The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: September 9, 2014
Canada says its frigate buzzed by Russian warplanes during NATO drill
Posted: September 9, 2014 at 8:02 pm
Russia has made clear once again that it doesn't want NATO forces on its borders. Or on its shores. Or anywhere near foreign territory it occupies.
Canadian Defense Minister Rob Nicholson has accused the Kremlin of sending three warplanes to buzz its navy frigate Toronto on Sunday while it was taking part in NATO exercises in international waters of the Black Sea.
"While the Russian military aircraft that circled the HMCS Toronto did not in any way pose a threat to the Canadian ship, their actions were unnecessarily provocative and risk escalating tensions even further," Nicholson said Monday in a statement issued in Ottawa.
The tensions he referred to emanate from months of fighting between Ukrainian troops and Russian-backed separatists in eastern Ukraine -- a conflict inspired by Russia's seizure of Ukraine's Crimea region in late February and annexation of the strategic Black Sea peninsula in mid-March.
The United States and its allies in the 28-nation North Atlantic Treaty Organization have accused Russian President Vladimir Putin of violating international law with the Crimean land grab and of destabilizing southeastern Ukraine by sending Russian soldiers and weapons across the border.
"Canada and its allies are taking part in reassurance measures as a direct result of the Putin regimes military aggression and invasion of Ukraine," Nicholson said in his statement, calling the exercises a message that "Russia's reckless actions must stop."
Russia's Defense Ministry responded with a denial that its warplanes flew around the Canadian vessel and the assertion that they had done nothing wrong.
"The Russian Air Force planes flight path ran through a region where a ship from the Canadian navy, the Toronto, was located but did not approach the foreign warship, ministry spokesman Igor Konashenkov told the RIA Novosti agency.
The two supersonic Su-24 Fencer fighter jets and an An-26 Curl military transport executed their scheduled flights "strictly in line with international rules," Konashenkov said.
Russian media cast the reported encounter as the result of a NATO buildup of forces around Russia following the Crimea annexation, which the state-run agencies refer to as the result of a local vote to secede from Ukraine and join Russia.
See original here:
Canada says its frigate buzzed by Russian warplanes during NATO drill
Posted in NATO
Comments Off on Canada says its frigate buzzed by Russian warplanes during NATO drill
NATO trumpets 'resolve' against threats
Posted: at 8:02 pm
BRUSSELS, Sept. 8 (UPI) -- NATO leaders are aiming to strengthen alliance capabilities amid Russian aggression in the Ukraine and growing threats elsewhere that threaten Europe.
First, leaders of the 28 member countries meeting in Wales last week resolved to maintain a continuous air, land, and sea presence in Eastern Europe -- including the Baltics -- on a rotational basis given Russian machinations in the region.
They also agreed to create a rapid response force.
"This spearhead will include several thousand land troops ready to deploy within a few days with air, sea and Special Forces support," said NATO Secretary General Anders Fogh Rasmussen.
The force plan includes a command-and-control presence, reception facilities and pre-positioned equipment.
"This is a demonstration of our solidarity and resolve," Fogh Rasmussen said. "In these turbulent times, NATO must be prepared to undertake the full range of missions and to defend allies against the full range of threats."
The demonstration of resolve comes amid months of tension in Europe over Russia's annexation of Ukraine's Crimea region and action by pro-Russian insurrectionists -- reportedly with active Russian involvement -- to take other parts of the Ukraine, which was once part of the Soviet empire. The belligerence from Russian President Vladimir Putin in response to European and American protests -- and actions such as sanctions against Russia -- has done nothing to dampen fears of a return to Cold War footing, not to mention fears for the future of territorial integrity in Baltic countries.
Canada, Germany, Portugal, Britain and others perform rotational air patrols in the region as a message to Moscow.
NATO leaders also agreed to put their money where their mouth is by reversing years of declining defense spending by member states.
NATO said the allies will focus their military budgets over the next 10 years to meet the "existing NATO guideline of spending 2 percent of gross domestic product on defense and with a view to meeting NATO capability priorities."
Read the original here:
NATO trumpets 'resolve' against threats
Posted in NATO
Comments Off on NATO trumpets 'resolve' against threats
Is NATO still relevant against Russia, ISIS?
Posted: at 8:02 pm
NATO might be losing its focus as it tries to strengthen its roles with both the crisis in Ukraine and rise of the terrorist group ISIS in the Middle East, according to foreign policy analysts.
