The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Monthly Archives: May 2017
First Amendment: often challenged but consistently enduring – Washington Post
Posted: May 20, 2017 at 6:30 am
By Roy S. Gutterman By Roy S. Gutterman May 19 at 9:43 AM
Roy S. Gutterman is an associate professor and director of the Tully Center for Free Speech at the S.I. Newhouse School of Public Communications at Syracuse University.
When protesters recently shouted conservative firebrands Ann Coulter and Milo Yiannopoulos off the University of California at Berkeley campus, the irony surrounding these two separate but related incidents was as bright as the fires that the protesters ignited, nearly burning down an academic building. How could the birthplace of the 1960s free speech movement be so hostile to opposing viewpoints?
A university should be a place where discussion and debate flourish. In this case, speakers on one side of the debate had no trouble articulating their viewpoint, while they silenced speakers on the other side of the table. This not only stifles the marketplace of ideas, it also runs counter to the values of the First Amendment.
While conservative opinions were targeted at Berkeley, challenges to free speech come from across the political spectrum. President Trumps declaration that the press is the enemy of the American people was one of his sharpest attacks against journalists and the Fourth Estate. It built on his other promises to crack down on leaks to journalists, as well as his campaign rhetoric naming and personally insulting reporters, and pledging to crack down on opponents and open up libel law to make it easier to recover damages from the press.
[Pray for the First Amendment. Now.]
Yet in the face of the rhetoric, the vitriol and the tweets, citizens and the press are still able to draw on the power and permanence of the First Amendment. Floyd Abrams, perhaps the countrys most prominent First Amendment and media lawyer, makes his latest case defending free speech and press rights in his book The Soul of the First Amendment. Abramss thesis is that speech and press rights are woven into the fabric of America and set the United States apart from the rest of the world. These inherently human rights are akin to freedom of conscience and lead citizens to achieve self-fulfillment through speech, expression, publication and the free flow of information.
A series of six essays, The Soul of the First Amendment is a quick read, and at about 140 pages, considerably thinner than Abramss other books on the topic, particularly his recent books Friend of the Court (2013) and Speaking Freely (2005). These essays are readable and comprehensible to both a specialized audience of lawyers and laypeople just looking to understand a little more about these rights.
The books brevity does not detract from its substance or clarity as Abrams explains the origins and tensions of the First Amendment. He dives into historic and contemporary controversies that test our adherence to these principles, noting, Speech is sometimes ugly, outrageous, even dangerous.
The journey of the First Amendment begins at the Constitutional Convention in 1787 and with the vision of James Madison and the framers who emerged from the Revolution skeptical of governments power over the people, and governments propensity to abuse that power through censorship or aggressive application of laws to punish speech or dissent.
The notion that First Amendment interests are served whenever laws genuinely reflect public opinion also seems to overlook the reality that the public too often seeks to suppress speech it disapproves of, he writes.
The road, however, is littered with the carcasses of dissidents and offensive speakers. Threats to speech are discussed throughout the book, including the Sedition Act of 1798; the Espionage Act of 1917; and the jailing of abolitionist journalists during the Civil War or communists and socialists during the Red Scare, McCarthyism and the Cold War. American history is replete with examples of attacking, punishing, ostracizing or censoring a range unpopular or offensive speakers.
[Our First Amendment test is here. We cant afford to flunk it.]
As the country has evolved, so has our protection of and tolerance for free speech and the marketplace of ideas.
Abrams supports much of his thesis in a lawyerly fashion, pointing to Supreme Court precedents and sprinkling in points from caselaw. It reads like a First Amendments Greatest Hits compilation. He cites such cases as New York Times v. Sullivan (1964), which revolutionized libel law and facilitated robust debate and criticism of public officials and public policy, particularly civil rights. He describes how in New York Times v. United States (1971), the Pentagon Papers case, the Supreme Court stood up to the Nixon administration by refusing to allow the government to block publication or censor the Times and The Washington Post, which were running stories based on leaked top-secret government documents.
The historic and the contemporary are explained and juxtaposed. For example, Abrams draws comparisons between the Pentagon Papers and WikiLeaks and the Edward Snowden stories published by the Guardian. Discussions of public officials and public figures litigating against the press are compared with recent threats by President Trump, as well as the Hulk Hogan invasion-of-privacy verdict against Gawker.
Other recent First Amendment challenges are also part of the discussion, including offensive religious protesters at military funerals, virtual child pornography, videos depicting animal abuse, flag burning and other outrageous speech. This illustrates another theme: It is easy to protect speech that does not rankle people, but the First Amendment protects ugly and offensive speech, too. Abrams also devotes a sizable portion of a chapter to defending the controversial Citizens United case.
Resting nicely on the pedestal Abrams builds, the First Amendment might be akin to Americas crown jewels, setting us apart from dictatorships and even other democracies. He writes that the gulf between the legal protections afforded to free expression in the United States and those afforded in Europe remains oceanic.
The explication begins with an anecdote from a family cruise in 1976, when his son, Dan, got into a tiff with the ships British staff, which barred the youth from a viewing of the PG-rated All the Presidents Men because of profanity. The aggrieved Dan, who grew up to be a lawyer and legal affairs reporter, chortled, Thats why we have the First Amendment.
Of course, the protections of the First Amendment apply only to government action and do not reach beyond our borders. However, this personal story sets the tone that Madison was really onto something unique.
Many other countries have laws protecting and supporting freedom of speech. However, Abrams notes that in many places, these pronouncements are mere lip service to such freedoms, especially in places where journalists and dissidents are censored, harassed, imprisoned or killed for expressing themselves.
