Archive for June, 2017

Privileged user management trips up NSA – TechTarget

A recently declassified report revealed the U.S. National Security Agency failed to fully secure its systems since the Edward Snowden leaks in 2013.

The report detailed the findings of the Department of Defense inspector general's 2016 assessment of the NSA's security efforts around privileged user management. The heavily redacted report was declassified after Charlie Savage, a Washington correspondent for The New York Times, filed a Freedom of Information Act lawsuit. The assessment looked at how the NSA handles privileged access management, and, according to the report, the NSA was found wanting.

After Edward Snowden leaked over a million files in 2013, the NSA began an initiative, dubbed Secure the Net (STN), with seven privileged user management goals. The inspector general's assessment found that the NSA met only four out of the seven goals: developing and documenting a plan for a new system administration model; assessing the number of system administrators across the enterprise; implementing two-factor access controls over data centers and machine rooms; and implementing two-factor authentication controls for system administration.

According to the report, dated Aug. 29, 2016, not all of the four privileged user management initiatives were fully met. "[The] NSA did not have guidance concerning key management and did not consistently secure server racks and other sensitive equipment in the data centers and machine rooms in accordance with the initiative requirements and policies, and did not extend two-stage authentication controls to all high-risk users," the report read.

Additionally, the assessment found that three of the seven STN initiatives for strong privileged user management were not accomplished. The NSA was supposed to "fully implement technology to oversee privileged user activities; effectively reduce the number of privileged access users; and effectively reduce the number of authorized data transfer agents."

There were 40 STN initiatives in total, though the assessment focused on the seven related to privileged access management. The conclusion reached in the assessment was, while the NSA was successful in part, it "did not fully address all the specifics of the recommendations."

Learn everything you need to know about privileged access management in the enterprise

Find out how to manage and monitor privileged user accounts

Test your privileged user management knowledge with this quiz

View original post here:
Privileged user management trips up NSA - TechTarget

NSA Names Whatcom as One of Four Centers of Academic Excellence in Cyberdefense National Resource Centers – whatcomtalk.com

Submitted by:Whatcom Community College

Whatcom Community College (WCC) has been selected by the National Security Agency (NSA) to lead efforts to improve and expand cybersecurity education nationwide as one of four Centers of Academic Excellence in Cyberdefense (CAE-CD) National Resource Centers. In this role, WCC will function as a super hub, helping to support and guide 10 regional centers. Whatcom will lead the CAE-CD mentor program, guiding university and college administrators and faculty through the rigorous application for the CAE-CD designation. The NSA bestows the designation, which recognizes colleges and universities that meet industry-recognized standards of education and training in the cyberdefense field, with curriculum mapped to the NSAs latest requirements.

The College will receive up to $1 million in federal grant funding, which will significantly expand the number of participating institutions in the United States. As one of four national centers funded to support various aspects of the initiative, WCC was designated as a National Center of Academic Excellence in Information Assurance/Cyber Defense 2-year education (CAE2Y) in 2011 and, again, in 2014. Whatcom was among the first community colleges in the nation to earn the designation.

WCC has years of experience and is a national leader in cybersecurity education. Our CIS and cybersecurity programs are models of excellence, WCC President Kathi Hiyane-Brown said. Were honored to share our program models with other academic institutions to help prepare qualified employees for the cyberdefense workforce, which is vital to our national security.

The grant project will leverage the mentor model program that WCC developed under previous grants. The program will connect candidate institutions with a qualified mentor who will assist the applicant in improving their cybersecurity program and completing the CAE-CD application. This process helps to ensure that the application is of high quality and meets NSA standards prior to submission. Through this process, colleges and universities can save time, effort, resources and frustration, and achieve a meaningful designation that will help attract faculty and students and even spur economic development in their region.

WCC offers a bachelor of applied science (BAS) in IT Networking as well as two-year degrees and certificates in computer information systems and cybersecurity (with opportunities to transfer to regional universities). WCC is also the lead institution for CyberWatch West a National Science Foundation (NSF) regional center for cybersecurity education and for C5 (Catalyzing Computing and Cybersecurity at Community Colleges), also funded by the NSF. More than 110 universities, colleges, high schools and educational organizations belong to the CyberWatch West consortium. For more information about WCCs computer information systems and cybersecurity programs, visit whatcom.edu/cis.

