Showing posts with label exclusive. Show all posts
Showing posts with label exclusive. Show all posts

Monday, March 31, 2014

Exclusive: Syrian forces trying to secure border areas in Idlib province

At Not Just The News, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Not Just The News and how it is used.


Log Files


Like many other Web sites, Not Just The News makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Not Just The News does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Not Just The News.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Not Just The News and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Not Just The News send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Not Just The News has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Not Just The News"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Exclusive: Syrian forces trying to secure border areas in Idlib province

Friday, March 21, 2014

Exclusive: Boeing U.S. tanker program seen $1 billion over budget



WASHINGTON Fri Mar 21, 2014 3:42pm EDT



Saturday, March 1, 2014

Exclusive - Maharishi on Transcendental Meditation - Larry King Live

At Alternate Viewpoint, the privacy of our visitors is of extreme importance to us (See this article to learn more about Privacy Policies.). This privacy policy document outlines the types of personal information is received and collected by Alternate Viewpoint and how it is used.


Log Files


Like many other Web sites, Alternate Viewpoint makes use of log files. The information inside the log files includes internet protocol (IP) addresses, type of browser, Internet Service Provider (ISP), date/time stamp, referring/exit pages, and number of clicks to analyze trends, administer the site, track user"s movement around the site, and gather demographic information. IP addresses, and other such information are not linked to any information that is personally identifiable.


Cookies and Web Beacons


Alternate Viewpoint does use cookies to store information about visitors preferences, record user-specific information on which pages the user access or visit, customize Web page content based on visitors browser type or other information that the visitor sends via their browser.


DoubleClick DART Cookie


  • Google, as a third party vendor, uses cookies to serve ads on Alternate Viewpoint.

  • Google"s use of the DART cookie enables it to serve ads to users based on their visit to Alternate Viewpoint and other sites on the Internet.

  • Users may opt out of the use of the DART cookie by visiting the Google ad and content network privacy policy at the following URL - http://www.google.com/privacy_ads.html.

These third-party ad servers or ad networks use technology to the advertisements and links that appear on Alternate Viewpoint send directly to your browsers. They automatically receive your IP address when this occurs. Other technologies ( such as cookies, JavaScript, or Web Beacons ) may also be used by the third-party ad networks to measure the effectiveness of their advertisements and / or to personalize the advertising content that you see.


Alternate Viewpoint has no access to or control over these cookies that are used by third-party advertisers.


You should consult the respective privacy policies of these third-party ad servers for more detailed information on their practices as well as for instructions about how to opt-out of certain practices. Alternate Viewpoint"s privacy policy does not apply to, and we cannot control the activities of, such other advertisers or web sites.


If you wish to disable cookies, you may do so through your individual browser options. More detailed information about cookie management with specific web browsers can be found at the browser"s respective websites.



Exclusive - Maharishi on Transcendental Meditation - Larry King Live

Tuesday, February 25, 2014

AP Exclusive: Few Army women want combat jobs








FILE – This Sept. 18, 2012 file photo shows female soldiers training on a firing range while wearing new body armor in Fort Campbell, Ky. Only a small fraction of Army women say they’d like to move into one of the newly opening combat jobs, but those few who do, say they want a job that takes them right into the heart of battle, according to preliminary results from a survey of the service’s nearly 170,000 women. (AP Photo/Mark Humphrey, File)





FILE – This Sept. 18, 2012 file photo shows female soldiers training on a firing range while wearing new body armor in Fort Campbell, Ky. Only a small fraction of Army women say they’d like to move into one of the newly opening combat jobs, but those few who do, say they want a job that takes them right into the heart of battle, according to preliminary results from a survey of the service’s nearly 170,000 women. (AP Photo/Mark Humphrey, File)





FILE – In this Jan. 27, 2012 file photo, Army Chief of Staff Gen. Raymond Odierno speaks at the Pentagon. Only a small fraction of Army women say they’d like to move into one of the newly opening combat jobs, but those few who do, say they want a job that takes them right into the heart of battle, according to preliminary results from a survey of the service’s nearly 170,000 women. The issue is going to be the propensity of women who want to do some of these things,” Odierno said in an interview with The AP. “I don’t think it’s going to be as great as people think.” (AP Photo/Pablo Martinez Monsivais, File)













Buy AP Photo Reprints







(AP) — Only a small fraction of Army women say they’d like to move into one of the newly opening combat jobs, but those few who do say they want a job that takes them right into the heart of battle, according to preliminary results from a survey of the service’s nearly 170,000 women.


That survey and others across the Army, publicly disclosed for the first time to The Associated Press, also revealed that soldiers of both genders are nervous about women entering combat jobs but say they are determined to do it fairly. Men are worried about losing their jobs to women; women are worried they will be seen as getting jobs because of their gender and not their qualifications. Both are emphatic that the Army must not lower standards to accommodate women.