Luke Coffey and Frank Gaffney told FoxNews.com the military alliance is slowly forgetting its principle mission in protecting the defense of its member states.
Coffey is the Margaret Thatcher Fellow at the Heritage Foundation and Gaffney serves as the founder and president for the national security think tank, Center for Security Policy.
There is a growing call from critics that the organization doesnt have a role in fighting ISIS, now called Islamic State.
I think NATO needs to get back to some of its roots, back to the basics, said Coffey. ISIS, without a doubt, poses a threat to the members inside NATO, but I think as an alliance this is not a challenge NATO should take on.
He instead proposes the U.S. lead a coalition of the willing" that could include NATO members, but should not fall under their jurisdiction because as we saw in Libya in 2011, when you get 28 members around a table it slows down the process and with this fight against ISIS youre going to need quick and rapid decision-making .
- Luke Coffey
Gaffney sees NATO as being a pale shadow of itself as result of reduction in defense spending by the U.S. and its allies. [Before] we go into Iraq or Syria with NATO, I think we best should think about rebuilding NATOs capabilities to protect their own territory.
Only four of NATO's 28 member states, including the U.S., have met the pledge to meet or exceed 2 percent of their country's GDP on military spending.
NATO members are currently debating how to possibly boost their support for Ukraine's military to fight pro-Russian rebels.
Read the original:
Is NATO still relevant against Russia, ISIS?
Posted in NATO
Comments Off on Is NATO still relevant against Russia, ISIS?
The case against the NSA metadata collection began yesterday – Video
Posted: at 8:01 pm
The case against the NSA metadata collection began yesterday
By: mikeroweRules12
Go here to see the original:
The case against the NSA metadata collection began yesterday - Video
Posted in NSA
Comments Off on The case against the NSA metadata collection began yesterday – Video
PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO – Video
Posted: at 8:01 pm
PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO
HERE COMES THE RUDEBOY EP 2014 the ongoing NSA AFFAIR and war on public privacy debate is the frame of this video // 1984-2014= 30 years of surveillance//---the video is a piece of art and...
By: jrPepsiBrown
See the original post:
PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO - Video
Posted in NSA
Comments Off on PEPSI BROWN da Nubian don pon microphone// NSA SCANDAL VIDEO WATCHING OFFICIAL VIDEO – Video
Tech industry groups ask US Senate to 'swiftly pass' NSA curbs
Posted: at 8:01 pm
Tech industry organizations have written a letter to leaders in the U.S. Senate, to ask them to swiftly pass the USA Freedom Act, legislation that is expected to end the collection of bulk domestic phone data by the National Security Agency.
Disclosures about the U.S. governments surveillance programs since June 2013 have led to an erosion of public trust in the U.S. government and the U.S. technology sector, anti-software piracy group BSA, Computer and Communications Industry Association, Information Technology Industry Council, Reform Government Surveillance and the Software and Information Industry Association wrote to Senate Majority Leader Harry Reid and Republican Leader in the Senate Mitch McConnell on Monday.
Reforms contained in the USA Freedom Act will send a clear signal to the international community and to the American people that government surveillance programs are narrowly tailored, transparent, and subject to oversight, the industry groups added.
In June last year, former NSA contractor Edward Snowden revealed that the NSA was collecting phone metadata of Americans from Verizon, the first of a series of revelations about U.S. surveillance in the country and abroad.
The U.S. House of Representatives passed in May an amended version of the USA Freedom Act that would limit the collection of phone data to certain specific selection terms. But an expanded definition of the specific selection terms that can be used by the NSA to collect data from phone companies was criticized by civil rights groups and the industry, as it would continue to allow the NSA to target a large number of phone records.
The bill introduced in the Senate in July by Senator Patrick Leahy, a Democrat from Vermont, and others aims to tighten the collection of data by the NSA by closing loopholes. In a letter to Leahy last week, U.S. Attorney General Eric Holder and Director of National Intelligence James Clapper expressed support for the bill.
The transparency measures and reform of surveillance proposed in the Freedom Act are expected to send positive signals abroad where U.S. tech companies fear losing business, the tech industry groups said, echoing a concern already expressed by a number of tech companies.
Cisco Systems CEO John Chambers, for example, wrote to U.S. President Barack Obama in May, asking for his intervention so that U.S. technology sales were not affected by a loss in trust.
As a result of the surveillance program revelations, U.S. technology companies have experienced negative economic implications in overseas markets, the tech groups wrote. In addition, other countries are considering proposals that would limit data flows between countries, which would have a negative impact on the efficiencies upon which the borderless Internet relies.
