The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: June 1, 2017
NATO might trigger Article 5 for certain cyberattacks – Defense News – DefenseNews.com
Posted: June 1, 2017 at 10:21 pm
TALLINN, EstoniaNATO will not rule out invoking Article 5 of its charter should one or more member nations find themselves under a serious cyberattack that threatens critical military and civilian infrastructure.
NATO officials told delegates at the International Conference on Cyber Conflict, or CyCon, in Estonia that the Western alliance would deliver a robust response in the event of a serious and prolonged attack on a member state in cyberspace. Article 5 provides for a united response by NATO states should a member nation come under attack.
"Although many of the cyberattacks that we see fall below a level in their seriousness that could trigger NATOs Article 5, it is plausible that a cyberspace event of great magnitude could take place that might lead to the triggering of Article 5 in special circumstances," said Catherine Lotrionte, director of CyberProject at Georgetown University.
The special circumstances that could trigger Article 5 would need to be at a substantially higher threat and risk level than propaganda of social media intrusions, Lotrionte said.
"Most attacks in cyberspace use no force. We would need to have a legal threshold for such threat situations, but the triggering of Article 5 is a real possibility. There are other issues, like time factors. A grave threat would need to be current, and not an event that happened years ago," she added.
NATO would take a very different and offensive posture if a cyberattack event on the scale of that launched against Estonia in 2007 were to happen now, said Brig. Gen. Christos Athanasiadis, assistant chief of staff cyber at NATOs Supreme Headquarters Allied Power Europe.
Estonias national intelligence services, including the military branch, suspected that the cyberattack on critical IT infrastructure was launched from Russia and potentially had state backing.
Article 5, according toAthanasiadis, exists to assure all NATO states that they can rely on support from fellow members should they become the subject of an aggressive attack that threatens to undermine their national security. Article 5 could be activated in certain situations if deliberately hostile attacks against a NATO member state happened within a cyberwar scenario, he said.
"We would have rules of engagement. There would be a strong cyber or conventional response if what happened to Estonia were to take place now. We want to develop a strong early-warning capability. We must develop capacities that also serve as a deterrent to aggressors out there,"Athanasiadis said.
See more here:
NATO might trigger Article 5 for certain cyberattacks - Defense News - DefenseNews.com
Posted in NATO
Comments Off on NATO might trigger Article 5 for certain cyberattacks – Defense News – DefenseNews.com
Will Nato become a transatlantic Frontex? – EUobserver – EUobserver
Posted: at 10:21 pm
Donald Trumps recent speech at the Nato headquarters during the alliances gathering of heads of state and government received much attention and criticism.
During his speech, Trump commented that "the Nato of the future must include a great focus on terrorism and immigration".
He said this after talking about how thousands of people are "pouring into" Nato countries without being properly identified.
The statement came in the context of a hard-line domestic narrative on migration in the US, and can hardly be seen as an isolated remark.
It was not the first time Nato has been called on to conduct migration-related activities for instance, Nato ships were deployed to the Aegean Sea in February 2016 following a request by Germany, Greece and Turkey.
Nevertheless, this mission is limited in scope, with a mandate only to support Frontex (the EU border control agency) and the Greek and Turkish Coast Guards by conducting reconnaissance, monitoring, and surveillance of irregular migration routes.
Trump's statement called for much greater engagement, and perhaps even a central role for the alliance in countering irregular migration to Europe and North America.
By establishing a clear link between terrorism and migration in his speech, Trump qualified migration as a major security threat that requires joint military action in order to be mitigated.
Many European governments, which are keen to reduce migratory flows to the EU, may quietly welcome such an approach, as they themselves have not only agreed to Nato's operation in the Aegean Sea, but also deployed an EU-led counter-smuggling mission in the Central Mediterranean (EUnavfor Med Operation Sophia).
However, more Nato involvement in such maritime activities would come with caveats.
Trumps insistence on allies to pay their fair share may lead to uncomfortable deals in which the US makes its support for migration-related efforts conditional upon the receipt of some sort of compensation.
It would also give the US a strong voice in how the operations are conducted, and what objectives they seek to address.
