The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: October 2014
NATO scrambles Canadian fighter jets: reports of increased Russian military activity
Posted: October 22, 2014 at 1:49 am
NATOscrambled fighterjetstwice in two days to intercept Russian military aircraft over the Baltic Sea, it said Tuesday amid reports that Russian military activity in the region is increasing.
Lt.-Col. Robert Gericke said the Russian aircraft were flying in international airspace and had not violated the territory of alliance members.
Two Canadian CF-18 Hornetjetswere scrambled from the Siauliai Air Base in Lithuania on Monday to intercept a Russian Ilyushin-20 surveillance aircraft, which they shadowed for some 15 minutes, NATOsaid.
"Once identification was successful, the intercept mission was completed and the two Hornets returned to their base," aNATOstatement said.
Earlier, the Latvian military tweeted thatNATOF-16jetswere dispatched on Tuesday to intercept a Russian Ilyushin-20 surveillance aircraft over the Baltic Sea. Gericke confirmed thatNATOjets had also intercepted a Russian aircraft that day, but could not immediately provide more details.
NATO, which has 16 fighterjetsin the region monitoring Baltic airspace, said it regularly launchesjetsto identify "unknown or potentially hostile aircraft" in the proximity of national airspace.
There were two similar incidents in the region on Oct. 7 and Sept. 11, but on neither occasion did the Russian aircraft constitute a threat toNATOforces, the alliance said.
In the past five days, the Swedish navy has been combing the Stockholm archipelago for signs of a foreign submarine that officials suspect entered its territorial waters illegally. It hasn't officially linked Russia to the suspected intrusion.
The Finnish military says that Russian military aircraft have violated the small Nordic country's airspace five times this year, and the Environment Institute said Russian military ships had twice intercepted one of its research vessels in international waters.
On Sept. 5, an Estonian security service officer was detained on the Russian border Estonia and Russia disagree on which side of it and is still in custody in Moscow.
See the original post:
NATO scrambles Canadian fighter jets: reports of increased Russian military activity
Posted in NATO
Comments Off on NATO scrambles Canadian fighter jets: reports of increased Russian military activity
NATO chases Russian aircraft
Posted: at 1:49 am
HELSINKI NATO scrambled fighter jets twice in two days to intercept Russian military aircraft over the Baltic Sea, it said Tuesday amid reports that Russian military activity in the region is increasing.
Lt. Col. Robert Gericke said the Russian aircraft were flying in international airspace and had not violated the territory of alliance members.
Two Canadian F-18 Hornet jets were scrambled from the Siauliai Air Base in Lithuania on Monday to intercept a Russian Ilyushin-20 surveillance aircraft, which they shadowed for some 15 minutes, NATO said.
Once identification was successful, the intercept mission was completed and the two Hornets returned to their base, a NATO statement said.
Earlier, the Latvian military tweeted that NATO F-16 jets were dispatched Tuesday to intercept a Russian Ilyushin-20 surveillance aircraft over the Baltic Sea. Gericke confirmed that NATO jets had also intercepted a Russian aircraft that day, but could not immediately provide more details.
NATO, which has 16 fighter jets in the region monitoring Baltic airspace, said it regularly dispatches jets to identify unknown or potentially hostile aircraft in the proximity of national airspace.
There were two similar incidents in the region Oct. 7 and Sept. 11, but on neither occasion did the Russian aircraft constitute a threat to NATO forces, the alliance said.
Meanwhile, Sweden's military is working on two new observations that could be evidence of suspected foreign underwater activity near the country's capital, a senior naval officer said Tuesday.
Swedish forces have been scouring the sea off Stockholm since Friday, after what the military called three credible reports of activity by foreign submarines or divers using an underwater vehicle.
The vessels were unidentified, but during the 1980s, the Swedish navy from time to time hunted suspected Soviet submarines in its waters.
Read this article:
NATO chases Russian aircraft
Posted in NATO
Comments Off on NATO chases Russian aircraft
Orientation NSA Mountain West Speakers Academy – Video
Posted: at 1:48 am
Orientation NSA Mountain West Speakers Academy
NSA Mountain West Speakers Academy.