Less than 8 percent of Army women who responded to the survey said they wanted a combat job. Of those, an overwhelming number said they’d like to be a Night Stalker — a member of the elite special operations helicopter crews who perhaps are best known for flying the Navy SEALS into Osama bin Laden’s compound in 2011.


Last year top Pentagon officials signed an order saying women must have the same opportunities as men in combat jobs and the services have been devising updated physical standards, training, education and other programs for thousands of jobs they must open Jan. 1, 2016. The services must open as many jobs to women as possible; if they decide to keep some closed, they must explain why.


The Army says that about 200,000 of its 1.1 million jobs are either direct combat or related jobs such as field artillery, combat engineers and so on. That’s roughly 20 percent of the force, though the direct-combat front-line fighters make up roughly half of that or about 9 percent.


Throughout last year, the Army emailed questionnaires to active duty, reserves and Army National Guard members to gauge soldiers’ views on the move to bring women into combat jobs. The results from the survey sent to women showed that just 2,238 — or 7.5 percent — of the 30,000 who responded said they would want one of the infantry, armor, artillery and combat engineer jobs.


Army officials also polled men and women on their concerns about the integration. And they asked senior female leaders to say whether they would have chosen combat jobs if they’d been given that chance 10 or 20 years ago.


All agreed the physical standards for the jobs should remain the same.


“The men don’t want to lower the standards because they see that as a perceived risk to their team,” David Brinkley, deputy chief of staff for operations at the Army’s Training and Doctrine Command, told the AP. “The women don’t want to lower the standards because they want the men to know they’re just as able as they are to do the same task.”


Brinkley’s office at Fort Eustis is filled with charts, graphs and data the Army is using to methodically bring women into jobs that have been previously open only to men. The surveys are helping to shape the education and preparation that women, men and top leaders need to put in place to insure the integration goes smoothly.


The questionnaires, and the focus groups that followed them, showed that younger men and those who have served with women in the last two years are more open to the integration, while mid-level soldiers — particularly those in units such as infantry and armor that have not yet included women — were more hesitant.


And there were nagging stereotypes. Male soldiers fretted that their unit’s readiness will be degraded because of what they term “women issues,” such as pregnancy and menstrual cycles. Or they worried that women incapable of the physical demands would be brought in anyway.


Officers were concerned about sexual harassment and improper relationships. And the idea of integrated units bothered both military wives and husbands.


Plagued by an increase in reported sexual assaults, the military is putting a much greater emphasis on training, reporting and treatment. But that increased focus, said Brinkley, has prompted some troops to say they are worried to be in the same room together.


The men, said Brinkley, worry that anything they say could ruin their careers.


“Did we have a problem? Yes. Are we aggressively solving it? Yes,” said Brinkley. But, he added, “we’ve kind of created a little environment of fear, which we fear might frankly hinder integration.”


The solution, said Brinkley and other Army leaders, involves education, training and good leadership.


Women across the Army have been getting pregnant for years and those units have dealt with it. And, while inappropriate relationships do happen, they are a violation of regulations. So it is up to unit leaders to enforce the Uniform Code of Military Justice in the combat arms units, just as they do in others.


Army leaders were unsurprised by the small number of women interested in combat jobs.


“The issue is going to be the propensity of women who want to do some of these things,” Gen. Ray Odierno, chief of staff of the Army, said in an interview with the AP. “I don’t think it’s going to be as great as people think.”


According to the survey, the vast majority of the women who expressed interest in combat jobs were in the lower ranks, age 27 or younger.


Some of the more experienced soldiers said that if they had it to do all over again, they might choose one of the combat arms jobs.


The limited interest also is in line with what other countries, such as Norway, have seen as they integrated women into combat roles, Brinkley said.


But, what surprised even him was what the women named as their preferred combat career.


More than 30 percent of the survey respondents pointed to the 160th Special Operations Aviation Regiment.


“I went back to the analysts and I said, ‘is there a glitch in this?’” said Brinkley.


But adding women will help the unit fill some spots. The 160th commander has said he is struggling, for example, to get mechanics, but even though there are many in the Army, he can’t bring them on because they are women, Brinkley said.


The 160th is a specialized unit used to fly forces fast, low and deep behind enemy lines under cover of darkness. Seventeen women already work in the unit in administrative, intelligence and logistics posts. And there have long been women aviators and aircrew in the conventional Army, just not on the special operations teams.


Hundreds of pilot and crew positions in the 160th were formally opened to women last June. And, as of Monday, officials said a number of women had applied and a handful have gotten the initial favorable assessment that allows them to begin moving through the process that includes a rigorous training course.


The second most popular choice was infantry, followed closely by combat engineers. Far fewer said they wanted to be in the field artillery, where unit members move and work with massive rocket and cannon systems. And the least popular branch of the Army they named was armor — jobs that involve working in the hulking tanks and armored vehicles.


