The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: February 11, 2015
Anonymous # Operation NSA Campus Stop Spying ON US – Video
Posted: February 11, 2015 at 3:50 pm
Anonymous # Operation NSA Campus Stop Spying ON US
By: Megan Rowe
Here is the original post:
Anonymous # Operation NSA Campus Stop Spying ON US - Video
Posted in NSA
Comments Off on Anonymous # Operation NSA Campus Stop Spying ON US – Video
NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
Posted: at 3:50 pm
After the Stuxnet digital weapon was discovered on machines in Iran in 2010, many security researchers warned that US adversaries would learn from this and other US attacks and develop similar techniques to target America and its allies.
A newly published document leaked by Edward Snowden indicates that the NSA feared the same thing and that Iran may already be doing exactly this. The NSA document from April 2013, published today by The Intercept, shows the US intelligence community is worried that Iran has learned from attacks like Stuxnet, Flame and Duquall of which were created by the same teamsin order to improve its own capabilities.
The document suggests that such attacks dont just invite counterattacks but also school adversaries on new techniques and tools to use in their counterattacks, allowing them to increase the sophistication of these assaults. Iran, the document states, has demonstrated a clear ability to learn from the capabilities and actions of others.
The document, which was prepared for a meeting between the NSA director and the British spy agency Government Communications Headquarters, doesnt mention the Stuxnet attack by name, but instead refers to Western attacks against Irans nuclear sector. Stuxnet targeted machines controlling centrifuges in Iran that were being used to enrich uranium for Irans program.
In addition to attacks against Irans nuclear sector, however, the document also states that Iran learned from a different attack that struck its oil industry. The report says Iran then replicated the techniques of that attack in a subsequent attack called Shamoon that targeted Saudi Arabias oil conglomerate, Saudi Aramco.
Irans destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary, the NSA document states. Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.
The latter statement in the document is referring to the so-called Wiper attack, an aggressive and destructive piece of malware that targeted machines belonging to the Iranian Oil Ministry and the National Iranian Oil Company in April 2012. Wiper didnt steal datainstead it destroyed it, first wiping content on the machines before systematically erasing system files, causing the systems to crash, and preventing them from rebooting. Wiper was designed to quickly destroy as many files as effectively as possible, which can include multiple gigabytes at a time, according to researchers at Kaspersky Lab who examined the mirror images of hard drives in Iran that were destroyed by Wiper.
Wiper was the first known data destruction attack of its kind. Although the NSA document doesnt credit the US and its allies for launching the attack, Kaspersky researchers found that it shared some circumstantial hallmarks of the Duqu and Stuxnet attacks, suggesting that Wiper might have been created and unleashed on Iran by the US or Israel.
Many believe it served as inspiration for Shamoon, a subsequent destructive attack that struck computers belonging to Saudi Aramco in August 2012. The document claims Iran was behind Shamoon. The Shamoon malware wiped data from about 30,000 machines before overwriting the Master Boot Record, preventing machines from rebooting. The attack was designed to replace erased data with an image of a burning US American flag, though the malware contained a bug that prevented the flag image from completely unfurling on machines. Instead, only a fragment of the flag appeared. Researchers said at the time that Shamoon was a copycat attack that mimicked Wiper.
Wiper is also believed to have inspired a destructive attack that struck computers belonging to banks and media companies in South Korea in March 2013. That attack wiped the hard drives and Master Boot Record of at least three banks and two media companies simultaneously and reportedly put some ATMs out of operation, preventing South Koreans from withdrawing cash from them. The report does not suggest that Iran was behind this attack.
View post:
NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
Posted in NSA
Comments Off on NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
The NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
Posted: at 3:50 pm
After the Stuxnet digital weapon was discovered on machines in Iran in 2010, many security researchers warned that US adversaries would learn from this and other US attacks and develop similar techniques to target America and its allies.
A newly published document leaked by Edward Snowden indicates that the NSA feared the same thing and that Iran may already be doing exactly this. The NSA document from April 2013, published today by The Intercept, shows the US intelligence community is worried that Iran has learned from attacks like Stuxnet, Flame and Duquall of which were created by the same teamsin order to improve its own capabilities.
