The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: January 9, 2015
Official: NSA will lead fight against future hacks
Posted: January 9, 2015 at 9:53 pm
The head of U.S. Cyber Command, Admiral Mike Rogers, speaking at the International Cyber Security Conference in New York City hosted by Fordham University, said the U.S., for the first time, was the victim of a "malicious act by a nation-state specifically designed to achieve a coercive effect" in the cyber-arena.
FBI director says Sony hackers 'got sloppy'
Rogers said in this case the act came in the form of an effort to "stop the release of a film with a particular viewpoint and the characterization of a leader," in reference to the recent hacking of Sony by North Korea.
He said the NSA's role in the investigation as "providing technical assistance," which included investigating the malware used in the hack, as well as the data generated from Sony to compare with other hacking activity.
The NSA is also taking a lead role in combating future large-scale hacks on private companies carried out by nation-states, such as developing counter-measures to major viruses, Rogers said.
"If it's a specific malware, for example, that we saw used in the Sony scenario, we partner with others using our technological expertise to write the programs that will counteract the malware," he said.
The other major challenge facing America in the cyber-world is balancing privacy with security in an environment where both good and bad actors are "using the same communication path, the same software and the same social media," according to Rogers.
Go here to see the original:
Official: NSA will lead fight against future hacks
Posted in NSA
Comments Off on Official: NSA will lead fight against future hacks
Volokh Conspiracy: E-mail warrant for all evidence of CFAA crimes violates Fourth Amendment, court holds
Posted: at 9:53 pm
In a recent case, United States v. Shah, 2015 WL 72118 (E.D.N.C. Jan. 6, 2015), a district court ruled that a search warrant for an e-mail account for all evidence of violations of the federal computer hacking statute failed to comply with the Fourth Amendment because it did not particularly describe the evidence to be seized.
The warrant in the case approved the seizure from a specific gmail account of e-mails that contained the following:
All information . . . that constitutes fruits, evidence, and instrumentalities of Title 18, United States Code, Sections 1030 (Fraud and Related Activity in Connection with Computers), since account inception, including, for each account or identifier listed on Attachment A, information pertaining to the following matters: a. Preparatory steps taken in furtherance of unauthorized network activity, communications regarding execution of the unauthorized network activity, and information regarding tools used in furtherance of the unauthorized network activity. b. Records relating to who created, used, or communicated with the account or identifier, including records about their identities and whereabouts.
This description is a slightly modified version of the DOJ recommended e-mail warrant description, albeit without a date restriction; see here at 261-62. According to the district court, however, the warrant was not specific enough. From the opinion:
The provision [of the warrant] describing the documents seized makes a general reference to [a]ll information described above in Section I that constitutes fruits, evidence, and instrumentalities of Title 18, United States Code, Sections 1030 (Fraud and Related Activity in Connection with Computers). (Google Warrant, 6). This statute, also known as the federal Computer Fraud and Abuse Act (CFAA), prohibits a wide array of activities, including the use of computers to transmit information restricted by the United States without authorization, intentionally accessing a computer without authorization or exceeding authorized access to obtain financial records, accessing nonpublic computers of the United States in a way which affects the governments use, accessing protected computers without authorization in order to commit fraud, threatening to cause damage or obtain information from a protected computer, conspiracy to commit these offenses, and other activities. See 18 U.S.C. 1030(a).
A violation of the CFAA would not necessarily generate such distinctive evidence as bank robbery or narcotics. Dickerson, 166 F.3d at 694. Nor would evidence necessarily be as distinctive as that of child pornography, a type of crime more commonly targeted by warrants for electronic information. E.g. United States v. Schesso, 730 F.3d 1040, 1044 (9th Cir.2013); United States v. Deppish, 994 F.Supp.2d 1211, 1214 (D. Kansas 2014). Rather, a warrant authorizing collection of evidence of a CFAA violation comes closer to warrants seeking to collect evidence regarding violations of broad federal statutes prohibiting fraud or conspiracy. In these cases, limitation by reference to the broad statute fails to impose any real limitation. See United States v. Maxwell, 920 F.2d 1028, 1033 (D.C.Cir.1990) (Although a warrants reference to a particular statute may in certain circumstances limit the scope of the warrant sufficiently to satisfy the particularity requirement it will not do so where, as here, the warrant authorizes seizure of all records and where, as here, the reference is to a broad federal statute, such as the federal wire fraud statute.); Rickert v. Sweeney, 813 F.2d 907, 909 (8th Cir.1987) (general search limited only by broad tax evasion statute held overly broad, where probable cause existed only to search for evidence of tax evasion in connection with one particular project); United States v. Roche, 614 F.2d 6, 78 (1st Cir.1980) (warrants limitation of search to fruits and instrumentalities of the violation of federal mail fraud statute was inadequate because limitation by so broad a statute is no limitation at all.).
