Ellen Nakashima
Ellen Nakashima
CRITIC
img-contested
N/A
0 reviews
PUBLIC
img-contested
N/A
2 reviews

RECENT ARTICLES

Sort by:
No Rating
NSA official installed as Trump left office resigns after he was sidelined

NSA official installed as Trump left office resigns after he was sidelined

Michael Ellis, a former Republican political operative, resigned Friday as the National Security Agency’s top lawyer, having been sidelined for three months after President Biden took office.The NSA director, Gen. Paul Nakasone, had placed Ellis the day President Donald Trump left the White House — just as Ellis was taking up the position. The reasons: a pending Pentagon inspector general probe, an official told The Washington Post at the time, and a security inquiry into Ellis’s handling of classified information, according to to Nakasone, a copy of which was obtained by The Post.Nakasone...

April 17, 2021
Share
Save
Review
No Rating
Biden administration imposes significant economic sanctions on Russia over cyberspying, efforts to influence presidential election

Biden administration imposes significant economic sanctions on Russia over cyberspying, efforts to influence presidential election

The Biden administration on Thursday imposed the first significant sanctions targeting the Russian economy in several years in order to punish the Kremlin for a cyberespionage campaign against the United States and efforts to influence the presidential election, according to senior U.S. officials.The administration also sanctioned that support Russian spy services’ cyberhacking operations and will expel 10 intelligence officers working under diplomatic cover in the United States. It formally named the Russian intelligence service SVR as responsible for .The measures are an effort to make...

April 15, 2021
Share
Save
Review
No Rating
The FBI wanted to unlock the San Bernardino shooter’s iPhone. It turned to a little-known Australian firm.

The FBI wanted to unlock the San Bernardino shooter’s iPhone. It turned to a little-known Australian firm.

The iPhone used by a terrorist in the San Bernardino shooting was unlocked by a small Australian hacking firm in 2016, ending a momentous standoff between the U.S. government and the tech titan Apple.Azimuth Security, a publicity-shy company that says it sells its cyber wares only to democratic governments, secretly crafted the solution the FBI used to gain access to the device, according to several people familiar with the matter. The iPhone was used by one of two shooters whose December 2015 attack left more than a dozen people dead.The identity of the hacking firm has remained a closely...

April 14, 2021
Share
Save
Review
No Rating
China builds advanced weapons systems using American chip technology

China builds advanced weapons systems using American chip technology

In a secretive military facility in southwest China, a supercomputer whirs away, simulating the heat and drag on hypersonic vehicles speeding through the atmosphere — missiles that could one day be aimed at a U.S. aircraft carrier or Taiwan, according to former U.S. officials and Western analysts.The computer is powered by tiny chips designed by a Chinese firm called Phytium Technology using American software and built in the world’s most advanced chip factory in Taiwan, which hums with American precision machinery, say the analysts.Phytium portrays itself as a commercial company aspiring...

April 7, 2021
Share
Save
Review
No Rating
Army initially pushed to deny District’s request for National Guard before Jan. 6

Army initially pushed to deny District’s request for National Guard before Jan. 6

ADThe Army initially pushed to reject the D.C. government’s request for a modest National Guard presence ahead of the Jan. 6 rally that led to the Capitol riot, underscoring the deep reluctance of some higher-ups at the Pentagon to involve the military in security arrangements that day.In an internal draft memo obtained by The Washington Post, the Army said the U.S. military shouldn’t be needed to help police with traffic and crowd management, as city officials had requested, unless more than 100,000 demonstrators were expected.The draft memo also said the request should be denied because a...

+1
March 16, 2021
Share
Save
Review
No Rating
Acting defense secretary orders NSA director to immediately install former GOP operative as the agency’s top lawyer

Acting defense secretary orders NSA director to immediately install former GOP operative as the agency’s top lawyer

ADActing defense secretary Christopher C. Miller ordered the director of the National Security Agency to install on Saturday a former GOP political operative as the NSA’s top lawyer, according to four individuals familiar with the matter.It is unclear what the NSA will do. The agency and the Pentagon declined to comment.In November, Pentagon General Counsel Paul C. Ney Jr. named Michael Ellis, then a White House official, to the position of general counsel at the NSA, a career civilian post at the government’s largest and most technologically advanced spy agency, He was selected after a...

January 16, 2021
Share
Save
Review
No Rating
Pentagon chief orders NSA to install White House official as career lawyer

Pentagon chief orders NSA to install White House official as career lawyer

WASHINGTON - Acting defense secretary Christopher Miller ordered the director of the National Security Agency to install on Saturday a former GOP political operative as the NSA’s top lawyer, according to four individuals familiar with the matter. It is unclear what the NSA will do. The agency and the Pentagon declined to comment. In November, Pentagon General Counsel Paul Ney Jr. named Michael Ellis, then a White House official, to the position of general counsel at the NSA, a career civilian post at the government's largest and most technologically advanced spy agency, The Post reported....

January 17, 2021
Share
Save
Review
No Rating
Political appointees, career analysts clashed over assessments of Russian, Chinese interference in 2020 election

Political appointees, career analysts clashed over assessments of Russian, Chinese interference in 2020 election

ADPresident Trump’s political appointees clashed with career intelligence analysts over the extent to which Russia and China interfered or sought to interfere in the 2020 election, with each side accusing the other of politicization, according to a report by an intelligence community ombudsman., the “analytic ombudsman” for the Office of the Director of National Intelligence (ODNI), describe an intelligence community afflicted by a “widespread perception in the workforce about politicization” of analysis on the topic of foreign election influence — one that he says threatens the legitimacy...

January 8, 2021
Share
Save
Review
No Rating
U.S. intelligence community says Russia is ‘likely’ behind major cyberhacks of federal agencies

U.S. intelligence community says Russia is ‘likely’ behind major cyberhacks of federal agencies

ADThe U.S. intelligence community stated Tuesday that Russia is “likely” behind a major and ongoing series of cyberhacks of federal agencies and private companies — its first official indication of blame.The statement, issued jointly by four agencies in a special task force, counters President Trump’s baseless suggestion last month that the intrusions might have been the work of Chinese hackers.Secretary of State Mike Pompeo said previously that the breaches were “clearly” Russian in origin, and U.S. officials have for weeks said privately that Moscow’s foreign intelligence service carried...

January 5, 2021
Share
Save
Review
No Rating
Microsoft says Russians hacked its network, viewing source code

Microsoft says Russians hacked its network, viewing source code

ADRussian government hackers engaged in a sweeping series of breaches of government and private-sector networks have been able to penetrate deeper into Microsoft’s systems than previously known, gaining access to potentially valuable source code, the tech giant said Thursday.The firm previously acknowledged that it had inadvertently downloaded a software patch used by Russian cyberspies as a potential “back door” into victims’ systems. But it was not known that the hackers had viewed the firm’s source code, or the crucial DNA of potentially valuable, proprietary software.Microsoft, however,...

December 31, 2020
Share
Save
Review
  • Total 18 items
  • 1
  • 2
OUTLETS
washingtonpost.com

washingtonpost.com

CRITIC
img-trusted
86%
PUBLIC
img-trusted
66%
msn.com

msn.com

CRITIC
img-contested
N/A
PUBLIC
img-contested
44%
inquirer.com

inquirer.com

CRITIC
img-contested
N/A
PUBLIC
img-contested
N/A