By: NSAMountainWest
See original here:
Orientation NSA Mountain West Speakers Academy - Video
Posted in NSA
Comments Off on Orientation NSA Mountain West Speakers Academy – Video
NSA: Samsung Knox Devices Safe for Classified Info
Posted: at 1:48 am
Several Galaxy devices (and the Boeing Black phone) received NSA approval to carry classified information.
A number of Samsung mobile devices have been cleared by the National Security Agency for use by U.S. government officials.
The Galaxy S5, S4, Note 4, and Note 3 smartphones, plus the Note 10.1 tablet, among others, received NSA approval to carry classified information, provided they are running Samsung's secure Knox enterprise suite.
Boeing's self-destructing Black smartphone (not to be confused with the Blackphone) also made the list.
"The inclusion of Samsung mobile devices on the ... list proves the unmatched security of Samsung Galaxy Devices supported by the Knox platform," CEO JK Shin said in a statement. "At Samsung, we continue to address today's increasingly complex security challenges, and are committed to delivering the most reliable mobile platform satisfying the needs of professionals in all industries."
Samsung Knox, introduced last year, provides Samsung devices with a corporate controlled "container," much like BlackBerry Balance. The Department of Defense approved Knox in May 2013, and Samsung struck a deal with mobile security firm Lookout last September to bolster the security of Android devices running Knox.
By December, however, researchers found a "critical vulnerability" in Knox, which they said could enable "easy interception of data communications." The following month, Samsung said the researchers "did not identify a flaw or bug in Samsung Knox or Android, [but] a classic Man in the Middle (MitM) attack, which is possible at any point on the network to see unencrypted application data."
In May, Samsung released its Galaxy S5 smartphone with Knox 2.0; the update includes an improved user experience and new tools for SMBs.
The next month, five Knox-installed Galaxy phones and tablets received approval from the U.S. Defense Information Systems Agency.
Such approvals are increasingly necessary in a bring-your-own-device (BYOD) environment. Gone are the days when people had a BlackBerry for work and an iPhone or other smartphone for personal use. People don't want to carry two gadgets around, so IT departments have had to add support for more popular devices. In industries that deal with classified or sensitive information - from banking to the military - super-secure services like Knox are intended to avoid data leaks and prying eyes.
Read the original post:
NSA: Samsung Knox Devices Safe for Classified Info
Posted in NSA
Comments Off on NSA: Samsung Knox Devices Safe for Classified Info
Agents questioned, Askar takes the Fifth in Trombetta hearing
Posted: at 1:48 am
PITTSBURGH -- An evidence suppression hearing for Pennsylvania Cyber Charter School founder Nick Trombetta will stretch into November after another day of arguments Monday was more notable for who did not testify than for who did.
Beaver County solicitor Joe Askar, who also represents the Rochester-based National Network of Digital Schools, invoked his Fifth Amendment rights against self-incrimination and refused to testify. Askar was subpoenaed by Trombettas defense team in their effort to get recorded conversations with attorneys, including him, tossed out by U.S. District Court Chief Judge Joy Flowers Conti.
Trombetta -- who faces 11 federal charges -- is claiming that the FBI violated his attorney-client privilege by recording discussions with Askar, former PA Cyber attorney Timothy Barry, and Ralph Monico and Leo Daly, attorneys who also represented NNDS. A Sept. 30 hearing was continued until Monday.
Mr. Askar has neither committed nor been charged with any crime. Nor will he be. As the U.S. Supreme Court has said, the privilege is available not only to protect the guilty, but also the innocent: We have emphasized that one of the Fifth Amendments basic functions is to protect innocent men, who otherwise might be ensnared by ambiguous circumstances, Bruce Teitelbaum, Askars attorney, said in a statement.
The ambiguities inherent in this complex matter and the possibility of misunderstanding compelled me, out of caution, to advise Mr. Askar to invoke his privilege, Teitelbaum said.
