Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Saturday, 25 March, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

NIST receives open letter regarding NSA relationship

by The Gurus
November 25, 2014
in Editor's News
Share on FacebookShare on Twitter

An open letter has been sent to the National Institute for Standards and Technology (NIST) and copied to the White House asking for secure and resilient encryption standards to be built.
 
Signed by 19 organisations, including the EFF, Liberty Coalition, New America’s Open Technology Institute, Electronic Privacy Information Center (EPIC) and vendors including Silent Circle and Cloudflare, it calls for development “free from back doors or other known vulnerabilities”, and calls on NIST to “make a strong statement ensuring independence, security and integrity” in order to restore trust and re-commit itself to the promotion of innovation and industrial competitiveness.
 
It said that much more must be done to restore the public’s trust in the agency and to ensure that secure communications tools and technologies are built on solid foundations, and detailed six key points on what NIST should do. These were the following:
 
1 – NIST should further commit, to the extent that it does not invade personal privacy interests, to transparency on the identity and affiliation of individuals and organisations that consult on the development process;
 
2 – NIST should establish a policy wherein the Agency publicly explains the extent and nature of the NSA’s consultation on future standards and any modifications thereto made at NSA’s request and NIST should begin a review process to ensure that wherever possible the same information is published for standards that are currently in use;
 
3 – NIST should attempt to maximise reach and engagement and limit barriers to access in order to conduct the best possible outreach to the public and further, in deciding on platforms, NIST should not only consider reach, level of engagement, and barriers to access, but also the ability to search for and access historical content to ensure persistence and continuity;
 
4 – NIST should commit to always providing a security proof for standards when the standard is put out for public comment and to explaining the justification for, origin, and means of generation for any parameters supplied in NIST standards;
 
5 – [NIST] should specify that, unless necessary, [the Agency] will only take into account information assurance needs of government in establishing cryptography standards, and should, under no circumstances, consider the signals intelligence needs of the NSA or any other intelligence or law enforcement need of any agency;
 
6 – NIST should extend [the principle of Usability] to its cryptography work to ensure that security standards are not weaker in practice than anticipated by examining only the underlying mathematics.
 
There were also further calls for NIST to publicly and irrefutably commit itself to independence from the NSA’s signals intelligence mission and any Government surveillance programs, activities, or authorities, expand to include independent full-time technical expertise and additional funding in order to decrease reliance on the NSA and other members of the Intelligence Community to the extent that an Act of Congress is necessary to achieve these items.
 
It was also encouraged that NIST should revisit and revise its Memorandum of Understanding (MOU) with the NSA, which was first entered into in 1989, and was amended in 2010. “The MOU should again be amended, not only to recognize NIST’s commitment to transparency on consultations with the NSA, but also to add express limitations on that consulting,” the letter said.
 
“The MOU should expressly limit NSA’s consultations to the furtherance of its Information Assurance mission, and any consultation that artificially lowers encryption standards to preserve signals intelligence capabilities must be expressly prohibited.”
 
The letter concluded by saying that NIST should establish and facilitate a continued dialogue with members of civil society, advocacy organisations and other experts who represent the interests of the general public and users.

FacebookTweetLinkedIn
ShareTweetShare
Previous Post

Sony Pictures falls under attack which forces employees out of work

Next Post

Australia rolls out reporting network ACORN

Recent News

Synopsys discover new vulnerability in Pluck Content Management System

Synopsys discover new vulnerability in Pluck Content Management System

March 24, 2023
Dole Food Company

Dole confirms employee data was breached following February ransomware attack

March 24, 2023
call centre

MyCena Improves Customer Data Access Protection in Call Centers and BPOs

March 23, 2023
Blue logo, capitalised letters. SPECOPS.

Fortune 500 Company Names Found in Compromised Password Data

March 23, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information