DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement. Outside partners to aid dual tech: spy-by-crypto.
John Young wrote:
DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement.
Outside partners to aid dual tech: spy-by-crypto.
Did you EVER have any doubts? 2016 IAD Top Technology Challenges Cyber sensing and analysis, adaptable and scalable Automated risk detection �monitoring, collection, fusion, sense-making Automated risk mitigation �decision making, orchestration, response actions Future cryptography �algorithms, protocols, practices Secure mobility �usable, assured, extending from endpoints to clouds Distributed cyber situational awareness (multi-domain, multi-event, timely, spanning authorities and sources, etc.) Predict, measure, and manage the impact of compromises on mission execution (in design & operation) Optimize and automate detection and mitigation across the kill chain Internet of Things �how to harden it, use it, defend it, and protect against it Assured recovery & reconstitution of operational cyber systems Improve HW and SW assurance for defense systems (incl. weapons platforms) https:// www. nsa. gov/ia/ -- RR "Freedom is the capacity to pause between stimulus and response." ~Rollo May
How does "spy-by-crypto" work? On Fri, Jan 22, 2016 at 2:53 PM, John Young <jya@pipeline.com> wrote:
DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement.
Outside partners to aid dual tech: spy-by-crypto.
On Fri, 22 Jan 2016 15:46:18 -0500 Michael Best <themikebest@gmail.com> wrote:
How does "spy-by-crypto" work?
why don't you ask your owners? fill a 'foia' or something.
On Fri, Jan 22, 2016 at 2:53 PM, John Young <jya@pipeline.com> wrote:
DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement.
Outside partners to aid dual tech: spy-by-crypto.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 01/22/2016 03:46 PM, Michael Best wrote:
How does "spy-by-crypto" work?
If you can't beat them, buy them out: Compromised cryptographic tools are a rich source of intelligence. Historical example: http://www.mediafilter.org/caq/cryptogate/ Current example: https://www.schneier.com/blog/archives/2015/12/nsagchq_exploit.html :o)
On Fri, Jan 22, 2016 at 2:53 PM, John Young <jya@pipeline.com <mailto:jya@pipeline.com>> wrote:
DIRNSA said at Atlantic Council on 21 January that NSA spying ("intelligence") and information protection (IAD) to be meshed. Separation not suitable for current requirement.
Outside partners to aid dual tech: spy-by-crypto.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBAgAGBQJWoqcHAAoJEDZ0Gg87KR0LefYP/28ea/Rf2w/yAM21SrtX6paR uqndXOhoDoNn99CqHMcHYtmj7wzIi4V5VAyDBDbkUMiVAciWdXJ9ONESfD8xdxZ2 FcpmobEfHlbyCWILzaSrB5iRjL0GmXuix41B3ow15JDS6U91XDRhKcOBWhkX/shh InYAa85l1ZQP+K81+cWhckoqKivS1kPm6RdCMAQRJQ81oVeh+xQKGhWf94nAaWgN kSuE500BrE708oFrXaqm+dX+Bl/BwQNg0W1ckRTe20XW86b6s2t1BFzBOT8g3NMb YY8iIettl9hOxOh6WwlTvuiQHD8SRJNADDMoU0x4s/RmKcIx73Bpr8tGehhS3/3t bpyQ4p1hcgJ37yjLy5h8tQP94/Xmih9CWmQUzxoji2aMWAJ0pxN54ooE4wyyX4aK MW+jGdBV8oQy6i7+/BSueWKB/9xn9+tyEPl95DZpwy6MmSmw97MbR/8F7GVznZTR 8y2SCW5MnM4ntDlcw7zcqIw318S/zBSKn+i8N6Q+szIWrmZYo7KMSdYKh/frQm5c bv0jfiVdwdajoQYEgmvuMGSxAAxYI0rSt/Ztya/UaXbt2pdmK3tki/kcjoK+pBcw s6h4v677Cyhcm6s6zmBRdaDMIZkZjEKO0oEHk814vTPGb9bSD8uzPmZ1EClg9cOz bEy8lXdIfGmBQFC0UhpW =Rfi6 -----END PGP SIGNATURE-----
participants (5)
-
John Young
-
juan
-
Michael Best
-
Rayzer
-
Steve Kinney