Archive for March, 2017

NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist – Foreign Policy (blog)


Foreign Policy (blog)
NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist
Foreign Policy (blog)
While the NSA, America's premier spy agency, has far greater insight into North Korean cyber operations than private security firms, Ledgett's remarks studiously avoided any reference to what evidence the agency has collected on the Bangladeshi heist.
Top NSA official suggests North Korea behind Bangladesh Bank heistDhaka Tribune
US Preparing Cases Linking North Korea to Theft at NY FedWall Street Journal

all 29 news articles »

Go here to read the rest:
NSA Official Suggests North Korea Was Culprit in Bangladesh Bank Heist - Foreign Policy (blog)

‘Unmasking,’ FISA and other terms to help you understand the wiretapping story – CNN

Whether the topic is ex-national security adviser Michael Flynn's leaked contacts with Russian Ambassador to the US Sergey Kislyak, Trump's unsubstantiated claim that former President Barack Obama wiretapped Trump Tower or House Intelligence Committee Chairman Devin Nunes' recent pronouncement that some of Trump's communications may have been swept up, to understand the story, one must understand the terms involved.

The National Security Agency, or NSA, is a US intelligence organization primarily tasked with the collection and analysis of foreign signals intelligence -- communications, generally through electronic means, be it a phone call, an email or something else entirely. This can also include metadata -- the information about the communications themselves -- like when, where and to whom a message is sent or received.

The NSA's mandate is to deal with foreign intelligence targets, like militants overseas or members of another government.

It is headquartered in Maryland, but its presence is felt globally, scooping up and processing information from people located virtually anywhere.

Its activities are covert, wide-ranging and linked to any number of US security efforts.

NSA has wide discretion to conduct surveillance on people outside of the US, but there are supposed to be legal barriers to snooping on US citizens. If the NSA picks up communications from a US citizen in the course of monitoring a foreign national, it is practice to "mask" the identity of the US person. Additionally, the identification of a US citizen mentioned in discussions between two foreign nationals is supposed to be masked.

But if the NSA or another agency with which NSA is sharing the information, like the FBI, wants to identify the person, it can do so if it believes it's necessary in the course of investigations or have probable cause to indicate there may be criminal conduct involved. Rogers said the number of people who have unmasking authority was limited in the NSA to about 20 people, while FBI Director James Comey said there were necessarily many more in the FBI who could do so because the agency's work involves domestic affairs.

Nunes said Trump's communications and those of people involved in his campaign may have been collected by the government through "incidental collection."

That means that in the course of monitoring for foreign intelligence purposes, the government may have caught the private communications of then President-elect Trump. But as noted later Wednesday by Democratic Rep. Adam Schiff, the ranking member on the House Intelligence Committee, incidental collection could refer simply to the mention of a US citizen, not that their communications were collected.

"If we are listening to two foreign spies, for example, talking to each other on foreign soil or two representatives of a foreign government, and they mention a US person -- that is incidental collection," Schiff said.

Passed alongside nine other amendments together known as the Bill of Rights, the Fourth Amendment is meant to curtail "unreasonable" searches from the government and require warrants based on probable cause for searches.

It is the main constitutional right that the US surveillance state butts against.

The Foreign Intelligence Surveillance Act of 1978 established the Foreign Intelligence Surveillance Court (FISC), a secretive court that can approve or disapprove spying requests. Its authority grew following the Sept. 11 terrorist attacks.

Former NSA contractor Edward Snowden leaked documents in 2013 exposing US surveillance activities and techniques, leading to the passage of the USA Freedom Act in 2015. The law implemented a set of reforms to FISC, which as of 2016 had rarely turned down requests from the government.

Additionally, FISA is often used not just to refer to the law itself but authorized surveillance under it. Similarly, the terms FISA orders, FISA warrants, etc. are used regularly.

In order to invade a US citizen's privacy for a search or seizure, law enforcement is legally required to have a warrant.

Laws passed following the revelation have attempted to narrow the scope of warrantless wiretaps.