“We’ve got to utilize the talent that we have available,” Odierno said. “We have some incredible female talent that we’ve been ignoring for a long time. We’ve got to get it in the right place.”


Associated Press




Top Headlines



AP Exclusive: Few Army women want combat jobs

Saturday, January 11, 2014

Exclusive: Spider-Man alter ego Peter Parker to return from death

Exclusive: Spider-Man alter ego Peter Parker to return from death
http://assets.nydailynews.com/polopoly_fs/1.1575792.1389391154!/img/httpImage/image.jpg_gen/derivatives/landscape_635/spiderman12n-1-web.jpg

Peter Parker resumes his swinging in ‘The Amazing Spider-Man’ #1, due out in April, from writer Dan Slott and artist Humberto Ramos.

Humberto Ramos/Marvel


Peter Parker resumes his swinging in ‘The Amazing Spider-Man’ #1, due out in April, from writer Dan Slott and artist Humberto Ramos.




Thirteen months after Spider-Man’s alter-ego was fatally squashed in the pages of his comic book, Peter Parker is about to make a miraculous recovery.


The nerdy Queens-born super hero had gone out losing to the nefarious Dr. Octopus — who trapped his arch-enemy’s mind in his own dying body just in time for him to croak. Doc Ock, aka Otto Octavius, survived in Parker’s body to take up the mantle of Spider-Man with no one else the wiser.


Writer Dan Slott had known Parker’s demise wasn’t permanent and the wall-crawling Mets fan would be back in the relaunched “Amazing Spider-Man” series that debuts this April, but he had to endure reaction ranging from death threats to Internet backlash to childrens’ tears while maintaining secrecy.


Slott divulged some of the top secret story to the ‘reel-life’ Spidey, Andrew Garfield, during a visit last summer to the set of ‘Amazing Spider-Man 2.’

Courtesy of Dan Slott


Slott divulged some of the top secret story to the ‘reel-life’ Spidey, Andrew Garfield, during a visit last summer to the set of ‘Amazing Spider-Man 2.’



“To do that for a solid year of my life, that’s the hardest thing I’ve had to do — to look small children in the eye at a convention and lie to them,” says Slott. “One of them with an honest-to-God Little League uniform and a quivering lip. Inside, part of me was dying.”


He did, however, cave under the pressure when he met actor Andrew Garfield on the set of “Amazing Spider-Man 2.” After the actor who plays Parker on the big screen expressed his shock over the death of the beloved character, Slott admits he dropped some secretive hints.


“(Parker’s coming back) just in time, fancy that, for a major Spider-Man motion picture,” quipped Slott. “It seems uncanny. It was very nice for Sony to schedule the movie around the story.”


Doctor Octopus took over Spider-Man’s body for the past 13 months, causing the death of his arch-nemesis in the process.

Humberto Ramos/MARVEL


Doctor Octopus took over Spider-Man’s body for the past 13 months, causing the death of his arch-nemesis in the process.



Bumping off the face of franchise, though, was a risky move.


Ever since Stan Lee and Steve Ditko (and possibly Jack Kirby) launched the awkward super hero in 1962’s “Amazing Fantasy” # 15, Parker even more than Spidey has been the publisher’s most popular creation. He’s relatable because his Spider-Sense couldn’t help him manage his personal life any better than his readers could manage theirs.


“It would have been great if you took a photo of my face at that time. I was not very thrilled,” says Marvel Editor in Chief Axel Alonso of Slott’s initial pitch, during an editorial retreat several years ago. “Let’s just say that as cynical as the hard-core fanboy was, I was more cynical.”


An alternate cover of ‘Amazing Spider-Man #1’ by artist Jerome Opeña

Jerome Opeña/Marvel


An alternate cover of ‘Amazing Spider-Man #1’ by artist Jerome Opeña



Alonso, however, adds that after five decades of stories that featured Parker battling a recurring set of villains and personal problems, “I do feel people will appreciate him a little more after this. I do think people have been taking him for granted.”


And over the past 13 months, the unthinkable happened: many fans gravitated towards the meaner, more arrogant Doc Ock version of Spider-Man — some maybe even prefering him to the goodie-two-shoes original.


“It feels like for every reader lost another reader jumped on,” says Matthew Klein, 27, a worker at Forbidden Planet, a comic book store near Manhattan’s Union Square.


“We’ve gone over 30 issues without Peter Parker, so when we let him out of that box and he gets to put on that costume again and he gets to swing through the sky, it’s going to be the greatest feeling,” says Slott.


