The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: January 27, 2015
Moscow and NATO Trade Barbs as Fighting Intensifies in Ukraine
Posted: January 27, 2015 at 10:52 am
TIME World Ukraine Moscow and NATO Trade Barbs as Fighting Intensifies in Ukraine Azif Alikberov recovers in a hospital after being wounded as fighting erupted in Mariupol, Ukraine on Jan. 26, 2014. Oleksandr Stashevskiy AFP/Getty Images Putin continues to blame a "NATO foreign legion" for the war in Ukraine, while the alliance says Russia is responsible for the resumed fighting
Clashes continued to escalate in Ukraines war-torn Donbas region Monday after a weekend of fierce fighting and shelling in the countrys southeast rendered a five-month-old peace accord all but dead.
On Monday, pro-Russian insurgents encircled a government garrison in the town of Debaltseve that lies along a main road and rail route between two vital rebel strongholds in Donetsk and Luhansk, according to Reuters.
The Ukrainian government has declared the imposition of emergency rule in the embattled Donetsk and Luhansk regions and placed the entire country on full readiness, according to President Petro Poroshenkos office.
Moscow continued to saddle Poroshenkos office with responsibility for the conflict this week, and chided his administration for refusing to engineer a political settlement with Kremlin-aligned forces that have effectively seceded from the state.
On Monday, Russian President Vladimir Putin accused Kiev of relying on a foreign legion to wage war against separatist militias.
Essentially, this is not an army but is a foreign legion, in this particular case, a NATO foreign legion, which is not pursuing Ukraines national interests of course, Putin told students at St. Petersburgs Mining University.
NATO Secretary General Jens Stoltenberg later dismissed Putins accusation as nonsense following an emergency meeting with the alliances ambassadors and Ukrainian diplomats in Brussels the first such session in six months.
At a brief press conference following the meeting, Stoltenberg lambasted the Kremlin for allegedly providing insurgent forces in southeast Ukraine with advanced heavy artillery, tanks, armored vehicles and manpower in recent weeks.
We call on Russia to stop its support for the separatists immediately, he told reporters.
More here:
Moscow and NATO Trade Barbs as Fighting Intensifies in Ukraine
Posted in NATO
Comments Off on Moscow and NATO Trade Barbs as Fighting Intensifies in Ukraine
Chomsky 2014 "Me Sorprendio el Alcance de la NSA" en Espaol – Alejandro Concha – Video
Posted: at 10:52 am
Chomsky 2014 "Me Sorprendio el Alcance de la NSA" en Espaol - Alejandro Concha
Copyrights belong to its authors edited video with the sole purpose of adding subtitles in order to its better diffusion.- Subtitled video for Educational Purposes only.- https://www.youtube.com/c...
By: Alejandro Concha
The rest is here:
Chomsky 2014 "Me Sorprendio el Alcance de la NSA" en Espaol - Alejandro Concha - Video
Posted in NSA
Comments Off on Chomsky 2014 "Me Sorprendio el Alcance de la NSA" en Espaol – Alejandro Concha – Video
NSA: 10 MInute English: TEST (C) – Video
Posted: at 10:52 am
NSA: 10 MInute English: TEST (C)
A free supplementary sesson for Upper Intermediate English Language Students of Native Speakers Academy. We hope this will encourage you to not only further your contact with real English but...
By: Graham William Hendrey
Read the rest here:
NSA: 10 MInute English: TEST (C) - Video
Posted in NSA
Comments Off on NSA: 10 MInute English: TEST (C) – Video
NSA: 10 Minute English: TEST (D) – Video
Posted: at 10:52 am
NSA: 10 Minute English: TEST (D)
A free supplementary sesson for Upper Intermediate English Language Students of Native Speakers Academy. We hope this will encourage you to not only further your contact with real English but...
By: Graham William Hendrey
Continue reading here:
NSA: 10 Minute English: TEST (D) - Video
Posted in NSA
Comments Off on NSA: 10 Minute English: TEST (D) – Video
Source code reveals link between NSA and Regin cyberespionage malware
Posted: at 10:52 am
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
The keylogger program, likely part of an attack framework used by the U.S. National Security Agency and its intelligence partners, is dubbed QWERTY and was among the files that former NSA contractor Edward Snowden leaked to journalists. It was released by German news magazine Der Spiegel on Jan. 17 along with a larger collection of secret documents about the malware capabilities of the NSA and the other Five Eyes partnersthe intelligence agencies of the U.K., Canada, Australia and New Zealand.