The document suggests that such attacks dont just invite counterattacks but also school adversaries on new techniques and tools to use in their counterattacks, allowing them to increase the sophistication of these assaults. Iran, the document states, has demonstrated a clear ability to learn from the capabilities and actions of others.
The document, which was prepared for a meeting between the NSA director and the British spy agency Government Communications Headquarters, doesnt mention the Stuxnet attack by name, but instead refers to Western attacks against Irans nuclear sector. Stuxnet targeted machines controlling centrifuges in Iran that were being used to enrich uranium for Irans program.
In addition to attacks against Irans nuclear sector, however, the document also states that Iran learned from a different attack that struck its oil industry. The report says Iran then replicated the techniques of that attack in a subsequent attack called Shamoon that targeted Saudi Arabias oil conglomerate, Saudi Aramco.
Irans destructive cyber attack against Saudi Aramco in August 2012, during which data was destroyed on tens of thousands of computers, was the first such attack NSA has observed from this adversary, the NSA document states. Iran, having been a victim of a similar cyber attack against its own oil industry in April 2012, has demonstrated a clear ability to learn from the capabilities and actions of others.
The latter statement in the document is referring to the so-called Wiper attack, an aggressive and destructive piece of malware that targeted machines belonging to the Iranian Oil Ministry and the National Iranian Oil Company in April 2012. Wiper didnt steal datainstead it destroyed it, first wiping content on the machines before systematically erasing system files, causing the systems to crash, and preventing them from rebooting. Wiper was designed to quickly destroy as many files as effectively as possible, which can include multiple gigabytes at a time, according to researchers at Kaspersky Lab who examined the mirror images of hard drives in Iran that were destroyed by Wiper.
Wiper was the first known data destruction attack of its kind. Although the NSA document doesnt credit the US and its allies for launching the attack, Kaspersky researchers found that it shared some circumstantial hallmarks of the Duqu and Stuxnet attacks, suggesting that Wiper might have been created and unleashed on Iran by the US or Israel.
Many believe it served as inspiration for Shamoon, a subsequent destructive attack that struck computers belonging to Saudi Aramco in August 2012. The document claims Iran was behind Shamoon. The Shamoon malware wiped data from about 30,000 machines before overwriting the Master Boot Record, preventing machines from rebooting. The attack was designed to replace erased data with an image of a burning US American flag, though the malware contained a bug that prevented the flag image from completely unfurling on machines. Instead, only a fragment of the flag appeared. Researchers said at the time that Shamoon was a copycat attack that mimicked Wiper.
Wiper is also believed to have inspired a destructive attack that struck computers belonging to banks and media companies in South Korea in March 2013. That attack wiped the hard drives and Master Boot Record of at least three banks and two media companies simultaneously and reportedly put some ATMs out of operation, preventing South Koreans from withdrawing cash from them. The report does not suggest that Iran was behind this attack.
See the rest here:
The NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
Posted in NSA
Comments Off on The NSA Acknowledges What We All Feared: Iran Learns From US Cyberattacks
Did the NSA and the UKs Spy Agency Launch a Joint Cyberattack on Iran?
Posted: at 3:50 pm
An NSA document newly published today suggests two interesting facts that havent previously been reported.
The Intercept, which published the document, highlighted that in it the NSA expresses fear that it may be teaching Iran how to hack, but there are two other points in the document that merit attention.
One concerns the spy tool known as Flame; the other refers to concerns the NSA had about partnering with the British spy agency Government Communications Headquarters and Israeli intelligence in surveillance operations.
In the document, prepared in April 2013 for a meeting between the NSA director and GCHQ, the author cites the Flame attack against Iran as an example of a US/GCHQ partnership. Flame was a massive spy platform exposed by Kaspersky Lab and Symantec in 2012. Flame targeted more than 10,000 machines in Iran, Lebanon, Syria, Sudan, the Israeli Occupied Territories and other countries in the Middle East and North Africa and was active for at least six years before it was discovered. It used some of the same code that Stuxnet used, leading researchers to conclude that it had been created by the same US/Israel teams that had created Stuxnet. The Washington Post reported in 2012 that the US and Israel were both behind Flame, quoting anonymous US officials. But the new Snowden document hints that GCHQ might have been involved in Flame with the US.