Section 702 of FISA is set to expire at the end of this year unless Congress votes to renew it and Trump signs that renewal into law.

It was one of the changes to FISA introduced in 2008 and establishes rules for the Justice Department and the director of national intelligence together target people located outside the US.

Government Communications Headquarters is essentially the equivalent to the NSA in the United Kingdom.

The United States has an intelligence alliance with four other English-speaking nations: The United Kingdom, Canada, Australia and New Zealand.

The five nations share intimate intelligence as part of what they call the "Five Eyes" agreement.

In his appearance before the House Intelligence Committee on Monday, Rogers said asking GCHQ to wiretap Trump would be at odds with the Five Eyes agreement.

Continue reading here:
'Unmasking,' FISA and other terms to help you understand the wiretapping story - CNN

Free tax software products offer great option for simple tax prep … – WRAL.com

Raleigh, N.C. Last tax season, 40 percent of those who filed electronically did not use a paid tax preparer. Many used one of the three most popular tax software products.

I need something quick, easy, get it done, Julia Brown said. Because my tax situation is straightforward, I think its a good solution and a safe solution for me.

TurboTax, H & R Block and TaxAct are all pretty good for simple situations.

Smartphones make it even easier. All three products allow users to automatically upload their W2 information by simply taking a photo.

If your tax situation becomes more complicated, if youre self-employed, you would likely have to upgrade. That could cost around $10 to $60.

You can likely get a deduction if you correctly itemize your return. Consumer Reports said all three have tools to help make itemized deductions easy.

Even without an upgrade to a more expensive version, Consumer Reports said any one of the at home products should get the job done for most simple returns.

Of the three, Consumer Reports found TaxAct has the best value for people who itemize, own a home or have simple investments.

The turn-around can be quick, and the federal refund can be automatically deposited into a bank account just 10 days after filing.

Read the rest here:
Free tax software products offer great option for simple tax prep ... - WRAL.com

Why AVG Free Antivirus Remains a Popular Malware and Virus Protection Software – TNH Online

AVG is one of the popular free antivirus software available for users. Perhaps, the most obvious indicator for this is when it was bought for $1.3 billion by Avast in 2016. AVG Free Antivirus software is similar to the AVG Internet Security but sans other features the former offers, given that it is free. But this does not mean that the protection it offers the users is compromised.

In fact, this year, AVG comes with an added layer of protection to its security toolkit to beat malware an unpatched vulnerabilities to a pulp. For the year 2017, AVG is designed with a security tool known as CyberCapture, a cloud-based system that separates roque and malicious files for analyzation, to provide protection from zero-second malware.

Moreover, AVG Free Antivuris 2017 boasts of the new Passive Mode. This feature will run two security tools on the system as well as protects the PC from malware sent online or through emails. Say, a user visits a suspicious and unsecure website, the Passive mode will do security checks and scans without disrupting the system.

Aside from these two security layers, a free performance scan has also been added to organize and de-clutter the hard drive. This works similarly like Piriform CCleaner in which files that clutter the system are identified and removed. Most frequently used programs, such as, Flash, Google Chrome and Adobe Reader will also be getting regular updates to fight bugs and fix vulnerability issues via an automatic software updater feature that has also been packaged in the latest AVG Free Software edition.

Since Avast already owns AVG, this means that the protection users get for free comes from basically two malware security providers, doubling the security features of devices and PCs with the AVG installed. And now that you know what to expect from AVG Free Antivirus 2017, it is wise to have your PC and devices protected with this software and for free.

Read more:
Why AVG Free Antivirus Remains a Popular Malware and Virus Protection Software - TNH Online

A ‘Stand Your Ground’ Expansion That Expands Inequality – New York Times


New York Times
A 'Stand Your Ground' Expansion That Expands Inequality
New York Times
The Florida Senate recently passed a bill intended to make its already robust Stand Your Ground law even more friendly to people who say they killed in self-defense. Under the current law, someone in this situation can avoid a trial if he proves at a ...

See more here:
A 'Stand Your Ground' Expansion That Expands Inequality - New York Times