Archive for the ‘NSA’ Category

NSAs cyber directorate marks a year in operation – Federal News Network

Best listening experience is on Chrome, Firefox or Safari. Subscribe to Federal Drives daily audio interviews onApple PodcastsorPodcastOne.

Few agencies are more concerned with cybersecurity than the National Security Agency. One might say NSA has cyber in its DNA. Recently the agencys cybersecurity directorate marked a full year of operations. For details on what its managed to get done, deputy director Dave Luber spoke to Federal Drive with Tom Temin.

Tom Temin: Mr. Luber, good to have you on.

Dave Luber: Tom, great to be here today.

Tom Temin: So first of all tell us roughly in general terms what the Cybersecurity Directorate does for NSA, and I guess youve got a kind of a government wide mission also.

Dave Luber: Well, thanks Tom. Cybersecurity Directorate was formed in 2019, and was created to integrate NSA cybersecurity mission to prevent and eradicate threats to our nations most sensitive systems and critical infrastructure. The Cybersecurity Directorate integrates NSA threat intelligence, vulnerability analysis, cryptographic knowledge, defensive operations and diverse technical expertise. Our cybersecurity year end review goes into more detail to this work we did towards the mission in 2020. And thats the first year of our full year as a Cybersecurity Directorate.

Tom Temin: Alright. And how many people are involved? Give us a sense of the scope of the activity here. And by the way, are you headquartered at the main NSA location?

Dave Luber: We are headquartered at the NSA main location in Fort Meade. And we have a vast number of folks that are part of our team, and just a great group of folks and professionals.

Tom Temin: And before we get into some of the specific accomplishments listed in the annual report, I just wanted to ask you, you think of the Cybersecurity and Infrastructure Security Agency at Homeland Security, CISA, as being in a similar type of activity. Do you to talk to one another and is there some sort of collaboration or cooperation there?

Dave Luber: Absolutely, in fact, CISAs one of our prime partners, but not the only partner that we have across the US government. And Ill get into a little bit more of that when I talk about some of the activities that weve engaged on collectively together.

Tom Temin: Well, lets get into that annual report thats online. And what do you consider some of the top highlights?

Dave Luber: Well, first off, the top highlights, the Cybersecurity Year in Review was really created to demonstrate the returns on investment that NSA made in the cybersecurity area and for the stakeholders and the American taxpayers. Really, the document is a testament to the skills and resiliency of the NSA people, and the partners across the public and private sectors who worked together throughout the year to protect the US in cyberspace. The Year in Review, we really created this to highlight and an unclassified way the accomplishments that were driven by our tremendous workforce and the partners, and to even provide greater transparency to the audiences as we lean forward in this first year. And Id be happy to go into some additional details on some of the things that we worked in that report.

Tom Temin: Well, you mentioned that there were 30 actionable cybersecurity products. And tell us more about those these are things that you coded or programmed? You tell me.

Dave Luber: Really, when I talk about the cybersecurity advisories and products, what Im really talking about is security guidance, or assessments that weve put together to help our customers in the national security system, national security systems owners, the Department of Defense, the defense industrial base, and many others within government, understand how to configure their systems and understand also the threats that they may see from cyber actors. So whether thats making sure that we protect our nations vital vaccine and make sure the networks are protected from actors who may try and target vaccine makers, or when we talk about nation states that may want to use public vulnerabilities to gain access to your networks.

Tom Temin: Got it. And heres where maybe the collaboration with CISA would come in, and also maybe the National Institute of Standards and Technologies. They have advisories and guidance and so forth, yours seems to be maybe more oriented toward the intelligence community and DoD, the classified end.

Dave Luber: Both national security systems owners, yes, on the classified end, but also the unclassified end. So just to give you an example, one of the efforts that we put together in one of our products, we issued this jointly between NSA, CISA and partners in the UK and Canada to warn against a particular advanced persistent threat targeting organizations engaged in COVID-19 vaccine research in the US and the UK and Canada. So that joint advisory provided really important indicators of compromise and detection techniques, and actionable mitigations. And as you might imagine, those sorts of advisories then help those in the vaccine process and developing the vaccine to really go and look at their networks, examine those networks and put mitigations in place.

Tom Temin: Theres one highlight thats really interesting and that is you supported the DoDs transition to telework and releasing written products and providing commercial solutions for classified capability packages. And this applies to 100,000 people. Tell us more about that one.

Dave Luber: Sure, absolutely. And COVID-19 really made us rethink how we work across government. And just like the rest of the the United States, the US government started transitioning many of their employees to working from home. So our experts in the cybersecurity mission rose to the occasion really to support the DoD into the transition of telework, but also enabling more than 100,000 users to telework securely. And as you might imagine, that included everything from releasing the best practices and products to use in a telework environment, as well as how to identify and mitigate compromises to personal home networks as more users begin to use those as part of their official business.