With these countries, there is no comparison and never will be. Abrams also distinguishes between American values and European countries, particularly Britain and the European Union, where libel laws are more plaintiff-friendly and the right to be forgotten has forced websites and search engines such as Google to remove hundreds of thousands of articles. International plaintiffs seek and sometimes find hospitable jurisdictions in which to litigate and punish the press through libel tourism.
As much as the First Amendment grants us rights to speak and express ourselves, the amendments construction is a bar on government power and potentially abuse. Congress shall make no law is a declaration to people around the world that the United States reveres our speakers and our government shall not abuse them.
Abrams has spent a lifetime fighting for First Amendment rights in courtrooms and the court of public opinion. It takes lawyers and judges to protect these rights and to write the story of the First Amendment. Abramss tribute to the amendment comes at a time when many believe that freedom of the press and freedom of speech are under attack from the highest levels of government.
Lets hope Abrams is writing an homage to the First Amendment, not its obituary.
The Soul of the First Amendment
By Floyd Abrams
Yale. 145 pp. $26
The rest is here:
First Amendment: often challenged but consistently enduring - Washington Post
Posted in First Amendment
Comments Off on First Amendment: often challenged but consistently enduring – Washington Post
Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine – Washington Post
Posted: at 6:30 am
From Brennan v. U.S. Dept of Homeland Sec., decided Tuesday by the Ninth Circuit:
When Transportation Security Administration (TSA) officers at Portland International Airport told John Brennan that he needed to undergo additional security screening because he tested positive for explosives, Brennan, in the middle of a TSA checkpoint, stripped naked. When TSA officers told Brennan to get dressed, he refused three times. After TSA officers had to close down the checkpoint and surround Brennans naked body with bins until the police arrived to remove him, the TSA fined Brennan $500 for interfering with screening personnel in the performance of their duties. See 49 C.F.R. 1540.109 (No person may interfere with, assault, threaten, or intimidate screening personnel in the performance of their screening duties under this subchapter.). Brennan petitioned for our review. We have jurisdiction under 49 U.S.C. 46110, and we deny the petition.
Brennans core contention is that stripping naked in the middle of a TSA checkpoint is expressive conduct protected by the First Amendment. But Brennan fails to carry his burden of showing that a viewer would have understood his stripping naked to be communicative. See Clark v. Cmty. for Creative Non-Violence, 468 U.S. 288, 293 n.5 (1984). Therefore, his conduct is not protected by the First Amendment.
Brennan also argues that his conduct did not violate the TSA regulation and that even if it did, the regulation is too vague to survive challenge under the Due Process Clause. Neither argument has merit. The regulation prohibits interfer[ing] with screening personnel in the performance of their screening duties. 49 C.F.R. 1540.109. A regulation is unconstitutionally vague if it fails to provide a person of ordinary intelligence fair notice of what is prohibited, or is so standardless that it authorizes or encourages seriously discriminatory enforcement. In making this judgment, we provide greater tolerance of enactments with civil rather than criminal penalties because the consequences of imprecision are qualitatively less severe.
Brennans conduct falls squarely within the regulations ordinary, contemporary, common meaning. We have long recognized that interfere has such a clear, specific and well-known meaning as not to require more than the use of the word[] in a criminal statute. In other words, the word has a settled legal meaning[]. And courts have often defined and applied it, but never in a way that would lead a person of ordinary intelligence to think that he or she could strip naked at a TSA checkpoint and refuse to get dressed, leading to the closure of the checkpoint.
The petition for review is DENIED.
Note that Brennans Oregon state court prosecution for public nudity ended with an acquittal:
The judge sided with the defense, which cited a 1985 Oregon Court of Appeals ruling stating that nudity laws dont apply in cases of protest.
It is the speech itself that the state is seeking to punish, and that it cannot do, Circuit Judge David Rees said. [Oregonian, Aimee Green.]
But the Ninth Circuit wasnt bound by this conclusion; state acquittals dont preclude federal claims, and in any event criminal acquittals dont preclude civil claims, which rely on a lower standard of proof. (Remember O.J.?)
Go here to read the rest:
Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine - Washington Post
Posted in First Amendment
Comments Off on Naked TSA Checkpoint Guy loses First Amendment challenge to $500 fine – Washington Post
EDITORIAL: Good First Amendment news – Washington Times – Washington Times
Posted: at 6:30 am
ANALYSIS/OPINION:
Sometimes theres a nugget of something good in the daily ration of bad news. A T-shirt printer in Lexington, Ky., one Blaine Adamson, won a state court ruling early this month that he was within his First Amendment rights to refuse to print an offensive message on T-shirts ordered by the Gay and Lesbian Services Organization for a gay pride parade.
The court overturned a ruling by the Lexington-Fayette Urban County Human Rights Commission that Mr. Adamsons firm, called Hands On Originals Christian Outfitters, violated a city ordinance barring discrimination based on sexual orientation.
Writing for the court majority, Chief Judge Joy Kramer agreed that the ordinance prohibits such discrimination, but discrimination was not at issue. Objecting to being compelled to propagate a message Mr. Adamson finds odious is not the same as refusing to serve the group because of the sexual orientation of its members.
The right of free speech does not guarantee to any person the right to use someone elses property, Judge Kramer wrote. The conduct [that] Hands On Originals chose not to promote was pure speech. Nothing in the fairness ordinance prohibits Hands On Originals, a private business, from engaging in viewpoint or message censorship.
