Posted on

Apple vs the FBI: Is Strong Encryption a Good Thing? What about National Security?

iphone_2018021b

Gary Miliefsky
CEO of SnoopWall, Inc.

by Gary S. @Miliefsky, Breach Prevention Pioneer and CEO ofSnoopWall, Inc. @SnoopWallSecure

When it comes to John McAfee @OfficialMcAfee saying if he couldn’t get into the San Bernardino terrorists iPhone he would ‘eat his shoe’ – many iPhone users thought he was crazy. How could anyone break into a secure, password protected and encrypted iPhone. Well, as I’m going to show you, John would never have to eat his leather shoe and was 100% correct that it could easily be done.

Watch John McAfee on CNBC (used under the fair use provision of US Copyright law) discuss this situation.

Many think the @Apple iOS operating system is one of the most secure in the world for any smartphone or tablet. That may be true as iOS offers full disk encryption with built-in hardened encryption (device KEY, file KEY, Keychain API, Data Protection API, etc). In fact, the iOS currently boots with a low-level boot loader then verifies iBoot. Apple defends well against native code exploits using both address space layout randomization (ASLR) and XN bit (which stands for eXecute Never). The ASLR randomizes memory location of program executable, data, heap and stack every time it is launched. To block cross application memory attacks the XN bit allows the OS to mark segments of a program’s memory such as heap and stack as unexecutable. In addition, Jailbreaking does not allow you to disable the ios sandbox, only to run apps outside of it. Does all this make it impenetrable? Of course not, it makes it more fun to hack because hackers and cyber criminals love two things – 1) a challenge and 2) something well deployed. With nearly 1/2 Billion iOS devices in the market, this is a prime target for hackers.

Early exploits were even able to avoid Jailbreak Detection. Smart malware developers can create jailbreak detection bypasses that fake replies to function calls to make it look like the device is not jailbroken, when it still is. What about the Apple iTunes Review Process? Serious hackers create apps that are Bridging the webkit – so you access native iOS API’s via JavaScript. Some have done Dynamic patching – just look at InstaStock for example by Charlie Miller. What about intentionally exploitable vulnerabilities – write code with a buffer overflow that when triggered causes unseen code to execute – see Jekyll by Georgia Tech. So, yes, there are creative ways to accept the challenge and find ways around the well done system hardening of iOS. Do you remember the Handy Flashlight app? This Flashlight app secretly let users enable iPhone tethering. Handy Light wasn’t actually a flashlight app at all — it was a sneakily disguised tethering utility that let users share their iPhone’s Internet connection with their laptop.

Some have asked if Apple has a secret key or special back door that they just didn’t want to share with the @FBI because Apple is riding the ‘privacy wave’. The latest version of the iPhones and iOS, are using an Elliptical Encryption Key Exchange, augmented by the onboard Cryptography Chip. Therefore, THERE IS NO MASTER KEY. End-user PINs are resolved via the Cryptographic Chip. 10 tries and the iPhone is ‘bricked’. Any changes to this system, would require hardware and software changes, weakening the system and leaving it vulnerable to hackers. However, as Cellebrite of Israel has proven, an external keyboard/usb vulnerability is exploitable in a way that avoids this security feature, ie, infinite password tries could be done without bricking and actually, you only need a few hours of brute force attacks to get in, see: Their exploit tool is called UFED – Universal Forensic Extraction Device and runs less than $700. See https://www.youtube.com/watch?v=AUgmnYChT48– So if you have possession of the device, you can physically exploit it. I’ve met teenagers working at Radio Shack who claim to have regularly used the device to help customers get back into their iPhone and also to transfer data such as contacts, photos and other media files to another device.

Watch Gary Miliefsky on Hardline Discussing Apple vs FBI Case

What about remote access? It’s all about having background permissions and network access. Apple manages all multi-tasking in specially managed threads. Except Keyboard, Audio Player, Alarm Clock and VPN Client, most processes are not allowed to run in the background. With these four exploit vectors, it’s easy to understand that the free Emoji keyboards and free VPNs are not so free, after all. By placing a network monitor on all egress traffic, you’ll be surprised with what you will find out of these two free apps in particular. Just pick one of the 500+ available on iTunes and you’ll start to understand the gravity of the situation. VPNs have control over all of your network traffic. This is a great exploit to access lots of data passed over the tunnel. In addition, products like Web Watcher are called iPhone Monitoring software (and there are at least a dozen vendors) – once installed, track Text messages, Photos, Call and Web-history.