“But there’s a twist. There’s always a twist.”


esacks@nydailynews.com




Entertainment – NY Daily News




Read more about Exclusive: Spider-Man alter ego Peter Parker to return from death and other interesting subjects concerning Entertainment at TheDailyNewsReport.com

Wednesday, December 25, 2013

AP Exclusive: Al-Qaida leader targeting UN workers








This undated photo provided by Iraqi government intelligence officials on Wednesday, Dec. 25, 2013 shows Nusra Front leader Abu Mohammed al-Golani. Iraqi intelligence officials that the shadowy leader of the powerful al-Qaida group fighting in Syria has sought to kidnap United Nations workers. The officials say they obtained the information about al-Golani, after capturing members of another al-Qaida group and that men gave them the first known photograph of al-Golani and letters written by the militant leader. (AP Photo/Iraqi Government)





This undated photo provided by Iraqi government intelligence officials on Wednesday, Dec. 25, 2013 shows Nusra Front leader Abu Mohammed al-Golani. Iraqi intelligence officials that the shadowy leader of the powerful al-Qaida group fighting in Syria has sought to kidnap United Nations workers. The officials say they obtained the information about al-Golani, after capturing members of another al-Qaida group and that men gave them the first known photograph of al-Golani and letters written by the militant leader. (AP Photo/Iraqi Government)





This undated photo provided by Iraqi government intelligence officials on Wednesday, Dec. 25, 2013 shows Nusra Front leader Abu Mohammed al-Golani. Iraqi intelligence officials that the shadowy leader of the powerful al-Qaida group fighting in Syria has sought to kidnap United Nations workers. The officials say they obtained the information about al-Golani, after capturing members of another al-Qaida group and that men gave them the first known photograph of al-Golani and letters written by the militant leader. (AP Photo/Iraqi Government)













Buy AP Photo Reprints







(AP) — The shadowy leader of a powerful al-Qaida group fighting in Syria sought to kidnap United Nations workers and scrawled out plans for his aides to take over in the event of his death, according to excerpts of letters obtained Wednesday by The Associated Press.


Iraqi intelligence officials offered the AP the letters, as well as the first known photograph of the Nusra Front leader, Abu Mohammed al-Golani, the head of one of the most powerful bands of radicals fighting the Syrian government in the country’s civil war.


The officials said they obtained the information about al-Golani after they captured members of another al-Qaida group in September. They spoke on condition of anonymity because they weren’t authorized to speak to journalists.


“I was told by a soldier that he observed some of the workers of the U.N. and he will kidnap them. I ask God for his success,” read an excerpt of a letter given by officials from Iraq’s Falcon Intelligence Cell, an anti-terrorism unit that works under Prime Minister Nouri al-Maliki.


The officials said other letters planned the kidnapping and killing of other foreigners, and Syrian and Iraqi civilians.


One U.N. worker was kidnapped for eight months in Syria and was released in October. Another two dozen U.N. peacekeepers were briefly held this year. It’s not clear if those abductions had any relation to al-Golani’s letters.


Syria’s uprising began with peaceful protests, but it turned into an armed uprising after Assad’s forces cracked down on demonstrators.


Since then, hard-line Islamic brigades have emerged as the strongest rebel forces in Syria, chiefly among them the Nusra Front.


Under al-Golani’s leadership, it has dominated rebel-held parts of southern Syria, and it is a powerful fighting force in the Damascus countryside and northern Syria, with an estimated force of 6,000 to 7,000 fighters.


Al-Maliki’s Shiite-majority government is considered a quiet ally of Syrian President Bashar Assad. The officials may have released the letter excerpts to underscore the dominance of al-Qaida in Syria.


The intelligence officials did not where they found the al-Qaida fighters who handed over the documents. They also would not say when the letters were written, though they said it represented a tiny sample of a large cache of documents.


The officials couldn’t explain why the letter excerpts were in a sloppily written, grammatically incorrect version of an Arabic dialect used across the Levant. It is believed that al-Golani was an Arabic teacher before he rose through al-Qaida’s ranks, and typically hard-line Muslims try to write in classical Arabic.


It may have been that an aide was writing down al-Golani’s speech. Arabs typically speak in dialects that are often quite different from the classical Arabic.


“The claim by Iraqi intelligence that Jolani and by extension, Jabhat al-Nusra, have been behind an explicit policy of kidnapping U.N. workers should be treated with some suspicion,” said Charles Lister, a prominent analyst of Syria’s militant groups. He referred to the Nusra Front by its Arabic name. “While it might well be true, elements within Iraq’s security services have a clear interest in portraying jihadists in Syria and Iraq in a highly negative light.”


Little is known about al-Golani, including his real name. He is believed to be 39 years old. The photograph suggests a man in his thirties.


Al-Golani is a nom de guerre, indicating he was born in the Israeli-occupied Golan Heights.


A Syrian native, he joined the insurgency after moving to Iraq.


He advanced through al-Qaida’s ranks and eventually became a close associate of Abu Musab al-Zarqawi, the Jordanian-born leader of the militant group al-Qaida in Iraq.


He eventually returned to Syria shortly after the uprising against Assad began in March 2011, where he formed the Nusra Front, first announced in January 2012.