Indeed, Mr. Adamson said hes willing to print LGBT T-shirts as long as the message he is asked to print on them does not promote homosexuality. Hands On Originals prints messages on mugs, pens and other things as well as T-shirts. Mr. Adamson has in the past declined printing jobs for a strip joint and for pens promoting a sexually explicit video.
The Kentucky ruling runs contrary to similar cases in Colorado, Oregon, New Mexico and elsewhere, in which Christian bakers, photographers and florists were penalized for exercising religious beliefs in refusing to participate in same-sex weddings.
The Kentucky ruling should encourage Jack Phillips, owner of the Masterpiece Cakeshop of Lakewood, Colo., who has appealed to the U.S. Supreme Court to reverse a 2013 ruling by the Colorado Civil Rights Commission, upheld by state courts, to punish him for refusing, for religious reasons to bake a cake for a same-sex wedding reception.
The high court has avoided taking the Phillips appeal for months while the court lacked a ninth justice in the wake of the death of Justice Antonin Scalia. With the confirmation of Neil Gorsuch as the ninth justice, the high court is now fully manned and ready for business.
See more here:
EDITORIAL: Good First Amendment news - Washington Times - Washington Times
Posted in First Amendment
Comments Off on EDITORIAL: Good First Amendment news – Washington Times – Washington Times
Vail Daily column: First Amendment and the commentary page – Vail Daily News
Posted: at 6:30 am
After reading a column titled "Setting the record straight," written by Pat Mitchell and published in the Saturday, May 13, edition of the Vail Daily, a concerned community member emailed me, calling into question my decision to allow Mitchell to use the newspaper as a forum to share his thoughts on homosexuality and the church.
As journalists, we live and die by the First Amendment, which protects all manner of expression, with a few notable exceptions. These exceptions have been defined by case law and include such things as obscenity, child pornography and inciting others to lawlessness.
When it comes to determining whether a submission makes it onto the commentary pages of the Vail Daily, the above-mentioned exceptions to free speech rarely, if ever, come into play. The three categories we are much more likely to come across are defamation, or in our case, since it's written, libel; what's called a "true threat," which is a verbal assault that threatens physical harm to a specific person; and fighting words.
Fighting words are "those which by their very utterance inflict injury or tend to incite an immediate breach of the peace," wrote Justice Frank Murphy in the 1942 U.S. Supreme Court decision for Chaplinsky vs. New Hampshire, a case that helped define those unprotected elements of speech.
Mitchell concluded his column by saying, "The Bible accepts homosexuals, both men and women, to the faith. They don't, however, condone their sexual behavior. Churches welcome them willingly as they would adulterers, thieves and others seeking forgiveness."
By describing homosexuals in the same breath as adulterers and thieves, was Mitchell using fighting words, inciting immediate action from those who read his remarks and thereby wandering into the narrow realm of speech not protected by the First Amendment? I don't believe so.
Whether or not I agree with Mitchell's conclusion did not factor into my decision to print his column. If I censored every opinion that ran contrary to my own, then I would not be a very good steward of this newspaper. Instead, I weighed his words against established tenets of free speech and, after careful consideration, published his column.
I believe it's critical that submissions to the commentary pages of the Vail Daily remain as free from my or anyone else's intrusion as is possible under the law, in order to cultivate a robust community dialogue. As a newspaper, we cannot demand the protections provided us by the First Amendment if we don't also uphold them within these pages.
Krista Driscoll is the editor of the Vail Daily. You can reach her at kdriscoll@vaildaily.com.
Read more:
Vail Daily column: First Amendment and the commentary page - Vail Daily News
Posted in First Amendment
Comments Off on Vail Daily column: First Amendment and the commentary page – Vail Daily News
Northwestern Students Shut Down Speech as President Says First Amendment ‘Not Absolute’ – Heat Street
Posted: at 6:30 am
On the same day the president of Northwestern University told the Wall Street Journal it was sometimes appropriate to restrict speech on campus, disruptive students prevented an in-class speech by an official from U.S. Immigration and Customs Enforcement.
An ICE spokeswoman was scheduled to talk to a Northwestern sociology class on Tuesdayone half of a two-part lesson, now cancelled, that would have also included a speech by an undocumented immigrant.
Protestors initially stood outside the classroom chanting F**k ICE. They were then admitted to the classroom, where they interrupted the talk and aggressively confronted both the ICE representative and the professor who had invited her, the student newspaper reported. The ICE officer left without completing her speech.
That same day, the Wall Street Journal published an interview with Northwesterns president, Morton Schapiro, where he defended safe spaces and said that offensive speech targeting specific individuals or groups might, in some circumstances, be considered assault, not free speech.
You want to protect the First Amendment, obviously, but it isnt absolute, Schapiro said. People reduce it to slogans or free speech at all costs.
Schapiro also said: I will just say that if you shut down freedom of speech, you better have a really good reason. I think if you shut down anything, you better be really sure that you have a moral and legal justification to do it. Thats my view.
The protestors came from MEChA, a campus Chicano group; Black Lives Matter, the Immigrant Justice Project, the Asian American Pacific Coalition and various LGBT campus groups, the Daily Northwestern reported.
On Facebook, MEChA defended shutting down the ICE officials talk:
Dialogue with any ICE official legitimizes their position as state actors of violence.The presence of an ICE PR agent whose sole purpose is to make ICE look good and recruit students implies university complicity and encouragement of the actions of this organization. We do not engage in conversations with ICE in any way, shape or form regardless of their position.
