The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: February 2015
Will NATO accept Ukraine & Syria defeat without using nuclear weapons? – Video
Posted: February 18, 2015 at 12:48 am
Will NATO accept Ukraine Syria defeat without using nuclear weapons?
NATO #39;s nuclear relapse Under the public radar, NATO is modernising its tactical nuclear arsenal. http://www.aljazeera.com/indepth/opinion/2014/12/nato-nuclear-relapse-2014123161917509924.html...
By: PublicEnquiry
Originally posted here:
Will NATO accept Ukraine & Syria defeat without using nuclear weapons? - Video
Posted in NATO
Comments Off on Will NATO accept Ukraine & Syria defeat without using nuclear weapons? – Video
Bulgarian Demonstrators March Against NATO Alliance – Video
Posted: at 12:48 am
Bulgarian Demonstrators March Against NATO Alliance
Source: https://www.youtube.com/user/videosptv February 16, 2015 - Press TV reports on the latest news headlines from around the world. Live @ http://www.presstv.ir/live.html Twitter @ http://twi...
By: PigMine2
See the rest here:
Bulgarian Demonstrators March Against NATO Alliance - Video
Posted in NATO
Comments Off on Bulgarian Demonstrators March Against NATO Alliance – Video
Nato | Define Nato at Dictionary.com
Posted: at 12:48 am
[ney-toh] /ne to/
IPA Syllables
an organization formed in Washington, D.C. (1949), comprising the 12 nations of the Atlantic Pact together with Greece, Turkey, and the Federal Republic of Germany, for the purpose of collective defense against aggression.
Origin Expand
N(orth) A(tlantic) T(reaty) O(rganization)
Examples from the web for NATO Expand
British Dictionary definitions for NATO Expand
North Atlantic Treaty Organization, an international organization composed of the US, Canada, Britain, and a number of European countries: established by the North Atlantic Treaty (1949) for purposes of collective security. In 1994 it launched the Partnership for Peace initiative, in order to forge alliances with former Warsaw Pact countries; in 1997 a treaty of cooperation with Russia was signed and in 1999 Hungary, Poland, and the Czech Republic became full NATO members
Word Origin and History for NATO Expand
acronym of North Atlantic Treaty Organization, which was set up in 1949.
Follow this link:
Nato | Define Nato at Dictionary.com
Posted in NATO
Comments Off on Nato | Define Nato at Dictionary.com
Game Film: NSA Gorfam 250′ 1-Pitch Softball Tournament – Video
Posted: at 12:47 am
Game Film: NSA Gorfam 250 #39; 1-Pitch Softball Tournament
Game film from the NSA Gorfam 250 1-Pitch tournament at Indian Springs Softball Complex in Broken Arrow, OK. Brought to you by RedDirtSoftball.com. Like us at facebook.com/reddirtsoftball...
By: RedDirtSoftball
Read the rest here:
Game Film: NSA Gorfam 250' 1-Pitch Softball Tournament - Video
Posted in NSA
Comments Off on Game Film: NSA Gorfam 250′ 1-Pitch Softball Tournament – Video
Ex-NSA chief linked to alleged coup plot – Video
Posted: at 12:47 am
Ex-NSA chief linked to alleged coup plot
Sen. Antonio Trillanes involves former National Security Adviser (NSA) Norberto Gonzales in the coup attempt against President Aquino. Subscribe to ABS-CBN News channel!
By: ABS-CBN News
See more here:
Ex-NSA chief linked to alleged coup plot - Video
Posted in NSA
Comments Off on Ex-NSA chief linked to alleged coup plot – Video
Kaspersky Lab uncovers online spy tools with potential NSA connections – Video
Posted: at 12:47 am
Kaspersky Lab uncovers online spy tools with potential NSA connections
The Moscow-based Kaspersky Lab has discovered new methods allegedly used by a group known as the #39;Equation Group #39;, potentially linked to America #39;s National Security Agency, to establish...
