Archive for the ‘NSA’ Category

How to Make $500 Monthly From NSA Stock – Yahoo Finance

How to Make $500 Monthly From NSA Stock  Yahoo Finance

Read more:
How to Make $500 Monthly From NSA Stock - Yahoo Finance

Tags:

NSA appoints new Cyber Command head | SC Media – SC Media

Cyber Command Deputy Chief and Air Force Lt. Gen. Timothy Haugh was unanimously confirmed by the Senate as the new leader of the Cyber Command and National Security Agency, replacing Army Gen. Paul Nakasone, who led major changes in the usage of the command's hackers during his tenure, according to The Record, a news site by cybersecurity firm Recorded Future. Further leadership changes within the Cyber Command and the cybersecurity directorate are expected with the approval of Haugh, along with Cyber National Mission Force Head Army Maj. Gen. William as his deputy earlier this month. Haugh's confirmation comes after both Sens. Tommy Tuberville, R-Ala., and Ron Wyden, D-Ore., dropped their respective efforts to block the nomination, with the former holding military nominations for almost a year in protest to the abortion policy by the Department of Defense and the latter preventing the nomination until the admission of the NSA's involvement in purchasing Americans' location and web browsing data from data brokers.

Read more here:
NSA appoints new Cyber Command head | SC Media - SC Media

Tags:

Senate Confirms Biden’s Pick To Lead NSA and Military’s Cyber Force – The Messenger

The U.S. militarys cyber force and its premier spying agency have a new leader.

The Senate on Tuesday confirmed Timothy Haugh as director of the National Security Agency and commander of U.S. Cyber Command, a pair of roles that make him responsible for defending the country from foreign hackers and striking back against them.

Lawmakers voted by voice to confirm Haugh, an Air Force lieutenant general who has served as Cyber Commands deputy commander for the past year, and promote him to the rank of general. Haugh was one of many military officials whose promotions had languished for months after Sen. Tommy Tuberville (R-Ala.) blocked their appointments to protest a Pentagon policy on abortions for service members.

Haugh will take over the reins of both elite cyber forces from Gen. Paul Nakasone, who dramatically expanded the two organizations public profiles and their relationships with foreign allies and private companies.

Under Nakasones watch, Cyber Command crippled ransomware gangs, protected Ukraine by hacking Russian forces and sent teams abroad to help other countries fend off digital attacks while returning with useful insights about how those adversaries operate. The NSA, meanwhile, created a program to share cybersecurity information and recommendations beyond defense contractors. The historically secretive organizations increasing openness about their work marked a dramatic shift, one that Nakasone and his team described as part of a deliberate effort to put their classified intelligence to better use.

Haugh will need to decide whether to continue, expand or restructure these NSA and Cyber Command initiatives, and hell have to evaluate Americas cybersecurity support to Ukraine and Israel as the two close U.S. allies fight major ground wars.

In the Middle East, Irans hacker army could jump into the war between Israel and Hamas at any moment, potentially unleashing a wave of attacks against critical infrastructure like Israeli hospitals and power plants in retaliation for Israels invasion of Gaza. (Iran-linked hackers have already breached several U.S. water facilities after targeting their Israeli-made equipment.) And in Eastern Europe, Russia could further intensify its steady barrage of cyberattacks against Ukraine in an attempt to break the stalemate between the two armies.

Haugh will also confront questions about the future of the union between the NSA and Cyber Command. When the Pentagon created Cyber Command in 2010, it chose the NSA director to lead the new organization, since Cyber Command would heavily rely on the spy agencys personnel and expertise. In the years since, there have been calls to separate this arrangement, but multiple administrations have rejected that idea.

Haugh has said that he supports the current structure because of the amount of overlap between the two organizations missions. But he has also promised to focus his attention on the NSA, whose morale and retention have sufferedin the decade since the embarrassing leaks by former agency contractor Edward Snowden.

My current leadership role with CYBERCOM and my familiarity and knowledge of its leadership, its mission, strengths and weaknesses means that I will be well positioned to comfortably delegate and direct its activities efficiently enabling time management and focus necessary to NSAs global enterprise, Haugh told lawmakers in July.