The group gained prominence in April after Golani rejected an attempted takeover of the Nusra Front by another rival al-Qaida group, now known as the Islamic State of Iraq and the Levant.


Iraqi intelligence officials said it was members of ISIL who gave them the information about al-Golani.


___


Associated Press writers Bassem Mroue and Diaa Hadid in Beirut contributed to this report.


Associated Press




Top Headlines



AP Exclusive: Al-Qaida leader targeting UN workers

Friday, December 20, 2013

Exclusive: Secret contract tied NSA and security industry pioneer




SAN FRANCISCO Fri Dec 20, 2013 7:17pm EST



A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/REUTERS

A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/


Credit: Reuters




SAN FRANCISCO (Reuters) – As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $ 10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.


Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.


Undisclosed until now was that RSA received $ 10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.


The earlier disclosures of RSA’s entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.


RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.


RSA and EMC declined to answer questions for this story, but RSA said in a statement: “RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own.”


The NSA declined to comment.


The RSA deal shows one way the NSA carried out what Snowden’s documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using “commercial relationships” to advance that goal, but did not name any security companies as collaborators.


The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that “encryption is an essential basis for trust on the Internet,” and called for a halt to any NSA efforts to undermine it.


Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA’s corporate evolution away from pure cryptography products as one of the reasons it occurred.


But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.


“They did not show their true hand,” one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.


STORIED HISTORY


Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA’s encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.


At the core of RSA’s products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.


From RSA’s earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.


The stakes rose when more technology companies adopted RSA’s methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.


RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words “Sink Clipper!”


A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.


The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.


“We became the tip of the spear, so to speak, in this fight against government efforts,” Bidzos recalled in an oral history.


RSA EVOLVES


RSA and others claimed victory when export restrictions relaxed.


But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.


RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.


And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $ 27.5 million of RSA’s revenue, less than 9% of the $ 310 million total.


“When I joined there were 10 people in the labs, and we were fighting the NSA,” said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. “It became a very different company later on.”


By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.


New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.


An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST’s blessing is required for many products sold to the government and often sets a broader de facto standard.


RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.


RSA’s contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.


“The labs group had played a very intricate role at BSafe, and they were basically gone,” said labs veteran Michael Wenocur, who left in 1999.


Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula “can only be described as a back door.”


After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.


But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.


The White House, meanwhile, says it will consider this week’s panel recommendation that any efforts to subvert cryptography be abandoned.


(Reporting by Joseph Menn; Editing by Jonathan Weber and Grant McCool)





Reuters: Top News



Exclusive: Secret contract tied NSA and security industry pioneer

Exclusive: Secret contract tied NSA and security industry pioneer




SAN FRANCISCO Fri Dec 20, 2013 7:48pm EST



A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/REUTERS

A National Security Agency (NSA) data gathering facility is seen in Bluffdale, about 25 miles (40 km) south of Salt Lake City, Utah, December 16, 2013. Jim Urquhart/


Credit: Reuters




SAN FRANCISCO (Reuters) – As a key part of a campaign to embed encryption software that it could crack into widely used computer products, the U.S. National Security Agency arranged a secret $ 10 million contract with RSA, one of the most influential firms in the computer security industry, Reuters has learned.


Documents leaked by former NSA contractor Edward Snowden show that the NSA created and promulgated a flawed formula for generating random numbers to create a “back door” in encryption products, the New York Times reported in September. Reuters later reported that RSA became the most important distributor of that formula by rolling it into a software tool called Bsafe that is used to enhance security in personal computers and many other products.


Undisclosed until now was that RSA received $ 10 million in a deal that set the NSA formula as the preferred, or default, method for number generation in the BSafe software, according to two sources familiar with the contract. Although that sum might seem paltry, it represented more than a third of the revenue that the relevant division at RSA had taken in during the entire previous year, securities filings show.


The earlier disclosures of RSA’s entanglement with the NSA already had shocked some in the close-knit world of computer security experts. The company had a long history of championing privacy and security, and it played a leading role in blocking a 1990s effort by the NSA to require a special chip to enable spying on a wide range of computer and communications products.


RSA, now a subsidiary of computer storage giant EMC Corp, urged customers to stop using the NSA formula after the Snowden disclosures revealed its weakness.


RSA and EMC declined to answer questions for this story, but RSA said in a statement: “RSA always acts in the best interest of its customers and under no circumstances does RSA design or enable any back doors in our products. Decisions about the features and functionality of RSA products are our own.”


The NSA declined to comment.


The RSA deal shows one way the NSA carried out what Snowden’s documents describe as a key strategy for enhancing surveillance: the systematic erosion of security tools. NSA documents released in recent months called for using “commercial relationships” to advance that goal, but did not name any security companies as collaborators.


The NSA came under attack this week in a landmark report from a White House panel appointed to review U.S. surveillance policy. The panel noted that “encryption is an essential basis for trust on the Internet,” and called for a halt to any NSA efforts to undermine it.