Tom Temin: Yes, because thats a mode of work thats likely to continue at a high level for some time, maybe even after the pandemic.

Dave Luber: Absolutely. So this work continues and we are constantly engaging with many partners across the DoD and other national security systems owners to further refine that guidance and provide additional insights as we learn more about the best ways to operate securely in a telework environment.

Tom Temin: And getting back to the operation warp speed, which you supported again with advisories and so forth, and what to watch out for, did you detect any particular heightened activity other than what goes on normally out there in the wild directed toward that research and toward those companies?

Dave Luber: As I mentioned, NSA provides threat intelligence and cybersecurity advisements. And if we start to see demonstrated activity where advanced persistent threats are targeting organizations, especially those that are important to our national security, such as the vaccine research that was going on, were absolutely going to get those advisories out and get that information out to those so they can protect their networks. Operation Warp Speed is really a whole government effort led by the Department of Defense and Health and Human Services. We wanted to make sure that that team was poised and charged to produce and deliver safe and effective COVID vaccine capabilities.

Tom Temin: So now all you have to do is get it made and distributed and the country will be better off. And let me ask you this, what are you looking for in 2021 and beyond? You helped secure an election, thats over with, and Operation Warp Speed is mostly done because there is a vaccine. So what comes up next?

Dave Luber: Certainly when you think about what comes up next, we have been working, as you might know, on a number of different activities going on. Our cybersecurity advisories continue to be a very important part of our future and making sure that we can get those insights out to our customers, and to make sure that they have the best guidance possible to secure their networks against very advanced cyber threats.

Tom Temin: Because a lot of agencies including DoD and their statutory requirements to get after security of the supply chain, and then the SolarWinds issue hit which was a supply chain breach, so is supply chain part of what youre looking at in depth coming up?

Dave Luber: Absolutely. This was a cyber espionage operation which was executed at scale and speed with very nuanced tactics and techniques and procedures. The actor targeted private sector technology providers who both serve the government and corporate clients and used that access to gain a foothold into their victims. And then they carefully picked specific victims of interest. So due to the nature of the foreign intelligence and cybersecurity mission, we are out there providing support to both US government entities that have been affected by this activity.

Tom Temin: And one more question, at the website there is a illustration It looks like a wall chart of the 2020 accomplishments. And it says can you find the hidden message in this graphic, but its very tiny on a web browser. And no matter what I did, I couldnt get that to enlarge. So how do people get to that wall chart so that they can solve the hidden message in the graphic?

Dave Luber: I believe our wall chart is available on nsa.gov.

Tom Temin: Alright, and someone could download and print it and stick it up and figure it out?

Dave Luber: Thats correct.

Tom Temin: Dave Luber is Deputy Director of the Cybersecurity Directorate at the National Security Agency. Thanks so much for joining me.

Dave Luber: Thank you.

View original post here:
NSAs cyber directorate marks a year in operation - Federal News Network

Targets of the Solorigate threat actors. Congress asks NSA about backdoors. Cyberspace Solarium’s Transition Book. – The CyberWire

Bloomberg reports speculation that Russian intelligence services may have been especially interested in what they could glean from tech and cybersecurity firms over the course of the SolarWinds supply chain compromise. Insight into defenses and cyber tools would have been particularly valuable.

IT and cyber firms didnt, however, comprise the entire list of private sector targets. Infosecurity Magazine notes that the Sunburst vulnerability has been determined to affect a number of manufacturing companies. Kaspersky CERT found that targeting broke down as follows: 32.4% of all victims were industrial organizations, with manufacturing (18.11% of all victims) by far the most affected." Utilities (3.24%), construction (3.03%), transportation and logistics (2.97%), and oil and gas (1.35%) also figured in the list.

Solorigate has provoked Congressional interest in an earlier incident, a 2015 breach of Juniper Networks servers in which the attackers made small changes to code for the Dual_EC_DRBG encryption algorithm. NIST had promulgated the NSA-developed algorithm as a standard for encryption in 2006. Bloomberg Law reports that two Senators and eight Representatives have signed a letter asking NSA to explain whether it had backdoored the encryption in ways that enabled hostile intelligence services to compromise the software supply chain.