Congress returned from recess on Monday though there may be only a few days of legislative business ahead of campaigning for midterm elections.
See more here:
Tech industry groups ask US Senate to 'swiftly pass' NSA curbs
Posted in NSA
Comments Off on Tech industry groups ask US Senate to 'swiftly pass' NSA curbs
"Fifth Amendment" Defined & Explained – Law
Posted: at 8:01 pm
PREMIUM LEGAL RESOURCES LEGAL FORMS ASK A LAWYER
'No person shall be held to answer for a capital, or otherwise infamous crime, unless on a presentment or indictment of a Grand Jury, except in cases arising in the land or naval forces, or in the Militia, when in actual service in time of War or public danger; nor shall any person be subject for the same offence to be twice put in jeopardy of life or limb, nor shall be compelled in any criminal case to be a witness against himself, nor be deprived of life, liberty, or property, without due process of law; nor shall private property be taken for public use without just compensation.'
The Fifth Amendment 'can be asserted in any proceeding, civil or criminal, administrative or judicial, investigatory or adjudicatory; and it protects against any disclosures which the witness reasonably believes could be used in a criminal prosecution or could lead to other evidence that might be so used.' Kastigar v. U.S., 406 U.S. 441, 44-45 ('72). A reasonable belief that information concerning income or assets might be used to establish criminal failure to file a tax return can support a claim of Fifth Amendment privilege. See U.S. v. Rendahl, 746 F.2d 553, 55-56 (9th Cir.'84).
The only way the Fifth Amendment can be asserted as to testimony is on a question-by-question basis. Rendahl, 746 F.2d at 555, citing with approval U.S. v. Bell, 448 F.2d 40, 42 (9th Cir.'71) (Fifth Amendment challenge premature on appeal from enforcement order; appellant must present himself for questioning after enforcement and as to each question elect to raise or not to raise the defense).
The appropriate device for compelling answers to incriminating questions is a government grant of use immunity. See Sharp, 920 F.2d at 1172.
Google+
Posted in Fifth Amendment
Comments Off on "Fifth Amendment" Defined & Explained – Law
Texas man's conviction overturned because of Fifth Amendment violation
Posted: at 8:01 pm
September 9, 2014 4:45 PM Share with others:
By Torsten Ove / Pittsburgh Post-Gazette
A federal appeals court today overturned the conviction of a Texas man on drug charges, saying the government violated his Fifth Amendment right against self-incrimination during his trial here.
Gathon Shannon, 48, of Houston, described by the U.S. Drug Enforcement Administration as a courier in a Texas-to-Beaver County cocaine ring, was convicted by a federal jury and sentenced in 2013 to 20 years.
But a three-judge panel of the U.S. 3rd Circuit Court of Appeals today ruled that the prosecution violated his rights in cross-examining him about his silence following his arrest in 2011.
The circuit judges vacated the sentence imposed by U.S. District Judge Alan Bloch and ordered that Mr. Shannon receive a new trial.
Mr. Shannon was among a group of accused conspirators targeted by the U.S. attorney's Organized Crime and Drug Enforcement Task Force, which said the ring supplied much of Beaver County's cocaine demand from 2009 to 2011.
Read this article:
Texas man's conviction overturned because of Fifth Amendment violation
Posted in Fifth Amendment
Comments Off on Texas man's conviction overturned because of Fifth Amendment violation
GWB probe: Christie says he's not satisfied with unanswered questions
Posted: at 8:01 pm
September 9, 2014, 2:42 PM Last updated: Tuesday, September 9, 2014, 3:45 PM
AP
Gov. Chris Christie
Governor Christie said Tuesday he is not pleased that several questions remain unanswered a year after local access lanes to the George Washington Bridge were closed tying up traffic in Fort lee for more than four days.
Chief among those questions is who ordered cones to be placed across the access lanes and why.
Christie was asked by a reporter during a news conference in Camden if he was satisfied by the answers obtained so far by the various investigations into the matter including one he called for by a team of lawyers that has so far cost taxpayers $7.2 million.
Related: GWB probe: New email exchange raises more questions
Some people havent answered questions, so I guess the answer would be no, Christie told a roomful of reporters.
The internal investigation Christie ordered of his office resulted in a report that found the governor did not know about the lane closures and placed the blame on Bridget Anne Kelly, the deputy chief of staff Christie fired after The Record reported in January that she sent the email, Time for some traffic problems in Fort Lee. The report also blamed David Wildstein, the former Christie appointee at the Port Authority, who Kelly sent the e-mail to. It raised questions about Bill Stepien, Christies two-time campaign manager though it didnt offer any conclusive evidence to tie him to the closures.