View post:
NSA Names Whatcom as One of Four Centers of Academic Excellence in Cyberdefense National Resource Centers - whatcomtalk.com

Why I sued Comey and the NSA, again! – WND.com

One day following the explosive revelations of Edward Snowden that the National Security Agency (NSA) had been engaging in mass surveillance of hundreds of millions of Americans without probable cause, I brought suit against then-President Barack Obama and his intelligence agencies. The case was randomly assigned to the Honorable Richard J. Leon of the U.S. District Court for the District of Columbia, one of the few non-Obama-Clinton appointees left in this tribunal. To accelerate the case I then filed a motion for preliminary injunction, asking Judge Leon to temporarily enjoin the defendants illegal surveillance of the populace, during the time the case would otherwise proceed to discovery and then trial.

After Judge Leon reviewed my pleadings, which required that he take action to adjudicate my motion for preliminary injunction with 21 days, he held a status conference. At that conference, he forcefully instructed the Obama Justice Department lawyers in the Federal Programs Branch that he would move the case along quickly and that they should not seek to delay his ruling by asking for non-meritorious requests for extensions. Labeling the case as one at the pinnacle of national importance, Leon advised the Obama Justice Department lawyers to forget about not working on weekends and evenings, and he then set an accelerated briefing schedule.

Judge Leon made good on his promise and ruled promptly, finding that the mass surveillance by Obama and his NSA was unconstitutional and violative of the Fourth Amendment. He added that this was so illegal as to be almost Orwellian, a reference to the landmark book 1984, by George Orwell, in which he coined the term for a tyrannical government: Big Brother.

The initial preliminary injunction entered on Dec. 16, 2013, was entered again later when I amended the complaint to conform with the edicts of the appellate court, the U.S. Court of Appeals for the District of Columbia Circuit, where the Obama Justice Department went after Leons ruling to try to slow down implementation. This second preliminary injunction, as well as the first, provoked Congress to enact a law that attempted to prevent further illegal and unconstitutional surveillance. It is called the USA FREEDOM Act.

However, now we have learned, as I suspected all along, that Obama and the NSA, with the Central Intelligence Agency (CIA) and the Federal Bureau of Investigation (FBI), continued to commit crimes by secretly conducting this illegal surveillance. This was revealed by disclosures obtained by Circa News, with reporters John Solomon and Sara Carter uncovering these continuing crimes.. And, my whistleblower client Dennis Montgomery, a former NSA and CIA contractor during the George W. Bush and Obama White House years, also revealed that this illegal surveillance was a constant by the FBI under the direction of former directors Robert Mueller and then James Comey as Montgomery himself worked with the FBI as well as the other intelligence agencies during these years.

And, this unconstitutional surveillance extended not just to millions of innocent Americans in general, but also other prominent persons such as Donald J. Trump, his family, the chief justice of the Supreme Court, other SCOTUS justices, 156 judges and thousands of others, such as the family of Nevada rancher Cliven Bundy, my client. Anyone who was seen as critical of or a phantom threat to the government, or who had taken action to clean up corruption, such as myself, was put under the looking glass of the so-called Deep State.

The potential for coercion and blackmail under these circumstances was seen to be great. As one example, how does one explain the 12th hour flip of Chief Justice John Roberts, where he voted with leftist justices to rubber-stamp Obamacare, a clearly unconstitutional law? What did the Deep State potentially have on Roberts that got him to jump ship and craft a majority opinion that was a textbook example of rank intellectual judicial dishonesty? This ruling almost destroyed the American economy as well as innocent peoples lives, who were thrown off their health insurance policies or could no longer afford to be covered, as the price of premiums later skyrocketed. This is just one example of the potential consequence of the Big Brother criminal surveillance of the Deep State.

As a result of the new revelations that the illegal spying has continued, despite the enactment of the USA FREEDOM Act, my client Dennis Montgomery and I have brought a new suit, this time adding James Comey along with the FBI and the intelligence agencies as defendants. Comey was included not just because he orchestrated the illegal surveillance during his years as Obamas FBI director, but also because he covered up an investigation caused by Montgomery, in which he was entrusted to supervise. Montgomery, under grant of immunity, had turned over 47 hard drives and over 600 million pages of information, much of which was classified, to Comey. FBI Special Agents Walter Giardina and William Barnett also interviewed my client, under oath, and his testimony was videoed. But despite this having occurred over two years ago, no action by Comeys FBI was taken, and the investigation was apparently buried. The reason? Comey had obviously directed his agents to deep six the investigation as it would show his and former FBI Director Robert Muellers criminal conduct.

