to the two thousand eighteen election's to the extent that you can talk about that. Absolutely. So the mission was ensuring the integrity of the two thousand eighteen midterm elections ensuring that we I understood the threat second that we appropriately tipped all the information we had about the threat to key partners across the US government. Certainly, FBI from a counter infants perspective digest from Cybersecurity of elections, infrastructure perspective, and they finally that we would support Cyber Command. If if authorized to impose costs, it's were attempts to disrupt. Disrupt the election. So. After the two thousand eighteen election's president trump publicly confirmed that cyber command played a role in deterring the Russians in two thousand eighteen are they're important lessons from what happened in two thousand eighteen about how we as a country can defend ourselves against this this insidious threat. Yes. So you know across the government, we look at two key polls. Integrity one is attempts to malignly influence population whether that is to highlight social discord to highlight issues that divide the population or to. Hand up sheer inappropriate. You know share information as part of shaping individuals ideas, and then the second is potentially interfering hacking into elections infrastructure as part of efforts to change the vote and I think the first pieces, the value of resiliency. The sense that you know once trust is lost, it's very hard to regain. So the knowledge for the American public that there are hundreds of people across the US government committed to and working to ensure the integrity of our elections. When it comes to counter influence though the biggest resilience as each of us. As Americans when we're reading something asking who might be trying to influence me what is the source of that information I fully confident in that source of that information. And then finally the role of the role of technology and the role of Public Private Partnership. In as part of elections integrity. So for us in the intelligence community were constantly watching for which adversaries maybe seeking to to shape a populations thinking to shape an election and then rapidly tipping that to partners or. To the private sector to ensure that they're both aware of techniques and our countering them on their platforms. So we've since learned shocked last week the updates from deny that the Russians continue to engage in election interference, the Chinese, the Iranians, and the punchline of all that for me is it's really hard to deter. Foreign interference right and I'm wondering if it's something special about foreign interference or if it's more about cyber at the end of the day and the difficulty of seeing cyber attributing it if you see it, how do you think about that question absolutely I think it is more about cyber than about elections from a cyber perspective when we look at fully both protecting cyber infrastructure and then to your second point about attribution, there's complexity laying what we call the red on top of the we may see threats. That are talked about strategic perspective and then we partners across the US government a looking to see where does that present itself? Where are the given vulnerabilities in a given infrastructure? The powers when you can lay the two together and say, here is a nation state that has intent to interfere in whatever that is an election critical infrastructure. I Pete Best and then translate that to the tactical level to say that network scanning or that vulnerability in hardware or software may well be used to achieve the objective putting that in place, and then most importantly preventing it because at the end of the day riding report about a victim and notifying the victim is far less satisfying than being able to put that together and prevent the adversary cheating their objective. So we've already started to shift now into your new role, right which was relaunched in October I believe. So be great if you could, and if you could explain for our listeners I, what NASA's two main missions are. Again and then cybersecurity and the difference between them just to give folks here level set absolutely. So Ns as a foreign intelligence agency were responsible for understanding a broad range of threats. Presented by governments to the United States, one of those threats include our cyber threats how nations may be using cyber to achieve their national objectives as that might be intellectual property theft for example, to counter the department defensively Thallady by accelerating foreign governments ability to to actually productized particular rnd for weapon that may be targetting critical infrastructure of a country. As part of threatening that country or as part of putting pressure on a given country. So that is the threat information on the second side. And say has cybersecurity mission. We're celestial known We build the keys codes and cryptography that's used to protect all of US government's most sensitive communications thinking nuclear command control weapon systems, the president's communications with allies, and we provide technical advice to mitigate those same threats that I talked about. So the really the he integration of the two missions where we think the magic is where we can say here's what we think adversaries are seeking to do, and here's how from a cybersecurity perspective we recommend you protect against. So so what motivated and the relaunch of the directorate and has its mission changed at all really good question. So we recognize that we were at a crossroads with national security as both technology and society ships were happening. We saw only kinds of technology that people want to from small satellites to Internet of things and each of those presents huge advancements. But they also present cybersecurity risk. Along with that, we saw various nation surtees. New Technologies think North Korean crypto currencies to get around sanctions to achieve their own objectives and we said we really need to up our game to more quickly be understanding those threats and ensuring that. We could both provide advice to build new technologies as early as possible, but also to counter adversaries use of those same technologies to achieve their national security. We're GONNA take a quick break to hear from our sponsor. Dumb. We'll be right back with more discussion with an neuberger. At Lockheed Martin, we're on a mission. Your mission. Not just the next mission but the one that's two steps ahead. That's why we've not only taken the lead in hyper sonics, but we're helping you integrate technology faster than. It's why we're not only developing the laser weapons systems you'll need but deploying them in the field. Our mission is to build the integrated solutions you can depend on because the world is depending on you. So and what are the what are the primary areas of Focus for your directorate? What kind of people work there? What's their skill set and what kind of customers do you serve? Questions. So the first parties. Operationalizing Intelligence. How do we ensure that from the intelligence that we see we took anything that's unique. And timely quickly so that we can prevent the victim. So that's the first, the first piece of of work, our areas of focus are. Both understanding that giving guidance encryption, we believe encryption. A key protection particularly in telecommunications environment that in many cases is entrusted. So both in building the government's special encryption, modernizing that as well as providing advice and insights on how to best use. Encryption the text of people who work cure are like we see him any organizations abroad gamut we have intelligence analyst. We have country-specific experts have a broad swath of technical experts, encryption network technologies, hardware, and software vulnerability analysts as well but the power is weird that can be integrated where you can say. How do you build on route of trust all the way through to an end point? Had you properly defend network and take a step back and do risk analysis to say? We are the gaps in your resilience and we're should your next dollar investment to closest gaps Right, and then what about customers is your is, is it just the Department of Defense? Is that the US government is even broader than that? How do you think about who it is you're working for? Yup Great Question. So there's a specific set work we do for what we call national security systems systems carrying classified information national security information the director. Vanessa is also the national manager for National Security Systems, that's the authority under which as I mentioned, we have we build the keys codes and cryptography responsible for distributing threat information as well. So those are across the US government with a particular focus on duty. Weapons Systems. And Related Systems. A second set of key partners and customers are dhs I. D. H., S. and its role supporting critical infrastructure. And, the sector specific agencies, and like I said the the real magic of understanding the critical infrastructure, we're it's key gaps and vulnerabilities are and being able to marry that up with what a foreign government may be intending to do and providing focused insight. Across the US government, there is broad use of commercial technologies, particularly duty and and national security system. So you may have seen when we're issuing advisories were also issuing advice on how to secure and configure those commercial technologies well because we see that. Those are used all across. Sensitive, systems as well. Your director has issued I think a dozen or so. Advisories about cybersecurity threats. Can you talk about why you guys do that? What the criteria is for quitting one of those out and then how do you think about the impact they have? Do You keep metrics on that? How do you think about? Advisories absolutely. So. Our advisories other way we really do them for three reasons. One is if we see a nation state actor using a particular vulnerability against the system care about we find that it really drives urgency of action people run faster when they're pursued, and if we can say, this nation state actor is using this vulnerability. Here's the mitigation advice to protect yourself against that we see impact and I'll talk about that how we measure that impact at the end. The second thing is there's a deep expertise here because we build and we break encryption. So encryption related technologies like the peons like you. You may recall the windows ten cryptographic vulnerability in January. Those are areas we focus on because we know those are sometimes hard to understand technically hard to implement. So if we can give very practical advice, them will issue those as well to help that be put in place, and then the third would be where there's a timely need and we're getting a lot of questions and we feel that putting out a product helps guide people and thinking about how to think about security I'll give an example. As. As covid. Pressed a lot of organizations across the US government particularly duty as well to move to telework. We started getting a lot of questions about secure collaboration. which commercial tools were safe to us and our goal was teaching people how to evaluate what safe to us. So we issued a product we're laid out the different attributes like. Code is available for review its end to end Krypton and a few other such attributes, and then we rated different secure collaboration publicly available tools against them and the cool part was we had companies call and say, well, you didn't get something quite right or can we be included as well and we said absolutely, we issued a second version and then we have another one coming out next week because our goal was making it as useful as possible and also helping teach people. How to assess. Different. Products for security. You ask the question about how we measure impact. So there's three different measures we've been using. The first is, do we see patch rates go up? They'll do we see for vulnerabilities that we've talked about here is a foreign actor might be using a boehner ability to achieve an objective. Can we watch those patriots go up and it was really cool to see. And a number of cases we've we've watched that increase. The second piece is there is a very capable and active cybersecurity industry has the information shared enable them to better protect. Sensitive US government national security systems networks, and you know in the case of the Xm vulnerability that we issued, we're advisory where we talked about the particular unit of Russian intelligence using the XML male vulnerability. It was really great to see five different cyber-security entities using that to identify other. Russian intelligence infrastructure and then take that down. So that was success for us that we made it harder for that adversary to achieve its objectives, and then the third one is really the feedback on the number of downloads and the feedback from administrators saying this was useful. This was unique timely and actionable could act on it, and then in May you guys took what I thought was an unprecedented step of actually openly attributing the exploitation of vulnerability to the Russian, Gru. and. That seemed to rare to me and I'm wondering why you decided to actually name Russia in this instance. So I it is rare because as you noted earlier, implicitly attributions hard. You may have seen a prior product where we highlighted one st state using another country's. Infrastructure to achieve its objective and then highlight he just hard attribution is. So when it's done, it needs to be done with precision to be confident. In that and we chose to do it because. We see that it makes targeted network owners more quickly patch and secure and build the resilience of their systems network administrators have way more vulnerabilities to address than they have time for or frankly money for and way more alerts than they can act on. So we can say this particular vulnerability is being used by a nation State Intelligence Service. We see them we see network administrators moving quickly and addressing it, and that's a fundamental goal. Fundamental goal is improving cybersecurity. If you kind of step back and look at look at the big picture here, you know, maybe from a thirty five thousand foot level how are we doing? The cyber threats are we barely keeping up? Are we catching up? Are we getting ahead of the game or? Is it always going to be hard for the defender. In this game in because the guy on the offense can always come up come up with something new how you think about sort of where we are in the history of of the threat of cyber and defense against it. I think we points overall technology is getting more secure. Technologies built more securely today. So the fundamental resilience is is improving you know when you have open source products, we have lots of is looking at a given technology and helping find vulnerabilities and address them. That being said were an ever more connected economy in an ever-more connected society, and as we build more connections, sometimes two systems that were not necessarily built for those kinds of connections. Data Systems. In that way, we bring and introduce new risks. On the third poll on the positive side, there's far more awareness about those risks and how to approach addressing them identifying what are the most important assets to protect and ensuring good practices are in place and it's far easier than ever to put that in place. So I think it's a mixed story on the one hand more more technologies built more securely, and there are communities of individuals working together to