Citing security and privacy concerns, Beth Redbird, the professor who invited the ICE official to speak, said she had cancelled a scheduled talk by an undocumented immigrant. Her class focuses on inequality in American society with an emphasis on race, class and gender.
In a discussion with students, Redbird defended her decision to invite the ICE representative, the Daily Northwestern reported. All they did was come here today to answer questions so you know whats going on, so that you are informed and so you can make decisions. If you want to make change in a community, you need to know whats going on, she said.
In a jointstatement, Schapiro and Northwesterns provost said they were deeply disappointed in students disrespectful, inappropriate behavior Tuesday.
While we understand the point of view expressed by the students protesting the guest lecturers invited to speak here, the resulting disturbance not only limited the academic inquiry central to our campus, it also forced invited speakers to leave and violated the rights of other enrolled students who were present to learn. Free expression must be protected and should be countered with more debate, close examination and critical thinkingnot censorship, their statement said.
The university also said it was reviewing the facts around the protests so it could take appropriate action.
Earlier this week, the Northwestern chapter of Students for Justice in Palestine hosted Rasmea Odeh, a woman convicted for a terrorist attack; her group, the PopularFront for the Liberation of Palestine had planted a bomb in a box of candy, which killed two college studentswhen it detonated agrocery storein Jerusalem.Pro-Israel groups on campuscondemned the event as an affront to the sanctity of life, saying it crosses a moral line.
In a statement, Northwestern Hillel announced it would hold a silent vigil for Odehs victims outside of the venue. This will be a silent, non-confrontational vigil, the group said. We will not attempt to disrupt the event in any way.Our goal is not to protest free speech, but instead to mourn the victims ofthe convicted terrorist who is speaking on our campus.
Schapiro joined about 150 students, professors and staffers who attended the vigil.
Jillian Kay Melchior writes for Heat Street and is a fellow for the Steamboat Institute and the Independent Womens Forum.
Posted in First Amendment
Comments Off on Northwestern Students Shut Down Speech as President Says First Amendment ‘Not Absolute’ – Heat Street
This Spy App Can See If You’ve Visited Whistleblowing Sites on the Dark Web – Motherboard
Posted: at 6:29 am
To stay off the radar when leaking information to the press, whistleblowers often turn to the dark web to mask their identity. But that's no match for a new malicious app that spies on your computer hardware, and can tell when you've visited whistleblower sites through the Tor Browser.
Thankfully, this revelation doesn't come from hackers. Instead, the app was developed by computer scientists at the Worcester Polytechnic Institute (WPI), and they uploaded a paper outlining their work to the arXiv preprint server last week. Their app makes use of a well-known attack in academic circles: if you carefully track and analyze the patterns of use on a computer's processor, you can piece together what the user is actually doing.
Now, the researchers have shown that it can be done with a malicious app running in the background on someone's machine, and a bit of AI.
"You might protect your browsing habits by going into incognito mode or using the Tor Browserthe traffic there is hidden from, say, your IT admin," said Berk Sunar, one of the study's co-authors, over the phone. "What we're showing here is that in that unprotected corporate environment, even using tools like Tor, your browsing history can be leaked in part to a monitoring authority."
Read More: Tor Project and Mozilla Making It Harder for Malware to Unmask Users
The researchers used Linux, which allowed them to access the data they needed (a rooted Windows or Mac system could allow similar access, Sunar said). They first tracked processor usage with the app while browsing different sites in Chrome in incognito mode, and in Tor, the browser that lets you access the dark web. An AI algorithm then parsed all of this data to come up with a baseline to predict which sites a user visited.
After training, the algorithm could look at new hardware use patterns via the app and predict whether a user had visited Netflix or Amazon with surprising accuracy: 86.3 percent for Chrome in Incognito mode.
In Tor, the system was less accurate, but only slightly. Just by looking at hardware use and analyzing it with an algorithm, the researchers could infer which websites were being accessed via Tor with 71 percent accuracy. When it came to whistleblower sites like Wikileaks and GlobalLeaks, the system's accuracy jumped to 84 percent.
The results for Tor were generally worse because the malicious tracking app caught the browser start-up and all the random jitters due to connection delays, creating a noisy dataset. The accuracy was better for whistleblowing sites, Sunar said, simply because it's a much smaller pool of sites to choose from.
So, if you're a whistleblower, how worried should you be about the government, or anyone else, using this tool to find you? "In the short term, I'd say not very worried, because there are so many other vulnerabilities out there that are easier to pull off," Sunar said. (The research was government-funded, via the US National Science Foundation, an agency that funds a wide array of research into science and engineering). And remember, these are researchers working in a tightly controlled experimental environment, trying to prove that they can do something nobody's done beforenot spooks or hackers trying to make a buck.
"You could tie it into a simple gaming application"
There's also the fact that the work took place in Linux, which is an extremely unpopular operating system. Taking this mobile, and on a more popular platform like iOS, would take some work. The iPhone's operating system doesn't allow access to the same fine-grain detail Linux allows, but there are other hardware performance indicators that could be folded into the system to work on iOS. "You could tie it into a simple gaming application," Sunar said. "Like Tetris, for example."
The attack also requires the user to download a malicious app, and although scammy apps have made it onto major app stores before, there's no guarantee that this one would. You'd also have to be in the crosshairs for someone really, really determined, in which case you might have bigger problems.