Nothing like a free Keylogger disguised as your Emoji Keyboard

Alarm Clocks and Audio Players have special permission to run in background

VPN’s manage traffic flow which means they see all your network traffic

In any case, these techniques are just the tip of the iceberg as to why the FBI or any government agency for that matter, doesn’t need to weaken the iPhone encryption to get into an iPhone.

“I’ve argued for years, that weakening encryption and creating “Secret Keys and Backdoors” would be a huge mistake and dangerous to national security.”

Let me name a few breaches and see if you can guess what they all have in common:

OPM.gov Breach = 22 Million Records Stolen by the Chinese government’s cyber army putting in field agents lives in jeopardy.
Sony Pictures Entertainment = 4 movies leaked, employee records lost, over a terabyte of data stolen by the DPRK’s cyber army.
Anthem.com breach = 80,000,000 records now in the hands of the Chinese Government (along with the OPM records which can be cross correlated).
Whitehouse.gov Breach? State.gov Breach? And many more in the news and found athttps://www.privacyrights.org.

Name any other recent breach over the past 3-5 years. What do these all have in common? There was NO ENCRYPTION setup to protect the data. With STRONG ENCRYPTION, none of these breaches would have happened. Lives are now in jeopardy over the OPM.gov breach so without encryption, yes, lives can be lost. Who has cyber armies drooling over our critical infrastructure, network equipment, iot, airplane, car, computer and smartphone vulnerabilities? China, Russia, North Korea, Iran and many cyber criminals!

Cyber-crime, cyber-espionage and cyber-terrorism all exploit: VULNERABILITIES and WEAK (or no) ENCRYPTION!

What would the legal ramifications be for Apple to be forced to weaken their iPhone encryption and not fix all the vulnerabilities I’ve listed above? Writing (STRONG) Computer Code is a form of FREE SPEECH. 1st Amendment guaranteed right. Apple or any other company coders in the USA have the right to unfettered or manipulated speech.

See: https://www.wired.com/2016/02/apple-may-use-first-amendment-defense-fbi-case-just-might-work/

So, forcing programmers to create a backdoor is a 5th Amendment violation because they have the right to NOT SPEAK which could easily be construed as ‘self-incrimination’ (weakening code) or forced ‘decryption’.

See: https://www.eff.org/deeplinks/2013/10/new-eff-amicus-brief-argues-fifth-amendment-prohibits-compelled-decryption

In addition, almost by chance, the US Government passed a very intelligent law called the Cyber Security Information Sharing Act of 2015 (aka CISA 2015). So, if any Federal Agency (FBI or other) finds a VULNERABILITY in any kind of computer or internet equipment (iPhone, for example), they must disclose this hole to the manufacturer (Apple, in this case) so that they may close the hole and HARDEN they SYSTEM against FUTURE EXPLOITATION.

See “The Protecting Cyber Networks Act” of 2015:https://intelligence.house.gov/ProtectingCyberNetworksAct

What this says is less VULNERABILITIES and strong ENCRYPTION will make America strong. Encryption is a good thing, it powers the e-tail/retail economy and online banking. Backdooring encryption is a bad thing, it empowers not just ‘trusted’ agencies like NSA and FBI but also any cybercriminal who can find the back door, and they look for them daily. Once criminals know of back doors, they move on to other platforms like silent circle, or video game chat networks or tor – they will always find a way to have a covert conversation. Root cause analysis says find the bad guys at the source, not when it’s too late, so finding them after the fact and hacking their phones is reactive not proactive. Let’s all stand together for VULNERABILITY sharing like the National Vulnerability Database https://nvd.nist.gov which rides off the Common Vulnerabilities and Exposures program (see: https://cve.mitre.org) where we all agree that less vulnerabilities is a good thing. Let’s also stand up for strong encryption, see:https://www.savecrypto.org

We could look beyond the iPhone into the vulnerabilities of cars, as exploited for Wired magazine, causing a Jeep to go off the road, or the new Boeing 777 that was launched with vulnerabilities that allow someone in a passenger seat to exploit the avionics.  What’s missing in both cases?  strong ENCRYPTION National Security is truly at risk without strong ENCRYPTION.  If you are old enough to remember the 1976 Ford Pinto story, you get my point.  What ever happened to Made in America with Pride?

