Archive for the ‘NSA’ Category

NSA, CIA senior officials address artificial intelligence threats and … – intelNews.org

October 2, 2023 by Joseph Fitsanakis

LAST WEEK, TWO SENIOR UNITED States intelligence officials shared rare insights on artificial intelligence, as they discussed some of the opportunities and threats of this new technological paradigm for their agencies. On Wednesday, Lakshmi Raman, Director of Artificial Intelligence at the Central Intelligence Agency, addressed the topic during an on-stage interview at Politicos AI & Tech Summit in Washington, DC. On Thursday, the National Security Agencys outgoing director, Army General Paul Nakasone, discussed the same subject at the National Press Clubs Headliners Luncheon in the US capital.

Nakasone (pictured) noted in his remarks that the US Intelligence Community, as well as the Department of Defense, have been using artificial intelligence for quite some time. Thus, artificial intelligence systems are already integral in managing and analyzing information on a daily basis. In doing so, such systems contribute in important ways to the decision-making by the NSAs human personnel. At the same time, the NSA has been using artificial intelligence to develop and define best-practices guidelines and principles for intelligence methodologies and evaluation.

Currently, the United States maintains a clear advantage in artificial intelligence over is adversaries, Nakasone said. However, that advantage should not be taken for granted. As artificial intelligence organizational principles are increasingly integrated into the day-to-day functions of the intelligence and security enterprise, new risks are emerging by that very use. For this reason, the NSA has launched its new Artificial Intelligence Security Center within its existing Cybersecurity Collaboration Center. The mission of the Cybersecurity Collaboration Center is to develop links with the private sector in the US and its partner nations to secure emerging technologies and harden the US Defense Industrial Base.

Nakasone added that the decision to create the Artificial Intelligence Security Center resulted from an NSA study, which alerted officials to the national security challenges stemming from adversarial attacks against the artificial intelligence models that are currently in use. These attacks, focusing on sabotage or theft of critical artificial intelligence technologies, could originate from other generative artificial intelligence technologies that are under the command of adversarial actors.

Last Wednesday, the CIAs Raman discussed some of the ways that artificial intelligence is currently being put to use by her agency to improve its analytical and operational capabilities. Raman noted that the CIA is developing an artificial intelligence chatbot, which is meant to help its analysts refine their research and analytical writing capabilities. Additionally, artificial intelligence systems are being used to analyze quantities of collected data that are too large for human analysts to manage. By devoting artificial intelligence resources to the relatively menial and low-level tasks of data-sifting and sorting, the CIA enables its analysts to dedicate more time to strategic-level products.

At the same time, however, the CIA is concerned about the rapid development of artificial intelligence by nations such as China and Russia, Raman said. New capabilities in artificial intelligence, especially the generative kind, will inevitably provide US adversaries with tools and capabilities that will challenge American national security in the coming years, she concluded.

Author: Joseph Fitsanakis | Date: 02 October 2023 | Permalink

Like Loading...

See the rest here:
NSA, CIA senior officials address artificial intelligence threats and ... - intelNews.org

Food must be at the centre of environmental policy decisions NSA – Meat Management

Posted on Oct 3, 2023

NSA Scottish Region, the Scottish branch of the National Sheep Association (NSA), has welcomed the Agriculture and Rural Communities (Scotland) Bill; but stressed that policymakers must keep the priorities of food and farming sectors at the heart of decision-making.

The trade body also approved of the Scottish Governments approach to enabling low carbon, efficient, productive, resilient farming businesses but hoped that, as the detail of the bill becomes clearer, it is not the case that policymakers have been blinded by low carbon only.

The NSA added that it hopes Government will recognise that food production will never be emission-free.

Grace Reid, NSA Scottish Region coordinator, said: NSA Scottish Region is keen to see a farm approach that recognises that agricultural businesses plan years ahead. The direction of policy and future support schemes need to be transparent, so sheep farmers know what is coming in the long-term and feel appreciated for the critical work they carry out on a daily basis.

Businesses have had to operate in the dark while we wait for this bill and we need transparency and a clear sense of direction as we proceed from here.

We have a duty to protect the positive practices in which our flocks already deliver for the wider environment and, therefore, society as a whole. Keeping food and farming at the centre of all future policy decisions is imperative, ensuring the environment is prioritised through farming rather than replacing it.

Reid said: Our future generations will look back at this opportunity to change legislation and it is vital we do not compromise their ability to deliver sustainable food production, enhance the resilience of farming practices and meet environmental and climate change goals.

A key priority for NSA Scottish Region when considering the newly published bill is that all implemented powers and policy are fair, simplistic, easy to understand and have a practical approach.

Reid continued: Following the two Scottish Government consultations, which NSA Scottish Region responded to in full, we will now begin to look in detail at what is included within this bill and engage with our sheep farming members on its content.

I urge all members to take part in the next phase of public participation, which has promised to provide a way to help design and develop the new framework included within the Agricultural Reform Programme. Topics such as changes to the 2025 Basic Payment Scheme, Whole Farm Plan, regions and measures are to be covered.