Still, the research is a good reminder that no privacy tool is perfect, and perhaps most importantly, if you let somebody own your computer, well, you're boned. The lesson remains: don't click any phishy links out there, and be careful what apps you put on your machine.
Subscribe to Science Solved It , Motherboard's new show about the greatest mysteries that were solved by science.
More:
This Spy App Can See If You've Visited Whistleblowing Sites on the Dark Web - Motherboard
Posted in Tor Browser
Comments Off on This Spy App Can See If You’ve Visited Whistleblowing Sites on the Dark Web – Motherboard
A hack has put data of 17 million Zomato users at risk: Should India be worried? – DailyO
Posted: at 6:29 am
Its sad, but someone, somewhere on the Dark Web will now be privy to all your eating habits, or at least the one that Zomato knows about.
For the uninitiated, Zomato is an Indian food start-up that started in 2008. The search engine for food, restaurant and online delivery portal, thats now has an app as well, has almost 12 million customers every month. Zomato is not only a popular guide to eateries across India, but in 22 other countries as well. For millennials, Zomato is almost as essential as the Yellow pages were back in the day.
But, coming back to the topic, Zomato has now been hacked and the data of close to 17 million users have been stolen, and put out on sale on the Dark Web. First reported by HackRead late on Wednesday night (May 17), the report suggested that an online handle nclay claimed to have hacked Zomato and was selling the stolen data (of 17 million registered users) on a Dark Web marketplace.
Wait. What is the Dark Web?
The Surface Web is anything that a search engine can find, while the Deep Web is anything that a search engine cant find. The Dark Web is a small portion of the Deep Web that has been intentionally hidden and is inaccessible through standard web browsers.
The most famous content that resides on the Dark Web is found in the TOR (The Onion Router) network. The TOR network is an anonymous network that can only be accessed with a special web browser, called the TOR browser. This is the portion of the Internet most widely known for illicit activities because of the anonymity associated with the TOR network.
Back to Zomato
The database includes emails and "hashed" password of registered Zomato users, and is being sold for 0.5587 Bitcoin (almost Rs 65,000). The vendor nclay also provided a sample of the data to prove his claim.
On May 18, Zomatos CTO Gunjan Patidar published a blog post acknowledging the hack. Trying to avoid panic and setting facts straight, Patidar says, The hashed password cannot be converted back to plain text so the sanctity of your password is intact in case you use the same password for other services.
Photo: DailyO
But he also cautioned users to change their passwords in any case and to change the passwords for other services, just in case they happen to be the same. This is so because, while they are difficult to crack, it is never prudent to assume complete faith in the abilities of hackers.
This is kind of why everyone should have different (and complex) passwords for different accounts and everyone should use a password manager to keep track of stuff. Seriously, its not that difficult a thing to do.
More importantly, and to the relief of millions of customers, Zomato has assured that payment related information on the site which is stored separately in a highly secure PCI Data Security Standard (DSS) compliant vault has not been leaked. So, your bank details and credit card details on Zomato are safe. Whew!
Continuing with the assurances, Patidar said, Over the next couple of days and weeks, well be actively working to plug any more security gaps that we find in our systems. Well be further enhancing security measures for all user information stored within our database, [and] a layer of authorisation will be added for internal teams having access to this data to avoid the possibility of any human breach.
Of course, despite the assurances from the company, it is a little difficult to maintain calm. In a company thats as huge as Zomato, a hack of this size is pretty worrisome. In fact, this is not the first time something like this has happened to the food start-up. In 2015, an ethical hacker, Anand Prakash who has also helped discover security bugs on Facebook and Uber managed to breach Zomato'sdatabase and managed to highlight a critical flaw in its data recall system. The white hat hacker later reported the details of the security flaws to Zomato.
We should be concerned
Hacks and cyber attacks, in an age when we are becoming increasingly more dependent on the internet, is a big problem. While it is, without a doubt, a companys responsibility to safeguard user data, the users themselves cannot simply wash their hands off any responsibility. The fact is, your data is only as safe as you choose for it to be.
In an increasingly more data-vulnerable world, it is always prudent to keep your passwords different, complex and keep changing them periodically. It is also up to you, as a consumer to choose security over convenience. Yes, it is easy to save information related to your banking/debit card or credit card details on vendor websites/apps. It saves you the pain of having to input it every time you use the given service. But isnt security a bigger worry than having to type in a 16-digit number?
The Zomato breach may not have been a harmful one or so it seems as of now but this is neither the first major hack we have witnessed in this country in the last few months, nor is this going to be the last. Both companies and users really need to get their security priorities in place.
Also read -India highly unsafe from global ransomware cyber attack: Here's what you need to do
Continue reading here:
A hack has put data of 17 million Zomato users at risk: Should India be worried? - DailyO
Posted in Tor Browser
Comments Off on A hack has put data of 17 million Zomato users at risk: Should India be worried? – DailyO
Why Nigerian CIOs should care about the dark web – ITWeb Africa
Posted: at 6:29 am
Published on 19 May 2017 By Wale Ogunyemi
The dark web is an increasingly lawless place where cybercriminals trade hacks, passwords, and stolen corporate data. While international regulation was sought to stamp out such practices, the online environment that allowed the Internet to spread so widely and so quickly has also allowed the dark web to stretch even further, and carve out new places to hide and operate from.
As the Nigerian economy expands, and more multinational businesses move into the region, the country's ever-increasing cybercrime statistics are a key concern. The Cyber Security Experts Association of Nigeria (CSEAN) has gone as far as to state that the Nigerian government is ill prepared to face cybercrime in 2017 and beyond.