Given Trumps blurry distinction between migrants and terrorists, the US primary concern in the Mediterranean is the use of migratory routes by terrorists pretending to be refugees. In fact, this was already an issue of concern for the Obama administration, though not a prominent one.
Trumps call for a refocused transatlantic alliance may thus result in diplomatic pressure for a Nato mission to intercept and screen asylum seekers before granting them entry.
This would represent a clear break with the current practices not only in terms of the actors concerned but also the procedure.
The involvement of non-EU military personnel in determining the admissibility of asylum seekers would raise several legal questions, not least regarding the principle of non-refoulement enshrined in the 1951 Refugee Convention. This provision forbids the forcible expulsion or return of an asylum seeker to a territory in which their life or freedom are in danger.
Of course, Nato member states would need to agree on any joint migration-related action. But given the disproportionate weight that the US holds in Nato, the Trump administrations priorities would likely dominate the agenda.
If Nato does take on a larger role in policing migratory routes, the US would have a much greater influence on EU migration policy, which would complicate an already deeply divided political map on this issue.
Member states seeking more solidarity-based solutions would be even more isolated than is already the case.
The G7 summit in Taormina, Italy, that immediately followed Trumps Nato debut, provided a stark example of how the Trump administrations priorities can affect multilateral discussions.
Italy attempted to draw attention to the high number of irregular arrivals it receives by symbolically hosting the gathering in Sicily, and tried to convince attending leaders to open more legal channels for migration such as refugee resettlement. Yet these efforts fell flat.
The G7 leaders statement focused mainly on border control and returns, without even mentioning resettlement.
Nato support for EU border security operations can be valuable, for example when it comes to the exchange of background information for the purpose of security screening asylum seekers.
Nevertheless, European policymakers should be wary of any shift in Natos focus towards collective border control.
Although migration is a challenge that can partially be addressed with the support of military assets, it is not a battle than can be won with military might.
Further securitisation of migration management will lead to more fragmentation and the criminalisation of migrant flows, and more human suffering as a result.
Only long-term approaches to the root causes of migration and smart legal channels that acknowledge the inevitability of human mobility will succeed in reducing irregular flows.
Marco Funk is a policy analyst at the European Policy Centre (EPC) in Brussels. The views expressed in this article are his own and do not necessarily reflect those of the EPC.
See the original post:
Will Nato become a transatlantic Frontex? - EUobserver - EUobserver
Posted in NATO
Comments Off on Will Nato become a transatlantic Frontex? – EUobserver – EUobserver
Trump’s treatment of America’s NATO allies was disgraceful – Los Angeles Times
Posted: at 10:21 pm
To the editor: As noted in your editorial, the United States North Atlantic Treaty Organization allies had hoped that the president would reaffirm Article 5 of the 68-year-old NATO treaty during his recent visit. (Trump didn't win any friends in Europe, editorial, May 26)
Article 5 was included in the treaty after World War II to deter a Soviet attack on Western Europe; however, the only time that it has been invoked was after the Sept. 11, 2001, terrorist attacks in the U.S. Americas NATO allies backed up their rhetorical support with tangible action.
The U.S. did not have the number of airborne warning aircraft to adequately protect American cities, and NATO sent seven planes with 830 crewmen from 13 countries to patrol American skies until May 2002. This was the first time in history that the continental United States was protected by foreign military forces.
Out of both gratitude for this commitment and in keeping with the central objective of the single most important agreement to which the U.S. is a party, President Trump should clearly and forcefully reassert the American commitment to the NATO treaty.
Dan Caldwell, Malibu
The writer is a professor of political science at Pepperdine University.
..
To the editor: No, dear editor, the ugly American is you.
The president returns from an enormously productive overseas trip, and yet you fail to acknowledge his many achievements and instead focus on him brushing his way past a fellow NATO leader.
When you must stoop that low to criticize the man, its clear hes being successful.
Leonard Lamensdorf, Westlake Village
..
To the editor: Its sad and embarassing that our president appears unable to think beyond the moment. He simply does not understand that America first necessarily includes the concept that our safety is dependent on the security of our European allies.