The Google Warrant provides no other details to clarify the particular crime at issue. Section II(a) makes reference to unauthorized network activity, yet gives no indication as to the meaning of this phrase, which would seem to be implicated in almost all of the activities prohibited by the CFAA. The warrant offers nothing about the time frame of the offense. See United States v. Hanna, 661 F.3d 271, 287 (6th Cir.2011) (noting, in upholding search warrant for electronic information, that the warrant was limited to the time period that the evidence suggested the activity occurred.) Rather, it provides for the seizure of all evidence of violations of the CFAA since account inception. (Google Warrant, 6).
Although the test for particularity is a pragmatic one, and must consider the circumstances and type of items involved, Torch, 609 F.2d at 1090, the record does not indicate that circumstances of the investigation precluded a more particularized description of the crime. Special Agent Ahearns supporting affidavit provides copious details as to the time and nature of the alleged offenses. Had the Google Warrant properly attached or incorporated this affidavit, it could have provided the necessary context for the search. Hurwitz, 459 F.3d at 471 ([A]n affidavit may provide the necessary particularity for a warrant if it is either incorporated into or attached to the warrant.) (quoting United States v. Washington, 852 F.2d 803, 805 (4th Cir.1988)). Yet the Google Warrant makes no incorporation, and it does not appear from the record that the affidavit was attached. Without the Google Warrant somehow including the additional details provided by Special Agent Ahearns affidavit, the affidavit itself cannot satisfy concerns for particularity or overbreadth. See Groh v. Ramirez, 540 U.S. 551, 557 (2004) (The Fourth Amendment by its terms requires particularity in the warrant, not in the supporting documents.).
[T]here are grave dangers inherent in executing a warrant authorizing a search and seizure of a persons papers that are not necessarily present in executing a warrant or search for physical objects whose relevance is more easily ascertainable. Williams, 592 F.3d at 52324 (quoting Andresen v. Maryland, 427 U.S. 463, 482 n. 11). Because electronic devices could contain vast quantities of intermingled information, raising the risks inherent in over-seizing data law enforcement and judicial officers must be especially cognizant of privacy risks when drafting and executing search warrants for electronic evidence. Schesso, 730 F.3d at 1042; see also In the Matter of the Search of Info. Associated with [redacted]@mac.com that is Stored at Premises Controlled by Apple, Inc., 13 F.Supp.3d 157, 16667 (D.D.C.2014) ( D.D.C. Mac.com Order ). Especially in light of the nature of the search and seizure here, the Google Warrant is not drafted with sufficient particularity. In the absence of additional details, the warrant fails to identify the particular crime for which officers were to seek evidence. Therefore, the warrant lacks the particularity required by the Fourth Amendment.
The court goes on to apply the good-faith exception, however, because the courts holding is somewhat novel under the circumstances. Heres the discussion, with a paragraph break added:
Originally posted here:
Volokh Conspiracy: E-mail warrant for all evidence of CFAA crimes violates Fourth Amendment, court holds
Posted in Fourth Amendment
Comments Off on Volokh Conspiracy: E-mail warrant for all evidence of CFAA crimes violates Fourth Amendment, court holds
January 3rd 2015 Second Amendment Update (made with Spreaker) – Video
Posted: at 9:52 pm
January 3rd 2015 Second Amendment Update (made with Spreaker)
Source: http://www.spreaker.com/user/nh_steve/january-3rd-2015-second-amendment-update New Hampshire has always had a strong commitment to gun-rights and sel...
By: Steve Mac Donald
Read more from the original source:
January 3rd 2015 Second Amendment Update (made with Spreaker) - Video
Posted in Second Amendment
Comments Off on January 3rd 2015 Second Amendment Update (made with Spreaker) – Video
First Amendment triumphs! (Kirby Delauter) / Frederick County – Video
Posted: at 9:52 pm
First Amendment triumphs! (Kirby Delauter) / Frederick County
First Amendment triumphs! (Kirby Delauter) Rachel Maddow reports on a pair of stories in which public figures attempted to intimidate local journalists from ...
By: MSNBC News
Read the original:
First Amendment triumphs! (Kirby Delauter) / Frederick County - Video
Posted in First Amendment
Comments Off on First Amendment triumphs! (Kirby Delauter) / Frederick County – Video
Megyn Kelly Schools Catholic Leagues @HolyBillDonohue on the #FIRST #AMENDMENT | #KellyFile – Video
Posted: at 9:52 pm
Megyn Kelly Schools Catholic Leagues @HolyBillDonohue on the #FIRST #AMENDMENT | #KellyFile
Follow Me @denvernewb https://twitter.com/denvernewb Visit ME @ http://www.dennewbie.com/ Megyn Kelly Schools Catholic League #39;s Bill Donohue on the First Amendment #KellyFile.