Haughs position overseeing the U.S.s electronic surveillance mission will put him on a collision course with privacy-minded lawmakers who are pushing for new limits on a key spying power, Section 702 of the Foreign Intelligence Surveillance Act, that expires next April.

Haugh has called this provision, which lets the government spy on foreigners located outside the U.S. without a warrant, indispensable to national security. And as NSA chief, he could emerge as a more forceful critic of efforts to modify the law.

Before taking the No. 2 job at Cyber Command, Haugh led multiple Air Force organizations responsible for cyber warfare and intelligence collection, along with Cyber Commands main operational wing, the Cyber National Mission Force. He joined the Air Force in 1991 as a graduate of Lehigh Universitys ROTC program.

The rest is here:
Senate Confirms Biden's Pick To Lead NSA and Military's Cyber Force - The Messenger

Tags:

NSA Releases International Cybersecurity Guidance on AI System Development; Rob Joyce Quoted – Executive Gov

The U.S. National Security Agency teamed up with other stateside departments as well as some in the U.K. to issue a cybersecurity information sheet, or CSI, on artificial intelligence system development.

The guidance, which includes input from the U.K. National Cyber Security Centre and U.S Cybersecurity and Infrastructure Security Agency, warns against adversarial machine learning attacks that could compromise data in AI technologies.

The CSI emphasizes the implementation of secure design, development, deployment and operation in AI systems. It recommends conducting a holistic assessment of AI-specific threats and using the findings to prepare the system for the evolving attack vectors.

The document also urges developers to compare the benefits and weaknesses of different AI models, taking into consideration factors such as training dataset characteristics, use case appropriateness, model complexity and component supply chains.

We wish we could rewind time and bake security into the start of the internet. We have that opportunity today with AI. We need to seize the chance, NSA Cybersecurity Director and Wash100 awardee Rob Joyce commented.

The rest is here:
NSA Releases International Cybersecurity Guidance on AI System Development; Rob Joyce Quoted - Executive Gov

Guidance for Securing AI Issued by NSA, NCSC-UK, CISA, and … – National Security Agency

FORT MEADE, Md.- The National Security Agency (NSA), UK National Cyber Security Centre (NCSC-UK), U.S Cybersecurity and Infrastructure Security Agency (CISA), and other partners have released Guidelines for Secure AI System Development, a Cybersecurity Information Sheet (CSI).

The agencies are releasing the report to help developers, providers, and systems owners develop, deploy, and operate secure Artificial Intelligence (AI) systems, including those used in National Security Systems (NSS), by the Department of Defense (DoD), and by the Defense Industrial Base (DIB).

We wish we could rewind time and bake security into the start of the internet. We have that opportunity today with AI. We need to seize the chance, said Rob Joyce, NSA Cybersecurity Director.

According to the CSI, AI systems are subject to security vulnerabilities that need to be considered alongside standard cyber threats. For example, AI systems are vulnerable to adversarial machine learning (AML) attacks, which exploit fundamental vulnerabilities in machine learning (ML) systems, including hardware, software, workflows, and supply chains. Prompt injection and training data poisoning are examples of AML attacks that could enable malicious cyber actors to compromise an ML models classification or regression performance, perform unauthorized actions, or extract sensitive information.

The CSI indicates that secure by design principles are applicable to AI systems. Providers of AI components should implement security controls by design and default within their ML models, pipelines, and systems. Accordingly, the CSI focuses on four key areas of AI system development: secure design, secure development, secure deployment, and secure operation.

The UK National Cyber Security Centre (NCSC-UK) and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) co-authored the CSI with NSA and other partners. The authoring agencies advise that this CSI does not replace general cybersecurity best practices and risk management programs. Recommendations in the CSI should be considered in conjunction with established cybersecurity, risk management, and incident response best practices.

Read the full report here. Visit our full library for more cybersecurity information and technical guidance.

NSA Media Relations MediaRelations@nsa.gov 443-634-0721

Continue reading here:
Guidance for Securing AI Issued by NSA, NCSC-UK, CISA, and ... - National Security Agency