Archive for the ‘NSA’ Category

EU smart device regulations. US to increase scrutiny of foreign tech investment. Social media leaders tight-lipped about security practices. – The…

CISA and NSA Publish Open Radio Access Network Security Considerations (CISA) CISA and the National Security Agency (NSA) have published Open Radio Access Network Security Considerations. This productgenerated by the Enduring Security Framework (ESF) Open Radio Access Network (RAN) Working Panel, a subgroup within the cross-sector working group assessed the benefits and security considerations associated with implementing an Open RAN architecture.

NSA Plans for Full Post-Quantum Cryptography by 2035 (Meritalk) The National Security Agency (NSA) expects National Security Systems (NSS) owners and vendors to start using post-quantum algorithms by 2035.

US Cyber-Defense Agency Urges Companies to Automate Threat Testing (Data Center Knowledge) Automated threat testing is still not very widespread, according to an official at CISA, who added that organizations sometimes dont follow through after deploying expensive tools on their network and instead just assume theyre doing the job.

Opinion Will deterrence have a role in the cyberspace forever war? (Washington Post) At a time of growing concern about possible nuclear threats from Russia, some prominent defense strategists are arguing for a new theory of deterrence. They argue that military conflict is now so pervasive in cyberspace that the United States should seek to shift away from deterrence in this domain and more aggressively exploit the opportunities it presents.

Why NATO Countries Dont Share Cyber Weapons (The National Interest) As states start to operationalize their cyber commands, they will have to stand on their own feet and not expect much help from their friends.

The EU unboxes its plan for smart device security (TechCrunch) The proposed EU Cyber Resilience Act will introduce mandatory cybersecurity requirements for products that have "digital elements".

China looks to increase penalties under its cybersecurity law (Reuters) China's cyberspace regulator on Wednesday proposed a series of amendments to the country's cybersecurity law including raising the size of fines for some violations, saying that it wanted to do so to improve coordination with other new laws.

The White House is on a cyber bender (Washington Post) The White House spent the week on a flurry of cybersecurity undertaking

White House: U.S. agencies have 90 days to create inventory of all software (The Record by Recorded Future) The White House told agencies this week that they have 90 days to create a full inventory of the products they use.

Biden Orders Deeper Scrutiny of Foreign Investment in Tech and Supply Chains (Wall Street Journal) A new executive order directs the panel screening foreign investment, Cfius, to look at deals in areas U.S. officials say are of interest to China.

Biden order sharpens foreign investment screening process (Washington Post) President Joe Biden on Thursday signed an executive order that administration officials say aims to sharpen the national security considerations taken in the federal government's review process for foreign investment in the United States.

Building on our Baseline: Securing Industrial Control Systems Against Cyberattacks (House Committee on Homeland Security) DATE: Thursday, September 15, 2022TIME: 10:00 AMLOCATION: 310 Cannon House Office BuildingSUBCOMMITTEE: Cybersecurity, Infrastructure Protection, & Innovation (117th Congress)ISSUE: Cybersecurity

Policymakers eye incentives to fund better OT cybersecurity (SC Media) Government efforts are increasingly focused on improving security for the specialized equipment and systems used to run critical services to American society.

Biden admin launches $1B cyber grant program for state, local governments (The Record by Recorded Future) The Biden administration on Friday launched a long-awaited federal cybersecurity grant program that will funnel up to $1 billion to state and local governments to upgrade their digital defenses.

WSJ News Exclusive | Justice Department Forms National Network of Prosecutors Focused on Crypto Crime (Wall Street Journal) The new effort is part of a trend toward putting more resources to target illegal activities involving digital currencies.

Near-Peer Competition Shapes Military Intelligence Priorities (AFCEA International) The services continue to pivot information gathering and intelligence efforts to meet rising threats from China and Russia.