By: Harper Poppy
Visit link:
Megyn Kelly Schools Catholic Leagues @HolyBillDonohue on the #FIRST #AMENDMENT | #KellyFile - Video
Posted in First Amendment
Comments Off on Megyn Kelly Schools Catholic Leagues @HolyBillDonohue on the #FIRST #AMENDMENT | #KellyFile – Video
Judicial Elections and the First Amendment: Williams-Yulee v. The Florida Bar
Posted: at 9:52 pm
On January 20, the U.S. Supreme Court will be hearing oral arguments in Lanell Williams-Yulee v. The Florida Bar. At issue is whether a ban on solicitation of campaign donations by judicial candidates in state elections in Florida violates the First Amendment rights of the candidates. Does Florida have a compelling interest in imposing such a ban to preserve the appearance of impartiality of its judges? Is it necessary to ensure judicial independence and maintain public confidence in the judicial system? Does this ban on solicitation violate the First Amendment rights of candidates to engage in political speech and political activity? Does the soliciting of campaign donations involve core political speech? In a post-argument briefing, two First Amendment experts who filed amicus briefs in the case, along with the former Chief Justice of the Indiana Supreme Court, will discuss these issues as well as the oral arguments conducted that morning before the Supreme Court. Moderating the panel will be a former FEC commissioner.
James Bopp, Jr. General Counsel, The James Madison Center for Free Speech
Robert Corn-Revere Partner, Davis Wright Tremaine
Justice Randall T. Shepard Former Chief Justice, Indiana Supreme Court
Manager, Election Law Reform Initiative and Senior Legal Fellow Read More
Read more from the original source:
Judicial Elections and the First Amendment: Williams-Yulee v. The Florida Bar
Posted in First Amendment
Comments Off on Judicial Elections and the First Amendment: Williams-Yulee v. The Florida Bar
Sex shop owners sue city of Des Moines
Posted: at 9:52 pm
DES MOINES, Wash. The owners of Secrets Adult Entertainment have filed a lawsuit against the city of Des Moines over violation of First Amendment rights and being shut down without due process.
On Dec. 5, officials red-tagged the building, citing code violations.
The violation document lists issues such as use of a storage area for retail space, an obstructed exit door, and a second exit door that was sticking.
The owners said they had dealt with code violations before, but usually had the opportunity to fix them for re-inspection. This time, they said they were locked out for 30 days, when they told KIRO 7 they could have addressed the issues within minutes.
Now, workers are allowed inside to make fixes, but the business is still closed with no timeline for reopening.
The owner who filed the suit, Mark White, alleges an assistant fire marshal and a city building inspector made homophobic remarks during their inspection, using the words f-gs and h---s directed at gay clients.
KIRO 7 spoke to a female employee who was present during the exchange. She said the officials even told them they would not be inclined to rescue anyone from the building if it were burning.
Basically they would have a moral issue with coming in and rescuing people from our establishment, said one of the co-owners, Michael, who didn't give his last name. Its just not right for a public official to say something like that.
South King Fire and Rescue issued a statement through its attorney.
South King Fire and Rescue adamantly denies the allegations of discriminatory code enforcement set forth in the plaintiffs complaint. It also adamantly denies that any of its employees made offensive or derogatory comments about the plaintiffs establishment or its customers.
Read the original here:
Sex shop owners sue city of Des Moines
Posted in First Amendment
Comments Off on Sex shop owners sue city of Des Moines
ZapChain Bitcoin Show – Hosted by Daniel Cawrey – Video
Posted: at 9:51 pm
ZapChain Bitcoin Show - Hosted by Daniel Cawrey
New episodes every Tuesday at http://zapchain.com We bring on bitcoin experts, discuss bitcoin news, and talk about interesting bitcoin discussions from ZapChain.com.
By: ZapChain
Follow this link:
ZapChain Bitcoin Show - Hosted by Daniel Cawrey - Video
Posted in Bitcoin
Comments Off on ZapChain Bitcoin Show – Hosted by Daniel Cawrey – Video
TRANSMISSSION 20: Bitcoin below 300$ Altcoins 2014: Litecoin, Dogecoin, Paycoin – Video
Posted: at 9:51 pm
TRANSMISSSION 20: Bitcoin below 300$ Altcoins 2014: Litecoin, Dogecoin, Paycoin
http://worldcryptonetwork.com http://transmission.rocks http://btcartgallery http://coin2talk.com Support at Patreon: http://www.patreon.com/theogoodman Dona...
By: World Crypto Network
Read more:
TRANSMISSSION 20: Bitcoin below 300$ Altcoins 2014: Litecoin, Dogecoin, Paycoin - Video
Posted in Bitcoin
Comments Off on TRANSMISSSION 20: Bitcoin below 300$ Altcoins 2014: Litecoin, Dogecoin, Paycoin – Video
BitPay at CES 2015: Copay Bitcoin Wallet – Multi-Signature Demo – Video
Posted: at 9:51 pm
BitPay at CES 2015: Copay Bitcoin Wallet - Multi-Signature Demo
BitPay #39;s Executive Chairman Tony Gallippi does a Multi-Signature transaction using our own Copay Wallet live at CES 2015. In this demo, Tony does a 2-of-2 transaction using a Windows Phone...
By: BitPay
Visit link:
BitPay at CES 2015: Copay Bitcoin Wallet - Multi-Signature Demo - Video
Posted in Bitcoin
Comments Off on BitPay at CES 2015: Copay Bitcoin Wallet – Multi-Signature Demo – Video