recentpopularlog in

jerryking : nsa   53

Quantum Computing Will Reshape Digital Battlefield, Says Former NSA Director Hayden - CIO Journal. - WSJ
Jun 27, 2018 | WSJ | By Jennifer Strong.

In the ongoing battle between law enforcement and Apple Inc. over whether the company should assist the government in cracking into iPhones, Mr. Hayden says it “surprised a lot of folks that people like me generally side with Apple” and its CEO Tim Cook.

Do you believe there’s a deterrence failure when it comes to cyber threats?

Yes, and it’s been really interesting watching this debate take shape. I’m hearing folks who think we should be more aggressive using our offensive cyber power for defensive purposes. Now that’s not been national policy. We have not tried to dissuade other countries from attacking us digitally by attacking them digitally.

What are your current thoughts on quantum encryption or quantum codebreaking?

When machine guns arrived it clearly favored the defense. When tanks arrived? That favored the offense. One of the tragedies of military history is that you’ve got people making decisions who have not realized that the geometry of the battlefield has changed because of new weapons. And so you have the horrendous casualties in World War I and then you’ve got the French prepared to fight World War I again and German armor skirts the Maginot Line. Now I don’t know whether quantum computing will inherently favor the offense or inherently favor the defense, when it comes to encryption, security, espionage and so on, but I do know it’s going to affect something.

What other emerging technologies are you watching?

Henry Kissinger wrote an article about this recently in which he warned against our infatuation with data and artificial intelligence. We can’t let data crowd out wisdom. And so when I talk to people in the intelligence community who are going all out for big data and AI and algorithms I say, “you really do need somebody in there somewhere who understands Lebanese history, or the history of Islam.”
Michael_Hayden  codebreaking  security_&_intelligence  quantum_computing  NSA  Apple  cyber_security  encryption  cyber_warfare  Henry_Kissinger  wisdom  national_strategies  offensive_tactics  defensive_tactics 
june 2018 by jerryking
Cyberattacks Put Russian Fingers on the Switch at Power Plants, U.S. Says
MARCH 15, 2018 | The New York Times | By NICOLE PERLROTH and DAVID E. SANGER.

The Trump administration accused Russia on Thursday of engineering a series of cyberattacks that targeted American and European nuclear power plants and water and electric systems, and could have sabotaged or shut power plants off at will.....Russian hacks had taken an aggressive turn. The attacks were no longer aimed at intelligence gathering, but at potentially sabotaging or shutting down plant operations.....Though a major step toward deterrence, publicly naming countries accused of cyberattacks still is unlikely to shame them into stopping. The United States is struggling to come up with proportionate responses to the wide variety of cyberespionage, vandalism and outright attacks.
Russia  security_&_intelligence  cyberattacks  vandalism  cyber_security  power_grid  infrastructure  NSA  vulnerabilities  hackers  U.S._Cyber_Command  David_Sanger  cyberphysical  physical_world 
march 2018 by jerryking
Security Breach and Spilled Secrets Have Shaken the N.S.A. to Its Core
NOV. 12, 2017 | The New York Times | By SCOTT SHANE, NICOLE PERLROTH and DAVID E. SANGER.

“These leaks have been incredibly damaging to our intelligence and cyber capabilities,” said Leon E. Panetta, the former defense secretary and director of the Central Intelligence Agency. “The fundamental purpose of intelligence is to be able to effectively penetrate our adversaries in order to gather vital intelligence. By its very nature, that only works if secrecy is maintained and our codes are protected.”
adversaries  data_breaches  hacking  vulnerabilities  counterintelligence  counterespionage  moles  malware  ransomware  Fedex  Mondelez  Edward_Snowden  security_&_intelligence  Russia  Leon_Panetta  NSA  cyber_security  cyber_warfare  cyberweapons  tools  David_Sanger  SecDef  CIA 
november 2017 by jerryking
Hacks Raise Fear Over N.S.A.’s Hold on Cyberweapons - The New York Times
By NICOLE PERLROTH and DAVID E. SANGER JUNE 28, 2017

The Petya ransomware attack....was built on cyberweapons (i.e. hacking tools that exploited vulnerabilities in Microsoft software) stolen from the NSA in 2016 by Shadow Brokers and made public in April 2017. Now those weapons are being deployed against various U.S. partners include the United Kingdom and Ukraine.....there is growing concern that United States intelligence agencies have rushed to create digital weapons that they cannot keep safe from adversaries or disable once they fall into the wrong hands..... the government “employs a disciplined, high-level interagency decision-making process for disclosure of known vulnerabilities” in software, “unlike any other country in the world.”....Officials fret that the potential damage from the Shadow Brokers leaks could go much further, and the agency’s own weaponry could be used to destroy critical infrastructure in allied nations or in the United States.