Senate confirms Fick as first U.S. cyber ambassador (The Record by Recorded Future) The U.S. Senate on Thursday confirmed Nathaniel Fick as the countrys first ever cyber ambassador. Fick will head the State Departments Bureau of Cyberspace and Digital Policy, an office that opened in April and is intended to address gaps in the governments global cyber response. The confirmation comes one day after the Senate Foreign Relations []

Cyber ambassador could soon take on a world of challenges (Washington Post) A Senate panel is about to kick the tires on Bidens pick for top cyber diplomat

Californias New Online Child Protection Law Will Challenge Companies (Wall Street Journal) A new California law on childrens data privacy could be a headache for many companies, especially smaller ones, according to privacy experts.

Social media hearings highlight lack of trust, transparency in sector (The Record by Recorded Future) Congressional hearings this week highlighted the U.S. governments lack of oversight and insight into social media giants with former employees testifying about grave risks posed by the platforms for which they once worked and the lack of regulatory structures and incentives needed to address them.

Read this article:
EU smart device regulations. US to increase scrutiny of foreign tech investment. Social media leaders tight-lipped about security practices. - The...

More than 300 classified documents including information related to the NSA, CIA, and FBI were recovered from Mar-a-Lago in 3 separate batches, The…

Mar-a-Lago one day after the FBI raid.Kimberly Leonard/Insider

The New York Times reported Monday that Trump kept more than 300 classified documents at Mar-a-Lago.

The documents included information from the CIA, NSA, and FBI on matters of national security.

The government recovered the documents in three separate batches, including the Aug. 8 search.

Former President Donald Trump kept more than 300 documents marked as classified at his residence in Mar-a-Lago after he left the White House, The New York Times reported Monday.

The government recovered the documents, which include information related to the FBI, CIA, and National Security Administration, in three separate batches, The Times reported.

The first group of documents, a batch of 15 boxes recovered by the National Archives in February, contained more than 150 classified materials and helped trigger the investigation that led to the raid on Mar-a-Lago earlier this month, The Times reported.

The second set was provided to the Justice Department in June by Trump's aides, according to The Times. The rest were recovered on August 8, when FBI agents searched the Florida golf and country club and recovered documents including 11 sets of classified materials.

While the specific content of the documents remains unknown, a source who had been briefed on the matter told The Times the files span "a variety of topics of national security interest."

The FBI and representatives for Trump did not immediately respond to Insider's requests for comment.

Though Trump has had shifting responses to whether the documents were classified, he has denounced the investigation as an "unthinkable violation" of his rights.

The search on Mar-a-Lago was executed after a federal magistrate judge, Bruce Reinhart, signed off on a warrant, which has been unsealed, indicating federal agents were seeking information related to national defense. The warrant relied on evidence cited in an affidavit, which is undergoing legal challenges regarding its release to the public.

Read the original article on Business Insider

Read the original here:
More than 300 classified documents including information related to the NSA, CIA, and FBI were recovered from Mar-a-Lago in 3 separate batches, The...

Insecurity: Northern youths protest in FCT, demand sack of NSA | The ICIR – ICIR

NORTHERN youths under the aegis of Arewa Youth Assembly, on Wednesday staged a protest over the rising level of insecurity in Nigerias Federal Capital Territory (FCT) and demanded the replacement of the National Security Adviser (NSA) Babagana Monguno.

Publicity Secretary Aliyu Muhammed, while addressing journalists during the protest at the National Assembly, said terrorists and other criminals had become more daring under Mongunos watch.

Muhammed also said the security situation in the country showed that the NSA was not effectively discharging his duties and called for his resignation or sack.

The criminal elements became emboldened under his watch as the NSA; they equally ambushed and killed some officers of the Brigade of Guards to Mr President and also issued notice to kidnap Buhari and Governor Nasir El-Rufai of Kaduna State. This is unfortunate and unimaginable in the history of nationhood.

The NSA is either not advising the President, or his ideas are infective; hence, the seeming triumph of ragtag elements over our Armed Forces. We, therefore, call for his immediate resignation or be sacked by Buhari, Muhammed said.