If Europe is threatened, so too is America.
Trumps inability to think maturely places all of us and the values we hold at risk. Our countrys stature as a beacon of freedom and decent values has now been permanently undermined, just as the presidency has been permanently discredited. Like the students at Trump University, America was scammed; unlike the students, however, the U.S. electorate cannot sue for redress.
For the first time in my life, I must say: Im embarrassed to be an American.
Irving Greines, Los Angeles
Follow the Opinion section on Twitter @latimesopinion and Facebook
Continued here:
Trump's treatment of America's NATO allies was disgraceful - Los Angeles Times
Posted in NATO
Comments Off on Trump’s treatment of America’s NATO allies was disgraceful – Los Angeles Times
Fact Check: Why did the NSA breach privacy protections? – The Weekly Standard
Posted: at 10:20 pm
National Security Agency analysts under the Obama administration improperly searched Americans' information, but the searches were conducted largely out of error, according to a review of publicly available intelligence documents reported on by Circa last week.
The website reported that Obama's NSA violated privacy protections by searching a subset of intelligence for Americans' information. The story draws in part from a partially declassified April 2017 Foreign Intelligence Surveillance Court opinion, which says that the NSA repeatedly and inappropriately queried, or searched, "U.S. person identifiers" within a swath of data. The data was collected under Section 702 of the Foreign Intelligence Surveillance Act, meaning that it targeted a foreigner, on foreign soil, for a foreign intelligence purpose.
The NSA at the time was not allowed to search a chunk of intelligence, known as "upstream," using U.S. person identifiers (like an American's email address)but it did, and "with much greater frequency than had previously been disclosed" to the FISC. Upstream data is obtained from "providers that control the telecommunications "backbone" over which telephone and Internet communications transit," according to an independent government oversight agency.
Of this, Circa wrote:
The admitted violations undercut one of the primary defenses that the intelligence community and Obama officials have used in recent weeks to justify their snooping into incidental NSA intercepts about Americans.
Circa has reported that there was a three-fold increase in NSA data searches about Americans and a rise in the unmasking of U.S. person's identities in intelligence reports after Obama loosened the privacy rules in 2011.
Officials like former National Security Adviser Susan Rice have argued their activities were legal under the so-called minimization rule changes Obama made, and that the intelligence agencies were strictly monitored to avoid abuses.
The intelligence court and the NSA's own internal watchdog found that not to be true.
This sounds nefarious, especially against the backdrop of a months-long controversy over unmasking and leaks. But as Circa hints some paragraphs later, the incidents, which were self-reported by the NSA to Congress and the FISC, were in part the result of a system design quirk.
"The system automatically includes in a search all authorities an analyst's credentials permit the analyst to access," Adam Klein, a senior fellow at the Center for a New American Security, told THE WEEKLY STANDARD. "That meant that analysts with access to upstream data had to opt out of querying upstream when setting their search criteria. That system design apparently resulted in non-compliant queries."
A January notice to the FISC also said that "human error was the primary factor" in a portion of these improper queries. The NSA in an announcement also claimed that the incidents were "not willful." And as Klein told TWS, "There have been no reported incidents of intentional misuse of Section 702 by the agencies responsible for implementing it."
The NSA inspector general report read:
For the queries into FAA 702 upstream data, SV concluded that analysts had not removed the FAA 702 upstream authority from their search criteria (that automatically defaulted on the basis of their credentials) or had not included the appropriate . . . limiters to prevent FAA 702 upstream data from being queried.
The NSA told the FISC about the incidents as the court conducted its annual review for 702 certifications. The non-compliance triggered a broader NSA review, and ultimately resulted in the agency declaring the end of "about" collectionor the gathering of communications that mention a target. "About" collection often scooped up entirely domestic communications, drawing the ire of civil liberties advocates. The NSA also announced that it would purge much of its upstream data, and the FISC gave the go-ahead for analysts to query upstream using U.S. person identifiers, now that "about" has ended.