ensure their secure on the other hand far more. Technology some of which. Is connected in ways that bring risk in ways that we always have to and I guess the third part, which is where we started adversary seeking to take advantage of those risks to achieve their objectives. So. If you if you were standing in front of a large multinationals board of directors in you're talking to them about cybersecurity. What's the one or two things that you would absolutely want them to take away from from your conversation? What is the tangible thing you most want to protect and what's the intangible thank you most want to protect. So if you're drug company, what is the intellectual property that's going to be your next potentially big drug big driver of economic growth, big driver of healing, and then second what's the biggest intangible? Thank perhaps, that's your reputation. The way you treat your employees, the price, the prices that you charge and what you're, what you're. How much you mark that up. Make sure that you're protecting both carefully make your your cyber security commensurate with with the risk presented to you if you lose either one. And you mentioned you mentioned Skater Systems and I'm not sure that all my listeners know what those are just explain that and then is there something? Is there something special about protecting data system from protecting? Normal network absolutely. So Skater Systems are essentially control systems for the core areas of infrastructure in a given country in a given company. So think power systems clean water drug manufacturing. and. Those are. Those are often complex system. So what's unique about them is you know those systems over the years were often built four reliability in the event of a bad storm that power system would come back online with confidence as. More technologies got connected. So for example, the ability to measure. Use of power the ability to measure confidence in in water and chemical level. Some of those systems got connected to network systems that provide a way to access them. One of the joint products we recently issued between Ns. WAS An ICS product because there had been some public articles about. a given attack against skater systems in the Middle East, and we wanted to ensure that we together with. One of our closest partners was providing technical advice to. Skate entities in the US based on what we were learning about those attacks. So interest, a couple more questions you've been terrific with your time. Seems to be an effort on the part of an essay to kind of open up the black box and showed the reputation no such agency right. Your conversation with me thinking example of that why is that a priority for for the agency and for General Nakasone? I in the cybersecurity mission fundamentally if we're not trusted we can't achieve our intact. People take advice from those they trust and the power of. Across the US Government Team USA work cyber. There each organization plays its position within that role. You Know My counterpart at Digest Chris Crabs often talks about them being the national risk managers. At an essay, we believe what we can bring uniquely is that integration of intelligence series of seeking to do what their capabilities are, what their infrastructure looks like and how to defend against cyber security advice to counter that, and that's always continuing because technologies change adversaries, goals change, and the resilient always has to be increased to meet that. So we want to be trusted to achieve what we believe. We can uniquely contribute to team USA on cyber. The first step to doing that is conveying, we are conveying the culture that's here the commitment to American values, and certainly WanNa part of our mission is an intelligence mission. In a in a democracy, we have an obligation to ensure that the Americans we serve. Feel they understand the values which we live. So your your former colleague and my really good friend Glenn Gerstl road. Op Ed about a year ago about what he saw the. Profound implications of the Digital Revolution on national security, and he raised a lot of concerns and among those was the sheer pace and scale and volume of technological change and. And data that's GONNA force intelligence agencies including NSA to fundamentally change how they do business I was GonNa say thinking big picture about those kinds of challenges. What are you trying to tackle I? Would've the adjustments look like, how do you? How do you think about the challenge that Glenn laid out? Absolutely, so I from the perspective of large amounts of data and ensuring, we can make sense of them. Ensuring that we can do big data analysis to help. Triage the information we identify and determine what are people are big assets put their time on to determine he's and how to act on them. So for example. We we're looking at machine learning to classify malware and we're certainly looking at. Machine learning potentially to help us identify vulnerabilities scale particularly when we look at systems that represent thirty years of technology like muffins systems, how do you secure a weapon system? That's been out there and represent each phase of technology and have confidence in its resilience and in command and control. And then finally. We have an obligation to both bring those technologies to be on our mission and understand how adversaries might use that and manage that accordingly. So for example, as we think about artificial intelligence and the potential to automatically. Direct weapon. In the United States we have strong values around how we would think about automation versus human control. In other countries around the world, there might be different ways that those kinds of decisions are approached. So how do we ensure that we both? Bring that integration of. Compliance and technology to the way we pursue it but also be aware of those gaps and keep an eye on the risks of those gaps. And you mentioned you mentioned people and you mentioned people a couple of times and and just took two questions about that. One is given the competition that you face with all of these cyber security firms and. Your folks must be very attractive to them, and their skills are quite valuable in their private sector. How how difficult is it for you to recruit and retain talent? Really thoughtful question because you asked two questions in their recruit entertained. So. From the recruit side, we get really great people. On the routine side. We have a really compelling mission. and. What brings keeps people. Here is the sense that they're contributing to something bigger than themselves. That is challenging fulfilling. It's on us as organizational leaders to ensure that each person has that opportunity to contribute what they can uniquely bring chew to that mission. And one of the one of the cool aspects of the Cybersecurity standup has been people who have left to call in and say, Hey, I'd like to come back I learned a lot. In the private sector, the missions, calling me and like to contribute again, and we've hired a number of them back and continuing to increase that and part of the message we have when people if people do decide to leave is to say that is great. You will continue to contribute to the nation's security. You'll learn a lot in the five at sector, and if you ever want to come back the doors open. What do you? What do you want the American people to know about the women and men who work for you. That, they're committed to the values. That this country was established for. That there are significant threats to the United States, our allies and to those values, and that not always can we talk about those threats because? By impact sometimes intelligence community, even the security mission has to operate in those shad in the show does so. Trust our values, trust that we are proud Americans. We swear an oath to the Constitution of the United States, and if you do question it or if you want to learn more roll up your sleeves and come into the for a few years and get to know what yourself because each person has unique abilities and a unique ability to contribute to their to their country in whatever way they choose whether that's government are in the private sector. But if you ever doubt it come on in and work here and and raise your voice and be a part of it. It sort of takes you back to what your parents taught you to. It really does it my dad grew up in in communist Hungary and In the beginning when I came into government, he would call me on the phone sometimes and switched to a foreign language and. I realized that for him growing up in another country. Is that complete trust of government that I American born? You know have that doesn't mean it's trust and verify it's from verify but there are things that I take for granted growing up in this society that I don't know if he ever will. So being able to look at things through his eyes and through mind make me realize how fortunate we are to be here and how much we have obligation to. To ensure it stays that way. And thank you so much for joining us and thank you for your service. Thank you so much for your time.
"us national security agency" Discussed on The CyberWire
"Disabled a Romanian network that was sending authentic messages expressing implausible support for president trump one would have to be naive indeed to uncritically swallow report that former President Obama and former first lady Michelle Obama had thrown their wholehearted support to the reelection of president trump. The motivation is as likely to be financial fraud as it is influence. malware bytes, reports, and ongoing series of Hamas attacks, which substitutes similar characters into familiar domain names. The activity appears linked to major cart and it shows the gang evolving to take advantage of similarities among Turkish, Cyrillic and other international character sets with the to us more familiar Roman letters. And finally as remote work increasingly looks likely to become an important part of the new normal. The US National Security Agency has said that it's expanding its telework capabilities with the twenty twenty one adoption of. Microsoft. Office three, sixty, five to support unclassified work FCW. Reports. But to rumors that NSA is going to open up its top secret cloud to remote work the agencies Ao Gregory Smith Berger said No. That's just not a thing and why not? Because come on friends, there's just some kinds of work that you can't phone in. And now a word from our sponsor, observe it with distributed workforce becoming the new norm. Many organizations are forced to learn how to manage mission critical functions remotely, which brings a unique set of insider threat challenges to the four whether it's careless users, disgruntled employees or third party contractors. Insiders have access to sensitive data on networks that are likely less secure, introducing new risks to. Your Business. To protect against these new threats proof points observant insider threat management solution empower security teams to identify user risk protect from data exfiltration and accelerate incident.
"us national security agency" Discussed on NewsRadio KFBK
"In weather became Sacramento and KFBK FM Polic Times from ABC News I'm Richard can to Western intelligence agencies. The US National Security Agency. Among them accused Russian hackers of trying to steal research on a vaccine for the Corona virus report lays out indicators of compromise and detection rules for companies involved in vaccine research and warns that the group Referred to as a PT 29 is quote likely to continue to target organizations involved in Cove in 19 vaccine research and development. The NSA cyber security director said the report would help to encourage everyone to take the threat seriously. ABC is Katherine Folders. Brian Camp governor of Georgia won't mandate mask wearing in his state, Atlanta and 14 other Georgia municipalities. Are mandating them. Camp is now going to court to stop them. Governor Brian Camp filing a lawsuit seeking to block Atlanta from rolling back parts of its reopening, including closing down dining rooms and that all important mask mandate, he says he's doing this on behalf. Of struggling businesses. Atlanta Mayor Qi Sha lance bottoms intends to keep enforcing the mask mandate. The report from ABC is Victor Oh kendo, Colorado governor Jared Polish ordered everybody age tenant upto wear a mask but says they shouldn't have had to wait for him to do it. We have talked a number of times about how you shouldn't wait for a requirement za rational thing to do to save save your life and protect our economy. Protect your loved one's new numbers out of the government show contrast in the economy. With the pandemic raging. Another 1.3 million Americans filed new claims for unemployed. Ointment insurance last week about the same as the week before and steady at a staggeringly high level. The picture on the retail front was a little bit better retail sales in June We're up 7.5%. But experts point out that's a lagging indicator and may not account for the resurgence in Corona virus cases in much of the country. A B C's Aaron Carter ski, no immediate word of casualties or injuries after a magnitude 6.9 earthquake that struck off the north side of Papua New Guinea tsunami considered unlikely the A temblor occurred 50 miles deep. You're listening to ABC knows And I hard radio Station News, 93.1 KFBK Governor Newsome is planning to advice schools on the re opening in the fall. He will hold.
"us national security agency" Discussed on WRVA
"From ABC News I'm Richard can to Western intelligence agencies. The US National Security Agency. Among them accused Russian hackers of trying to steal research on a vaccine for the Corona virus report lays out indicators of compromising detection rules for companies involved in vaccine research and warns that the group referred to as a PT 29 Is quote likely to continue to target organizations involved in Cove in 19 vaccine research and development. The NSA cyber security director said the report would help to encourage everyone to take the threat seriously. ABC is Katherine Faulder's Brian Camp governor of Georgia won't mandate mask wearing in his state, Atlanta and 14 other Georgia municipalities are mandating them. Camp is now going to court to stop them. Governor Brian Camp filing a lawsuit seeking to block Atlanta from rolling back Parts of its reopening, including closing down dining rooms and that all important mask mandate, he says he's doing this on behalf of struggling businesses. Atlanta Mayor Qi Sha lance bottoms intends to keep enforcing the mask mandate. The report from ABC is Victor. Oh, kendo, Colorado governor Jared Polish ordered everybody age 10 and upto wear a mask but says they shouldn't have had to wait for him to do it. We have talked a number of times about how you shouldn't wait for a requirement it za rational thing to do to save you. Saved your life and protect our economy. Protected. Love wants new numbers out of the government show contrast in the economy. With the pandemic raging. Another 1.3 million Americans filed new claims for unemployment insurance last week about the same as the week before and steady at a staggeringly high level. The picture on the retail front was a little bit better retail sales in June We're up 7.5%. But experts point out that's a lagging indicator and may not account for the resurgence in Corona virus cases in much of the country. A B C's Aaron Carter ski, no immediate word of casualties or injuries after a magnitude 6.9 earthquake that struck off the north side of Papua New Guinea tsunami considered unlikely the A temblor occurred 50 miles deep. You're listening to ABC knows. Let's say you just bought a house. Bad news is.