One of the less discussed but deeper reasons I believe that Apple is standing up for strong encryption in their devices, is that they are betting on the future of mobile commerce via ApplePay.  If they can guarantee to the banks that transactions are safer coming from their devices than our wallets and purses, it will open up an entire ecosphere that thrives off Apple.  This could be worth billions in the long haul.  One weak security key to ApplePay and cyber criminals will make it painful for retail, which has now made the transition to e-tail, to continue on it’s path to m-tail or ‘mobile commerce’. This is a big bet and a backdoor for the FBI would ruin Apple’s future in this green field.

In the bigger picture, even beyond Apple, less vulnerable products with strong encryption will result in higher taxable GDP in America because we’ll have more quality products to sell internationally, we’ll lose less to cyber theft, leaving more money in our bank accounts to grow our businesses. There will be more international revenues and exports as other countries and international companies will once again trust that Made in America means made well and strong. This will create more jobs in America and there will be less successful Cybercrime against the US. It will dramatically reduce the chance of cyber-terrorism in America and oh by the way to my friend John McAfee and all fellow privacy advocates, as a side effect of being smart about hardened products and strong encryption, yes, the Citizens get the reclaim their privacy, a sovereign right in our great Nation.

To those who will only get this message through visuals, I’ve put these four videos up for your enjoyment:https://tinyurl.com/woes4star

I’m placing my bets on hardened systems, strong encryption and the value of privacy here at SnoopWall as is John McAfee in his new public company, (NYSEMKT: MGT) folding in an array of privacy products and services. Please watch us to see how it pays out.

About the Author

Gary is the CEO of SnoopWall, Inc. and a co-inventor of the company’s innovative breach prevention technologies. He is a cyber-security expert and a frequent invited guest on national and international media commenting on mobile privacy, cyber security, cyber crime and cyber terrorism, also covered in both Forbes and Fortune Magazines. He has been extremely active in the INFOSEC arena, most recently as the Editor of Cyber Defense Magazine. Miliefsky is a Founding Member of the US Department of Homeland Security (https://www.DHS.gov), the National Information Security Group (https://www.NAISG.org) and the OVAL advisory board of MITRE responsible for the CVE Program (https://CVE.mitre.org). He also assisted the National Infrastructure Advisory Council (NIAC), which operates within the U.S. Department of Homeland Security, in their development of The National Strategy to Secure Cyberspace as well as the Center for the Study of Counter-Terrorism and Cyber Crime at Norwich University. In his earlier career he sold and licensed technology that he invented to Hexis Cyber, a division of KeyW, Intel/McAfee, IBM, Computer Associates and BlackBox Corporation. Gary is a member of ISC2.org and is a CISSP®. Email him at ceo@snoopwall.com and visit him online athttps://www.snoopwall.com.

Posted on

Nimr al-Nimr execution: Former Iraq PM al-Maliki says death will ‘topple Saudi regime’

Lawrence of Arabia

Elsewhere, demonstrators carrying pictures of the Shi’ite cleric were involved in a clash with police in the Bahraini village of Abu-Saiba

Harriet Sinclair

The former prime minister of Iraq, Nuri al-Maliki, has said that the execution of the prominent Shi’ite cleric Sheikh Nimr al-Nimr by Saudi Arabia will be the downfall of the Gulf kingdom’s government.

Mr al-Maliki, who was prime minister of Iraq between 2006 and 2014, said in a statement that his countrymen “strongly condemn these detestable sectarian practices and affirm that the crime of executing Sheikh al-Nimr will topple the Saudi regime as the crime of executing the martyr al-Sadr did to Saddam,” referencing the death of another prominent cleric in Iraq in 1980.

Hundreds of armoured vehicles were sent to Qatif in Saudi Arabia to contain protests in response to the execution, while demonstrators in Bahrain have been tear-gassed.

Several protests have taken place in majority Shia Qatif and in Bahrain, following the execution of Sheikh al-Nimr and 46 others for ‘terrorism offences’.

Demonstrators carrying pictures of the Shi’ite cleric were involved in a clash with police in the Bahraini village of Abu-Saiba, where dozens were tear-gassed, according to witnesses.