Most of the dozen current and former RSA employees interviewed said that the company erred in agreeing to such a contract, and many cited RSA’s corporate evolution away from pure cryptography products as one of the reasons it occurred.


But several said that RSA also was misled by government officials, who portrayed the formula as a secure technological advance.


“They did not show their true hand,” one person briefed on the deal said of the NSA, asserting that government officials did not let on that they knew how to break the encryption.


STORIED HISTORY


Started by MIT professors in the 1970s and led for years by ex-Marine Jim Bidzos, RSA and its core algorithm were both named for the last initials of the three founders, who revolutionized cryptography. Little known to the public, RSA’s encryption tools have been licensed by most large technology companies, which in turn use them to protect computers used by hundreds of millions of people.


At the core of RSA’s products was a technology known as public key cryptography. Instead of using the same key for encoding and then decoding a message, there are two keys related to each other mathematically. The first, publicly available key is used to encode a message for someone, who then uses a second, private key to reveal it.


From RSA’s earliest days, the U.S. intelligence establishment worried it would not be able to crack well-engineered public key cryptography. Martin Hellman, a former Stanford researcher who led the team that first invented the technique, said NSA experts tried to talk him and others into believing that the keys did not have to be as large as they planned.


The stakes rose when more technology companies adopted RSA’s methods and Internet use began to soar. The Clinton administration embraced the Clipper Chip, envisioned as a mandatory component in phones and computers to enable officials to overcome encryption with a warrant.


RSA led a fierce public campaign against the effort, distributing posters with a foundering sailing ship and the words “Sink Clipper!”


A key argument against the chip was that overseas buyers would shun U.S. technology products if they were ready-made for spying. Some companies say that is just what has happened in the wake of the Snowden disclosures.


The White House abandoned the Clipper Chip and instead relied on export controls to prevent the best cryptography from crossing U.S. borders. RSA once again rallied the industry, and it set up an Australian division that could ship what it wanted.


“We became the tip of the spear, so to speak, in this fight against government efforts,” Bidzos recalled in an oral history.


RSA EVOLVES


RSA and others claimed victory when export restrictions relaxed.


But the NSA was determined to read what it wanted, and the quest gained urgency after the September 11, 2001 attacks.


RSA, meanwhile, was changing. Bidzos stepped down as CEO in 1999 to concentrate on VeriSign, a security certificate company that had been spun out of RSA. The elite lab Bidzos had founded in Silicon Valley moved east to Massachusetts, and many top engineers left the company, several former employees said.


And the BSafe toolkit was becoming a much smaller part of the company. By 2005, BSafe and other tools for developers brought in just $ 27.5 million of RSA’s revenue, less than 9% of the $ 310 million total.


“When I joined there were 10 people in the labs, and we were fighting the NSA,” said Victor Chan, who rose to lead engineering and the Australian operation before he left in 2005. “It became a very different company later on.”


By the first half of 2006, RSA was among the many technology companies seeing the U.S. government as a partner against overseas hackers.


New RSA Chief Executive Art Coviello and his team still wanted to be seen as part of the technological vanguard, former employees say, and the NSA had just the right pitch. Coviello declined an interview request.


An algorithm called Dual Elliptic Curve, developed inside the agency, was on the road to approval by the National Institutes of Standards and Technology as one of four acceptable methods for generating random numbers. NIST’s blessing is required for many products sold to the government and often sets a broader de facto standard.


RSA adopted the algorithm even before NIST approved it. The NSA then cited the early use of Dual Elliptic Curve inside the government to argue successfully for NIST approval, according to an official familiar with the proceedings.


RSA’s contract made Dual Elliptic Curve the default option for producing random numbers in the RSA toolkit. No alarms were raised, former employees said, because the deal was handled by business leaders rather than pure technologists.


“The labs group had played a very intricate role at BSafe, and they were basically gone,” said labs veteran Michael Wenocur, who left in 1999.


Within a year, major questions were raised about Dual Elliptic Curve. Cryptography authority Bruce Schneier wrote that the weaknesses in the formula “can only be described as a back door.”


After reports of the back door in September, RSA urged its customers to stop using the Dual Elliptic Curve number generator.


But unlike the Clipper Chip fight two decades ago, the company is saying little in public, and it declined to discuss how the NSA entanglements have affected its relationships with customers.


The White House, meanwhile, says it will consider this week’s panel recommendation that any efforts to subvert cryptography be abandoned.


(Reporting by Joseph Menn; Editing by Jonathan Weber and Grant McCool)






Reuters: Politics



Exclusive: Secret contract tied NSA and security industry pioneer

Friday, December 13, 2013

Exclusive: After "cataclysmic" Snowden affair, NSA faces winds of change




FORT MEADE, Maryland Fri Dec 13, 2013 6:35pm EST



U.S. National Security Agency (NSA) Director General Keith Alexander testifies before the Senate Judiciary Committee in Washington December 11, 2013. REUTERS/Gary Cameron

U.S. National Security Agency (NSA) Director General Keith Alexander testifies before the Senate Judiciary Committee in Washington December 11, 2013.


