The Biggest NSA Whistleblower Ever
Jakari Jackson reports: NSA WHISTLEBLOWER: #39;WE #39;RE NO LONGER A COUNTRY WITH A GOVERNMENT, WE #39;RE A GOVERNMENT WITH A COUNTRY #39; ...
By: TheAlexJonesChannel
Continue reading here:
The Biggest NSA Whistleblower Ever
Jakari Jackson reports: NSA WHISTLEBLOWER: #39;WE #39;RE NO LONGER A COUNTRY WITH A GOVERNMENT, WE #39;RE A GOVERNMENT WITH A COUNTRY #39; ...
By: TheAlexJonesChannel
Continue reading here:
Wikipedia Suing The NSA and The Large Hadron Collider Reborn - Downstream
Downstream is Al Jazeera #39;s weekly look at the top stories from the world of science and tech with Tarek Bazley. Join in on the conversation on Twitter: #AJDownstream In this episode (March...
By: Al Jazeera English
Read the original:
Wikipedia Suing The NSA and The Large Hadron Collider Reborn - Downstream - Video
The ability to hack the BIOS chip at the heart of every computer is no longer reserved for the NSA and other three-letter agencies. Millions of machines contain basic BIOS vulnerabilities that letanyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to two researchers.
The revelation comes two years after a catalogue of NSA spy tools leaked to journalists in Germany surprised everyone with its talk about the NSAs efforts to infect BIOS firmware with malicious implants.
The BIOS boots a computer and helps load the operating system. By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computers operating system were wiped and re-installed.
BIOS-hacking until now has been largely the domain of advanced hackers like those of the NSA. But researchers Xeno Kovah and Corey Kallenberg presented a proof-of-concept attack today at the CanSecWest conference in Vancouver, showing how they could remotely infect the BIOS of multiple systems using a host of new vulnerabilities that took them just hours to uncover. They also found a way to gain high-level system privileges for their BIOS malware to undermine the security of specializedoperating systems like Tailsused by journalists and activists for stealth communications and handling sensitive data.
Although most BIOS have protections to prevent unauthorized modifications, the researchers were able to bypass these to reflash the BIOS and implant their malicious code.
Kovah and Kallenberg recently left MITRE, a government contractor that conducts research for the Defense Department and other federal agencies, to launch LegbaCore, a firmware security consultancy. They note that the recent discovery of a firmware-hacking toolby Kaspersky Lab researchers makes it clear that firmware hacking like their BIOS demo is something the security community should be focusing on.
Because many BIOS share some of the same code, they were able to uncover vulnerabilities in 80 percent of the PCs they examined, including ones from Dell, Lenovo and HP. The vulnerabilities, which theyre calling incursion vulnerabilities, were so easy to find that they wrote a script to automate the process and eventuallystopped counting the vulns it uncovered because there were too many.
Theres one type of vulnerability, which theres literally dozens of instances of it in every given BIOS, says Kovah. They disclosed the vulnerabilities to the vendors and patches are in the works but have not yet been released. Kovah says, however, that even when vendors have produced BIOS patches in the past, few peoplehave applied them.
Because people havent been patching their BIOSes, all of the vulnerabilities that have been disclosed over the last couple of years are all open and available to an attacker, he notes. We spent the last couple of years at MITRE running around to companies trying to get them to do patches. They think BIOS is out of sight out of mind [because] they dont hear a lot about it being attacked in the wild.
An attacker could compromise the BIOS in two waysthrough remote exploitation by delivering the attack code via a phishing email or some other method, or through physical interdiction of a system. In that case, the researchers found that if they had physical access to a system they could infect the BIOS on some machines in just two minutes. This highlights just how quickly and easy it would be, for example, for a government agent or law enforcement officer with a moments access to a system to compromise it.
Link:
One of the most successful U.S. National Security Agency spying programs involved intercepting IT equipment en route to customers and modifying it.
At secret workshops, backdoor surveillance tools were inserted into routers, servers and networking equipment before the equipment was repackaged and sent to customers outside the U.S.
The program, run by the NSAs Tailored Access Operations (TAO) group, was revealed by documents leaked by former NSA contractor Edward Snowden and reported by Der Spiegel and Glenn Greenwald.
It was one of many revelations about the NSA that caused widespread suspicion that U.S. technology products shouldnt be trusted, even if companies strenuously denied helping the agency.
And it appears some Cisco Systems customers have since taken steps to prevent NSA tampering.
The company has shipped equipment to addresses that are unrelated to a customer, said John Stewart, Ciscos chief security and trust officer, on Wednesday during a panel session at the Cisco Live conference in Melbourne.