Wildstein provided documents to a legislative panel investigating the incident but cited the Fifth Amendment when he appeared before lawmakers, refusing to answer questions including whether he worked at the Port Authority. Both Kelly and Stepien successfully fought legislative subpoenas seeking documents in court by arguing their constitutional right to protect themselves against self incrimination.
More:
GWB probe: Christie says he's not satisfied with unanswered questions
Posted in Fifth Amendment
Comments Off on GWB probe: Christie says he's not satisfied with unanswered questions
Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?
Posted: at 8:01 pm
The U.S. Department of Justice is current prosecuting Ross Ulbricht for being the apparent mastermind of the illegal narcotics website Silk Road, which was run for years on a hidden website. In defending the prosecution, the U.S. Attorneys Office recently filed a very interesting brief explaining how investigators found the computer server that was hosting the Silk Road (SR) server. Although the brief is about the Fourth Amendment, it has very interesting implications for the Computer Fraud and Abuse Act, the federal computer hacking statute.
The brief explains how the FBI found the SR server:
The Internet protocol (IP) address of the SR Server (the Subject IP Address) was leaking from the site due to an apparent misconfiguration of the user login interface by the site administrator i.e., Ulbricht. FBI agents noticed the leak upon reviewing the data sent back by the Silk Road website when they logged on or attempted to log on as users of the site. A close examination of the headers in this data revealed a certain IP address not associated with the Tor network (the Subject IP Address as the source of some of the data). FBI personnel entered the Subject IP Address directly into an ordinary (non-Tor) web browser, and it brought up a screen associated with the Silk Road login interface, confirming that the IP address belonged to the SR Server.
The FBIs declaration explains that the investigating agent entered miscellaneous information into the login prompt of the Silk Road server and received an error message. A forensic analysis of the error message found that it contained an IP address not associated with Tor. That IP address was the address of the Silk Road server.
The DOJ brief argues that there was nothing unconstitutional or otherwise unlawful about obtaining the inadvertently leaked IP address from the Silk Road server:
There was nothing unconstitutional or otherwise unlawful in the FBIs detection of that leak. The Silk Road website, including its user login interface, was fully accessible to the public, and the FBI was entitled to access it as well. See United States v. Meregildo, 883 F. Supp. 2d 523, 525 (S.D.N.Y. 2012) (noting that web content accessible to the public is not protected by the Fourth Amendment and can be viewed by law enforcement agents without a warrant). The FBI was equally entitled to review the headers of the communications the Silk Road website sent back when the FBI interacted with the user login interface, which is how the Subject IP Address was found.
It does not matter that Ulbricht intended to conceal the IP address of the SR Server from public view. He failed to do so competently, and as a result the IP address was transmitted to another party which turned out to be the FBI who could lawfully take notice of it. See United States v. Borowy, 595 F.3d 1045, 1048 (9th Cir. 2010) (finding that defendant had no legitimate privacy interest in child pornography files posted on peer-sharing website, notwithstanding that defendant had made ineffectual effort to use site feature that would have prevented his files from being shared); United States v. Post , __ F. Supp. 2d __, 2014 WL 345992, at *2-*3 (S.D. Tex. Jan. 30, 2014) (finding that defendant had no legitimate privacy interest in metadata used to identify him that was embedded in file he had posted on Tor website, notwithstanding that he did not realize he was releasing that information and he intended to remain anonymous).
In short, the FBIs location of the SR Server was lawful, and nothing about the way it was accomplished taints any evidence subsequently recovered in the Governments investigation.
I wonder: Does DOJs position that there is nothing . . . unlawful about this procedure mean that DOJ concedes that it would not violate the Computer Fraud and Abuse Act, 18 U.S.C. 1030, the federal computer hacking statute?
The FBIs location of the SR server brings to mind the prosecution of my former client Andrew Auernheimer, aka weev, who readers may recall was criminally prosecuted for his role in visiting website addresses on an AT&T server that AT&T had thought and hoped would not be found by the public. Auernheimers co-conspirator found that AT&T had posted e-mail addresses on its server at IP addresses that the public was not expected to find.
Here is the original post:
Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?
Posted in Fourth Amendment
Comments Off on Volokh Conspiracy: Does obtaining leaked data from a misconfigured website violate the CFAA?