Russian Hackers Tried To Steal Coronavirus Research, Intelligence Agencies Say
"U. S. National Security Agency and other Western intelligence outfits are accusing Russian hackers with trying to steal Corona virus vaccine research. The warning that the group a PT, 29 also known as cozy Bear. Suspected of having ties to the Kremlin's domestic and foreign intelligence services is tryingto hack researchers working on the vaccine. The allegation which the Kremlin denies. Potentially MOHR EVIDENCE a Russian aggression towards America after its targeting of the US election in
Russia is hacking virus vaccine trials, US, UK, Canada say
"If fighting the virus weren't enough, the National Security Agency says researchers working TTO find vaccines are also fighting off Russian hackers. Spy agencies in the U. S. Canada and Great Britain say the same Russian groups that attacked the 2016 election are now actively trying to steal data from scientists working on a cure for Cove in
"us national security agency" Discussed on KQED Radio
"And Britain accused Russian hackers of trying to steal research on possible covert 19 vaccines. Three nations set, a group known as Cozy Bear linked to Russian intelligence is targeting academic and pharmaceutical groups. It's unclear whether any information was actually stolen. The FBI announced today it's investigating a sweeping security breach at Twitter that comes after hackers access high profile accounts on Wednesday, including Barack Obama, Joe Biden. Bill Gates and Kanye West, among others. They then tweeted from those accounts promoting the crypto currency Bitcoin. We'll get more details on all of this and the alleged Russian hacking of covert research later in the program. The European Union's top court has avoided an agreement that let big tech companies share data on you. Citizens with the U. S. Privacy activists in Europe welcomed the decision. Austrian activist Max Schrems said he hopes the two governments will guarantee that users data is protected in the US as strongly as it is in Europe. Silicon Valley will simply realized that idea. U. S laws are going to be changed to a certain extent or they will literally have to move a lot of their operation to Europe and even split their systems into two parts. Case grew out of disclosures by Edward Snowden, a former contractor at the US National Security Agency. In 2013 Snowden revealed that Facebook was giving US security groups access to European users data The Vatican is telling bishops they should report all claims of clergy sexual abuse to police, even if local law doesn't require it. That new guidance issued today aims to force church leaders to investigate such cases. It also urges them not to dismiss allegations made anonymously through Social media. For the second time this week, the United States has executed a federal death row inmate Wesley Ira perky, died by lethal injection today at a federal prison in Indiana. He'd been convicted in 2003 of kidnapping and murdering a teenage girl in Kansas City. This week's federal executions are the nation's first in 17 years. The Trump Administration fired off new warnings about China today. In a growing pressure campaign, Attorney General William Barr said Americans have become too reliant on Chinese goods and services. And in Grand Rapids, Michigan. He accused the ruling Chinese Communist Party of mounting a quote economic blitzkrieg to get ahead of the United States. Globalization does not always point in the direction of greater freedom. Ah, world marching to the beat of the Communist China's Chinese drum will not be hospitable one For institutions that depend on free markets, free trade or the free exchange of ideas. Already this week, the US stripped Hong Kong of preferential trading status. It also rejected Chinese claims in the South China Sea and imposed travel curbs on employees of the telecom giant. Aging said today it will stand up to what it called gangster logic. The US Supreme Court refused to intervene in a fight over convicted felons right to vote in Florida. State law requires that they paid all court costs, fines and restitution before they can vote. Ah lower court had upheld that law and the Supreme Court has now left that order in place. Ahead of Medicaid and Medicare. Seema Verma is under fire over alleged mismanagement of $6 million in communications contracts and inspector General's report says she led a Republican media consultant have too much authority over federal employees. Verma says The findings are based on quote unsubstantiated assumptions and in complete analysis. The pro football team in Washington, D. C is facing allegations of long running sexual harassment. Washington Post reports tonight. 15 former employees, Female employees say they suffered suggestive comments, verbal abuse and sexual overtures. They say it was routinely ignored or Condoned. Post reports. Three top employees with the franchise who resigned in the past week are among those accused. The team says it has hired a law firm to investigate in economic news. Another 1.3 million Americans filed for unemployment benefits benefits in the last week. That is unchanged from a week earlier on Wall Street, the jobless news help to push stocks lower. The Dow Jones industrial average lost 135 points to close at 7 26,031 The NASDAQ fell 76 points and the S and P 500 dropped 11. Still to come on the news hour, the Trump Administration rolls.
"us national security agency" Discussed on KOMO
"Coming up on Corwin taken short line where police have killed the suspect who stabbed a man and a dog coming to time. 11 o'clock. From ABC News, Michelle Franzen as Corona virus cases continue to increase for the majority of states and some businesses or re closing. Another wave of jobless claims is adding to the strain. Another 1.3 million Americans filed new claims for unemployment insurance last week about the same as the week before and steady at a staggeringly high level. The picture on the retail front was a little bit better retail sales in June We're up 7.5%. But experts point out that's a lagging indicator and may not account for the resurgence in Corona virus cases in much of the country. ABC is Aaron Carter ski today House Speaker Nancy Pelosi at her weekly briefing, calling on Senate lawmakers to pass another stimulus bill for Americans, business owners and schools. Two months ago, she says. The House passed the Heroes Act. We have to $230 billion specifically for the schools. And then we have nearly a trillion dollars for state and local government, which I remind you is 1/2 of what they gave away in their tax break 83% of the benefits going to the top. 1%. Senate leaders say they're working on a separate stimulus plan. Ah, warning for companies working on vaccines. The US UK and Canada all saying on Thursday that Russian hackers were attempting to steal the research. Cyber espionage group associated with the Russian intelligence services has attempted to hack into Corona virus vaccine research in the U. S. Britain and Canada. That's according to a report from the UK is National Cyber Security Center. The US National Security Agency agreed with that report. The report lays out indicators of compromise and detection rules for companies involved in vaccine research and warns that the group referred to as a PT 29 is quote likely to continue to target organizations involved in Cove in 19 vaccine research and development. The NSA cyber security director said the report would help to encourage everyone to take the threat seriously. Kathryn Folders, ABC NEWS Washington You're listening to ABC News stay connected to stay informed. Cho, Mo midday and nobody once again a final hour of the morning commutes and we'll check out your traffic for you. Just a couple minutes around Tom Butler. With our top story for two Come on, 24 7 News Center, 71 partly sunny in downtown Seattle. These are our top stories. Police in shoreline shot and killed a knife wielding man after the man stabbed a dog Walker and his dog almost core would take with the update from the scene. Police say the suspect was holding the knife and refused to drop it when sheriff's deputies opened fire, killing him, Sergeant Ryan Abbott with the King County Sheriff's Office says. The stabbing victim was walking his dog down his private driveway when the unknown assailant attacked the suspect stabbed the.
"us national security agency" Discussed on AP News
"The European union's top court has ruled that an agreement that allows a big tech companies to transfer data to the U. S. is invalid and that national regulators it needs take tougher action to protect users data the ruling doesn't mean an immediate halt to old data transfers outside the EU there is another legal mechanism that some companies can use but it means that the scrutiny over data transfers will be ramped up and that the EU and the US may have to find a new system that guarantees that Europeans data is afforded the same protection in the US as it is in the E. U. the case began after former US National Security Agency contractor Edward Snowden revealed in 2013 that the American government was snooping on people's online data and communications center shockingly London
EU court invalidates data-sharing pact with US
"The European union's top court has ruled that an agreement that allows a big tech companies to transfer data to the U. S. is invalid and that national regulators it needs take tougher action to protect users data the ruling doesn't mean an immediate halt to old data transfers outside the EU there is another legal mechanism that some companies can use but it means that the scrutiny over data transfers will be ramped up and that the EU and the US may have to find a new system that guarantees that Europeans data is afforded the same protection in the US as it is in the E. U. the case began after former US National Security Agency contractor Edward Snowden revealed in two thousand and thirteen that the American government was snooping on people's online data and communications center shockingly London
Muscling up to China and 25 years since Srebrenica
"Tom Switzer, he and welcome to another episode off between the lines now today on the program will be commemorating the twenty fifth anniversary of Europe's worst massacre since the Holocaust in ninety, ninety, five more than eight thousand people died in Shrimp Nitsa. The town was supposed to be a U N protected safe haven in the vicious civil war that tore Yugoslav apart instead the civilians ended up being massacred by Bosnian Serbs. Were lightning fast with their superior weapons. They easily overran the lightly. I'm Bosnian government troops and the token full civilian peacekeepers. The UN's Valley to protect the civilians inspired Washington to launch unilateral action against Serbia and end the civil war. Would things be the same today now? That's later in the program, but first defense. Last week the Morrison. Government launched a defence strategy and force structure review now the move signals a major shift away from the strategy outlined in the last defence white paper. Remember that just four years ago in two thousand sixteen. It plotted out Australia's strategic costs for the next decade. But that White Paper has as we know been rapidly overtaken by Vince covert China or that now the new review has promised two hundred and seventy billion dollars over the next decade to enhance Australia's defence capabilities with renewed focus on areas like Saba and spice capabilities and the possible development of hop sonic weapons will be fitting aircraft with long-range anti-ship missiles, increasing underwater surveillance and boosting fuel ammunitions reserves. Now, underscoring the seriousness of the shift, the Prime Minister even drew comparisons to the nineteen thirties and the lead up to world. War Two that period of the nineteen thirties. Is Been Something I've been revisiting on a very regular basis and when you connect by the economic challenges and the global uncertainty. It can be very haunting, but is the money too much or not enough is going to all the right places, and we'll do enough to safeguard Australia from China's increasing assertiveness and is rapidly growing military capabilities. What's the role of Australia's diplomacy? And all of this will joining me to discuss this at three distinguished guests. By skill is professor of Asia Pacific Security Studies at Macquarie University Holiday Bites. Thank you good to be here Melissa Conley. Tar is a research fellow at the Asia Institute at the University of Melbourne. Hi There Melissa could to speak again Tom. And Pay. The Jennings is executive director of the Australian Strategic Policy Institute. Tom No. Can you talk us through the top of scenarios and potential conflicts that the defense review is preparing us for the scenario that the review is focusing on is one involving a high end conventional conflict, so I've gone to the days of stabilization operations in t more Counterterrorism operations in Afghanistan This document is preparing foresight on onsite conflict. Involving countries that have sophisticated military forces. And, of course, the document doesn't say. I don't think it would be reasonable to expect it to say. That China is the problem. But let me tell you China is the problem that is the now neoplasia competitive that way of thinking about when we think about what's adequate in terms of the topic of military capability we need to have. and to does reflect to change. From past years Tom I recall when I started by defense career, we were thinking much more about the risks presented by Indonesia, and the so called low level in cushions in the northwest. Of course, that's no longer features in anyone's strategic thinking. Really it's about China and the risks that the People's Republic is presenting to all of its neighbors in abroad since in the Indo Pacific region and beyond I cabinet crudely putting it some sites laying the groundwork for fortress Australia US sign. This is preparing us to join a potential use LID. Containment slash war against China for example to protect Taiwan Peter Jennings. I think that is it covers a spectrum of possibilities. One possibility which I think is Epson you were in terms of language of the document is that we might conceivably end up having to face military conflict without being able to rely on the direct combat support of the United States, and that's what leads to discussions around extra stockpiling munitions and fuel insightful. But I think in general terms. Yes, the expectation is that Australia. Through its history has been a country that forms coalitions usually have like minded partners, the share the same types of objectives. And the the plan will design the Defense Force. Really gives us the capacity to do that with Rachel Ellis lecture, example, Japan but also with our traditional ally the United States okay bates skill. You've recently completed a review of China's defense capabilities and its recent military modernization, specifically looking at the implications for Australia Wind you expect the Peo- The People's Liberation Army and its navy. When do you expect them to have the capability to project power as far as Australia annual Pacific knives, well in many respects Tom, they already can I mean they have the long range missile capabilities to do that? Know as a from a standoff position launched from their own from their own homeland against hours. But what I think, the the new strategy is looking at is really the development of capability over the next ten fifteen twenty years, and that's by the Chinese