 

https://www.independent.co.uk/news/world/middle-east/nimr-al-nimr-execution-protesters-tear-gassed-in-bahrain-after-saudi-arabia-carries-out-death-a6793761.html

Posted on

Obama not briefed on FBI’s Clinton probe

hillary-clinton-what-difference-does-it-make

By Julian Hattem – 12/09/15 01:12 PM EST

President Obama does not receive briefings about the FBI’s investigation into the personal email setup Hillary Clinton used as secretary of State, bureau Director James Comey said on Wednesday.

As a result, Obama should have no way of knowing how the inquiry is proceeding, Comey told the Senate Judiciary Committee, despite the president’s apparent dismissal of concerns about impropriety.

The FBI’s examination of Clinton’s server, which held her private email account and has drawn intense criticism from Republicans and transparency advocates, has put the FBI in a tight spot.

In response, Comey has repeatedly attempted to shoot down concerns about political motivation in his bureau’s probe and fears that investigators will undermine evidence against Clinton or another Obama administration official.

“I hope the American people know the FBI well enough and the nature and character of this organization,” Comey told the Senate panel on Wednesday.

“As I’ve said many times, we don’t give a rip about politics,” he added. “We care about finding out what is true and doing that in a competent, honest and independent way. I promise you that’s the way we conduct ourselves.”

Conservatives expressed worry in October when Obama said that Clinton had made “a mistake”by using the private email address throughout her time at the State Department but that the behavior did not compromise official secrets.

“I can tell you that this is not a situation in which America’s national security was endangered,” Obama told CBS’s “60 Minutes.”

According to reports, Obama’s comments upset some FBI officials, who worried that it amounted to meddling in their investigation.

https://thehill.com/policy/national-security/262639-obama-not-briefed-on-clinton-investigation

Posted on

Christie says he’ll ‘never’ approve giving drivers licenses to undocumented N.J. residents

wanted

Drivers Licenses For Undocumented Immigrants Clears Assembly Panel

Legislation that would grant driver’s licenses to undocumented immigrants passed the Assembly Homeland Security and State Preparedness Committee in a 3-2 voteon Monday. Alyana Alfaro, PolitickerNJ.com Read more

Christie on Drivers’ Licenses for Undocumenteds: ‘Dangerous and Irresponsible’

As the Assembly Homeland Security and State Preparedness Committee considers drivers’ licenses for undocumented workers, Gov. Chris Christie issued qa statement in opposition. Max Pizarro, PolitickerNJ.com Read more

 

By Claude Brodesser-Akner | NJ Advance Media for NJ.com TRENTON

TRENTON — As Gov. Chris Christie mulls a bid for the White House, some of his positionson immigration may be evolving. But one remains steadfastly the same.

“I’m not giving driver’s licenses to people who are undocumented. That’s it,” Christie said flatly, speaking on his monthly radio show on New Jersey 101.5.

Christie called the state-issued driver’s license “the single most important form of identification. It gets you onto airplanes. … I cannot give driver’s licenses to people who I cannot be sure who they are … and I’ve had that position right from the beginning.”

Christie was named U.S. Attorney for New Jersey on September 10, 2001. The 9/11 terrorist attacks occurred on his second day on the job.

“When it first happened … all I could think about was the job — what is this going to mean?” Christie told The Associated Press on the 10th anniversary of the terror attacks in 2011.

https://www.nj.com/politics/index.ssf/2015/04/christie_says_hell_never_approve_giving_drivers_li.html

Posted on

High stakes for Hillary, lawmakers in Benghazi panel showdown

trey-gowdy-600x400

By Scott Wong and Julian Hattem – 10/19/15 06:00 AM EDT

Hillary Clinton isn’t the only one with a lot riding on this week’s Capitol Hill hearing on the 2012 Benghazi terrorist attacks.

The 12-member Select Committee on Benghazi is loaded with ambitious lawmakers from both parties looking for a breakout moment on the national stage with the Democratic presidential front-runner.

More than half the Republicans serving on the panel have been mentioned as potential candidates to replace Speaker John Boehner (R-Ohio). And the committee’s chairman, GOP Rep. Trey Gowdy (S.C.), is widely viewed as having a bright political future back home in South Carolina.