By: Cnn News Rt
See original here:
Kaspersky Lab uncovers online spy tools with potential NSA connections - Video
Posted in NSA
Comments Off on Kaspersky Lab uncovers online spy tools with potential NSA connections – Video
NSA Hacks Hard Drives – Daily Security Byte EP.25 – Video
Posted: at 12:47 am
NSA Hacks Hard Drives - Daily Security Byte EP.25
In this short, daily video post, Corey Nachreiner, CISSP and Director of Security Strategy for WatchGuard Technologies, shares the biggest InfoSec story from the day -- often sharing useful...
By: Corey Nachreiner
Originally posted here:
NSA Hacks Hard Drives - Daily Security Byte EP.25 - Video
Posted in NSA
Comments Off on NSA Hacks Hard Drives – Daily Security Byte EP.25 – Video
How omnipotent hackers tied to NSA hid for 14 years …
Posted: at 12:47 am
Aurich Lawson
CANCUN, Mexico In 2009, one or more prestigious researchers received a CD by mail that contained pictures and other materials from a recent scientific conference they attended in Houston. The scientists didn't know it then, but the disc also delivered a malicious payload developed by a highly advanced hacking operation that had been active since at least 2001. The CD, it seems, was tampered with on its way through the mail.
It wasn't the first time the operatorsdubbed the "Equation Group" by researchers from Moscow-based Kaspersky Labhad secretly intercepted a package in transit, booby-trapped its contents, and sent it to its intended destination. In 2002 or 2003, Equation Group members did something similar with an Oracle database installation CD in order to infect a different target with malware from the group's extensive library. (Kaspersky settled on the name Equation Group because of members' strong affinity for encryption algorithms, advanced obfuscation methods, and sophisticated techniques.)
Kaspersky researchers have documented 500 infections by Equation Group inat least 42 countries, with Iran, Russia, Pakistan, Afghanistan, India, Syria, and Mali topping the list. Because of a self-destruct mechanism built into the malware, the researchers suspect that this is just a tiny percentage of the total; the actual number of victims likely reaches into the tens of thousands.
A long list of almost superhuman technical feats illustrateEquation Group's extraordinary skill, painstaking work, and unlimited resources. Theyinclude:
Taken together, the accomplishments led Kaspersky researchers to conclude that Equation Group is probably the most sophisticated computer attack group in the world, with technical skill and resources that rival the groups that developed Stuxnet and theFlame espionage malware.
"It seems to me Equation Group are the ones with the coolest toys," Costin Raiu, director of Kaspersky Lab's global research and analysis team, told Ars. "Every now and then they share them with the Stuxnet group and the Flame group, but they are originally available only to the Equation Group people. Equation Group are definitely the masters, and they are giving the others, maybe, bread crumbs. From time to time they are giving them some goodies to integrate into Stuxnet and Flame."
In an exhaustive report published Monday at the Kaspersky Security Analyst Summit here, researchers stopped short of saying Equation Group was the handiwork of the NSAbut they provided detailed evidence that strongly implicates the US spy agency.
First is the group's known aptitude for conducting interdictions, such as installing covert implant firmware in a Cisco Systems router as it moved through the mail.
Second, a highly advanced keylogger in the Equation Group library refers to itself as "Grok" in its source code. The reference seems eerily similar to a line published last March in an Intercept article headlined "How the NSA Plans to Infect 'Millions' of Computers with Malware." The article, which was based on Snowden-leaked documents, discussed an NSA-developed keylogger called Grok.
Read the original:
How omnipotent hackers tied to NSA hid for 14 years ...
Posted in NSA
Comments Off on How omnipotent hackers tied to NSA hid for 14 years …
The NSA has reportedly found ways to avoid even the strongest security measures
Posted: at 12:47 am
The U.S. intelligence community has found ways to avoid even the strongest of security measures and practices, a new report from Moscow-based Kaspersky Lab suggests, demonstrating a range of technological accomplishments that place the nation's hackers as among the most sophisticated and well resourced in the world.
Hackers who are part of what the cybersecurity researchers call "Equation Group" have been operating under the radar for at least 14years, deploying a range of malware that could infect hard drives in a wayalmost impossible to remove and cold hide code in USB storage devicesto infiltratenetworks kept separate from the Internet for security purposes.