own own acknowledged calendar that they would be able to by that time of mass, a large enough capability, both in terms of its long range strike, you know striking from their own homeland, but also bill to project. Project Power passed the so-called first and second island change and being a position to more directly threatened through those platforms Australian security. So you know we're talking ten or fifteen year window here and I think given the time it does take to try and respond to develop the the deterrent and defense capabilities for Australia. That's that's you know that's in some ways a short window. for Australia to be mobilizing in reaction Melissa Tali. What's the role of a strong diplomacy and all these well I think it needs to be growl. And one of the concerns when we look at the deteriorating strategic environment is we think all that's a defense problem? And so when the prime minister launches the strategic update with those comparisons with the nineteen thirties. It pushes US toward seeing in purely military terms but we don't just want to say things in that security lands, we want to think about all of the parts about national power projection, so that's diplomacy and development as well as defense I think if if people thought about it I think what we invest in all three strongly, but that's not where it is if you look at federal budget fifty. Fifty nine billion to defense and less than seven billion to diplomacy and development together the lowest point with ahead in our history and I think we missing that opportunity. If we don't take US seriously, the way that diplomacy and development can shape things in the world so I was struck. Today was a defendant looking at the latest poll on what are the major concerns that Australians have at the moment of the top threats in the world and the first five, a role nontraditional that drought, environment, disaster, climate change, pandemics, and downtown, global economy, and those places where you know military spending isn't going to help shape that environment. So we need to have an effect on those. We need to be thinking much more about what we can do in the diplomacy and development to mind Peter Jennings. What would you say in to Melissa's observations? Because they reflect a certain mindset that that perhaps we should be focused more on non state actors rather than say China for instance well, I think all of these you know threats that have to be taken seriously. I'm and simply because we're living in the middle of a pandemic for example, doesn't the climate change is gone away in this no longer going to present a problem to us. I guess what I'd say. Is that the you know the five things Melissa listed? That were in the featured in the low e Poland terms of popular concerns. Are also the things which could. In different ways late to the risks of conflict escalating in the Indo Pacific region generally so You know my my view, please while I would like to see spending on diplomacy increased. While I. Say Development Assistance is being something which is effectively the United soft in of Australian power, and the military is the hot end of Australian power. I think. The message against all of these areas is that we have just been underinvesting for decades underinvesting for decades, so we're we're all. High fiving ourselves at just reaching about two percent of gross national product, being spent on defense, but that is compared to what we spending in cold or years, which was sometimes between three and a half percent in four percent of rustic product. So what we have grown used to Tom I would say is. Free written on the United. States code tiles of security for for decades. We've dramatically under. Invested in the things that we need to do to strengthen Australia's position, not just militarily, but also diplomat. A now. We're rather surprised to hear the news that Gosh the bill is a lot more expensive than we really thought. It was only if you've got that confidence in the US. and. In fact, the whole trump stories, the story of the Americans really big being fed up with the rest of the world, thinking that the US can fund the bill for their security, so we're going to have to do more and I think we're going to have to do it against multiplicity of areas not. Justin sought the defense organization. We'll some scholars such as you want and James Current from the University of Sydney. They say that this document sounds a lot like an acknowledgement that the US might not always be there to help us out. By are we starting to plan for more independent Australian defense posture I think it would be a wise move to keep that option open when you think of the capabilities that the Chinese developing in which do have a direct pose a direct threat to Australia or could do so. In many respects, the I think the types of threats that you might not expect an immediate or even timely response on the part of the United States what I'm thinking here. Cyber capabilities is a huge priority for the Chinese. We already know what they see the sort of capability. They can wield against Australia and that's not the sort of thing you can expect a kind of cavalry to. Lead the charge from from Washington to come to Australia's defence slowly long range strike capability on the part of the Chinese capability. They already have in which are going to continue to develop. which could threaten Australia down the road now? These are capabilities that I think that Australia's going to have to develop their own defenses for. They can certainly do that with United States, but again it's not necessarily the sort of threat that we would expect some sort of traditional ally joint response not to make it well. Some of are in listeners will email me and they'll say that if Uncle Sam struggles to police. It's own CDs. Melissa. How on Earth Can Uncle Sam Police? The Asia Pacific region in the face of a rising China. What's your sense about us staying power in the next decade or two in look? It's difficult One of the things that strategic update looks at is more threats to the global rules order, and unfortunately the you know, the US is part of that. the US is not along with the strategies interest on things like global trading system, and a number of international issues like global health where we would say you need to be supporting. A Global Response that said I don't think the strategic update will be read negatively in. Washington, it's my guess. it very clearly couched in terms that I think the US will lock about Australia contributing more and having more self. that could be seen as a statement that we think that the US might not have outback, but can also be seen as something that the US has been for for a long time. I particularly liked a few elements of the update things like making sure that we have. You know material ammunition You know that aren't going to be disrupted. Buckle supply trying having more capability eight industrial cut suffering capability here antiques fuel reserves, which is not as long sane as an issue for us, so I mean those are things that are worth investing in. Regardless of US resolve because as we've seen from COVID, we know that supply chain can be disrupted very quickly and easily, and it's worth having eligibilities. Cepeda Jennings bite skill and Melissa Conley Toilet and Melissa. The Pacific step up last year. That realigned Australia's development budget to deal with some of the strategic challenges posed by China in the Pacific Do you think it goes far enough? The step up was followed recently by strategies new International Development Policy Partnerships for recovery, and that's made it very clear that strategies focus should be on the Pacific and also southeast. Asia including. Indonesia and team August. I think that has a very clear statement about what we want. In the region of being entrusted trusted development partner and influencing those societies that we think positive for four region. Again you're going to. You're going to say you. Hear this from me all the time, but again the problem is that we not really making much invasive lunch, so partnerships for recovery head no new money it talked about the massive challenges that covered as as creating for for the for the Pacific, and for for our region broadly, and the only funding announcement was that we're going to repurpose the money. We would have spent on sending Australian. Volunteers in scholarship holders. And we're GONNA use that so I I suppose I. Feel a little bit with all the areas, not actually include district update in that as well that what we've seen through the foreign policy, White Paper and International Development Policy through to to the defense. Strategic Updike is. We talk about how. how? What a time! These these frosty leaving a contested difficult awful environment that we've now got to leave in and the Dow L. Easy Times over, and then we say, and we're not gonNA. Give any new money so I mean the defense announcement is essentially just that we're going to continue to you know, extrapolate out the money that was planned to be spent in the twenty twenty six, and we're going to extrapolate that out to twenty thirty terabytes skill. Do we risk getting into a bidding war for influence in the Pacific? I don't know if it's a risk. If it is a risk worth worth taking. I mean obviously the Pacific region is so extremely important Australia's future. Both for for defense reasons for regional engagement for diplomatic reasons, developing reasons and the like. so It's quite possible that we're entering in a more competitive phase with China in this. SITES WRIST BYTES I'm talking about more the budgetary concerns he because in the wake of the Corona Virus Crosses. There'll be serious limits on how we can spend on these things scholley. Yes, there is and party left to be be developed for that, but you know when you're talking about your own backyard. I mean I I. I don't think it's the kind of country that can simply. Pretended it's by itself getting back pay to Jennings to the region, generally in the rise of what. Angus Campbell is of the Defence Force he's talked about the rise of political warfare, the idea of grey zone warfare things like cyber attacks, economic coercion influence operations that fall below the traditional threshold of war. He says we need a whole of government response to it. I, you seeing that whole of government approach happening in Campbell, or is this Manley focus on defense and the spy agency so far Peter Jennings. It probably is focused on the national security agency's Tom. That's not too surprising because you'd expect them to sort of pick up on the risks I. But General Campbell is right. It does need to be all government is. There's a whole lot of things happening there that simply cannot and should not be done by defense organizations. and. I think that realization is slowly dawning. Along as both of the speakers have said that actually ladyship comes with cost of infrastructure is going to play that role, but you know, give you a small example of this we. We have lost the ability to broadcast into the South Pacific and Southeast Asia. In a way that we used to very successfully over over decades to give us the capacity to do that. We're probably talking about you know that. He million a year forty million a year, which sounds a lot of defend. It's nothing if you're in the Defense Department. Let me tell you. But you need to be able to do things like that. To be the truth teller in the region to actually tell the region that there are alternatives to Chinese Communist Party authoritarianism I think that's what's needed with responding to this grey zone on threat. Is Actually to be the truth teller. In this part of the will and getting our system in Cambridge used to that reality to understanding what needs to be done. To starting at different type of conversation with our region. With our own people for that matter that that is a sort of a psychological change which I can see happening, but we're not quite yet. There's a bit of work still to be done to get to that point Melissa. Conley Tyler. Is, just responding on that. I agree entirely with what pitcher saying on on broadcasting. It's a small investment, such a an increasing influence. It should be Brian and I hope that did that's being seen. I think having defense voices. I will help a lot in a banks, seriously I'm but just went. When you ask Tom Balaton host government and what's happening there? There are some really good examples, so for example win. This Pacific step pop started an office of the Pacific was established in that apartment and tried and each job. He's to be that coordinating body, and it's bringing together the. The defense, the development and the diplomacy in a way that he's gone to maximize our influence. and I've noticed this a lot more discussion about that that three. How do you bring defense development diplomacy communities together? I'm involved in initiate the Pacific. Four Day and I think a lot of people not talking about what more we can do for that that joined up coordination to make the most about national instruments by skill. You're an expert on China. The elephant in the room of course is China doing need to be careful not to overestimate China's military strength. What about the weaknesses? Exactly right I mean you have to know your enemy's weakness as well as their strengths in the case of China, they are undertaking enormous reforming organization effort. They're pouring billions of dollars into new capabilities, but there's a lot of things we need to recognize I. Mean One is that the Chinese have not fought a shooting war and more than forty years. They are have no. They have zero experience in high end combat against a serious. Adversary, scenario, so that's not to downplay them, but to understand that they've got enormous obstacles to overcome that day. Themselves acknowledge that they themselves. No, they have to overcome, and that's why we had this window that we've been talking about. A fifteen to twenty years. to try and develop capabilities to get in front of the kinds of things that the Chinese want to bring to bear around. Around, twenty thirty or twenty, thirty, five, twenty, forty, paid-up Melissa to be continued. Thanks so much for being on our in. Thank you, tell my pleasure. Thank you, Tom. That was paid jennings. He's executive director of the Australian strategic pulsing suit by skill professor of Asia Pacific Security Studies at Macquarie University and Melissa Commonly Tyler. She's a research fellow at the Asia Institute at the University of Melbourne. These between the lines with Tom Switzer. Coming next, we're going to replay a version of a segment from between the lines. I 'cause commemorating the massacre of Bosnian Muslims at shredded Nitsa on the eleventh of July nodding ninety. Five twenty five years ago this week. More than eight thousand people were killed by Serb forces. It was the worst massacre. Europe had seen since the Holocaust. Serve softening up Trevor Nature for the army's final push into the town. Town of course was supposed to be a safe haven protected by the United Nations, but the civilians ended up being sitting ducks as I woke Larry. Hollingsworth Remembers I. Myself Feel Devastated and ashamed I was there with them? When we told them that it was a safe haven I watched. Many of these people walk in with the minimal possessions into shreds, knowing that it was a safe haven, and now they're fleeing out because we've let them down, let them down to the extent that within dies. About Twenty three thousand