He noted that indiscriminate killings across the country had worsened food scarcity and the countrys poverty rate.

We want the security of this nation to unconditionally be improved from its present state to a satisfactory one, and all Nigerians in captivity should be fought for and set free, unconditionally, he said.

- Advertisement -

The group, however, called off the protest but threatened to converge again in all 19 Northern states if their demands were not met in two days.

The ICIR reported that residents of the FCT are living in apprehension over the spread of insecurity into the countrys capital.

Following a series of attacks by terrorists and bandits within the FCT, security concerns have heightened, and residents have expressed dissatisfaction with the Federal Governments response to the security concerns.

Ijeoma Opara is a journalist with The ICIR. Reach her via vopara@icirnigeria.org

See the original post here:
Insecurity: Northern youths protest in FCT, demand sack of NSA | The ICIR - ICIR

NSA to reveal identities of big men behind oil theft in Nigeria Presidency – Daily Post Nigeria

Garba Shehu, the Senior Special Assistant to President Muhammadu Buhari on Media and Publicity, has disclosed that the office of the National Security Adviser (NSA) would soon reveal the identities of highly placed Nigerians behind oil theft in Nigeria.

Appearing on a Trust TV programme, Shehu revealed that security operatives recently raided locations where illegal oil bunkering thrives as part of the plan to control economic sabotage in Nigeria, adding that oil theft is being tackled.

Shehu also disclosed that it is embarrassing for the country not to meet up with the quota given to it by the Organisation of Petroleum Exporting Countries (OPEC).

According to him, Oil theft is being tackled. The big problem we have in this country is that we ought to see more commitment from communities in assisting law enforcement agents. In some cases, where some actors in law enforcement are complicit, it becomes bad.

We used to fight the OPEC for more quotas; now, theyve given us and we arent able to meet up. Thiss embarrassing. Security agencies are fully involved in stopping this act. Im hopeful that in the next few days, the office of the National Security Adviser (NSA) will be presenting to the country big men who are promoters of this kind of business as theyre being caught and illegal refineries are being bombed out.

The Nigerian National Petroleum Company Limited is also installing a monitoring capacity to detect or advise immediately when sabotage of oil pipelines happens.

Meanwhile, just last week, the Economic and Financial Crimes Commission (EFCC) arrested 120 Nigerians over alleged illegal oil theft.

The EFCC carried out a joint operation with personnel of the 6 Division Garrison, Nigerian Army in Port Harcourt, Rivers State.

See the original post here:
NSA to reveal identities of big men behind oil theft in Nigeria Presidency - Daily Post Nigeria

Former US Cyber Command and NSA chief makes the case for a cyber competition strategy | The Strategist – The Strategist

Cyber threats to national security and prosperity are today better understood, better prioritised and far better resourced than in decades past. Cyber as a domain, as a threat and as a key opportunity is now a firmly established and essential element of military strategy and capability.

Yet today, state, non-state and individual cyber actors have greater capability, capacity and willingness to use cyber tools aggressively for malicious purposes, and their tolerance for risk has grown.

In the view of former US National Security Agency and US Cyber Command boss Mike Rogers, despite the positives, the overall picture of the cyber domain is one of increased threat and complexity.

Most countries, even if they leverage all the power and capability of their military and defence cyber sectors, cant effectively respond to this complex threat environment alone. Many nations, Western and non-Western, democratic and non-democratic alike, now understand that their national capabilities and their private sectors are engaged in a competition that is fundamentally unfair.

For decades, countries with market-based economies, such as the United States, have sought to create national frameworks that enable their research and development ecosystems and free-market private sectors to pursue global competitive advantage, largely by keeping government out of their way.

The assumption that market-based economies by their nature could continue to enable the private sector to out-compete and out-innovate their rivals has been disproven. Rogers notes that the approach of an enabled and unencumbered free market served the US well for a time after the end of the Cold War; it led to the invention and dominance by the US and other Western nations of key capability areas like stealth technology, the internet and wireless connectivity.