Clinton’s Democratic allies on the panel include one declared Senate candidate, Rep. Tammy Duckworth of Illinois, and another potential one, veteran Rep. Elijah Cummings of Maryland.

Here’s a look at seven members of the Benghazi panel who could shine in the spotlight during Thursday’s showdown

 

https://thehill.com/homenews/house/257218-high-stakes-in-benghazi-showdown

Posted on

New battle over claim that Clinton mishandled CIA secrets

hillary-clinton-what-difference-does-it-make

By Julian Hattem – 10/19/15 07:26 AM EDT

Congressional Democrats are accusing Republicans on the House Select Committee on Benghazi of falsely claiming that Hillary Clinton improperly handled some of the government’s most closely kept secrets, days before the former secretary of State appears before the panel.

An email revealed by committee Republicans earlier this month made it seem as if Clinton received and then forwarded the name of a CIA source as part of a 2011 memo from longtime associate Sidney Blumenthal.

The name of that source “is some of the most protected information in our intelligence community,” committee Chairman Trey Gowdy (R-S.C.) said at the time, “the release of which could jeopardize not only national security but also human lives.”

According to the committee’s top Democrat, Rep. Elijah Cummings (Md.), however, the CIA told lawmakers this weekend that “they do not consider the information … classified.”

“Specifically, the CIA confirmed that ‘the State Department consulted with the CIA on this production, the CIA reviewed these documents, and the CIA made no redactions to protect classified information,’” Cummings said in a scathing letter to Gowdy.

A State Department official confirmed that Cummings’s letter “describes ‎the situation accurately.” A spokesman with the CIA declined to comment on the matter.

Gowdy insisted that the presence of the name in one of Clinton’s emails is nonetheless damaging, regardless of the CIA’s stance.

 

https://thehill.com/policy/national-security/257276-gop-hit-over-claims-that-clinton-mishandled-cia-secrets

Posted on

Dozens of Clinton emails were classified from the start, U.S. rules suggest

hillary-clinton-what-difference-does-it-make

NEW YORK | BY JONATHAN ALLEN

For months, the U.S. State Department has stood behind its former boss Hillary Clinton as she has repeatedly said she did not send or receive classified information on her unsecured, private email account, a practice the government forbids.

While the department is now stamping a few dozen of the publicly released emails as “Classified,” it stresses this is not evidence of rule-breaking. Those stamps are new, it says, and do not mean the information was classified when Clinton, the Democratic frontrunner in the 2016 presidential election, first sent or received it.

But the details included in those “Classified” stamps — which include a string of dates, letters and numbers describing the nature of the classification — appear to undermine this account, a Reuters examination of the emails and the relevant regulations has found.

https://www.reuters.com/article/2015/08/21/us-usa-election-clinton-emails-idUSKCN0QQ0BW20150821

Posted on

Clinton Pressured at Press Conference on Emails

hillary-clinton-what-difference-does-it-make

Clinton pulls plug on testy presser over server questions
August 18, 2015, 06:22 pm
By Ben Kamisar

Hillary Clinton dismissed the controversy surrounding her private email server and defended her conduct as legal during a press conference Tuesday in Las Vegas.

A visibly aggravated Clinton repeatedly insisted that she had done nothing wrong and seemed frustrated by questions about the issue.

“What I did was legally permitted, number one, first and foremost,” the Democratic presidential candidate said in response to a question from Fox News reporter Ed Henry. “We turned over everything that was work-related, every single thing.”

She added that in “retrospect,” it had not turned out to be convenient to have the private server during her years as secretary of State.

“I regret that this has become a cause celebre. But that does not change the facts, and no matter what anybody tries to say, the facts are stubborn,” she said.

“I know there is a certain level of anxiety or interest in this, but the facts are the facts.”