Given this obstruction and criminality, I recently filed suit on behalf of Montgomery and myself as our cellphones and computers have been obviously hacked and violated by Comeys FBI and the intelligence agency defendants in the last months, as they knew that my client, with my help, was offering his testimony to the intelligence and judiciary committees on Capitol Hill. But when Congress as usual failed to do its job, perhaps scared that the FBI and intelligence agencies would leak information harmful to senators and representatives, Montgomery and I had to take matters into our own legal hands and filed a new case before Judge Leon.

Friday, I again appeared before this courageous judge for an early status conference, and I will report on this in Freedom Watch publications that can be found at http://www.freedomwatchusa.org.

But for the time being, what can be said is that Comey, Mueller and their FBI, along with the rogue intelligence agencies, again are before the bar of justice. They and the others who have illegally violated our privacy must be held accountable under the rule of law. Indeed, if anyone has obstructed justice, it appears not to be President Trump, but his criminally minded chief accuser Comey and his equally corrupt special counsel friend Robert Mueller. And as a side note, contrary to the Kool-Aid swallowed by some ill-informed commentators in the media and elsewhere in the swamp that infests the nations capital, these are not men of great integrity! Just ask Dennis Montgomery, my co-plaintiff!

Media wishing to interview Larry Klayman, please contact media@wnd.com.

Excerpt from:
Why I sued Comey and the NSA, again! - WND.com

AscendTMS software free to DAT carrier users – Overdrive Magazine

DAT Solutions announced it has completed integrating its most popular carrier features into the AscendTMS for carriers, and it will be offered at no cost to current and future DAT carrier customers. DAT TruckersEdge, Express, and Power carrier customers can log into the AscendTMS and search loads and post their trucks as they would inside their DAT load board app or desktop product.

Freight matching is increasingly about efficiency, said DAT Senior Vice President Don Thornton. The integration lets our carrier customers, especially smaller ones with fewer technical or financial resources, match their empty trucks with available DAT loads with the press of a single button. We are pleased to make AscendTMS carrier functionality available to our carrier network, the largest source of spot market capacity with 1.3 million trucks.

The AscendTMS for DAT Solutions carrier customers is available immediately, DAT says, offering a multifunction management tool at various service levels, including:

DAT load boards are also integrated with all major carrier and broker TMS solutions, including its own DAT Keypoint.

The rest is here:
AscendTMS software free to DAT carrier users - Overdrive Magazine

Where Can You Download Free Software for Windows in 2017? – The Merkle

Windows is more than a legend in the technology world. It can rightfully be said that the development of the information era began with the development of this particular operating system. Of course, now many people are obsessed with Android, and even more are crazy about iOS, but the fact remains Windows still does not lose its positions. While desktop computers continue to remain in our houses and offices, this trend will not change. However, Windows is simply an operating system without programs filling it.

In addition to the standard set of apps which the developers deemed absolutely necessary, each of us chooses his own unique kit of applications that will be most useful to a particular user. A computer can be a fun entertainment, as well as a tool for serious work. Therefore, the set of necessary apps is different for everyone. However, regardless of the purpose of using the desktop,Yum!Download contains the maximum possible number of useful applications.

The separation of applications into categories greatly simplifies the process of searching and downloading them. At Yumyou can download applications for a variety of goals. The most necessary programsare placed in a separate column, so you can quickly view the list and to set what you need in two clicks. With the help of this website, you can quickly start using Google Chrome, Skype, Ccleaner, Avast Antivirus and other applications that are in the world top on demand.

Here you will be also able to find all kinds of music and movie players, photo processing wizards, messengers, games and professional programs. Most important thing is that all of the programs on this site can be easily downloaded for free.

What Do We Recommend to Download:

Do not make a skeptical face. Yes, this player really was one of the first, developed for Windows, but time did not make it worse.

Internet Download Manager. This is an analog of uTorrent, but it is faster in operation, and also does not contain advertising.

If you have to deal with special programs, such as online banking or work time tracking, then they will not work without the latest and updated version of Java.

It is almost impossible to do without a convenient archiver in our era of the information boom. This program will help to solve problems with the transfer and storage of large amounts of information.

This is a very convenient and free application for viewing and processing photos. Special knowledge is not required to start using it. However, even professional photographers give likes to it. Now it is easy to improve the quality and appearance of the photo with just a few clicks.

Disclaimer: This is a sponsored article, any views in this post do not reflect the view of The Merkle. If you liked this article, follow us on Twitter @themerklenews and make sure to subscribe to our newsletter to receive the latest bitcoin, cryptocurrency, and technology news.

Follow this link:
Where Can You Download Free Software for Windows in 2017? - The Merkle