In theory, that makes it harder for the NSA to target an individual company and scoop up their package. But supply chains are tough to secure, Stewart said, and once a piece of equipment is handed from Cisco to DHL or FedEx, its gone.
Still, the risk of such tampering is pretty low for most customers. Cisco has been working on better ways for customers to verify the integrity of the systems it ships, but there will always be certain amount of risk that cant be mitigated, Stewart said.
If a truly dedicated team is coming after you, and theyre coming after you for a very long period of time, then the probability of them succeeding at least once does go up, Stewart said. And its because theyve got patience, theyve got capacity and more often than not, theyve got capability.
One of the leaked Snowden documents, dated June 2010, has two photos of an NSA interdiction operation, with a box that said Cisco on the side.
Originally posted here:
To avoid NSA, Cisco gear gets delivered to strange addresses
The National Security Agencys top lawyer has left the government and returned to private practice as a partner at Mayer Brown LLP in Washington D.C., running the firms global privacy and security practice.
Since 2012, Rajesh De served as the NSAs chief legal officer and principal legal adviser to its current director, Michael Rogers, and Mr. Rogerss predecessor, Gen. Keith Alexander.
At the NSA, Mr. De stood at the nexus between national security policy and law as the agency was dealing with the fallout from former agency contractor Edward Snowdens exposure of the governments broad-scale surveillance programs.
In an interview this week with the Washington Post, Mr. De declined to talk about Mr. Snowden, who was granted asylum in Russia, but told the paper that he believes that no person, a king or an IT guy, should consider themselves above our democratic system.
Before joining the NSA, Mr. De worked at the White House as staff secretary and deputy assistant to the president. He also served in the Department of Justices Office of Legal Policy. Before that, the Harvard Law School graduate was a partner at Mayer Brown.
With the rapid evolution of the cybersecurity landscape, its an exciting time to return to private practice, he said in a statement released by his firm.
See original here:
Violation of my Fifth Amendment police harass me
By: wedoogee231
Read more from the original source:
Senate Votes Against Fourth Amendment Protection Act 720p
I am just a middleman trying to spread the word FAIR USE NOTICE: This video may contain copyrighted material. Such material is made available for entertainment purposes only. This constitutes...
By: Timothy anon
Read the original post:
Senate Votes Against Fourth Amendment Protection Act 720p - Video
The Founders #39; Intent of the 2nd Amendment
The Second Amendment is the individual right to keep and bear arms. Facebook: https://www.facebook.com/pages/Reid-Henrichs/811881388897208.
By: Reid Henrichs
See the original post:
David Mierswa Second Amendment Part 3
Your constitutional second amendment rights, learn about how concealed carry and Chicago politics affect you. To learn more check out DMLaw360.com.
By: Attorney David P. Mierswa and Associates
View post:
MSM Labels Gun Owners The Same As Rapist!
LEFTIST MEDIA CLAIMS IF YOU SUPPORT SECOND AMENDMENT, YOU SUPPORT RAPE http://www.infowars.com/leftist-media-claims-if-you-support-second-amendment-you-support-rape/ ...
By: THElNFOWARRlOR
See original here:
The Dangers of a Constitutional Convention
Click here to sign the petition http://tinyurl.com/n5p8enk Do you know why a Constitutional Convention is so dangerous to our Second Amendment rights? Watch as National Association...
By: National Association for Gun Rights
See the original post:
A Navy veteran and his wife are challenging a ban on handguns in Saipan, arguing in federal court that the Commonwealth of Northern Mariana Islands is bound by the U.S. Constitutions Second Amendment.
Ive always been a firm believer in our constitutional rights, whether thats freedom of speech, religion or the right to keep and bear arms or right to privacy, and Im pretty sure that what Im doing in this case is in defense of those convictions, said David J. Radich, 44, a former petty officer third class.
His wife, Li-Rong Radich, was severely beaten by an intruder in 2010, a trauma that her husband says might have been prevented if she had a handgun.
While the islands citizens can receive permits for a select few long guns, the law prevents them from possessing those for self-defense, even at home. Regulation of handguns varies in the four other inhabited U.S. territories. With differing degrees of regulation, they are allowed in Americas only other commonwealth territory, Puerto Rico, as well as in Guam and the Virgin Islands, but handguns are banned in American Samoa.
Born in California, Radich, a former boatswains mate, served aboard the USS Vandegrift, a guided-missile frigate that participated in Operation Desert Shields Maritime Interception Operations in 1990. After a ships rope crushed his right hand, Radich lost his pinky and required extensive physical therapy. Although he was subsequently found fit for duty, he left the Navy in 1993 and enrolled in college, earning a degree in history and education. He taught school in the Detroit area.