The so-called dark web, buried in the deep web, utilises a different protocol and is not indexed by mainstream search engines. Users go about their business anonymously, their locations protected by encryption and a host of privacy features baked into the free and readily available Tor browser, which is the most common way of accessing it. This makes it a paradise for cybercriminals.
Dark web threats loom in today's complex, ever-changing environment, for companies all over the world. To shore up their own cyber defences, CIOs need to take a more proactive approach to monitoring threats in its hidden depths.
Exposing these illicit transactions is almost impossible as many take place in invitation-only forums and are authenticated to stop anyone tracking them. However, it seems that even the dark web is not invincible when it comes to vulnerabilities. The hack of Freedom Hosting II, the largest host of dark websites, shows that there are holes in the deepest abyss of the Internet.
According to a Palo Alto Networks report (2016), the Nigeria 419 cybercrime gangs specialise in using advanced malware tools common with sophisticated criminals and espionage groups. To illustrate the threat that cybercrime poses to Nigerian individuals and businesses, the Leadership.ng (2016) reported that Nigeria loses nearly half-a-billion dollars to cybercrime annually.
The publication also predicted that in 2017, five categories of cybercrime would dominate the country: the CEO email scam, ransomware, assisted online kidnapping, cyber bullying, and impersonation.
In addition, Alphabay, reputably the biggest dark web marketplace, recently issued a statement on Pastebin confirming that it had rewarded a hacker after they had found bugs that had enabled them to steal 218,000 unencrypted messages between buyers and sellers. This hack highlights the scale of business being done on the dark web and underlines why CIOs need to understand its dangers and minimise their organisations' exposure.
It could be argued that these vulnerabilities in the dark web makes it easier for ethical hackers to get a better view of what data sits where, while making the dark web a more dangerous place for cybercriminals to operate. In this case stolen data, which included names and addresses, were handed over to law enforcement agencies, but only a minute percentage of stolen data is handled responsibly.
Take Yahoo, for example. Data from a breach involving one billion Yahoo accounts back in 2013, which the company only went public about last year, is still being openly sold on the dark web. The stolen data for sale includes personal data including names and birth dates.
Scanning for threats
CIOs are beginning to understand that a more proactive approach must be taken to protecting their organisations from cyber crime, which includes scanning the dark web for threats.
However, due to the make-up of dealings and the trust required between buyers and sellers on the dark web, human intelligence is essential in monitoring the dark web - automated tools alone are not enough.
Granted, monitoring the dark web is an enormous task. It requires a global team of cyber experts to analyse massive volumes of data and linguists who can impersonate cybercriminals to gain their trust.
Threat monitoring the dark web gives CIOs intelligence that can act as an early warning system. It can uncover, for example, if cybercriminals are planning an attack, so the organisation can pre-empt a breach and take immediate action to protect their digital identities and servers.
One of the biggest threats of the dark web is that dissatisfied employees can use it to sell their services to cybercriminals, according to Avivah Litan, VP distinguished analyst at Gartner. A report by RedOwl and InSights claims that the active recruitment of insiders in the dark web is growing fast, with insider outreach going up nearly 50 percent from 2015 to 2016.
The report maintains that the dark web has created an active market for employees to easily monetise insider access. It says that sophisticated cybercriminals are using the dark web to find and engage insiders to help them get malware over organisation's perimeter security and trigger it.
Gartner's Litan says that its clients blame the ease in which discontented employees can download the Tor browser and log into the dark web. Litan accepts that insider threats are a sensitive issue and that companies do not want pry and encroach on employee privacy, but at the same time must protect their business assets. "Organisations must be the judge of how high their risks are and how far they need to go fighting it," she says.
The RedOwl and Insights report recommends that enterprises "create, train and enforce consistent security policies while protecting employee privacy". This includes making sure employees and contractors understand penalties involved in insider action on the dark web.
The dark web provides a rich source of cyber threat intelligence for any CIO looking to bolster their cyber defences. By monitoring its inner workings, organisations can find out what data or IP may has been stolen, or leaked by insiders to use against them.
Tor, however, has made no secret of the fact it is doing more to safeguard its users this year, making the dark web even more difficult to penetrate. This will include sandboxing Tor at the application level and investigating the use of quantum computing.
There isn't an organisation out there who can claim it will never be compromised. Threat detection is paramount.
If CIOs know what they are up against, they can take the appropriate steps to protect their organisations.
Having an ear to what is being discussed in the chambers of the dark web is invaluable in the war against cybercrime.
By Wale Ogunyemi, Senior Solution Architect for Orange Business Services.
ALSO ON ITWEB AFRICA
GE executive speaks on energy resource management on the continent.
Bruce van Wyk director at PaySpace writes that accountancy practices have a lot to gain from mobile, cloud-based technologies.
ISPA says attempts to eradicate hateful/harmful content from social networks are often hindered by the global nature of these networks.
Wale Ogunyemi, Senior Solution Architect for Orange Business Services, says threat monitoring the murky world of the dark web empowers CIOs to act.
See the article here:
Why Nigerian CIOs should care about the dark web - ITWeb Africa
Posted in Tor Browser
Comments Off on Why Nigerian CIOs should care about the dark web – ITWeb Africa
Adylkuzz Cryptocurrency Mining Malware Spreading for Weeks …
Posted: at 6:28 am
Overview
On Friday, May 12, attackers spread a massive ransomware attack worldwide using the EternalBlue exploit to rapidly propagate the malware over corporate LANs and wireless networks. EternalBlue, originally exposed on April 14 as part of the Shadow Brokers dump of NSA hacking tools, leverages a vulnerability (MS17-010) in Microsoft Server Message Block (SMB) on TCP port 445 to discover vulnerable computers on a network and laterally spread malicious payloads of the attackers choice. This particular attack also appeared to use an NSA backdoor called DoublePulsar to actually install the ransomware known as WannaCry.