“Whether it’s North Korea, Russia, China, Iran or ISIS, almost all of the flash points out there now involve a cyber element,” Leon E. Panetta, the former defense secretary and Central Intelligence Agency chief.....viruses can suddenly mutate into other areas you didn’t intend, more and more,” Mr. Panetta said. “That’s the threat we’re going to face in the near future.”..... ransomware that recently gained the most attention in the Ukraine attack is believed to have been a smoke screen for a deeper assault aimed at destroying victims’ computers entirely. .....Mr. Panetta was among the officials warning years ago of a “cyber Pearl Harbor” that could bring down the American power grid. But he and others never imagined that those same enemies might use the N.S.A.’s own cyberweapons.....rogue actors actors, like North Korea and segments of the Islamic State, who have access to N.S.A. tools who don’t care about economic and other ties between nation states,”.....So long as flaws in computer code exist to create openings for digital weapons and spy tools, security experts say, the N.S.A. is not likely to stop hoarding software vulnerabilities any time soon.
adversaries  CIA  computer_viruses  cyberattacks  cyberthreats  cyberweapons  David_Sanger  exploits  hackers  Leon_Panetta  malware  NSA  North_Korea  Pentagon  power_grid  ransomware  rogue_actors  security_&_intelligence  SecDef  vulnerabilities 
june 2017 by jerryking
U.S. Cyberweapons, Used Against Iran and North Korea, Are a Disappointment Against ISIS - The New York Times
By DAVID E. SANGER and ERIC SCHMITT JUNE 12, 2017.

In 2016, U.S. cyberwarriors began training their arsenal of cyberweapons on a more elusive target, internet use by the Islamic State. Thus far, the results have been a consistent disappointment......The effectiveness of the nation’s arsenal of cyberweapons hit its limits against an enemy that exploits the internet largely to recruit, spread propaganda and use encrypted communications, all of which can be quickly reconstituted after American “mission teams” freeze their computers or manipulate their data..... the U.S. is rethinking how cyberwarfare techniques, first designed for fixed targets like nuclear facilities, must be refashioned to fight terrorist groups that are becoming more adept at turning the web into a weapon......one of the rare successes against the Islamic State belongs at least in part to Israel, which was America’s partner in the attacks against Iran’s nuclear facilities. Top Israeli cyberoperators penetrated a small cell of extremist bombmakers in Syria months ago, the officials said. That was how the United States learned that the terrorist group was working to make explosives that fooled airport X-ray machines and other screening by looking exactly like batteries for laptop computers......ISIS' agenda and tactics make it a particularly tough foe for cyberwarfare. The jihadists use computers and social media not to develop or launch weapons systems but to recruit, raise money and coordinate future attacks.

Such activity is not tied to a single place, as Iran’s centrifuges were, and the militants can take advantage of remarkably advanced, low-cost encryption technologies. The Islamic State, officials said, has made tremendous use of Telegram, an encrypted messaging system developed largely in Germany......disruptions often require fighters to move to less secure communications, making them more vulnerable. Yet because the Islamic State fighters are so mobile, and their equipment relatively commonplace, reconstituting communications and putting material up on new servers are not difficult.
ISIS  NSA  security_&_intelligence  disappointment  Israel  encryption  disruption  London  London_Bridge  tools  cyber_security  cyberweapons  vulnerabilities  terrorism  Pentagon  U.S._Cyber_Command  campaigns  David_Sanger 
june 2017 by jerryking
Hackers Hit Dozens of Countries Exploiting Stolen N.S.A. Tool
MAY 12, 2017 | - The New York Times | By NICOLE PERLROTH and DAVID E. SANGER.

Hackers exploiting malicious software stolen from the National Security Agency executed damaging cyberattacks on Friday that hit dozens of countries worldwide, forcing Britain’s public health system to send patients away, freezing computers at Russia’s Interior Ministry and wreaking havoc on tens of thousands of computers elsewhere.....The attacks appeared to be the largest ransomware assault on record, but the scope of the damage was hard to measure. It was not clear if victims were paying the ransom, which began at about $300 to unlock individual computers, or even if those who did pay would regain access to their data.