Radich said he became comfortable around handguns after a doctor suggested that holding and firing one would be therapeutic for his hand. He bought one and used it for target practice.
Radich said he eventually wearied of the cold weather and general decay of Detroit and in 2006 took a job teaching earth science to seventh- and eighth-graders in Tinian, a sparsely populated island near Saipan thats part of the Northern Marianas. He took a job as an environmental consultant on Saipan in June 2008.
Shortly thereafter, he met Li-Rong and they were soon married.
About 45 minutes after he arrived at work one morning in 2010, his wife called, sobbing, saying shed been attacked. Radich called 911 and rushed home.
I found my wife on the floor of the apartment in really bad shape, Radich said. Her face was unrecognizable.
Read the original:
John and Diane Foley, RTDNF First Amendment
The parents of James Foley interviewed at the RDTNF First Amendment Dinner.
By: RTDNA
Continue reading here:
Tanya Simon at the RTDNA First Amendment Awards
By: RTDNA
See original here:
How to Teach Social Studies: First Amendment Lesson Introduction
Does the 1st Amendment truly guarantee anything? Not really. This metaphor will help your students put 1st Amendment cases into context and help them analyze them. Why don #39;t the defendants...
By: Jeffrey Sanders
Read the original here:
How to Teach Social Studies: First Amendment Lesson Introduction - Video
Radio Attitude - Exercising The First Amendment - Hour One - Part 01
Live From KVNF Paonia CO Saturday, July 27th 1996.
By: Radio Attitude
Read more from the original source:
Radio Attitude - Exercising The First Amendment - Hour One - Part 01 - Video
2015 National Freedom of Information Day Conference: Miriam Nisbet
Hosted by the Newseum Institute #39;s First Amendment Center in cooperation with OpenTheGovernment.org and the American Library Association, the annual Freedom of Information Day Conference ...
By: Newseum
Read the rest here:
2015 National Freedom of Information Day Conference: Miriam Nisbet - Video
One of the interesting reveals at the end of Citizenfour, the recent Academy Award-winning documentary about Edward Snowden, was the thanks it gives to various security software programs. The information that Snowden leaked two years ago continues to reverberate today, and it kicked off renewed interest in data security, privacy, and anonymity. Based on the closing credits in the movie, weve put together aguide tosome of the major security software programs and operating systems available. If youve wanted to take steps to secure your own information, but were uncertain where to start, this articleshould get you headed in the right direction.
The Tor Security Bundle is probably the best-known of the software products well discuss today. The Tor browser is easy to install and set up; its based on Firefox 31.5.0, but as the program warns, simply using Tor isnt enough to secure your Internet browsing. If you want to remain anonymous on the Tor network, youll need to also do the following:
Configuring Tor is relatively easy. Once youve begun the installation process, youll be asked to choose whether you want to connect directly to Tor or through a bridge relay, as shown below:
Make your choice, and the system finishes installing what looks like a standard version of Firefox with a few custom scripts and configuration options.
One caveat about using Tor for anonymous browsing is that the performance isnt going to be what youre used to from a standard connection. Tor uses multiple levels of encryption to hide destination IPs, and routes the information randomly across its own network to defeat spying. This helps prevent certain kinds of packet tracking, but it also introduces some substantial performance penalties.
The fact that Tor routing is randomized makes it tricky to estimate the performance impact of using it, but we ran a series of webpage loading tests anyway. Treat these as a useful ballpark rather than the final word. Page caches were cleared before the load tests for both standard Firefox (36.0.1) and the Tor Browsers version (31.5.0).
As you can see, load times for Tor are 3-4x higher than they are for other browsers. Thats the price you pay for anonymity.
Continued here:
#ViccSjc_The Bitcoin Success Story - OneCoinOneConcept - OneCoin - CryptoCurrency
OneCoin Rocks http://www.bit.ly/TTCReward Latest Updates Master Card Union Pay Card, linked directly to your #OneCoin Crypto Currency account in 30 days. Dubai May 15th One...
By: OneCoin One Concept
Continue reading here:
#ViccSjc_The Bitcoin Success Story - OneCoinOneConcept - OneCoin - CryptoCurrency - Video
#ViccSjc_The #OneCoinOneConcept #GlobalPowerTeam Build
OneCoin provides a once in a lifetime opportunity, revolutionizing the business world of today #39;s digital economy. The OneCoin concept is born out of the success of the pioneering cryptocurrency,...
By: OneCoin One Concept
Go here to read the rest:
#ViccSjc_The #OneCoinOneConcept #GlobalPowerTeam Build - Video