Although the document doesnt say overtly that GCHQ partnered with the US in creating and unleashing Flame, it hints obliquely at cooperation. The document notes that the NSA has successfully worked multiple high-priority surges with GCHQ and cites Flame as an example. But, oddly, it doesnt say they worked together on creating Flame. Instead, it simply cites Irans discovery of Flame in a list of projects on which the GCHQ and the US collaborated.
These jointly worked events include the storming of the British Embassy in Tehran; Irans discovery of computer network exploitation tools on their networks in 2012 and 2013; and support to policymakers during the multiple rounds of P5 plus 1 negotiation on Irans nuclear program, the document reads. The reference to an embassy attack presumably refers to the 2011 attack on the British embassy by protestors in Iran. The reference to the P5 plus 1 relates to negotiations between Iran and Western powers over Irans nuclear program. The network attacks are identified by name as the Flame attacks in another part of the document.
Its unclear what else this might refer to if not the two countries partnering in the creation and unleashing of Flame. Other documents leaked by Edward Snowden have spelled out in more detail how the NSA and GCHQ have partnered over the years in other spy operations, ranging from sharing data siphoned from undersea cables to the hacking of telecom networks, like Belgiums Belgacom, to monitor mobile traffic. The new document suggests that the two countries might also have partnered on Flame in some way, though its unclear to what extent. If this is correct, and the previous Post is correct as well, it would mean the three nations teamed up to spy on Iran, presumably over its nuclear program.
Although there are numerous examples released in the Snowden documents of NSA-GCHQ cooperation as well as NSA-Israeli cooperation, the 2013 document published today expresses concern about a trilateral agreement between the three nations.
It appears in a section discussing a collaboration between the NSA, GCHQ and ISNUa reference to the Israeli SIGINT National Unit, the Israeli counterpart to the NSA. Under the heading Potential Landmines, the document notes that GCHQ has long pushed to work with the NSA and ISNU in a trilateral arrangement to prosecute the Iranian target. And it notes that the NSA and GCHQ have agreed to share information gleaned from their separate partnerships with Israeli intelligence. But with regard to a trilateral partnership, the NSA had reservations. The document notes that the SID policy has been opposed to such a blanket arrangement.
SID refers to the Signals Intelligence Directorate. Under the SID Management Directive 422 (.pdf), the intelligence community is prohibited from delegating a mission to a non-USSS elementthat is, a non-US SIGINT Systemwithout first obtaining a memo of understanding between the NSA and the non-US entity. NSA activities are government by a number of directives, most important among them is USSID 18, which governs what the US can and cannot collect on US persons and how it must handle information collected incidentally on them. Including a foreign spy agency in data collection raises issues about oversight and legality if it involves data pertaining to U.S. persons. This may be in part why the NSA was concerned.
Continue reading here:
Did the NSA and the UKs Spy Agency Launch a Joint Cyberattack on Iran?
Posted in NSA
Comments Off on Did the NSA and the UKs Spy Agency Launch a Joint Cyberattack on Iran?
The Switchboard: Judge sides with NSA in warrantless search case
Posted: at 3:50 pm
Published every weekday, the Switchboard is your morning helping of hand-picked stories from the Switch team.
Judge rules for NSA in warrantless search case. Privacy advocates suffered a major setback Tuesday when a Judge sided with the National Security Agency in the long-running Jewel v. NSA case. "U.S. District Judge Jeffrey White in Oakland, California wrote the plaintiffs failed to establish legal standing to pursue a claim that the government violated the Fourth Amendment," reported Dan Levine at Reuters.
Apple is building a massive solar farm in California. "Apple chief executive Tim Cook said Tuesday that the company is taking on an ambitious project: an enormous solar farm that will provide enough power for all of the company's corporate offices, California stores, its forthcoming campus and more," reports the Switch's Hayley Tsukayama.
Uh-oh: Jeb Bushs transparency effort also exposed Florida residents personal data. Florida man Jeb Bush's bid for transparency went awry when he released more than 4 gigabytes of constituent email from his time as governor -- without redacting personal information, the Switch's Brian Fung noted.
NSA claims Iran learned from Western cyberattacks.Over at the Intercept, Glenn Greenwald reports on a newly revealed Snowden document showing that the National Security Agency claimed that cyberattacks against Iran were actually helping Tehran prepare its own offensive capabilities.