Credit: Reuters/Gary Cameron




FORT MEADE, Maryland (Reuters) – The U.S. National Security Agency has made dozens of changes in its operations and computer networks to prevent the emergence of another Edward Snowden, including potential disciplinary action, a top NSA official said on Friday, as a White House review panel recommended restraints on NSA spying.


Former NSA contractor Snowden’s disclosures have been “cataclysmic” for the eavesdropping agency, Richard Ledgett, who leads a task force responding to the leaks, said in a rare interview at NSA’s heavily guarded Fort Meade headquarters.


In the more than hour-long interview, Ledgett acknowledged the agency had done a poor job in its initial public response to revelations of vast NSA monitoring of phone and Internet data; pledged more transparency; and said he was deeply worried about highly classified documents not yet public that are among the 1.7 million Snowden is believed to have accessed.


He also stoutly defended the NSA’s mission of tracking terrorist plots and other threats, and said its recruiting of young codebreakers, linguists and computer geeks has not been affected by the Snowden affair – even as internal morale has been.


“Any time you trust people, there is always a chance that someone will betray you,” he said.


The NSA is taking 41 specific technical measures to control data by tagging and tracking it, to supervise agency networks with controls on activity, and to increase oversight of individuals.


Measures include requiring two-person control of every place where someone could access data and enhancing the security process that people go through and requiring more frequent screenings of systems administrative access, Ledgett said.


After months of sometimes blistering criticism in the news media and by Congress and foreign governments, the publicity-averse NSA is now mounting an effort to tell its side of the Snowden story.


It granted access to NSA headquarters to a team from CBS’ “60 Minutes” program, which is scheduled to broadcast a segment on the agency on Sunday.


Ledgett, a 36-year intelligence veteran who reportedly is in line to be the agency’s deputy director, joked that doing media interviews was “a complete out-of-body experience for me.”


He spoke to Reuters on the same day that the White House said it had decided to maintain the practice of having a single individual head both the NSA and U.S. Cyber Command, which conducts cyberwarfare – an outcome the NSA leadership favored.


Separately, news reports late Thursday said an outside review panel appointed by the White House has recommended changes in a program disclosed by Snowden that collects basic data on Americans’ phone calls – known as metadata.


The panel reportedly said the data should be held by an organization other than the NSA and stricter rules should be enforced for searching the databanks.


Ledgett declined to discuss the panel’s specific recommendations. But he seemed to acknowledge that tighter guidelines for NSA eavesdropping were in the offing, saying that what is technologically possible “has gotten ahead of policy.”


Snowden, who is living under asylum in Russia, disclosed a vast U.S. eavesdropping apparatus that includes the phone metadata program; NSA querying of Internet communications via major companies such as Google Inc and Facebook Inc; and widespread tapping of international communication networks.


Ledgett made no apologies for what many see as overly aggressive NSA monitoring. He noted that the U.S. government’s intelligence taskings to the agency run to 36,000 pages, and said its activities take place within a “box” of U.S. laws and policies.


“We’ll color in every square millimeter of that box,” he said, implying the NSA will use its legal authorities to the fullest extent possible.


The NSA’s internal review has determined about 98 percent of the scope of the material that Snowden had accessed, and officials have found no evidence that he had help either within the NSA or from adversary spy agencies.


Ledgett said that when Snowden was downloading the documents, NSA was ahead of other intelligence agencies in installing “insider threat” software that President Barack Obama ordered in the wake of an earlier leak scandal involving the group WikiLeaks. But installation of the software, which might have stopped Snowden, was not complete.


“Snowden hit at a really opportune time. For him – not for us,” he said.


Ledgett said that most of the Snowden material released publicly so far has been about NSA programs and partnerships with foreign countries and companies, rather than intelligence reports and “requirements.” The latter refers to U.S. government taskings to the NSA to answer questions about specific targets.


That last category is what keeps him up at night. “Those make me nervous because they reveal what we know and what we don’t know and they are almost a roadmap for adversaries.”


No one at the NSA has yet lost their job over the Snowden crisis, including at the Hawaii site where he worked. Ledgett said three people are under review for potential disciplinary action, but declined further comment.


He challenged those who call Snowden a whistleblower, saying the former contractor did not use multiple channels available to vent his concerns. “I actually think characterizing him as a whistleblower is a disservice to people who are whistleblowers.”


Ledgett said he knew of no U.S. government move toward reaching any kind of a legal deal with Snowden, a decision that would be up to the Justice Department.


But, he said in his opinion, such a conversation would have to include concrete assurances that Snowden would secure any of the material he has that has not yet been made public.