Over the subsequent weekend, however, we discovered another very large-scale attack using both EternalBlue and DoublePulsar to install the cryptocurrency miner Adylkuzz. Initial statistics suggest that this attack may be larger in scale than WannaCry: because this attack shuts down SMB networking to prevent further infections with other malware (including the WannaCry worm) via that same vulnerability, it may have in fact limited the spread of last weeks WannaCry infection.
Symptoms of this attack include loss of access to shared Windows resources and degradation of PC and server performance. Several large organizations reported network issues this morning that were originally attributed to the WannaCry campaign. However, because of the lack of ransom notices, we now believe that these problems might be associated with Adylkuzz activity. However, it should be noted that the Adylkuzz campaign significantly predates the WannaCry attack, beginning at least on May 2 and possibly as early as April 24. This attack is ongoing and, while less flashy than WannaCry, is nonetheless quite large and potentially quite disruptive.
The Discovery
In the course of researching the WannaCry campaign, we exposed a lab machine vulnerable to the EternalBlue attack. While we expected to see WannaCry, the lab machine was actually infected with an unexpected and less noisy guest: the cryptocurrency miner Adylkuzz. We repeated the operation several times with the same result: within 20 minutes of exposing a vulnerable machine to the open web, it was enrolled in an Adylkuzz mining botnet.
Figure 1: EternalBlue/DoublePulsar attack from one of several identified hosts, then Adylkuzz being download from another host - A hash of a pcap of this capture is available in the IOCs table
The attack is launched from several virtual private servers which are massively scanning the Internet on TCP port 445 for potential targets.
Upon successful exploitation via EternalBlue, machines are infected with DoublePulsar. The DoublePulsar backdoor then downloads and runs Adylkuzz from another host. Once running, Adylkuzz will first stop any potential instances of itself already running and block SMB communication to avoid further infection. It then determines the public IP address of the victim and download the mining instructions, cryptominer, and cleanup tools.
It appears that at any given time there are multiple Adylkuzz command and control (C&C) servers hosting the cryptominer binaries and mining instructions.
Figure 2 shows the post-infection traffic generated by Adylkuzz in this attack.
Figure 2: Post-infection traffic associated with the attack
In this attack, Adylkuzz is being used to mine Monero cryptocurrency. Similar to Bitcoin but with enhanced anonymity capabilities, Monero recently saw a surge in activity after it was adopted by the AlphaBay darknet market, described by law enforcement authorities as a major underground website known to sell drugs, stolen credit cards and counterfeit items. Like other cryptocurrencies, Monero increases market capitalization through the process of mining. This process is computationally intensive but rewards miners with funds in the mined currency, currently 7.58 Moneros or roughly $205 at current exchange rates.
Figure 3 shows Adylkuzz mining Monero cryptocurrency, a process that can be more easily distributed across a botnet like that created here than in the case of Bitcoin, which now generally requires dedicated, high-performance machines.
Figure 3: Part of the behavioral analysis from an Adylkuzz-infected VM showing it, among other things, closing SMB door and launching Monero Mining
One of several Monero addresses associated with this attack is shown in Figure 4. The hash rate shows the relative speed with which the specific associated instance of the botnet is mining Moneros, while the total paid shows the amount paid to this particular address for mining activities. In this case, just over $22,000 was paid out before the mining associated with this address ceased.
Figure 4: One of several Monero addresses associated with income from Adylkuzz mining
Looking at the mining payments per day associated with a single Adylkuzz address, we can see the increased payment activity beginning on April 24 when this attack began. We believe that the sudden drop that occurred on May 11 indicates when the actors switched to a new mining user address (Figure 5). By regularly switching addresses, we believe that the actors are attempting to avoid having too many Moneros paid to a single address.
Figure 5: Daily payment activity associated with a single Adylkuzz mining address
Statistics and payment history for a second payment address are shown in Figure 6. This address has had just over $7,000 paid to date.
Figure 6: A second Monero address associated with income from Adylkuzz mining
A third address shows a higher hash rate and a current payment total of over $14,000 (Figure 7).
Figure 7: A third Monero address associated with income from Adylkuzz mining
We have currently identified over 20 hosts setup to scan and attack, and are aware of more than a dozen active Adylkuzz C&C servers. We also expect that there are many more Monero mining payment addresses and Adylkuzz C&C servers associated with this activity.
Conclusion
Like last weeks WannaCry campaign, this attack makes use of leaked NSA hacking tools and leverages a patched vulnerability in Microsoft Windows networking. The Adylkuzz campaign, in fact predates WannaCry by many days. For organizations running legacy versions of Windows or who have not implemented the SMB patch that Microsoft released last month, PCs and servers will remain vulnerable to this type of attack. Whether they involve ransomware, cryptocurrency miners, or any other type of malware, these attacks are potentially quite disruptive and costly. Two major campaigns have now employed the attack tools and vulnerability; we expect others will follow and recommend that organizations and individuals patch their machines as soon as possible.
Acknowledgments
We want to thank:
Indicators of Compromise
Also available in MISP JSON format.