Barry was called to the stand by defense attorney Adam Hoffinger later in the day, but was excused after a lengthy off-the-record sidebar involving his attorney, Trombettas lawyers and prosecutors. Hoffinger said Barry would be recalled when the hearing continues next month.
Trombetta attorney Robert Salerno quizzed FBI agent Samantha Bell, the lead investigator, on synopses of calls monitored by agents, instructions to agents on recording calls and minimization, the FBIs name for when agents stop listening to calls that are irrelevant or might be protected by attorney-client privilege.
After Barry was excused, FBI agent Paul Allen took the stand and was questioned by Hoffinger on a June 2012 synopsis of a recorded call on which he noted that Trombetta would be talking to his attorney.
Hoffinger wondered how agents could know when to stop recording privileged communications if they truly did not know whether Trombetta had a personal attorney. Allen said he did not exactly remember, but testified that he might have simply written the note to be cautious.
Im not sure why I used the personal pronoun his, Allen said. I didnt mean anything by it.
See the original post:
Agents questioned, Askar takes the Fifth in Trombetta hearing
Posted in Fifth Amendment
Comments Off on Agents questioned, Askar takes the Fifth in Trombetta hearing
Scott and Crist have heated and personal final debate before November election
Posted: at 1:48 am
JACKSONVILLE, Fla. (WOFL FOX 35 ORLANDO) -
Both former Governor Charlie Crist and current Governor Rick Scott turned up the heat in their final debate before the election, with both men making it clear they do not like each other and both men taking multiple opportunities to attack their opponent over personal wealth and other issues. One repeatedly called the other by first name before taking their jabs.
On personal character and ethics
Crist employed the same type of attacks he has used on television about Scott, pointing to his tenure at HCA/Columbia, a hospital chain which was fined $1.7 billion for Medicare fraud. Crist repeated a line from one of those ads, saying that Scott once invoked his Fifth Amendment right against self-incrimination while questioned about an unrelated civil lawsuit.
Rick you talk about being accountable. How were you accountable with HCA at all? asked Crist.
Scott raised questions about associates of Crist, including Scott Rothstein, who was convicted and imprisoned for masterminding one of the state's largest Ponzi schemes, and Jim Greer, the disgraced former chairman of the Republican Party of Florida, who served time after pleading guilty to theft and money laundering.
"Scott Rothstein testified, under oath, that Charlie was paid to appoint judges," said Scott. "His hand-picked party chairmen went to prison."
On raising the minimum wage and job creation
One issue the pair returned to was the minimum wage. Scott and Crist were on opposite sides of this issue like many others.
The private sector determines wages," said Scott. "Let's look at actually what happened. When Charlie says he wants to raise the minimum wage, that, according to the Congressional Budget Office, would lose $500,000 jobs. Charlie, you lost 832,000 jobs when you were governor. How many more jobs can we lose?
Continue reading here:
Scott and Crist have heated and personal final debate before November election
Posted in Fifth Amendment
Comments Off on Scott and Crist have heated and personal final debate before November election
Supreme Court oral arguments Heien v North Carolina – Video
Posted: at 1:47 am
Supreme Court oral arguments Heien v North Carolina
The Supreme Court recently heard oral arguments regarding our fourth amendment in the case of Heien v. North Carolina. Listen to the case yourself.
By: DailyWorldwideNews
Read more:
Supreme Court oral arguments Heien v North Carolina - Video
Posted in Fourth Amendment
Comments Off on Supreme Court oral arguments Heien v North Carolina – Video
When Can the Police Search Your Phone and Computer?
Posted: at 1:47 am
Your computer, phone, and other digital devices hold vast amounts of personal information about you and your family. This sensitive data is worth protecting from prying eyes, including those of the government.
The Fourth Amendment to the U.S. Constitution protects you from unreasonable government searches and seizures, and this protection extends to your computer and portable devices. But how does this work in the real world? What should you do if the police or other law enforcement officers show up at your door and want to search your computer?
EFF has designed this guide to help you understand your rights if officers try to search the data stored on your computer or portable electronic device, or seize it for further examination somewhere else. Keep in mind that the Fourth Amendment is the minimum standard, and your specific state may have stronger protections.