women and children were deported, and about eight thousand Muslim men and boys left behind where executed and buried in mass graves. Now, reports from the time described, frightening scenes stiffen overawed from medicines on frontier. Speaking he. Loading some of the children and women into buses, but there's no indication as to where it was buses, going with seen some horrifying streaming, going on women and children going into the buses being taken away from their family This was going on with a lot of crying a lot of panicking. The slaughter had been planned carefully and executed with precision. All the wall Dutch. Pace is literally stood by, and did nothing indeed even when the Serb assault on Srebrenica was imminent. in-command is still rejected Kohl's racetracks. Positions. Pope John Paul. The second declared ribbon Nitsa a defeat for civilization as media reports begins to reveal the scale of the unfolding tragedy. The UN says nine hundred thousand people are still unaccounted for. About some became clear as government soldiers emerging from the forest in central Bosnia, told of horrific massacres at the hands of the Serbs one young. People executing them on spot, but this didn't come out of the blue. By the time this massacre took place the civil war that tore the former Yugoslavia. Repot was heading into its fourth year. More than a million people have been displaced, and the world became familiar with a new term ethnic cleansing. So? Who is to blame for these well? Let's start with the United. Nations from ninety two to ninety, five shrivel Nitsa was the world's first union declared civilian syphon. It was supposed to to her aggression. It was supposed to aggression and set the scene for political negotiations to end hostilities between the Bosnian Serbs, and Muslims, but the UN soldiers in the SIPHONS. They were bedeviled by problems. If you declare an area safe haven in the name of the United Nations. Nations if you tell the people if they are safe in the name of the United Nations you have got to put the troops on the ground, and it's no good for politicians say yes, we go for safe havens, but we're not gonNA put the troops meanwhile the Europeans vacillated and equivocated failing miserably to cope with across at its own back door. America was also reluctant to get involved as then President George Bush senior explained in Nani Nani to. I? Something because I learned something from Vietnam. I am not going to commit US forces until I know what the mission is to the military. Tell me that it can be completed until I know how they can come out. You have ancient rivalries that have cropped up as as Yugoslavia's dissolved or getting dissolved, and it isn't going to be solved by sending in the eighty second airborne, and although on the campaign trail that Ye Bill Clinton pledged to reverse the appeasement of that bushes of Belgrade as President Clinton allowed the Balkans to bleed for three more years. French President Jacques Chirac was moved to declare quote, the position of the leader of the free world vacant. Trinite Sur changed all that having done nothing the before during the mass killings in Rwanda Clinton was galvanized into action, and crucially he cut the United Nations out of the Decision Chine on August thirty Washington led a night bombing campaign against the Serbs the NATO action began early this morning. The harsh light of fires and explosions coloring the night sky. Some people watched the bombardment from their houses, but after more than ten thousand deaths here in the last three years, most Sarajevans had given up any hope of outside intervention. Last night it came on a scale which could yet change the course of this war by the end of not ninety five sixty thousand nine hundred troops, including twenty thousand Americans were on the ground in Bosnia. Pace was declared. The BOEKEN's wars ended only because the US finally acted. He's President Clinton in November ninety five my fellow Americans in this new era there are still times when America and America alone can and should make the difference for peace. The terrible war in Bosnia is such a case nowhere. Today is the need for American leadership. More stark are more immediate than in. In Bosnia in the years since the Mexica Europe inaction was heavily criticised, and the US was held up for its global leadership in particular for its unilateral humanitarian intervention. This is when the US secretary. Of State. Madeleine Albright said America was the indispensable nation, and that idea would fade into the justification of the Iraq invasion in two thousand and three as a war of liberation, but he's a question with the US intervene. If the shrivel Nitsa massacre happened today from the standpoint of twenty twenty, we might ask if the era of US unilateral humanitarian intervention is well and truly over. Well, that's it for this week. Show remember if you'd like to hear the episode again or download segments since two thousand fourteen. Just go to ABC. Dot Net dot US slash aren and follow the prompts to between the lines, or you can listen via the ABC. Listen APP, or wherever you get your podcast. You can even subscribe, so you never miss an episode. I'm Tom Switzer continue next week.
WhatsApp will halt processing of Hong Kong police requests for user data
"What's APP and telegram both committed to not processing requests for user data from Hong Kong law enforcement agencies afternoon National Security Law went into effect in Hong. Kong July first facebook on whatsapp characterized this as a pause and processing to review the impact of the law including consulting with human rights experts while telegram said it would not process request until an international consensus is reached in relation to the ongoing political changes in the city. THE NEW NATIONAL SECURITY LAW SETS UP National Security Agency in Hong. Kong, that is not under the jurisdiction of local government and covers crimes related to secession, subversion, terrorism and foreign collusion.
White House Dismisses Reports of Bounties, but Is Silent on Russia
"The white. House is still trying to grapple with reports that Russia paid bounties to taliban-linked militants to kill U, S and coalition forces in Afghanistan and that the president was told about the plot months ago tonight. The Washington Post says trump has no plans for an immediate response because he quote does not believe the reports. Reports are true or actionable. According to two senior administration officials this morning on social media, trump again dismissed the issue calling it quote just another made up by fake news tale that is told only to damage me and the Republican Party just another hoax hours later, the praise the president made his first public comments about the Intel echoing his administration's lied about not having been briefed because the information had not been verified. We never heard about it because intelligence never found it to be. Of the of that a level where it would rise to that I'm sure I don't see many things that they don't think rose to the occasion. This didn't rise to the occasion and from what I hear. And I hear it pretty good. The intelligence people didn't even many of them didn't believe it happened at all. I think it's a hoax. I think it's a hoax by the newspapers and the Democrats. This was something that never got presented to me and they know that never got presented because it didn't rise to that level. Trump's national security advisor and press secretary offered reports. The slightly different take on why trump wasn't informed about. The Intel appeared to focus on one unnamed Diana staffer. The person decided. Early on whether the president should be briefed on this in the Oval in the oval tells briefing was his career senior career civil servant. Officer I and she made that decision because she didn't have confidence in the intelligence that came up and we had this. Ron Telling we started an interagency process to look at options so that if the if the intelligence turned out to be verified, if it could be corroborated, then we'd have options to go to the president with it was a career. CIA officer with more than thirty years a tenure who made the decision not to brief up in the national security adviser agreed with that decision. That was the right decision to make at this moment as I speak to you, it is still unverified. Today the Senate intelligence. Committee became the latest group of lawmakers to get a briefing on the from the administration on the bounty plot. A new report in politico says quote. Top White House officials confirmed lawmakers this week that the Russian bounty intelligence was included in trump's dealing written brief in late February Capitol Hill. Sources say even though it had not been briefed to the president orally by that point, the article does not. Not Specify which lawmakers received this information. The gang of eight members of Congress who the administration usually keeps in the loop on critical national security matters are still hoping to get their own briefing from the director of the CIA the Director of the National Director of National Intelligence and the head of the National Security Agency that meeting had been scheduled to take place today, but this morning it was postponed until tomorrow.
"us national security agency" Discussed on The CyberWire
"Dave Bittner your cyber wire summary for Friday may twenty ninth twenty twenty the US National Security Agency warned yesterday that Russia's Gru continues to exploit the Xm male vulnerability CVA Twenty nineteen ten one forty nine an essay identifies the Russian unit involved as specifically belonging to GRU's main center for special technologies the group commonly known as sand worm. The vulnerability was disclosed patched in June of last year and NSA advises users to apply it. This provides another object lesson in the importance of keeping software up to date the GRU has been exploiting the bug since August two thousand nineteen it also provides another example of the ways in which the historically reticent NSA has become increasingly engaged in public warnings and advice on Cybersecurity Kaspersky outlines a campaign against industrial targets in Japan Italy Germany and the UK the specific goals of the campaign are unknown although Kaspersky says they've observed destructive activity and extraction of data. The attackers used stenography in the data extraction process. That is they hide code in an image this and other aspects of the campaign make the attacks difficult to detect and block yesterday. Us President Trump signed an executive order on preventing online censorship. Intended to address ways in which social media are applying selective censorship that is harming our national discourse it addresses section to thirty of the communications decency. Act which afford civil liability protection to online service providers that act as neutral platforms as opposed to editors the secretary of Commerce will lead a petition for rulemaking to clarify section to thirty federal agencies will evaluate spending on platforms that engage in viewpoint discrimination and the Federal Trade Commission will investigate unfair trade practices related to content moderation among the points. That stand out in the order. Are It's observation? That the protections in section two thirty were designed narrowly to provide certain protection for minors it also emphasizes the Act's provisions that restrictions on content be done in good faith and it asks the Federal Trade Commission to take a close look at social media. Companies outsourcing content moderation to third parties that themselves arguably engage in viewpoint discrimination. The order is widely viewed as a response to the president's recent experiences with twitter at issue is the difficult question of what counts as a neutral supplier of a service and what counts as being a publisher with responsibility for content. Thus should facebook instagram and twitter be treated like sellers of newsprint or like newspapers like telephone company or like a television station. We'll hear more on the executive order from our guest. Ben Yellen of the University of Maryland Center for Health and Homeland Security a little later in the show. Several data breaches and ransomware. Incidents are being reported. Ntt Communications the tokyo-based Telecommunications Service provider giant has disclosed that one of its servers was breached. A relatively small number of customers is so far. Thought to be little more than six hundred. The attack began in a Singapore cloud server from where the attackers moved to an internal server and then to an NT active directory server from which the data was taken the criminal proprietors of Net Walker. Ransomware have also been active. They've hit Michigan State University and given the administration until next Thursday. To Pony up the ransom. If the university doesn't come up with the ransom the amount of which isn't yet publicly known. The extortionist will release the sensitive data. They've stolen to show that they're in earnest. The gang has posted images of directories a passport scan and financial documents leaping computer reports zd net notes. That networker has recently been used against the Australian Logistics Company Toll Group and the Australian city of fights. Net Walker is a ransomware as a service operation. That's actively recruiting new affiliates and finally would have people been learning with respect to cybersecurity during the pandemic emergency as far as we can see. We're learning a great deal about improvisation under pressure and we're also learning that we can live without or at least work without we've been following the COVID pandemic since the cyber wire like many other businesses in our area move to remote work on March sixteenth. This was of course. Consistent with shelter in place guidance from public health authorities Maryland relaxes some of its public health guidelines today and this seems a good point to which to take stock of how the emergency has affected the cyber security sector while the pandemic and its effects are far from over its consequences for cybersecurity. Now seem clear enough. I to suggest some lessons. We might draw from the experience and it also seems to be the right time to roll our coverage of covid nineteen related news into our ordinary coverage of cybersecurity. We conclude this series with today's story. If there's one overarching observation to be made about the pandemic and its effects on cybersecurity. It's that improvisation under pressure creates unexpected challenges risks and opportunities. We'll have a final wrap up Monday with our plan. Final daily update on Kobe. Nineteen and its effects on the cyber security community until then enjoy the weekend and now a word from our sponsor plex track flex track is the ultimate purple teaming platform guiding the healthy collaboration of your red and blue teams through a single web based interface. Flex TRACK DOES THIS BY I. Elevating red teams eliminating the struggle of reporting and allowing the team to focus on. What's important identifying security issues read teams are provided with an easy to use platform that allows reports to be created and then exported with the click of a button saving the team valuable time flex track also powers up blue teams by providing them with a platform to consolidate findings and remediate them in an efficient and timely manner. Gone are the days of five hundred page penetration test reports as plex tracks streamlines. The process with a status tracker integrations with.