Kaspersky's report did not say the U.S. government wasbehind the group. But it did say the group was closely linked to Stuxnet -- malware widely reported to have been developed by the National Security Agency and Israel that was used in an attack against Iran's uranium enrichment program -- along with other bits of data that appear to align with previous disclosures. Reuters further linked the NSA to the Kaspersky report, citing anonymous former employees of the agency who confirmed Kaspersky's analysis.
NSA spokesperson Vanee Vines said in a statement that the agency was aware of the report, but would not comment publicly on any allegations it raises.
The Kaspersky report shows a highly sophisticated adversarythat has found ways to worm itself into computers with even the strongest of security measures in place. This matches up with what we know about other NSA efforts from documents leaked by former NSA contractor Edward Snowden, which showed efforts to undermine encryption and evade the protections major tech companies used to guard user data.
But the new report paints a more detailed picture of the breadth of the agency's reported offensive cyber arsenal. And unlike other recent revelations about U.S. government snooping, which have largely come from Snowden, the insights from Kaspersky came from examining attacks found in the digital wild. Victims were observed in more than 30 countries, withIran, Russia, Pakistan and Afghanistan having among the highest infection rates, according to the report.
One of the most sophisticatedattacks launched by theEquation Group lodged malware deep into hard drives, according to Kaspersky. It worked by reprogramming the proprietary code, called firmware, built into the hard drives themselves. That allowed for persistent storage hidden inside a target system that could survive the hard drive being reformatted or an operating system being reinstalled, the report says.
The code uncovered by Kaspersky suggests the malware was designed to work ondisk drives of more than a dozen major manufacturers -- including those from Seagate, Western Digital, Toshiba, IBM and Samsung. But the report also notes that this particular technique seemed to be rarely deployed, suggesting that it was used only on the most valuable victims or in unusual circumstances.
The Kaspersky report also said the group found ways to hide malicious files within aWindows operating system database on the targets' computer known as the registry -- encrypting and stashing the files so that they would be impossible to detect using antivirus software.
Equation Group also found ways to infiltratesystemsthat were kept off the Internet for security purposes -- commonly known as "air-gapped" networks. Malware used by the hackers relied on infected USB sticks to map out such networks -- or even remotely deploy code on them, according to the report.
Originally posted here:
The NSA has reportedly found ways to avoid even the strongest security measures
Posted in NSA
Comments Off on The NSA has reportedly found ways to avoid even the strongest security measures
Is the NSA putting spyware in hard drives?
Posted: at 12:47 am
The NSA may be implanting spying software in hard drives from a dozen major manufacturers including Toshiba, Western Digital, IBM, Samsung and Seagate, a report from cybersecurity firm Kaspersky Lab revealed Monday.
Though Kaspersky did not come out and point the finger directly at the National Security Agency -- instead calling out the Equation group, who have been perpetrating high-level attacks for almost 20 years -- but they said that there are "solid links indicating that the Equation group has interacted with" the actors behind Stuxnet, a virus the NSA used to attack Iranian nuclear weapons development in 2012.
A former NSA employee told Reuters that Kaspersky's analysis was correct, and "another former intelligence operative confirmed that the NSA had developed the prized technique of concealing spyware in hard drives."
The Kaspersky paper calls the software "perhaps the most powerful tool" in the Equation group's impressive arsenal, and "the first known malware capable of infecting the hard drives." It reprograms the drives and creates a hidden space where it can save stolen information to be retrieved later.
As CNET's Bridget Carey told CBS News, getting that deep into a piece of firmware (the core software of the drives), is very hard to do and requires the source code from the manufacturer.
One of the companies whose hard drives were infected with the spyware, Western Digital, said that it did not give its source code to the government. "But other sources in cybersecurity say that the government can get this because all it takes is for you to sell a computer to the Pentagon or another agency and they have to say, 'You know what, for security reasons we need that source code,'" Carey explained.
In other words, the government may have only had to ask for what it wanted in order to send spying-capable hard drives all over the world.
2015 CBS Interactive Inc. All Rights Reserved.
See the original post:
Is the NSA putting spyware in hard drives?
Posted in NSA
Comments Off on Is the NSA putting spyware in hard drives?