Because anything you say can be used against you in a criminal or civil case, before speaking to any law enforcement official, you should consult with an attorney. Remember generally the fact that you assert your rights cannot legally be used against you in court. You can always state: "I do not want to talk to you or answer any questions without my attorney present." If they continue to ask you questions after that point, you can say: "Please don't ask me any further questions until my attorney is present." And if the police violate your rights and conduct an illegal search, often the evidence they obtain as a result of that search can't be used against you.
We've organized this guide into three sections:
If you consent to a search, the police don't need a warrant.
The most frequent ways police are able to search is by asking you for permission. If you say "yes" and consent to the search, then police don't need a warrant. You can limit the scope of that consent and even revoke or take it back after the officers begin searching, but by then it may be too late.1 That's why it's better not consent to a searchpolice may drop the matter. If not, then they will generally need to get a search warrant to search.
Law enforcement may show up at your door. Apart from a few exceptions, police need a warrant to enter your home.
The police can't simply enter your home to search it or any electronic device inside, like a laptop or cell phone, without a warrant.
See original here:
When Can the Police Search Your Phone and Computer?
Posted in Fourth Amendment
Comments Off on When Can the Police Search Your Phone and Computer?
Supreme Court to decide if cops can access hotel registries without warrants
Posted: at 1:47 am
The Supreme Court is weighing in on another Fourth Amendment privacy case, this one concerning a Los Angeles ordinance requiring hotels to surrender guest registries to the police upon request without a warrant.
Thejustices agreed(PDF) Monday to hear Los Angeles' appeal of a lower court that ruled7-4 that the lawmeant to combat prostitution, gambling, and even terrorismwas unconstitutional. The law(PDF) requires hotels to provide the informationincluding guests' credit card number, home address, driver's license information, and vehicle license numberat a moment's notice. Several dozen cities, from Atlanta to Seattle, have similar ordinances.
"The Supreme Court will consider both the scope of privacy protections for hotel guests and also whether the Fourth Amendment prohibits laws that allow unlawful searches," EPIC wrote. "The second issue has far-reaching consequences because many recent laws authorize the police searches without judicial review. Thus far, courts have only considered "as applied" challenges on a case-by-case basis."
The appeal is the third high-profile Fourth Amendment case the justices have taken in three years.
In 2012, the justices ruled that authorities generally need search warrants when they affix GPS devices to a vehicle. And earlier this year, the Supreme Court said that the authorities need warrants to peek into the mobile phones of suspects they arrest.
In the latest case,Los Angeles motel owners sued, claiming that the law was a violation of their rights. The 9th US Circuit Court of Appeals agreed with the motel owners in December and said the only documentsthey must disclose include a hotel's proprietary pricing and occupancy information.
Businesses do not ordinarily disclose, and are not expected to disclose, the kind of commercially sensitive information contained in the records, Judge Paul Watford wrote for the majority. He said a hotel has "the right to exclude others from prying into the contents of its records."
In dissent, Judge Richard Clifton wrote that neither the hotel nor the guest has an expectation of privacy."A guest's information is even less personal to the hotel than it is to the guest," Clifton said.
In arguing to the justices that they should review the majority's conclusion, Los Angeles city officials wrote(PDF), "These laws expressly help police investigate crimes such as prostitution and gambling, capture dangerous fugitives and even authorize federal law enforcement to examine these registers, an authorization which can be vital in the immediate aftermath of a homeland terrorist attack."
Thehigh court did not set a hearing date.
Original post:
Supreme Court to decide if cops can access hotel registries without warrants
Posted in Fourth Amendment
Comments Off on Supreme Court to decide if cops can access hotel registries without warrants
Not everyone agrees with the second amendment. – Video
Posted: at 1:47 am
Not everyone agrees with the second amendment.
Not everyone agrees with the second amendment.
By: LoneStar1776
Read the original:
Not everyone agrees with the second amendment. - Video
Posted in Second Amendment
Comments Off on Not everyone agrees with the second amendment. – Video