Security experts described the attacks as the digital equivalent of a perfect storm. They began with a simple phishing email, similar to the one Russian hackers used in the attacks on the Democratic National Committee and other targets last year. They then quickly spread through victims’ systems using a hacking method that the N.S.A. is believed to have developed as part of its arsenal of cyberweapons. And finally they encrypted the computer systems of the victims, locking them out of critical data, including patient records in Britain.
tools  cyber_security  cyberweapons  cyberattacks  vulnerabilities  malware  Microsoft  ransomware  hackers  NSA  exploits  blackmail  David_Sanger 
may 2017 by jerryking
U.S. Directs Cyberweapons at ISIS for First Time - The New York Times
APRIL 24, 2016 | NYT | By DAVID E. SANGER.

The United States has opened a new line of combat against the Islamic State, directing the military’s six-year-old Cyber Command for the first time to mount computer-network attacks that are now being used alongside more traditional weapons....The NSA, which specializes in electronic surveillance, has for years listened intensely to the militants of the Islamic State, and those reports are often part of the president’s daily intelligence briefing. But the N.S.A.’s military counterpart, Cyber Command, was focused largely on Russia, China, Iran and North Korea — where cyberattacks on the United States most frequently originate — and had run virtually no operations against what has become the most dangerous terrorist organization in the world...The goal of the new campaign is to disrupt the ability of the Islamic State to spread its message, attract new adherents, circulate orders from commanders and carry out day-to-day functions, like paying its fighters....The N.S.A. has spent years penetrating foreign networks — the Chinese military, Russian submarine communications, Internet traffic and other targets — placing thousands of “implants” in those networks to allow it to listen in.

But those implants can be used to manipulate data or to shut a network down. That frequently leads to a battle between the N.S.A. civilians — who know that to make use of an implant is to blow its cover — and the military operators who want to strike back. N.S.A. officials complained that once the implants were used to attack, the Islamic State militants would stop the use of a communications channel and perhaps start one that was harder to find, penetrate or de-encrypt.
ISIS  cyber_warfare  NSA  security_&_intelligence  terrorism  cyberweapons  exploits  hackers  software_bugs  vulnerabilities  Pentagon  U.S._Cyber_Command  campaigns  David_Sanger 
april 2016 by jerryking
NSA may be putting Israeli security interests above U.S., new document reveals - World Israel News | Haaretz
By Haaretz | May 15, 2014

Greenwald, who published many of Snowden's revelations over the last year, released his book "No Place to Hide" on Wednesday. Concurrently with the release of the book, Greenwald made public slides that Snowden obtained from the NSA. One of them deals with intelligence relations with Israel.

"Balancing the SIGINT exchange equally between U.S. and Israeli needs has been a constant challenge in the last decade; it arguably tilted heavily in favor of Israeli security concerns. 9/11 came, and went, with NSA's only true Third Party CT relationship being driven almost totally by the needs of the partner," one slide reads.

Another slide states, "The Israelis are extraordinarily good SIGINT partners for us, but … they target us to learn our positions on Middle East problems. A NIE [National Intelligence Estimate] ranked them as the third most aggressive intelligence service against the U.S."

These statements imply that the NSA is providing Israel with information much more than Israel is providing the United States with information.
NSA  Israel  security_&_intelligence  sigint  Glenn_Greenwald 
may 2014 by jerryking
Eyes Everywhere
Autumn 2013 | University of Toronto Magazine |By Scott Anderson
NSA  security_&_intelligence  uToronto  CSE  surveillance  sigint 
november 2013 by jerryking
Canadian embassies eavesdrop, leak says - The Globe and Mail
COLIN FREEZE

The Globe and Mail

Published Tuesday, Oct. 29 2013

In 1995, former CSEC employee Mike Frost wrote in his memoir, Spyworld, that he set up “listening posts” at Canadian embassies. His book says CSEC signals intelligence technicians during the Cold War were funded and mentored by NSA counterparts who taught them how to conceal a piece of spy machinery inside what appeared to be an office safe.
CSE  sigint  security_&_intelligence  NSA  Five_Eyes  diplomacy  espionage  eavesdropping  books  memoirs 
october 2013 by jerryking
Asian countries demand answers over reports of spying from embassies
Oct. 31 2013 | The Globe and Mail |

A document from National Security Agency leaker Edward Snowden, published this week by German magazine Der Spiegel, describes a signals intelligence program called “Stateroom” in which U.S., British, Australian and Canadian embassies secretly house surveillance equipment to collect electronic communications. Those countries, along with New Zealand, have an intelligence-sharing agreement known as “Five Eyes.”
NSA  diplomacy  Asian  Australia  New_Zealand  Edward_Snowden  sigint  security_&_intelligence  Five_Eyes 
october 2013 by jerryking
Spying Known at Top Levels, Officials Say - NYTimes.com
October 29, 2013 | NYT | By MARK LANDLER and MICHAEL S. SCHMIDT.