Forbes Web site was compromised by Chinese cyberespionage group, researchers say. For three days last year, the "Thought of the Day" feature on Forbeswasn't just annoying, it was dangerous -- a Chinese cyberespionage group compromised it, using it as part of a watering hole attack that targeted those in the financial and defense industry, researchers told the Switch.
Want more? Follow@TheSwitchand our reporters --@kansasalps,@b_fungand@htsuka-- for the latest tech news throughout the day.
Andrea Peterson covers technology policy for The Washington Post, with an emphasis on cybersecurity, consumer privacy, transparency, surveillance and open government.
Here is the original post:
The Switchboard: Judge sides with NSA in warrantless search case
Posted in NSA
Comments Off on The Switchboard: Judge sides with NSA in warrantless search case
NSA wins key ruling in years-old phone and Internet spying lawsuit
Posted: at 3:50 pm
The EFF's "Team Jewel."
The case, known as Jewel v. NSA, was originally brought by the EFF on behalf of Carolyn Jewel, a romance novelist who lives in Petaluma, California, north of San Francisco. For years, the case stalled in the court system, but it gained new life after the Edward Snowden disclosures in 2013.
Despite the NSA's victory in its partial summary judgment, there are a number of issues left to be adjudicated in Jewel.
The judge's ruling only concerned Upstream Internet surveillance, not the telephone records collection nor other mass surveillance that are also at issue in Jewel, Kurt Opsahl, an EFF attorney, told Ars, referring to the governments program to capture data directly off of fiber optic cables.
We will continue to fight to end NSA mass surveillance, he added.
US District Judge Jeffrey White, in his 10-page order, found that the lead plaintiff lacked standinge.g., she was unable to show that she specifically was surveilled. Beyond the question of standing, the court found it was not able to evaluate her claims without violating national security.
As Judge White wrote:
Based on the public record, the Court finds that the Plaintiffs have failed to establish a sufficient factual basis to find they have standing to sue under the Fourth Amendment regarding the possible interception of their Internet communications. Further, having reviewed the Government Defendants classified submissions, the Court finds that the Claim must be dismissed because even if Plaintiffs could establish standing, a potential Fourth Amendment Claim would have to be dismissed on the basis that any possible defenses would require impermissible disclosure of state secret information.
The standing issue here is similar to a 2013 Supreme Court decision known as Clapper v. Amnesty International. That case found that the plaintiffs (such as Guantanamo Bay lawyers) who had strong evidence to believe that they were being spied upon but could not demonstrate it to the Supreme Courts standard, could not bring their case.
During a December 2014 hearing in federal court in Oakland, California, Judge White heard arguments from both sides in his attempt to wrestle with the plaintiffs July 2014 motion for partial summary judgment.
View original post here:
NSA wins key ruling in years-old phone and Internet spying lawsuit
Posted in NSA
Comments Off on NSA wins key ruling in years-old phone and Internet spying lawsuit
US judge backs NSA in people vs privacy case
Posted: at 3:49 pm
A US JUDGE HAS ruled in favour of the National Security Agency (NSA) in a personal privacy case, despite the protests of rights group the Electronic Frontier Foundation (EFF).
Jewel vs the NSA was ruled on by judge Jeffrey White in Oakland, California, who told plaintiffs that they had failed to prove that the government violated a long established hope that a man's home is his castle', or rather the Fourth Amendment.
The EFF expressed its disappointment at the latest stage in a case in which it has been involved for some time.
"EFF will keep fighting the unlawful, unconstitutional surveillance of ordinary Americans by the US government," the group said in a statement.
"Today's ruling was not a declaration that NSA spying is legal. The judge decided instead that 'state secrets' prevented him from ruling whether the programme is constitutional.
"It would be a travesty of justice if our clients are denied their day in court over the secrecy' of a programme that has been front page news for nearly a decade.
"Judge White's ruling does not end our case. The judge's ruling only concerned upstream internet surveillance, not the telephone records collection nor other mass surveillance processes that are also at issue."
The EFF has looked to crack open the government during the case and get it to talk more openly about surveillance sweeps.
"The American people know that their communications are being swept up by the government under various NSA programmes," it said.