Select Dropped Samples
Executed commands:
taskkill /f /im hdmanager.exe C:Windowssystem32wbemwmiprvse.exe -secured -Embedding taskkill /f /im mmc.exe sc stop WELM sc delete WELM netsh ipsec static add policy name=netbc netsh ipsec static add filterlist name=block netsh ipsec static add filteraction name=block action=block netsh ipsec static add filter filterlist=block any srcmask=32 srcport=0 dstaddr=me dstport=445 protocol=tcp description=445 netsh ipsec static add rule name=block policy=netbc filterlist=block filteraction=block netsh ipsec static set policy name=netbc assign=y C:WindowsFontswuauser.exe --server C:WindowsFontsmsiexev.exe -a cryptonight -o stratum+tcp://xmr.crypto-pool.fr:443 -u 49v1V2suGMS8JyPEU5FTtJRTHQ9YmraW7Mf2btVCTxZuEB8EjjqQz3i8vECu7XCgvUfiW6NtSRewnHF5MNA3LbQTBQV3v9i -p x -t 1 C:WindowsTEMP\s2bk.1_.exe /stab C:WindowsTEMP\s2bk.2_.log taskkill /f /im msiexev.exe netsh advfirewall firewall delete rule name="Chrome" netsh advfirewall firewall delete rule name="Windriver" netsh advfirewall firewall add rule name="Chrome" dir=in program="C:Program FilesGoogleChromeApplicationchrome.txt" action=allow netsh advfirewall firewall add rule name="Windriver" dir=in program="C:Program FilesHardware Driver Managementwindriver.exe" action=allow C:Windows445.bat C:Windowssystem32PING.EXE ping 127.0.0.1 net stop Windows32_Update attrib +s +a +r +h wuauser.exe C:Windowssystem32SecEdit.exe secedit /configure /db C:Windowsnetbios.sdb C:Windowssystem32net1 stop Windows32_Update
Select ET signatures
2024217 || ET EXPLOIT Possible ETERNALBLUE MS17-010 Heap Spray 2024218 || ET EXPLOIT Possible ETERNALBLUE MS17-010 Echo Response 2024216 || ET EXPLOIT Possible DOUBLEPULSAR Beacon Response 2000419 || ET POLICY PE EXE or DLL Windows file download 2826160 || ETPRO TROJAN CoinMiner Known Malicious Stratum Authline (2017-04-28 1) 2017398 || ET POLICY Internal Host Retrieving External IP via icanhazip.com - Possible Infection 2022886 || ET POLICY Crypto Coin Miner Login
The rest is here:
Adylkuzz Cryptocurrency Mining Malware Spreading for Weeks ...
Posted in Cryptocurrency
Comments Off on Adylkuzz Cryptocurrency Mining Malware Spreading for Weeks …
Cryptocurrency Market Cap Tops $60 Billion to Hit All-Time High – CoinDesk
Posted: at 6:28 am
The total market capitalization of all cryptocurrencies reached an all-time high today, passing $60bn as the innovative assets continued to draw robust inflows.
This figure reached $63.6bn atone point during the day's trading, according to online data serviceCoinMarketCap, which represented a weekly, monthly and quarterly increase of roughly 18%, 115% and 220%, respectively.
While analysts cited different variables as fueling these gains, one factor they noted was growing awareness of cryptocurrencies, one that is finding them emerge as a more diverse set of investments than observed previously.
Tim Enneking, chairman of cryptocurrency hedge fund Crypto Asset Management, spoke to this development, stating:
"Cryptocurrencies are finally hitting the general consciousness whereas before they were marginal, with the possible exception of bitcoin."
As the assets draw "increased media coverage," Ryan Rabaglia, head trader for Octagon Strategy, told CoinDesk new investors are coming to the space.The growing interest in the space is also being felt at his over-the-counter (OTC) trading desk, which has been seeing a rise in business activity.
"Our onboarding rates have experienced a massive spike and our trading volumes, at mid-month, have already increased exponentially compared on a month-to-month basis. We do not see this quieting any time soon," he said.
When asked whether his company has experienced an increase in this activity amid the recent rally in cryptocurrency prices, Harry Yeh, managing partner of Binary Financial, told CoinDesk:
"There's definitely a larger demand, not just for bitcoin, but [for] everything across the board."
As for where cryptocurrency prices (and therefore total market cap) will go next, analysts offered mixed views. While the total value (and number) of assets in this space has surged in recent months, it is difficult to tell how much further they can climb without developing compelling value propositions.
Yeh offered an optimistic point of view, telling CoinDesk that "we are just getting started".
"People still don't really understand that there is a lot more room for this to move because it's a global phenomenon now. Expect more moves up but also some pullbacks like in the last week," he said.
Jacob Eliosoff, a cryptocurrency fund manager, offered a more cautious stance, telling CoinDesk that the market was "reaching the frenzy point". He expressed doubt as to how much longer these values would hold, noting that while nobody knows for sure when a bubble will pop, there are always warning signs.
Eliosoff stated that in this case, a "crackdown" oninitial coin offerings (ICOs), the process by which developers create new cryptocurrencies to fund projects, would likely spur a downturn.
He also asserted that should bitcoin prices see a downturn, the cryptocurrencyspace could see diminished confidence.
Price chart image via Shutterstock
Read more:
Cryptocurrency Market Cap Tops $60 Billion to Hit All-Time High - CoinDesk
Posted in Cryptocurrency
Comments Off on Cryptocurrency Market Cap Tops $60 Billion to Hit All-Time High – CoinDesk