The Cyberspace Solarium Commission has produced a Transition Book for the new US Administration. They recommend three steps for immediate action:

Originally posted here:
Targets of the Solorigate threat actors. Congress asks NSA about backdoors. Cyberspace Solarium's Transition Book. - The CyberWire

NSA fume over the violation of COVID-19 safety protocols – BusinessGhana

The National Sports Authority (NSA) has expressed dissatisfaction over the unacceptable behaviour of fans and the blatant disregard for COVID-19 safety protocols during a match-day 11 encounter between Hearts of Oak and Great Olympics played at the Accra Sports Stadium, last Saturday.

In a press statement signed by Mr. Charles Amofah, Head of Public Relations of NSA, it said despite all the measures that have been put in place such as spaced out marked seats to ensure social distancing, fans were found jubilating, singing, hugging each other when their team scored, thus ignoring the safety protocols.

"In view of this, the Authority is using this medium to inform the Ghana Football Association(GFA) and the clubs using the facility that it would not hesitate to resort to matches being played behind closed doors, in order to ensure total adherence to the COVID-19 safety protocols.

"The Authority would like to assure the general public of its commitment to ensure strict compliance with the COVID-19 safety protocols, in collaboration with the law enforcement agents deployed to our facility," the statement said.

In other related development, the President of the Republic, Nana Addo-Dankwa Akufo-Addo has entreated the NSA and GFA to ensure the compliance with a 25% capacity rule in our stadium with spectators adhering to social distancing rule and the wearing of masks.

Read more:
NSA fume over the violation of COVID-19 safety protocols - BusinessGhana

Baba Yara Stadium will be ready for use soon – NSA Boss – GhanaWeb

Sports News of Wednesday, 3 February 2021

Source: footballmadeinghana.com

National Sports Authority boss, Professor Peter Twumasi

The National Sports Authority boss, Professor Peter Twumasi has re-assured that the Baba Yara Stadium in Kumasi should be ready to host football matches soon, as renovation works near completion.

The facility has been closed for renovation works for close to a year now, with work progressing at a snails pace. The situation has forced football clubs who use the facility to find an alternative venue as they anxiously wait for works to be completed.

Asante Kotoko, King Faisal and Asokwa Deportivo for instance use different match venues for their respective home league games in the current campaign.

Asante Kotoko host games the Accra Sports Stadium while Faisal use the Techiman Ohene Ameyaw Park for the Ghana Premier League home games. Asokwa Deportivo also use the Len Clay Stadium at Obuasi for their home matches in the National Division One League.

Speaking after inspecting the progress of work done, Professor Peter Twumasi has indicated that works are currently moving on as planned. The underground PVC pipes have been laid to supply water to the automated sprinkler system. This is to help water the grass to grow to an appreciable level.

According to Professor Twumasi, all should be set for football matches to be played at the venue when this has been sorted.

View post:
Baba Yara Stadium will be ready for use soon - NSA Boss - GhanaWeb

Newark Flowserve Sports & Social Club boosted after securing safety net thanks to Newark Sports Association – Newark Advertiser

A popular sports site has been listed as an asset of community value.

The Newark Sports Association (NSA) has seen its application to secure Newark Flowserve Sports & Social Clubs status as an asset of community value approved by the district council.

It means the site, which is home to Newark FC and a number of other sports clubs, will now receive additional protection from development plans should the landowner decide to dispose of it, either through a freehold sale, or the grant or assignment of a qualifying lease.

Matthew Norton, business manager at Newark and Sherwood District Council, said: The asset met the test set out in Section 88 (2) of the Localism Act, as the asset has had a recent use which furthered the social wellbeing or social interests of the community and it is realistic to think that it could have such a use again in the next five years.

Paul Baggaley, secretary of the NSA, stressed playing fields like the one at Lowfields were an essential part of residents daily lives.

Nominating a local asset as an asset of community value is not a hostile act, said Mr Baggaley.

The NSA will work positively with any organisation that wants to nominate local assets that contribute to the cultural, recreational or sporting life of the town.

Communities and users could bring threatened assets to life if they are given the opportunity.

The answer is not always to build houses.

Parks, playing fields and open space is infrastructure like roads, schools and hospitals and they are an essential part of our daily lives.

The pandemic has increased the importance of sport and the need to stay physically active.

There are people who have been physically affected by covid-19 but there is a much larger group who have been financially affected.

Protecting assets that are close to peoples homes and are free to use is absolutely crucial if we are to recover from the pandemic and build back fairer and fitter communities.

Lowfields is also home to Newark FCs youth teams and is a popular site for charity sports events and school tournaments.

Running clubs and bowls clubs also use the site.

The NSA welcomed sports groups or organisations to get in contact with them should they wish to nominate an asset as an ACV.

You can do so by calling Paul Baggaley on 07903 623369.

Go here to read the rest:
Newark Flowserve Sports & Social Club boosted after securing safety net thanks to Newark Sports Association - Newark Advertiser