"The government's attempt to block true judicial review of its mass, untargeted collection of content and metadata by pretending that the basic facts about how the spying affects the American people are still secret is outrageous and disappointing."
The rest is here:
US judge backs NSA in people vs privacy case
Posted in Fourth Amendment
Comments Off on US judge backs NSA in people vs privacy case
News – Gun Rights Proclamation – theDove.us – Video
Posted: at 3:49 pm
News - Gun Rights Proclamation - theDove.us
Jackson County Commissioners are working on stating their support for the Second Amendment. Originally aired on theDove TV Radio 6th February 2015 See more...
By: theDoveTV
Read this article:
News - Gun Rights Proclamation - theDove.us - Video
Posted in Second Amendment
Comments Off on News – Gun Rights Proclamation – theDove.us – Video
Federal Court judge shoots down pro-gun group's lawsuit
Posted: at 3:49 pm
A pro-gun groups lawsuit seeking to undermine the citys strict gun control laws has been shot down by a Manhattan Federal Court judge.
The NRA-affiliated New York State Pistol and Rifle Association sued the city in 2013, arguing that laws limiting certain licensed handgun owners to carrying their unloaded weapons directly to or from their homes and shooting ranges infringed on their Second Amendment rights.
Judge Robert Sweet said he wasnt buying it last week in a 43-page ruling.
These regulations are reasonable and result from the substantial government interest in public safety, Sweet wrote, citing previous rulings that outside the home, firearms safety interests often outweigh individual interests in self-defense.
The gun group had argued the small number of shooting ranges only eight in the city amounted to a gun ban. Sweet countered that the paucity of gun ranges was simply the free market at work.
There are over 40,000 active handgun licenses in the city, according to court documents.
We are pleased that the city was able to defeat this challenge to our common-sense gun laws that are designed to keep us all safe, said Mayor de Blasios spokeswoman, Marti Adams.
Sweet called the restrictions a minimal, or at most, modest burden on Second Amendment rights. He said the NYPD processes 3,200 new applications and 9,000 renewal applications for handgun licenses yearly. The gun association did not respond or comment.
Continued here:
Federal Court judge shoots down pro-gun group's lawsuit
Posted in Second Amendment
Comments Off on Federal Court judge shoots down pro-gun group's lawsuit
Senate panel asserts state law trumps federal rule
Posted: at 3:49 pm
PHOENIX Declaring state law to be above all others, a Senate panel voted Tuesday block federal gun laws they believe violate the Second Amendment, and to punish the city of Tucson for enacting its own restrictions.
The votes were part of a series of actions by the same Senate committee asserting state supremacy, including:
All of the votes, along party lines in the Republican-controlled Committee on Federalism, Mandates and Fiscal Responsibility, were based on arguments that the state has to protect individual rights from being trampled.
Potentially the most far reaching is SB 1384, requiring federal officials to get permission from a county sheriff before taking certain actions. Sen. Judy Burges, R-Sun City West, said it simply recognizes the supremacy of the state over the federal government, and that sheriffs are each countys chief constitutional and law enforcement officer.
SB 1384 would make it illegal for any federal employee, including a law enforcement official who has not been first given permission by the sheriff, to make an arrest, conduct a search or seize property.
Burges said the law is needed because it is a duty of the sheriff to protect and defend the citizens business of his county from any and all abuses of constitutional rights and freedoms, even in the name of law enforcement.
Exceptions are provided for incidents on federal lands or where the officer has witnessed a crime that requires immediate arrest. And it would not apply to customs or Border Patrol officers.
Burges said there are things already happening in Arizona that are potential flash points, including federal agencies closing roads, and in one instance, in Greenlee County, the confiscation of cattle and sale of them at auction in a dispute between the U.S. Forest Service and the rancher.
Burges sees her legislation as a way for the state to fight back against things like the federal government requiring that wolves be accommodated in Arizona something two other committees have voted to spend $250,000 fighting in court.
She said there already are problems with wolves stalking children, and her legislation affirms the right of the sheriff to defend Arizonans, including shooting a wolf without fear of a $50,000 federal fine.
See the original post:
Senate panel asserts state law trumps federal rule
Posted in Second Amendment
Comments Off on Senate panel asserts state law trumps federal rule