But between the fourth and fifth generation of these technologies, the playing field has definitively tilted in favour of actors that exploit highly controlled, centralised and coordinated strategies leveraging all the resources and capability in their private and public sectors, including intelligence and espionage capabilities.

Chinanow openly described as a peer competitor and strategic rival to most Western countrieshas assessed that cyber and a range of critical and emerging technologies are game-changers with both domestic and international implications. Cyber is considered by China (and the US and others) as being among a range of technologies that can offer decisive strategic advantages for future prosperity and security.

The Chinese state has poured, and continues to pour, billions of dollars into building its cyber capabilities. Its strategy includes blatant theft of advanced Western intellectual property and excessive requirements for technology transfer from the West as a precondition for access to the lucrative Chinese market, and to the billions of dollars of Chinese state investment.

No company, R&D outfit, or sector of companies operating under free-market principles and on the assumption of a level playing field can compete with Chinas strategy. Competing under these circumstances requires a team approach bringing together government and the private sector, and working with partners and allies across national boundaries.

In no way should a team strategy between like-minded players emulate what China has done. Competing effectively doesnt necessitate cyber-enabled IP theft, the employment of state espionage capabilities to unfairly benefit Chinese state-owned and private companies, or forced technology transfer. But it does require policy settings that protect innovation and cutting-edge technology developed and commercialised in the US and other centres of technological excellence and dynamism (including and especially in the Indo-Pacific).

It also requires export-control and inward-investment regimes that differentiate between international actors with which technological cooperation is a strategic imperative and those that present significant strategic risks.

It certainly involves a clear articulation that competitionfair competition with clear rules for acceptable and unacceptable behaviouris the strategy. And it involves action to create a policy environment that enables competition in a way that protects and extends existing rules and norms and that safeguards IP and key sources of innovation.

It also requires forums and mechanisms that bring together the perspectives, incentives and imperatives that drive the activities of governments, the technology sector and civil society. These communities dont yet talk to one another effectively, dont harness their collective power for shared benefit, and dont align on common interests in a way that produces superior outcomes for them all.

The need to get to that is urgent. The Sydney Dialogue, an ASPI initiative, brings government, private-sector and civil-society leaders together at the highest levels and provides a platform for enhanced cooperation between international actors. It offers a constructive space for the urgent conversation needed to enable stronger, fairer, more integrated competitive strategies between countries that share a commitment to the rule of law and a vision for the use of existing and future technologies in the global good.

Rogers discussed the need for better, more integrated strategies to compete with China in key technology areas. He delved into the implications of the use of cyber capabilities in the Russian invasion of and ongoing war against Ukraine, and described it as a watershed moment. The growing reality of, and increasing calls for, decoupling of cyber and other technologies from China, Russia and other actors is also explored.

Importantly, Rogers talked about the enormous potential of the technology priorities and objectives of the AUKUS partnership. Australia, the UK and the US have a real opportunity to demonstrate and enhance their ability to achieve effective integration between government, industry and civil society, and to work across national borders through a joined up, multi-sectoral technology strategy for national security.

To meet the objectives of partnerships like AUKUS, theres a need to move beyond cooperation to integration, including between parts of our systems that have operated independently for good reasons in the past. We must preserve the best and most productive characteristics of our free and open systems. But government, the private sector and civil society must also be brought into closer alignment for the benefit of all. It is past time to move beyond understanding the problem and start organising more effectively for the geostrategic technology competition that we know were now in.

The policy challenges posed by critical, emerging, cyber and space technology require a new approach. That starts with answering a key question Rogers asks: What is our vision of the key technologies, the most critical sectors that are really going to drive economic advantage and [that] if placed at risk would cause us harm, [and] what are the policies we need to create advantage for ourselves?

A new cybersecurity strategy based on what is required to become and remain competitive, secure and resilient should focus on this central question.

Continue reading here:
Former US Cyber Command and NSA chief makes the case for a cyber competition strategy | The Strategist - The Strategist