Asked if the server, which has been turned over to the Department of Justice, had been wiped clean, Clinton initially shrugged and later joked: “Like with a cloth or something?”

https://thehill.com/blogs/ballot-box/presidential-races/251413-clinton-pulls-plug-on-testy-presser-over-server-questions

Posted on

Hillary’s email firm was run from a loft apartment with its servers in the BATHROOM, raising new questions over security of sensitive messages she held

hillary-clinton-what-difference-does-it-make

Democratic White House front-runner used Platte River Networks of Denver, Colorado, to maintain her controversial ‘home brew’ server
Up to 60 emails with classified material have been found in a sample of those she did not delete – meaning there could be many more
Now Daily Mail Online reveals new questions over security of her emails when Platte River was involved in maintaining server
‘Mom and pop’ firm used converted residential apartment and had its own servers in a bathroom closet
Links between ‘local’ IT company and Clinton remain unclear but its VP of sales and marketing, who was sued for ‘fraud’ is said to be ‘big Democrat’

By HUGO DANIEL IN DENVER, COLORADO, FOR DAILYMAIL.COM

PUBLISHED: 08:12 EST, 18 August 2015 | UPDATED: 12:03 EST, 18 August 2015

The IT company Hilary Clinton chose to maintain her private email account was run from a loft apartment and its servers were housed in the bathroom closet, Daily Mail Online can reveal.

Daily Mail Online tracked down ex-employees of Platte River Networks in Denver, Colorado, who revealed the outfit’s strong links to the Democratic Party but expressed shock that the 2016 presidential candidate chose the small private company for such a sensitive job.

One, Tera Dadiotis, called it ‘a mom and pop shop’ which was an excellent place to work, but hardly seemed likely to be used to secure state secrets. And Tom Welch, who helped found the company, confirmed the servers were in a bathroom closet.

It can also be disclosed that the small number of employees who were aware of the Clinton contract were told to keep it secret.

The way in which Clinton came to contract a company described as a ‘mom and pop’ operation remains unclear.

However Daily Mail Online has established a series of connections between the firm and the Democratic Party.

Read more: https://www.dailymail.co.uk/news/article-3201367/Hillary-s-email-firm-run-loft-apartment-servers-BATHROOM-raising-new-questions-security-sensitive-messages-held.html#ixzz3jD6fAUn5

Posted on

Garrett vows to keep fighting Iran agreement

Scott_Garrett_took5_a_break_from_DC_theridgewood-blog

file photo

JULY 21, 2015    LAST UPDATED: TUESDAY, JULY 21, 2015, 1:21 AM
BY ABBOTT KOLOFF
STAFF WRITER |
THE RECORD

TEANECK — Rep. Scott Garrett told more than 250 people gathered Monday night for a town hall meeting at Congregation Bnai Yeshurun that he will continue his efforts to block the Iran nuclear arms deal, saying it would be detrimental to the security of both the United States and Israel.

He said that the deal was “woefully short” of President Obama’s promises and that “we essentially will be starting a countdown for Iran to have nuclear weapons” in the future. Garrett, a Republican who represents portions of Bergen, Passaic, Sussex and Warren counties, said he hoped enough Democrats would join Republicans to block the deal, but added that he did not expect that to happen.

The meeting echoed portions of a multifaceted national debate, with a large coalition of organizations planning the Stop Iran Rally in Times Square on Wednesday to oppose the agreement while peace groups and others have been arguing in its favor. Iranians also have not been in complete agreement, with hundreds protesting the agreement in Tehran over the weekend.

Congressional Republicans, including Garrett, have been uniformly against it. However, they would need a two-thirds majority in Congress to prevent the agreement from being finalized. Garrett said he voted against that procedure when it was established with bipartisan support this year, adding, “It puts the Constitution on its head.”

Rabbi Steven Pruzansky of Bnai Yeshurun said the agreement placed the nation “on the verge of a historic capitulation.” He added that “Obama’s America is on a collision course with Israel.”

https://www.northjersey.com/news/world/garrett-vows-to-keep-fighting-iran-agreement-1.1377711

Posted on

Why Credit Monitoring Fails to Address the Real Threat Facing Hacked Feds

hackkers_theridgwoodblog

By Eric Katz
June 11, 2015

In response to what was one of the largest data breaches in American history, the Office of Personnel Management has offered 4 million current and former federal employees free credit monitoring and identity theft insurance.

That approach may completely miss the mark, experts say.

Media reports and now lawmakers have said that state actors — likely from China – appear to be behind the attack, rather than individuals looking to exploit employees’ financial information. Credit monitoring, therefore, is a nice offer but one that is unlikely to protect federal employees from their adversaries’ true intentions.

“Credit reporting is lip service,” said Richard Blech, CEO of Secure Channels Inc., a cybersecurity firm that provides encryption technology and authentication services. “It means nothing.”