See the rest here:
Food must be at the centre of environmental policy decisions NSA - Meat Management

NSA to stand up AI security center – Defense One

Cookie List

A cookie is a small piece of data (text file) that a website when visited by a user asks your browser to store on your device in order to remember information about you, such as your language preference or login information. Those cookies are set by us and called first-party cookies. We also use third-party cookies which are cookies from a domain different than the domain of the website you are visiting for our advertising and marketing efforts. More specifically, we use cookies and other tracking technologies for the following purposes:

Strictly Necessary Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Functional Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Performance Cookies

We do not allow you to opt-out of our certain cookies, as they are necessary to ensure the proper functioning of our website (such as prompting our cookie banner and remembering your privacy choices) and/or to monitor site performance. These cookies are not used in a way that constitutes a sale of your data under the CCPA. You can set your browser to block or alert you about these cookies, but some parts of the site will not work as intended if you do so. You can usually find these settings in the Options or Preferences menu of your browser. Visit http://www.allaboutcookies.org to learn more.

Sale of Personal Data

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Social Media Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Targeting Cookies

We also use cookies to personalize your experience on our websites, including by determining the most relevant content and advertisements to show you, and to monitor site traffic and performance, so that we may improve our websites and your experience. You may opt out of our use of such cookies (and the associated sale of your Personal Information) by using this toggle switch. You will still see some advertising, regardless of your selection. Because we do not track you across different devices, browsers and GEMG properties, your selection will take effect only on this browser, this device and this website.

Here is the original post:
NSA to stand up AI security center - Defense One

NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC … – CISA

Today, the U.S. National Security Agency (NSA), Federal Bureau of Investigation (FBI), and Cybersecurity and Infrastructure Security Agency (CISA), along with the Japan National Police Agency (NPA) and the Japan National Center of Incident Readiness and Strategy for Cybersecurity (NISC) released joint Cybersecurity Advisory (CSA) People's Republic of China-Linked Cyber Actors Hide in Router Firmware. The CSA details activity by cyber actors, known as BlackTech, linked to the Peoples Republic of China (PRC). The advisory provides BlackTech tactics, techniques, and procedures (TTPs) and urges multinational corporations to review all subsidiary connections, verify access, and consider implementing zero trustmodels to limit the extent of a potential BlackTech compromise.

BlackTech has demonstrated capabilities in modifying router firmware without detection and exploiting routers domain-trust relationships to pivot from international subsidiaries to headquarters in Japan and the United States, which are the primary targets.

CISA strongly recommends organizations review the advisory and implement the detection and mitigation techniques described to protect devices and networks. For additional guidance, see Peoples Republic of China State-Sponsored Cyber Actors Exploit Network Providers and Devicesand visit CISAs China Cyber Threat Overview and Advisoriespage.

Continue reading here:
NSA, FBI, CISA, and Japanese Partners Release Advisory on PRC ... - CISA

President Obama’s NSA-Modified Cell Phones on Display at the … – National Security Agency

When an NSA employee approached National Cryptologic Museum (NCM) Director Vince Houghton asking if he wanted the Obama phones, he didnt hesitate to acquire the cryptologic gems for display at the museum.

The Obama phones are specially modified Motorola A840 models personally used by President Barack Obama during his time in office. The new exhibit, which opened in August this year, includes three of these cell phones in addition to four blackberry devices also used by President Obama, several with the presidential seal.

We had generic phones like these on display, but these are the ones that belonged to the former president, said Deana Bowles, NCMs curator. When people saw Obama using a phone on television, the internet, social media, or wherever, these are the ones he was using.

Following Obamas term, NSA removed security modifications and classified data the phones contained from his presidency. Before the exhibit opening, NCM received approval from NSA and the White House Communications Agency to place the phones on display.

This display shows people that changes in technology force us to do things differently and get used to new things, even the President of the United States, Bowles said. When Obama became President, he insisted on using his blackberry like when he was a senator, but the device would not accept the necessary security modifications. He had to learn these flip phones.

For 30 years, people from across the Nation have come to witness the museums unique displays. According to Houghton, part of the NCMs mission is to be one-of-a-kind. Since its founding in 1993, the NCM remains the Intelligence Communitys only completely public museum.

The NCM also displays artifacts that cant be seen anywhere else, including original World War II German enigma machines for visitors to encrypt and decrypt messages, the last existing U.S. Navy Cryptanalytic Bombe, and Johannes Trithemius early 16th century Polygraphiae the first-ever printed book on cryptology.

While artifacts like these help to make the NCM unique, Houghton envisions a museum that constantly changes, with new, genuine artifacts tied to moments in history so visitors can experience something new every time they enter the museum. I want to be able to say This is the first code talker message ever transmitted during World War I, he said. "I want to point to the original Japanese naval message intercepted at Station Hypo in 1942 and proved we had broken the Japanese naval code JN-25. The NCM already owns artifacts with ties to people throughout history, including Hitlers personal enigma machine, General Joseph Hookers Union Code Book from the Civil War, Love letters with unique encryptions exchanged between U.S. soldiers and their wives and sweethearts during World War II, and much more. To bring his vision of the future of the museum to life, Houghton has a list of desired artifacts on the wall by his desk. It includes 25 cryptologic devices, machines, and correspondence that he wants to replace in the NCMs inventory. He's scratched one item off the list so far: the Obama phones.

Houghton hopes others from NSA contact him to offer items for museum display. Many may not consider sending items to the public museum because of classification restrictions, but Houghton explained that NCM has an offsite classified storage space to hold items during the declassification process.

The museum also has a massive storage space for new artifacts to be held safely. According to Houghton, the staff finds more and more each day.

"We still don't know everything we have," he said. "Eventually, they could become part of temporary exhibits for visitors to experience. "By late fall this year, well have three to four areas designated for temporary exhibits, Houghton added. Well be ready for years to come.

For more information about the NCM, including hours of operation,visit nsa.gov/museum.

More here:
President Obama's NSA-Modified Cell Phones on Display at the ... - National Security Agency