Weve obtained a copy of the malicious files published by Der Spiegel and when we analyzed them, they immediately reminded us of Regin, malware researchers from antivirus firm Kaspersky Lab said Tuesday in a blog post. Looking at the code closely, we conclude that the QWERTY malware is identical in functionality to the Regin 50251 plugin.
Moreover, the Kaspersky researchers found that both QWERTY and the 50251 plug-in depend on a different module of the Regin platform identified as 50225 which handles kernel-mode hooking. This component allows the malware to run in the highest privileged area of the operating systemthe kernel.
This is strong proof that QWERTY can only operate as part of the Regin platform, the Kaspersky researchers said. Considering the extreme complexity of the Regin platform and little chance that it can be duplicated by somebody without having access to its source code, we conclude the QWERTY malware developers and the Regin developers are the same or working together.
Der Spiegel reported that QWERTY is likely a plug-in of a unified malware framework codenamed WARRIORPRIDE that is used by all Five Eye partners. This is based on references in the code to a dependency called WzowskiLib or CNELib.
In a separate leaked document authored by the Communications Security Establishment Canada, the Canadian counterpart of the NSA, WARRIORPRIDE is described as a flexible computer network exploitation (CNE) platform thats an implementation of the WZOWSKI Five Eyes API (application programming interface).
The document also notes that WARRIORPRIDE is known under the code name DAREDEVIL at the UK Government Communications Headquarters (GCHQ) and that the Five Eyes intelligence partners can create and share plug-ins for it.
The newly discovered link between QWERTY and Regin suggests that the cyberespionage malware platform security researchers call Regin is most likely WARRIORPRIDE.
Some experts already suspected this based on other clues. According to Kaspersky Lab, Regin was the malware program that infected the personal computer of Belgian cryptographer Jean-Jacques Quisquater in 2013. That attack was linked to another malware attack against Belgian telecommunications group Belgacom whose customers include the European Commission, the European Parliament and the European Council.
Go here to read the rest:
Source code reveals link between NSA and Regin cyberespionage malware
Posted in NSA
Comments Off on Source code reveals link between NSA and Regin cyberespionage malware
Link between NSA and Regin cyberespionage malware becomes clearer
Posted: at 10:52 am
Security researchers found a strong connection between Regin and a keylogger used by the Five Eyes intelligence alliance
Keylogging malware that may have been used by the NSA shares signficant portions of code with a component of Regin, a sophisticated platform that has been used to spy on businesses, government institutions and private individuals for years.
The keylogger program, likely part of an attack framework used by the U.S. National Security Agency and its intelligence partners, is dubbed QWERTY and was among the files that former NSA contractor Edward Snowden leaked to journalists. It was released by German news magazine Der Spiegel on Jan. 17 along with a larger collection of secret documents about the malware capabilities of the NSA and the other Five Eyes partners -- the intelligence agencies of the U.K., Canada, Australia and New Zealand.
"We've obtained a copy of the malicious files published by Der Spiegel and when we analyzed them, they immediately reminded us of Regin," malware researchers from antivirus firm Kaspersky Lab said Tuesday in a blog post. "Looking at the code closely, we conclude that the 'QWERTY' malware is identical in functionality to the Regin 50251 plugin."
Moreover, the Kaspersky researchers found that both QWERTY and the 50251 plug-in depend on a different module of the Regin platform identified as 50225 which handles kernel-mode hooking. This component allows the malware to run in the highest privileged area of the operating system -- the kernel.
This is strong proof that QWERTY can only operate as part of the Regin platform, the Kaspersky researchers said. "Considering the extreme complexity of the Regin platform and little chance that it can be duplicated by somebody without having access to its source code, we conclude the QWERTY malware developers and the Regin developers are the same or working together."