Russian agents have been hacking major email program, says NSA
"Russian military hackers are accused of hacking into a major email system a piece my grass he has details the National Security Agency issued an advisory Thursday warning that Russian military hackers have been infiltrating a major email server program since last August or earlier the NSA says the intrusions of the extra mail transfer agent have been carried out by the Russian military group known as sandworm that's the same hacking group that interfered in the twenty sixteen U. S. presidential election and carried out a twenty seventeen cyber attack targeting businesses that operate in Ukraine X. M. which is widely used mostly runs on unix type operating systems hi Mike
NSA: Russian agents have been hacking major email program
"Russian military hackers are accused of hacking into a major email system a piece my grass he has details the National Security Agency issued an advisory Thursday warning that Russian military hackers have been infiltrating a major email server program since last August or earlier the NSA says the intrusions of the extra mail transfer agent have been carried out by the Russian military group known as sandworm that's the same hacking group that interfered in the twenty sixteen U. S. presidential election and carried out a twenty seventeen cyber attack targeting businesses that operate in Ukraine X. M. which is widely used mostly runs on unix type operating
"us national security agency" Discussed on WBBM Newsradio
"Decency act section two thirty protects companies from being sued for potentially harmful or illegal content posted by its users so if the president gets his way and he winds up posting something that's potentially libelous or otherwise harmful the companies would be obligated to take it down to avoid a possible lawsuit if you're in the west get out the tank tops and get ready to crank the AC CBS news meteorologist Jeff beer deli more easy may hit ninety seven on Saturday in Billings Montana of all places forecast to reach ninety two on Sunday in total over forty eight record highs will be challenged through the weekend the US National Security Agency says the same Russian military hacking group that interfered in the twenty sixteen presidential election has been exploiting a major email server that's called axiom since last August or earlier this is CBS news you can listen to CBS news radio twenty four hours a day seven days a week on radio dot com or the radio dot com app download it today correspondent Pam culture with one way to catch a four legged criminal who doesn't like donuts they're irresistible to lots of us and bears that's how they got a black bear to stop wandering around fort Myers Florida it was lured into a trap with treats from Krispy Kreme and capped off by blueberry pie scented spray wildlife officials say the two hundred and fifty pound bear who likely weighs more after the doughnuts was probably roaming around to find a mate or food Pam Coulter CBS news American Airlines says it will cut its management and administrative staff.
"us national security agency" Discussed on Newsradio 830 WCCO
"Communications decency act section two thirty protects companies from being sued for potentially harmful or illegal content posted by its users so if the president gets his way and he winds up posting something that's potentially libelous or otherwise harmful the companies would be obligated to take it down to avoid a possible lawsuit if you're in the west get out the tank tops and get ready to crank the AC CBS news meteorologist Jeff beer deli more easy may hit ninety seven on Saturday in Billings Montana of all places forecast to reach ninety two on Sunday in total over forty eight record highs will be challenged through the weekend the US National Security Agency says the same Russian military hacking group that interfered in the twenty sixteen presidential election has been exploiting a major email server that's called axiom since last August or earlier this is CBS news you can listen to CBS news radio twenty four hours a day seven days a week on radio dot com or the radio dot com app download it today from downtown Minneapolis studios news talk eight three WCCO this is Minnesota's most trusted station for news I'm still Martin reporting from the Midwest of Saint Paul thick smoke choking the air as an auto parts store is set the blaze for the second straight night as the protest into day three after the death of George Floyd protesters have been fiercely turning their attention to Saint Paul since late this morning after a disastrous night in south Minneapolis last night I'm also hearing some flash bangs in the.
"us national security agency" Discussed on KXNT NewsRadio 840 AM
"Communications decency act section two thirty protects companies from being sued for potentially harmful or illegal content posted by its users so if the president gets his way and he winds up posting something that's potentially libelous or otherwise harmful the companies would be obligated to take it down to avoid a possible lawsuit if you're in the west get out the tank tops and get ready to crank the AC CBS news meteorologist Jeff beer deli more easy may hit ninety seven on Saturday in Billings Montana of all places forecast to reach ninety two on Sunday in total over forty eight record highs will be challenged through the weekend the US National Security Agency says the same Russian military hacking group that interfered in the twenty sixteen presidential election has been exploiting a major email server that's called axiom since last August or earlier this is CBS news you can listen to CBS news radio twenty four hours a day seven days a week on radio dot com or the radio dot com app downloaded today have you ever thought about saying goodbye to your job just walking into your boss and saying I quit and how would you like to commute to work without ever leaving your home well not long ago a thirty nine year old entrepreneur from a billionaire family spent twenty million dollars in three years to find the best home based business in North America he researched seventy different companies and when he found the only one that had a real long term potential he bought it and right now he's looking for people to help him turned this company into its next billion dollar success story so if you're serious about making money from home without having to leave your.
NSA: Russian agents have been hacking major email program
"Hi Mike Crossey reporting the NSA says Russian agents have been hacking of major email program the National Security Agency issued an advisory Thursday warning that Russian military hackers have been infiltrating a major email server program since last August or earlier the NSA says the intrusions of the ex the mail transfer agent have been carried out by the Russian military group known as sandworm that's the same hacking group that interfered in the twenty sixteen U. S. presidential election and carried out a twenty seventeen cyber attack targeting businesses that operate in Ukraine X. M. which is widely used mostly runs on unix type operating systems hi Mike Rossi up
Protesters rally as China proposes new security law in Hong Kong
"Hong Kong police firing volleys of tear gas in a popular shopping district as people took to the streets once again the March against China's proposed tough national security legislation that new law would allow mainland Chinese national security agencies to operate in the city for the first time would ban sedition secession and subversion against Beijing correspondent Anna Coren reports police have made clear they won't tolerate the protests multiple rounds have been fine the place behind me I just raise their signs saying that you can be arrested if you still congregating assign it went up a little bit earlier saying that they will use several thousand protesters continue to hit the streets in defiance though chanting Hong Kong independence the only way out while flying blue pro
Trump administration discussed conducting first U.S. nuclear test in decades
"Top trump administration officials reportedly considered ending a decades long moratorium on nuclear tests the topic reportedly surfaced this past week at a meeting of senior officials from the top national security agencies The Washington Post reports they discussed conducting what would be the first U. S. nuclear tests since nineteen ninety two the trump administration asserts that China and Russia have each resumed low level testing something both countries deny it appears the meeting ended with the decision to take other measures
Hong Kong opposition slams China national security law move
"In Hong Kong Pro Democracy lawmakers are blasting China's move to enact national security legislation. They believe this legislation could mark the end of the One Country. Two System Arrangement that has given Hong Kong semi autonomy. Since the end of British rule in nineteen ninety-seven the move by China emerged from this week's national legislative session and event that largely serves as a rubber stamp for what the Communist Party in Beijing wants to do. Cnn's Ivan Watson joins us from Hong Kong via skype and Ivan. I can you explain what this new legislation can actually mean for Hong Kong. I think it's important to stress. How different Hong Kong is from the rest of mainland China to people? Who may not know? It's the free as corner of the People's Republic of China and it was supposed to stay largely autonomous until two thousand forty seven and govern itself while being part of China so here the Internet isn't censored and the courts are independent of the political leadership and can rule against it. None of that exists in mainland China. And what the Communist Party has now announced is in the interest of national security. It is not going to dictate a whole series of laws and criminalize actions down here in Hong Kong with a heavy handed approach and a direct approach that it has never had until today. I mentioned the One Country Two System Arrangement I mean. Does this in effect then end that arrangement but certainly would hongkongers from the opposition and elected legislator who are critics of the Communist Party in mainland China? That's they're saying. This is the end of Hong Kong as we know it. And when you see. The list of what is proposed here which includes Criminalising treason secession in sedition against the Chinese government authorizing the National Security Agency of mainland China to set up offices down here in Hong Kong secret police. All of that suggests a very dramatic shift here and something that this city has never really seen in modern times. Is this retribution. For those democracy protests we've been seeing in Hong Kong over the last year the central government in China and the Hong Kong administrators. Who are by Beijing have been defending these new national security proposals arguing that the protests were a threat to national security in all of China. And thus they have to do this. There've been some caveats saying hey freedom of speech freedom assembly all those things that you have known they will be untouched. But if you've ever been in mainland China and seeing what a police state it is there and how any dissent is absolutely crushed very quickly. It's very clear that the national security rubric can be used as an excuse to almost stop anything in mainland China. So why wouldn't that be any different down here? All of this. All of these decisions are happening as we speak in real time. But I'm wondering how will this resonate in the region with the people? They are particularly in Hong Kong. There is alarmed for instance. One man I spoke with your. He runs a photo printing shop. He said this is taking us backwards and he. Also this is ominous. He said his WHATSAPP GROUP WITH HIS CHILDHOOD. Friends has completely dried up today in response to this now. Couple of points. Whatsapp doesn't exist in mainland China. The there's such censorship it also suggests that immediately ordinary people are worried that what they may message. Each Other presumably in privacy could be used against them in the future. What's next Ivan in this process? The opposition here is calling for protests which died down over the last five months as this city was dealing with the coronavirus pandemic and as the threat of that pandemic receded here. The old political divisions were starting to bubble up again. Beijing has shot a very strong shot across the bow here and recall that last year. You Up to two million people protesting against these types of measures. That's two out of every seven. Hong Kongers were out in opposition. That even if they manage to generate that kind of popular protests right now it does not seem like Xi Jinping. The ruler of China is
"us national security agency" Discussed on The CyberWire