Mr. Clapper and the agency’s director, Gen. Keith B. Alexander, vigorously rejected suggestions that the agency was a rogue institution, trawling for information on ordinary citizens and leaders of America’s closest allies, without the knowledge of its Washington overseers.

Their testimony came amid mounting questions about how the N.S.A. collects information overseas, with Republicans and Democrats calling for a congressional review, lawmakers introducing a bill that would curb its activities and Mr. Obama poised to impose his own constraints, particularly on monitoring the leaders of friendly nations. At the same time, current and former American intelligence officials say there is a growing sense of anger with the White House for what they see as attempts to pin the blame for the controversy squarely on them.

General Alexander said news media reports that the N.S.A. had vacuumed up tens of millions of telephone calls in France, Italy and Spain were “completely false.” That data, he said, is at least partly collected by the intelligence services of those countries and provided to the N.S.A.

Still, both he and Mr. Clapper said that spying on foreign leaders — even those of allies — was a basic tenet of intelligence tradecraft and had gone on for decades. European countries, Mr. Clapper said, routinely seek to listen in on the conversations of American leaders.
security_&_intelligence  espionage  Europe  sigint  NSA  leaders  eavesdropping  spymasters  James_Clapper  spycraft 
october 2013 by jerryking
Obama calls Hollande as U.S. spy scandal widens to include France - The Globe and Mail
DEB RIECHMANN and KIMBERLY DOZIER

WASHINGTON — The Associated Press

Published Monday, Oct. 21 2013,

U.S. President Barack Obama called French President François Hollande on Monday and discussed France’s anger over reported aggressive surveillance tactics by the National Security Agency...Keeping tabs on allies is classic spy craft but the sweep and scope of the NSA program have irritated Germany, Britain, Brazil, and most recently Mexico and France....The report in Le Monde, co-written by Glenn Greenwald, who originally revealed the surveillance program based on leaks from former NSA contractor Edward Snowden, found that when certain numbers were used, the conversations were automatically recorded. The surveillance operation also swept up text messages based on key words, Le Monde reported, based on records from Dec. 10 to Jan 7.

The French government, which wants the surveillance to cease, also renewed demands for talks on protection of personal data.
Obama  espionage  security_&_intelligence  NSA  sigint  France  French  surveillance  spycraft  eavesdropping 
october 2013 by jerryking
L. Gordon Crovitz: White Hats vs. Black Hats - WSJ.com
August 4, 2013 | WSJ | By L. GORDON CROVITZ.

The NSA says 42 terror-related plots have been disrupted, thanks to its surveillance program.

In the language of computer hacking, the good guys are "white hats," who identify weaknesses in systems so they can be fixed. "Black hats" are the ones who take advantage of weaknesses in systems.......A white-hat hacker would point out what happens when intelligence agencies fail to monitor communications data. Gen. Alexander pointed out that the 9/11 plots succeeded because of avoidable intelligence failures, citing the example of an intercept of a phone call from Yemen involving one of the 9/11 hijackers. "We didn't have the tools and capabilities to see that he was actually in California," Gen. Alexander said. "The intelligence community failed to connect those dots."
black_hats  NSA  security_&_intelligence  surveillance  9/11  privacy  L._Gordon_Crovtiz  terrorism  U.S._Cyber_Command  connecting_the_dots  white_hats 
august 2013 by jerryking
Evidence of Huawei Spying, Former Intelligence Chief Says
July 19, 2013 | By REUTERS

Michael Hayden, also the former head of the U.S. National Security Agency (NSA), said in an interview with the paper that Huawei had "shared with the Chinese state intimate and extensive knowledge of the foreign telecommunications systems it is involved with".