Der Spiegel reported that QWERTY is likely a plug-in of a unified malware framework codenamed WARRIORPRIDE that is used by all Five Eye partners. This is based on references in the code to a dependency called WzowskiLib or CNELib.
In a separate leaked document authored by the Communications Security Establishment Canada, the Canadian counterpart of the NSA, WARRIORPRIDE is described as a flexible computer network exploitation (CNE) platform that's an implementation of the "WZOWSKI" Five Eyes API (application programming interface).
The document also notes that WARRIORPRIDE is known under the code name DAREDEVIL at the UK Government Communications Headquarters (GCHQ) and that the Five Eyes intelligence partners can create and share plug-ins for it.
The newly discovered link between QWERTY and Regin suggests that the cyberespionage malware platform security researchers call Regin is most likely WARRIORPRIDE.
See the rest here:
Link between NSA and Regin cyberespionage malware becomes clearer
Posted in NSA
Comments Off on Link between NSA and Regin cyberespionage malware becomes clearer
The NSA's infosec tips won't stop you from being hacked
Posted: at 10:52 am
Earlier this month, the NSAs cyber security wing released its best practice guide to defending against destructive malware - presumably with one eye on the beleaguered Sony bosses who continue to deal with the fallout from the companys high profile hack.
The report (PDF) focuses on cost-effective countermeasures that can be easily established in your organisation to make life more difficult for the average attacker.
Starting with controls such as segregation of networks, protection and restriction of the use of administrative privileges, and whitelisting authorised application execution on your systems, the tips aim to circumvent the damage cyber bad guys can do.
But is the NSA's new fact sheet just wishful thinking from the US spy agency? Would any of this information have stopped something like the Sony attack from happening?
I have scoured the content of the document in search of anything new. I didn't find it.
None of this is groundbreaking advice (and none of it should be new to the security team at Sony).
The NSA best practice controls will already be familiar to anyone following our own Australian Signals Directorate (ASD) guidelines on attack mitigation strategies, including its highly regarded Top 4 Strategies to Mitigate Targeted Cyber Intrusions-a mandatory requirement for government departments adhering to the Protective Security Policy Framework (PSPF).
Whitelisting, reduction of administrative privileges and a comprehensive approach to patching feature heavily in the ASDs top four. Its top 35 adds even more defensive measures that can be implemented to protect your organisation.
Nearly all of the mitigations listed in the NSA document - such as the use of Microsofts Enhanced Mitigation Experience Toolkit (EMET) and subscribing to cloud-based reputation services - are also covered in the ASD documentation.
As a result I was rather disappointed with this latest effort from the NSA. Realistically, the only valuable advice in this document is a warning for organisations to prepare for the worst.
Read more here:
The NSA's infosec tips won't stop you from being hacked
Posted in NSA
Comments Off on The NSA's infosec tips won't stop you from being hacked
The First Amendment…(Historically Speaking) – Episode #13 – Video
Posted: at 10:51 am
The First Amendment...(Historically Speaking) - Episode #13
A weekly program on UPTV hosted by Frederick Douglass Dixon.
By: UPTV6
Read the rest here:
The First Amendment...(Historically Speaking) - Episode #13 - Video
Posted in First Amendment
Comments Off on The First Amendment…(Historically Speaking) – Episode #13 – Video
Why Bitcoin is one of the easiest markets to trade | Chris Dunn – Video
Posted: at 10:50 am
Why Bitcoin is one of the easiest markets to trade | Chris Dunn
How to catch the BIGGEST moves in Bitcoin for gains of 16%-32%. Why Bitcoin is FAR easier to trade than stocks, forex, options. My 3 ""underground secrets"" ...
By: Investor Inspiration
Read the original here:
Why Bitcoin is one of the easiest markets to trade | Chris Dunn - Video
Posted in Bitcoin
Comments Off on Why Bitcoin is one of the easiest markets to trade | Chris Dunn – Video
What’s up with bitcoin and the euro – Video
Posted: at 10:50 am
What #39;s up with bitcoin and the euro
join the Syndicate: http://www.tradeempowered.com/syndicate.
By: Jason Stapleton
More here:
What's up with bitcoin and the euro - Video
Posted in Bitcoin
Comments Off on What’s up with bitcoin and the euro – Video