"Zd net reports. That apple has disputed. The seriousness of the vulnerabilities zek OPS claimed it discovered when it saw them being exploited in the wild. It's the exploitation in the wild. That apple takes particular exception to Cupertino. Says it found no indications that the zero days pose any real threat to users apple does acknowledge the zero days and says they will be fixed in the next IOS release. Some researchers think Zack. Ops may have observed malformed emails and not militias exploitation of bugs. Zek says it intends to release more information on its discovery in the meantime naked security suggests that whatever else the bugs might be. They don't seem to be directly exploitable and so any risk is probably low. China says that biomedical organizations should be off limits to hacking the Wuhan Institute of Technology among organizations receiving the attention of hackers employees. Email accounts have been compromised. The South China Morning Post reports the level for research facility has been the subject of repeated speculation that Cova nineteen accidentally escaped from the labs there and did not originate in the city's wet markets. The speculation is surely a matter of legitimate inquiry especially given Beijing's less than transparent record during the pandemic but in some fringe quarters. Such speculation has reached the level of subjective certainty which is pretty clearly approaching chem trail territory. But it's fire is mid week report describing their recent look at. Apd thirty two has prompted a call from Beijing has writers says urging all nations to condemn any attack on an organization involved in working against the pandemic there surely substantial international sentiment for placing biomedical facilities in a protected category off limits to cyber attack the way the laws of armed conflict prohibit most deliberate attacks against hospitals. It's not clear however that abt thirty two. A threat actor associated with the Vietnamese government is engaged in destructive or disruptive Attacks Fire. I concluded the AP has been conducting intrusion campaigns against Chinese targets involved with responding to the pandemic especially China's Ministry of Emergency Management and the local government of John. These seemed to be more in the nature of espionage. Vietnam has denied any involvement telling Reuters at the accusations are baseless and arguably more menacing threat to hospitals is playing out in the Czech Republic which continues to look toward Russia as the source of recent cyber incidents in the nation's medical facilities tension between Prague and Moscow Continues Radio Free Europe Radio Liberty reports removal of a statue of Soviet Marshal Kanev who led the army group that drove through Czechoslovakia in nineteen forty five but who also crushed the Hungarian Revolution of Nineteen fifty-six and was instrumental in erecting. The Berlin Wall has given offense to Moscow so has renaming the street on which Russia's embassy is located in Prague in honor of former Russian Deputy Prime Minister Boris Nemtsov. The inveterate critic of President Putin was murdered outside the Kremlin in Twenty fifteen Moscow regards both access provocations on the Czech side. There's widespread outrage over cyber operations reconnaissance and battlespace preparation for the most part that affected healthcare facilities during the current pandemic. These activities increasingly looked like the work of Russian operators a researcher associated with Johns Hopkins University School of Advanced International Studies reports finding previously unremarked campaign. Nasar that use tools? The shadow brokers are believed to have obtained from the US National Security Agency and then leaked to threat actors. The name of the operations is a Farsi word and there's Farsi text associated with the operation but attribution remains murky. It would be premature to call Nasar an Iranian operation the US National Security Agency and the Australian Signals Directorate have issued joint guidance on detecting preventing web shell malware. Why take up web shells as the agency's explain? Web shells provide attackers with persistent access to a compromise network using communication channels disguised to blend in with legitimate traffic web shell. Malware is a long standing pervasive threat that continues to evade many security tools. The public guidance is another instance of five is intelligence services undertaking public outreach on cybersecurity domain tools this morning publish their own study of how the domains apparently devoted to the cause of reopening normal life in the US came to be and who registered them many of the sites a number of them with second amendment themes appear to domain tools to have been established by Aaron door a consultant who advises political movements on Advocacy Organization. Their use of a small set of common templates seem to derive from another political consultancy. One Click politics which further raised suspicion that the apparently local ostensibly grass roots sites were in fact. Astroturf domain tools emphasized in a conversation with us that one common feature on the ASTROTURF sites is a prominent and functioning donate button. This suggest to them that a non trivial goal of the operation is making money domain tools. Also suggested to areas that merit some attention. I deep fakes have been generally associated with fake audio or video content domain tools. Points out that one of the problems of astroturf being an influence operations generally is the production of useful content at scale. Sometimes this is done through. Plagiarism or repurposing sometimes and this is something domain tools noticed in connection with mister doors operation by having some loans to fight crank out a number of bylined pieces using the same byline does tend to blow the gaff but it happens. Domain tools suggests that deep learning tools can be adapted to rapidly produce good enough written content. In the service of influence this could involve impersonation of real persons or simply generate articles that could be attributed to various sock puppets. Second while most of the astroturf seems based domestically in the United States there are indications that a few of them may have infrastructure in Hong Kong. That's curious and deserves further. Investigation remember jokers stash their back. The karting market is offering a fresh batch of stolen paycard data the goods. This time are mostly card stolen from us. In South Korean USERS BANK INFO security says and finally Nintendo has confirmed that hackers gained access to about one hundred sixty thousand player accounts according to Z. Dina the attackers are thought to have abused legacy logging system intendo network ID and then ide- that remains in use to manage old we you or Nintendo Three D. S. accounts. What the hackers have done with the caper seems to indicate that petty mines are behind the whole thing. A lot of them are buying up fortnight in game currency. We KNOW WE KNOW IN GAME. Currency can be traded for things of real value. Used to launder illicit cash and so on but really or night.
Former Airman Reality Winner Seeks Prison Release Amid Pandemic
"News former National Security Agency contractor sentenced to federal prison for leaking classified government information is asking for a compassionate release due to the pandemic the attorney for reality Leigh winner says his client has pre existing conditions that make her a more susceptible to being infected with covert nineteen and the prison cannot protect her or follow social distancing guidelines she's serving a sentence of five years and three months in fort worth Texas for a single count of transmitting national security information when she worked at the National Security Agency office in
Kishore Mahbubani says COVID-19 won't stop China's rise
"These days for China there's been an economic slowdown a trade and technology war with America. One of the few issues of bipartisanship in today's Washington then there have been protests in Hong Kong global criticism of Beijing's treatment of the Muslim minorities not to mention Western anxiety about the role of Y in those five G. networks and don't forget the allegations of Chinese interference in sovereign states across the region. Add to this. The outbreak of corona virus or covered nineteen and silently some pundits and they mainly in the West. They're asking whether we're witnessing communist China's Chernobyl moment what do you think well one distinguished intellectual who profoundly disagrees with all this skepticism. He's my guest today. Kishore Mahbubani is distinguished fellow. The Asia Research Institute at the National University of Singapore a former ambassador to the UN twice and a former foreign secretary of Singapore case. Your has risen several influential books on Asia and the rise of China the lightest one is called has China won the Chinese challenge to American Promessi as published by public phase in New York Keisha. Welcome back between the lines. My pleasure there'd be back now you've heard all these. These dial warnings about China and as I say they mainly come from listeners. What do you disagree well? I think it's absolutely certain that the return of China to his place as the number one economy in the world cannot be stopped because from the year one to the eighteen twenty or eighteen hundred of the last two thousand years the two largest economies of the world were always those of China and India so the past two hundred years of Western domination award. History have been an aberration. All aberrations come to a natural end and China's return cannot be stopped. And that's absolutely set. You say in your book that if Xi Jingping does not put in place San Succession mechanisms. America could win this geopolitical contest and bear in mind just a couple years ago. She overturned legislation on. Term Limits for presidents essentially might himself later for life. Some of these critics say that. How does that promote good governance for China and a sound succession mechanism? That will allow China to Rosza Unabated well I would say that the history of China has taught them when they have strong central government. The people benefit a lot. When this week government they suffer a lot and you look at a hundred years of humiliation. That China's suffered from the first opium war of Eighteen. Forty two right until the establishment of the People's Republic of China in nineteen forty nine. The main reason why they went through one hundred years of humiliation was because they had weak central government so what Xi Jinping has given to China is once again very strong central government this is an asset for China. I think he's going to be around as Vita for a long time. And as long as he's around. I think China will do very well. Okay will you say that this geopolitical contest that's broken out between America and China? That will continue marathon. Rice does that mean that Beijing and Washington a doomed to confrontation. Well the the reason why. I'm producing my book now. Has China one his precisely because I want to avoid a confrontation in my. I think it's absolutely unnecessary for the United States and China to get entangled in this confrontation because at the end of the day the primary goal of the United States government is to improve the wellbeing of the American people than the best way to improve the well being of the American people especially in this call. The crisis is to work with China and not work against China but of course unfortunately the United States has other goal and is the primary goal of the United States is to maintain primacy in the global order. Then that will lead to confront To leading American proponents of containing China. John Shaw. The University of Chicago Have Stephen. Walt whom you quoted approvingly in your book about the perils of American Hubris and exceptionalism but on China I disagree. They say I've been guests on this program and I've made this point Measham and casual. They say that a rising China does indeed threaten the regional status quo and Washington moreover will and should go to great lengths to ensure that China does not dominate the Asia. Pacific your response. Well I think the question is whether or not they can both live with each other In the region if if the United States by the way you know all the countries in this region many of them one the United States will remain strong player in this region. I think it'd be good for the region to have United States. Remain as strong Leah. By United States can remain a strong player without on fronting China. He can remain a strong player by working with China In in in many critical areas. And frankly if you ask the countries in the region What they would like to see they would like to see a strong China and they would like to see a strong United States. But they don't want to be forced to choose within China and the United States and we'll get to this question about choosing later on in the show but I want to stick with America. There is a consensus in the region. That America should stay but Foreign Affairs magazine. This is the Distinguished New York Journal to Achieve. Contributed this month. It faces a range of top. Foreign Policy Thinkers. They're all weighing on whether or not the. Us is in the process of global retrenchment The cover of Australia's leading Foreign Affairs Journal. This month is is called can trust America So Am I right in saying you? Don't think American showing any signs of withdrawing from Asia. Now I see no signs at all America retreating from the region and And I think that very strong as you know policy in America is to some extent made by the president but is also made by the deep state and the deep state has a very strong consensus that they got to remain very strongly Industry region. So I don't see an American of withdraw anytime in the near future but I do I do argue that the United States has got to behave differently. With China net once had One tenth the size of China's of America's GNP retailers but today China's be GNP BB. Dems is bigger than the United States. So you behave differently. Was this animal. What about that? Animals DASA more assertive. Now in your book and you listening to Katia Mahbubani. We're chatting about his new book. Has China one in your new book as show you dedicate a chapter to the question is China expansionist and you say basically China wants to respect global rules and norms but let's face it. It has ignored the ruling from the UN's Permanent Court of Arbitration. That was at The Hague in two thousand sixteen. The high concluded for those of you listening who've forgotten about this this is four years ago. Chana's conduct around the Scarborough Shoal and the Spratly islands it was illegal and let's remember Beijing has continued to build up a military prisons on artificial Alan's at drive out local fishermen and in the last few months case. Short Sean has been bullying Indonesia over the Natuna islands. How is all this respecting global order? Well you know one point. I emphasize said there were people talk of benevolent. Great Powers Turn Benevolent Grid. Power is an oxymoron. So as you know the United States today has not ratified the law. The Sea Convention. So in in some areas as China emerged behaving exactly the United States. The United States would never accept going to a tribunal to judge whether or not the United States valid or invalid claiming any area in that respect. China is behaving like the United States by just as the United States. Most of the time respects most international rules and conventions China. Also most of the time respects most of international rules in confections in many ways. China's behavior and America's behaviour is very similar in the international arena. Your critics would say that. China's