Ken Ammon, chief strategy officer for Xceedium, a network security company that contracts with the government and commercial enterprises, said credit monitoring is fine as a “first step,” though it serves more to protect the infiltrated organization legally than it does the individual from bad actors.

Experts refer to the hack as “cyber espionage,” rather than “cyber crime.” Individuals that illegally obtain data such as Social Security numbers and addresses can use that information for identity theft as it relates to credit card information, for example, but state actors do not hold those same interests.

https://www.govexec.com/defense/2015/06/why-credit-monitoring-fails-address-real-threat-facing-hacked-feds/115090/?oref=relatedstories

Posted on

Dominance of national security shakes up race for White House

middle-east-shouts-death-to-america

By Alexander Bolton

The resurgence of Islamic terrorism and President Obama’s nuclear deal with Iran is shaking up the race for the White House, pushing national security to the forefront of the GOP primary debate.

The primacy of foreign policy could be a problem for Sen. Rand Paul (R-Ky.), the libertarian Tea-Party favorite, who is set to launch his presidential campaign next week in Louisville. He proposed steep defense cuts when he first came to the Senate and has expressed wariness about foreign military interventions.

On the other hand, the new dynamic could help Sens. Marco Rubio (R-Fla.) and Ted Cruz (R-Texas), who have touted their experience on the Foreign Relations and Armed Services committees, respectively, as they make the case for their candidacies.

https://thehill.com/policy/defense/237910-dominance-of-national-security-shakes-up-race-for-white-house

Posted on

Christie’s Ebola Nurse Antagonist goes bike riding as DOD contradicts her!

imgres

Christie’s Ebola Nurse Antagonist goes bike riding as DOD contradicts her!
Oct. 30  2014
By Matt Rooney | The Save Jersey Blog

This lady is a real trip, Save Jerseyans!

I’ve spoken to the nurses in my life since Kaci “the Brat” Hickox‘s story went viral; not one of them thinks it’s unreasonable, after an extended journey to Africa interacting one-on-one with Ebola patients, for a health care worker to spend 3-weeks in a hospital (or at home) to guarantee that this deadly virus doesn’t spread.

It’s not hard for anyone who isn’t a narcissist to understand why.

After all, the CDC was EGREGIOUSLY wrong – time and time again – when it came to this disease (1) coming to America and (2) the risk to health care workers caring for the infected. Ebola isn’t 100% understood and the “experts” continue to contradict themselves; researchers disagree, for example, on a few key points including the all-important incubation period.

But then again, most of nurses in my life aren’t nasty liberals who care more about making political points than protecting the American people. Check out what she did today:

https://savejersey.com/2014/10/christie-ebola-nurse-bike-ride-troops-quarantine/

Posted on

Edward Snowden to SXSW: NSA Leaders Have Harmed Our National Security ‘More Than Anything’ Else

o-EDWARD-SNOWDEN-facebook

Edward Snowden to SXSW: NSA Leaders Have Harmed Our National Security ‘More Than Anything’ Else

The fugitive leaker, appearing by video conference, attacked virtually every corner of the national security apparatus during a Q&A session at the festival.

America’s most high-profile fugitive visited one of the country’s most popular entertainment festivals in Texas on Monday, drawing thunderous applause from a crowded room filled with his adoring fans.

Edward Snowden, appearing from Russia through a live video stream, told attendees of the South by Southwest Interactive conference in Austin that Congress had fundamentally failed to do its job as an overseer of the government’s bulk surveillance programs, declaring that “we need a watchdog that watches Congress.

The former National Security Agency contractor, in a conversation with the American Civil Liberties Union’s Christopher Soghoian and Ben Wizner, also charged the current and most recent chief of the NSA as the two people most responsible for jeopardizing the country’s national security due to their preference for aggressive collection of data rather than protection of it after the Sept. 11, 2001, terrorist attacks.

“More than anything, there are two officials who have harmed our Internet security and national security,” Snowden said, his image backdropped by an enlarged copy of the U.S. Constitution. “Those two officials are Michael Hayden and Keith Alexander.”

https://www.nationaljournal.com/tech/edward-snowden-to-sxsw-nsa-leaders-have-harmed-our-national-security-more-than-anything-else-20140310