"I think that goes without saying," he was quoted as saying.
espionage  China  Huawei  cyber_security  security_&_intelligence  spymasters  telecommunications  Michael_Hayden  NSA 
july 2013 by jerryking
Snowden's Questionable New Turn - NYTimes.com
June 17, 2013, 4:02 pm 52 Comments
Snowden’s Questionable New Turn
By DAVID FIRESTONE
NSA  whistleblowing  security_&_intelligence  sigint  espionage  Edward_Snowden 
june 2013 by jerryking
The Solitary Leaker - NYTimes.com
By DAVID BROOKS
Published: June 10, 2013

If you live a life unshaped by the mediating institutions of civil society, perhaps it makes sense to see the world a certain way: Life is not embedded in a series of gently gradated authoritative structures: family, neighborhood, religious group, state, nation and world. Instead, it’s just the solitary naked individual and the gigantic and menacing state.

This lens makes you more likely to share the distinct strands of libertarianism that are blossoming in this fragmenting age: the deep suspicion of authority, the strong belief that hierarchies and organizations are suspect, the fervent devotion to transparency, the assumption that individual preference should be supreme. You’re more likely to donate to the Ron Paul for president campaign, as Snowden did.
NSA  David_Brooks  security_&_intelligence  wiretaps  eavesdropping  libertarians  whistleblowing 
june 2013 by jerryking
Sharpen those little grey cells
October 3, 2001 |Globe & Mail | By WESLEY WARK.
Canada can‘t join the war on terrorism or protect itself unless we upgrade our intelligence capabilities, says international security analyst....And Ottawa must create a Canadian foreign intelligence service, similar to the CIA or Britain‘s Secret Intelligence Service, the SIS. Canada is the only G8 nation without such a service. This hampers our ability to understand foreign developments, and to contribute meaningfully to any global war on terrorism. At the moment, the Canadian Security Intelligence Service (CSIS) has a limited mandate for foreign-intelligence collection, is tied up in red tape and hamstrung by lack of resources and expertise. As we debate the creation of a Canadian secret service, we must decide whether CSIS is the appropriate body to take on this difficult mission.

The most secretive institution in the Canadian security and intelligence community is the Communications Security Establishment (CSE), a bland title that hides an institution responsible for foreign-communications intelligence and the protection of government-communications networks. It will need more resources and a significant technological upgrade to operate at the same level as its sister organizations, the National Security Agency in the United States and GCHQ (Government Communications Headquarters) in the United Kingdom.
security_&_intelligence  CSIS  Wesley_Wark  9/11  CSE  self-protection  sigint  GCHQ  NSA  intelligence_analysts 
july 2012 by jerryking
n+1: Leave Your Cellphone at Home
26 April 2012
Science and Technology
Sarah Resnick
privacy  security_&_intelligence  NSA 
may 2012 by jerryking
U.S. Probe Ties Chinese Cyberspying to Military - WSJ.com
December 13, 2011 | WSJ |By SIOBHAN GORMAN.
U.S. Homes In on China Spying
Probe Pinpoints Groups of Hackers and Ties Most to Military; Officials Prepare to Confront Beijing
cyber_warfare  China  hackers  PLA  NSA  security_&_intelligence  espionage 
april 2012 by jerryking
U.S. Probe Ties Chinese Cyberspying to Military - WSJ.com
DECEMBER 13, 2011 | WSJ | By SIOBHAN GORMAN

U.S. Homes In on China Spying
Probe Pinpoints Groups of Hackers and Ties Most to Military; Officials Prepare to Confront Beijing
espionage  cyber_warfare  China  NSA  hackers  security_&_intelligence 
december 2011 by jerryking
Leak Offers Look at Efforts by U.S. to Spy on Israel - NYTimes.com
Sept. 5, 2011 | NYT | By SCOTT SHANE. Shamai Leibowitz, an FBI
translator, sentenced to 20 mths in prison last yr. for leaking
classified info. to a blogger. The info. detailed concerns re.Israel’s
efforts to influence Congress & public opinion, & fears that
Israel might strike nuclear facilities in Iran...While the U.S. govt.
routinely eavesdrops on some embassies inside the U.S., intelligence
collection against allies is always politically delicate, especially one
as close as Israel...The FBI listens in on foreign embassies &
officials in the U.S. chiefly to track foreign spies, though any
intelligence it obtains on other matters is passed on to the CIA &
other agencies. The intercepts are carried out by the FBI’s Operational
Tech. Division, according to Matthew Aid, a writer who describes the
monitoring in a book, “Intel Wars,” to be published in January...Treated
as highly classified by the FBI, the fact that the U.S. spies on Israel
is taken for granted by intelligence experts.
espionage  security_&_intelligence  Israeli  CIA  FBI  NSA  translations  intercepts  Israel  eavesdropping  books  covert_operations  wiretaps 
september 2011 by jerryking

Copy this bookmark:





to read