maritime climbs a contested by the Philippines Malaysia Brunei Indonesia Vietnam Beijing has antagonized nations log New Zealand Australia with cyber attacks and and political interference. Nightside casual these. Not Diplomatic Wins for president. She hasn't he made some big mistakes. Well I it's it's it's interesting. It's always the rest. That is screaming very loud on this South China Sea When was the last time you heard a very strong statement from militia All of all of Philippines On the South China Sea. Why you're seeing behind. What is happening behind the scenes is a lot of diplomacy that is not reported in the Western media. Now I cannot comment on the side of the tax on Shelia and New Zealand but I I believe it was Edward Snowden revealed to us that if you live in today's world you can assume that anything you put up. There is being monitored completely by the National Security Agency of the United States. So I think what the world needs is new conventions in the cyber area and the world should work together do agree on some set of rules for what you can or cannot do in terms of cyber hacking spoke with the New Zealand professor. Anne Marie Bridie last week on this program and she told us about three investigations into Chinese interference in politics that a currently underway in New Zealand. But we WANNA go there now and finished your point. I was quite struck by a law in in your book. He sure well. You talked about the Chinese reluctance to conquer Australia quote. Future historians will marvel at the fact that even though Australia is geographically close to China. It was physically. It was physically occupied in conquered by far more distant British forces absolutely true. I mean if China was an expansionist power wrenching. Her travel all the way to Africa. He could have easily gone to Australia. Additional Australia. Remarkable accident of history. That Australia was colonized by British forces than not Chinese. I mean future. Historians will marvel. The anomaly visits Tom Switzer. On our in 'em I guess is Keisha Mahbubani the former foreign secretary of Singapore and President of the UN Security Council. He's now a distinguished fellow at the National University of Singapore. We're talking about his new book. Has China one now for some of Iran's listeners in Venice Matas whether your overstating China's rise and I WANNA put to you this very rule weakness in limitation surely because many analysts They argue that there's a ticking bomb in China it's low birthright and the aging population and this is the argument that will reduce the workforce and could potentially break social security system. How would you respond to those critics? Oh that's absolutely no question. That China faces a lot of serious Internal Challenges. Because you know it is to instill a developing country It's CABBIE DYING IF I get it right. It's still about ten thousand dollars. One-sixth debt of the United States has a long way to go before it becomes fully developed country. And that's precisely why China wants to focus on its internal development and not get dragged into an all-out geopolitical contests with the United States. So you notice that China wherever possible is trying to avoid getting entangled with the United States even though the United States clearly is challenging the United States challenging the United States charging China In many
"us national security agency" Discussed on The CyberWire
"For Isis specifically according to ZD net. He's alleged to have been working on a gentle Lennox destroy intended to help the terrorist organization. Better handle their multimedia propaganda accounts he also wrote a python script facilitate sharing isis propaganda on social media. At least two of his online isis contacts turned out to be undercover. FBI agents cyber scoop noted that owes a dense Ke's linked in page indicated that he had worked at blackberry silence for two months as a software tester. This doesn't seem to be the case however a blackberry silence spokesperson said that according to our records this individual has never been an employee or contractor for silence and finally the US National Security Agency issued shooting advisory offering advice for enterprises that implement transport layer security inspection or t l SL organizations use. T. Lsi to decrypt trip traffic. That enters or exits their corporate network. So the traffic can be inspected before being sent on to its destination. The process is meant to prevent the infiltration of malware or the exfiltration of sensitive data as well as identify encrypted command and control channels however an essay notes that T. LSI brings risks of. Its own if it's not implemented properly the agency recommends that T- LSI only be performed once within an organization and the device that performs arms. The decrypt should be isolated and well protected organizations should monitor and analyze their logs to identify insider threats and misrouted traffic and they should use T.. LSI products that are validated by the National Information Assurance Partnership. It's time to take a moment to tell you about. Our sponsor recorded future recorded. Future is the real time threat. Intelligence Company whose patented technology continuously analyzes analyzes the entire web develop information security intelligence gives analyst unmatched insight into emerging threats and when analytical talent is as scarce scarce and Pricey as. It is today. Every enterprise can benefit from technology that makes your security teams more productive than ever. We here at the cyber wire have long long been subscribers to recorded future cyber daily and if it helps us we're confident it will help you to subscribe today and stay a step or two ahead of the threat. Go recorded future dot com slash cyber wire to subscribe for free threat intelligence updates from recorded future. That's recorded future dot com slash cyber wire and we thank recorded future for sponsoring our show.
"us national security agency" Discussed on WNYC 93.9 FM
"A young man. He says China was a poor country with few options. And so joining the PLA was a good career choice. Well, I mean the perception is that walkway is connected with the fears that they may use while way as an instrument. Do you think it's connected any company and China, especially large companies are of course, that there was a indefens- with the Chinese government? I mean in China the favorite saying for many, many decades Guan see, you know, this relationship is very important. Andrew long does not deny there is a relationship. However, he believes if hallway with too. Heavily dependent upon the Chinese state. Then it would have been impossible to have achieved the phenomenal success that it has. Of course, they're all relationships with the government. But this is a company controlled by the staff, and you look at how they had been behaving joining the past couple of decades, and they they will not have one so much customer such large market. I mean, that's inconceivable. Remember, those back doors spying goes both ways. Back in twenty ten while the United States made the public case about the dangers of buying from hallway classified documents showed that the US national security agency, the NSA engaged in a secret operation. Call short giant breaking into walkways headquarters in all to find out any back goals. The.
"us national security agency" Discussed on No Agenda
"I'm john of san francisco bay you're actually right there right where he's talking about yeah i see nothing explain that spain explain it explain fahey member the uh the really under reported story about the nsa tools being stolen and the there's still not even sure if it was from the inside of the agency your hackers who got in from the outside was a new york times report eminem noone discuss this but us and the new york times uh now a former us national security agency contractor has agreed to plead guilty knuckle sure why they worded that way but okay all right then i'll plead guilty to stealing classified information but not just classified information he had been seed spent up to twenty years stealing highly sensitive government material from us intelligence community related to national defence collecting a trove of secrets he hoarded at his home and glenn bernie maryland ages though horter fifty terabytes of data they got that's a that's quite a horde holy moley fifty terabytes aim and guess where the it was a contractor would company did he worked for dues alan whose allen you nailed which meets union as listened to your phone columns fantasy is looking out for you best riotous as a provider i'm sorry but they just use the guy's a backup provide provider as a cloud art guy effect i'm gonna call you the cloud from now on the glass the cloud john see where the sea stands for plow divorce because that one s right which iran update.
"us national security agency" Discussed on KFI AM 640
"Feel at my brother be sarah last night i didn't feel it either by almost forty thousand people dead needed last about ten seconds i'm scared yeah it's on hayward fault faultline that they call it the sleeping giant we had a major quake six point eight back and eighteen sixty eight so scientists still tell you we're overdue and i just read it's a hundred times more populated than it was back in eighteen sixty eight and look at all the infrastructure so we had a seven point now a shallow quake where you'll feel if this one michelle though about seven point six miles yeah yeah um i it'd be concerned but i doubt that's all we need with so see what happens in two thousand eighteen cal thank you it immediate range missile launched by north korea last april crashed into a north korean city there were explosions and there were casualties a former us national security agency contractor is going to plead guilty to stealing classified documents in the largest theft of secret information in history is dave harold martin scheduled to plead guilty to one count of willful retention of national defense information in a court in baltimore the private sector jobs surged in december because of a strong holiday shopping season companies hired more workers companies hired two hundred and fifty thousand new workers to close out the year catherine austin fits registered investment adviser with us catherine that's pretty good news her while currently stronger than expected i think you know we added about two million jobs last year george and if you look at what was expected at the beginning of the year with certainly stronger was gonna be even more interesting is tax reform means repatriation of a lot of cash and the question is will uh we'll corporations be hiring so uh i think the next year could be even better if things go well without repatriation let the stock market still stayed strong even though some people think the bubble will get what do you think well there's no doubt the stock market is at really new level part of it is we seen a permanent increase or it looks like a permanent increase in corporate margins and corporate market share of the gnp and that's part of with.
"us national security agency" Discussed on WHO NewsRadio 1040 AM
"Was a magnitude three point nine that occurred around midnight west coast time about five miles for mount st helens it was felt in portland but no reported injuries and now they're concerned about california let's check in with khoury the author of the mando predicts earthquakes about the late jim brooklyn cafe get scared in california is that justified every parkway is is a justified they're getting scared in california well he's south 'cause i didn't feel that my brother is last night i didn't feel it either by almost forty thousand people did i needed it lasted about ten seconds i'm scared yeah it's on hayward as we age so scientists still tell you we're overdue and i just read it's a hundred times more populated they don't one yates so scientists still tell you we're overdue and i just read it's a hundred times more populated they don't was back in eighteen sixty eight and look at all them for structured so if we had a seven point now a shallow quake where you'll feel if this one michelle though about seven point six miles yeah yeah um i would be concerned with ties to hot here we go that's all we need let's see what happens in two thousand eighteen cal thank you intermediate range missile launch by north korea last april crashed into a north korean city there were explosions and there were casualties a former us national security agency contractor is going to plead guilty to stealing classified documents in the largest theft of secret information in history is names harold martin scheduled to plead guilty to one count of willful retention of national defense information in a court in baltimore the private sector jobs surged in december because of a strong holiday shopping season companies hired more workers companies hired to two hundred fifty thousand new workers to close out.
"us national security agency" Discussed on KYW Newsradio 1060
"Hospital computer systems across england it's an international attack in a number of countries and organisations of these two hundred thousand victims in one hundred fifty countries hit with a cyber extortion attack spain's telephone system in the us fedex was hit the ransomware is called wannacry takes advantage over the microsoft windows created for the us national security agency spot bush stolen over which is unprecedented of local charter bus has crashed on i ninety five in maryland duties charles nephew henri school in west mountaineering were heading south a card tragic past their chartered bus you have to grace had cut the bus or click the car were tipped over one of the victims of fourteen year old girl who had been thrown twenty feet from the bus into the woods on the shoulder head injuries broken varying a bus filled with philadelphia police personnel was in that caravan and stop to offer assistance right i guess yes well fargo bank over what a cringes discriminatory legend pretty significant disparities between after america's ripe tomatoes and wife stay says it will vigorously defend its record as a fair and responsible land dismissed questions about reports that the sheer classified information with russian officials during their visit at the white house we are very successful legal to liberals.