In the aftermath of Snowden, the NSA is trying to be more open about what it does so the public can have more confidence in the agency’s mission.


“We as an agency are a little naive, for a long time we were ‘No Such Agency’ or ‘no comment’ and were not adept at presenting our face to the public,” he said.


“I think quite frankly had we done more of that over the last five or 10 years we might not be in the same place that we are vis-a-vis the public perception of who we are and what we do,” he said. “So too late to learn that lesson, so what you are seeing now is our new face.”


(Editing by Lisa Shumaker)





Reuters: Top News



Exclusive: After "cataclysmic" Snowden affair, NSA faces winds of change

Exclusive: After "cataclysmic" Snowden affair, NSA faces winds of change




WASHINGTON Fri Dec 13, 2013 4:53pm EST



U.S. National Security Agency (NSA) Director General Keith Alexander testifies before the Senate Judiciary Committee in Washington December 11, 2013. REUTERS/Gary Cameron

U.S. National Security Agency (NSA) Director General Keith Alexander testifies before the Senate Judiciary Committee in Washington December 11, 2013.


Credit: Reuters/Gary Cameron




WASHINGTON (Reuters) – President Barack Obama’s administration said on Friday it will keep one person in charge of both the National Security Agency spy agency and the military’s Cyber Command, despite calls for splitting the roles after revelations about vast U.S. electronic surveillance operations.


The White House had considered splitting up the two agencies, possibly giving the NSA a civilian leader for the first time in its 61-year history to dampen controversy over its programs revealed by former contractor Edward Snowden.


Both the NSA and Cyber Command, which conducts cyber warfare, are now headed by the same man, Army General Keith Alexander, who is retiring in March. Given that the chief of Cyber Command must be a military officer, the White House decision means that Alexander’s successor will be from the military as well.


“Following a thorough interagency review, the administration has decided that keeping the positions of NSA Director and Cyber Command Commander together as one, dual-hatted position is the most effective approach to accomplishing both agencies’ missions,” said Caitlin Hayden, spokeswoman for the White House’s National Security Council.


“Without the dual-hat arrangement, elaborate procedures would have to be put in place to ensure that effective coordination continued and avoid creating duplicative capabilities in each organization.”


The White House announced that Obama had received an outside panel’s recommendations on what constraints might be in order for the NSA and that the 40 recommendations would be reviewed.


“We expect our overall internal review to be completed in January and the president thereafter to deliver remarks to outline the outcomes of our work,” Hayden said.


The review was driven by public disclosures about NSA spying, including reports that German Chancellor Angela Merkel’s phone had been monitored.


Based in Fort Meade, Maryland, Cyber Command tries to detect and stop computer penetration of military and other critical networks by U.S. adversaries like China, Iran and North Korea.


However, there is an increasing focus on offense as military commanders beef up plans to execute cyber strikes.


A steady drip of revelations from Snowden about the vast scope of NSA spying has raised widespread concern about the reach of such U.S. operations, with its ability to pry into the affairs of private individuals as well as the communications of foreign leaders.


REVIEW OF SPYING


Obama said last week he intended to propose NSA reforms to reassure Americans that the agency was not violating their privacy.


“I’ll be proposing some self-restraint on the NSA and to initiate some reforms that can give people more confidence,” Obama said in a television interview on December 5.


The Wall Street Journal reported late on Thursday that the outside panel’s draft proposals call for changing the NSA leadership from military to civilian as well as storing the vast amount of data on phone calls collected by the agency at a third-party organization.


The proposals also recommend stricter standards for searching the data amassed by the NSA, the Journal said.


The recommendations from panel, called the Review Group on Intelligence and Communications Technologies, are among several measures suggested this year by Obama, who has said he ordered a review of the surveillance programs before Snowden leaked secret documents to media.


Hayden declined comment “on a report that is not yet final and hasn’t yet been submitted to the White House.” He said the administration was still working out the details of how and when it will be made public.


(Additional reporting by Alina Selyukh and Steve Holland; Editing by Alistair Bell and Christopher Wilson)






Reuters: Politics



Exclusive: After "cataclysmic" Snowden affair, NSA faces winds of change

Wednesday, December 4, 2013

Exclusive: Morgan Stanley, UBS hired to run Applus+ IPO - source

Exclusive: Morgan Stanley, UBS hired to run Applus+ IPO - source
http://currenteconomictrendsandnews.com/wp-content/uploads/2013/12/a1466__?m=02&d=20131204&t=2&i=817425387&w=580&fh=&fw=&ll=&pl=&r=CBRE9B31F6P00.jpg




LONDON/MADRID Wed Dec 4, 2013 1:25pm EST






Read more about Exclusive: Morgan Stanley, UBS hired to run Applus+ IPO - source and other interesting subjects concerning Business at TheDailyNewsReport.com