The court's late March certification reflected that change. But the court was not pleased with the non-compliance. The FISC in October described it as "a very serious Fourth Amendment issue" and attributed the agency's delayed disclosure to "an institutional 'lack of candor.'"
Still, the incidentincluding the NSA's self-reporting and public announcementsexemplifies the extent of 702 oversight, Klein said.
"The program is subject to extensive oversight, including judicial supervision by the Foreign Intelligence Surveillance Court. The recent end of "about" collection in response to FISC oversight shows that it has real teeth," he said.
If you have questions about this fact check, or would like to submit a request for another fact check, email Jenna Lifhits at jlifhits@weeklystandard.com or The Weekly Standard at factcheck@weeklystandard.com.
Read more:
Fact Check: Why did the NSA breach privacy protections? - The Weekly Standard
Posted in NSA
Comments Off on Fact Check: Why did the NSA breach privacy protections? – The Weekly Standard
NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says – Salt Lake Tribune
Posted: at 10:20 pm
"I have reviewed the declaration of Michael V. Hayden dated March 8, 2017," Drake's statement said. "As a result of personal knowledge I gained as a long-time contractor and then senior executive (1989-2008) of the NSA, I know the statements made by Hayden in that declaration are false or, if not literally false, substantially misleading."
Drake's statement was provided to the U.S. Department of Justice this week, as part of discovery, by attorney Rocky Anderson the Salt Lake City mayor at the time of the 2002 Olympics who represents plaintiffs Mary Josephine Valdez, Howard Stephenson, Deeda Seed, Will Bagley and Thomas Nelson Huckin.
In January, Judge Robert Shelby rejected an attempt by the Department of Justice to dismiss the case.
The NSA has the capability to seize and store electronic communications passing through U.S. intercept centers, according to a statement from Drake.
After Sept. 11, 2001, "the NSA's new approach was that the president had the authority to override the Foreign Intelligence Surveillance Act (FISA) and the Bill of Rights, and the NSA worked under the authority of the president," Drake said. "The new mantra to intercepting intelligence was 'just get it' regardless of the law."
Additional information on NSA's intelligence gathering came to light in 2013 when Edward Snowden revealed to Glenn Greenwald of the Guardian, the scope of U.S. and British global surveillance programs.
One of the documents Snowden purloined spoke to the 2002 operation, where the NSA sought detailed records without warrants from telecom communications systems in Utah, including Qwest Communications.
The document, labeled "Top Secret," has several entries, including this one: "In early 2002, NSA personnel met with senior vice president of government systems and other employees from Company E [later identified as Qwest]. Under authority of the President's Surveillance Program (PSP), NSA asked Company E to provide call records in support of security for the Olympics in Salt Lake City... On 19 February 2002, Company E submitted a written proposal that discussed methods it could use to regularly replicate call record information stored in a Company E facility and potentially froward the same information to NSA ... "
In 2011 the NSA completed the $1.2 billion digital storage faci`lity called the Utah Data Center in Bluffdale.
In a 2012 lawsuit in U.S. District Court for the Northern District of California, two former highly-placed NSA employees said the agency was not filtering personal electronic data but was storing everything it collected.
"The capacity of NSA's infrastructure far exceeds the capacity necessary for the storage of discreet, targeted communications," said William Binney. "The capacity of NSA's infrastructure is consistent, as a mathematical matter, with seizing both the routing information and the contents of all communications."
In the same case, J. Kirk Wiebe, who worked as a senior analyst at the NSA from 1975 to 2001, concurred with Binney and Drake.
"I agree with Mr. Drake's assessment that everything changed at the NSA after the attacks of September 11. The prior approach focused on complying with the Foreign Intelligence Act (FISA)," he stated. "The post-September 11 approach was that NSA could circumvent federal statutes and the Constitution as long as there was some visceral connection to looking for terrorists."
By contrast, in the Utah case, current NSA Director of Operations Wayne Murphy, like Hayden, rejected allegations of an NSA "blanket" surveillance program during the 2002 Winter Olympics. He noted, however, that NSA collection of communications did and does continue to exist but is "targeted at one-end foreign communications where a communicant was reasonably believed to be a member or agent of Al-Qaeda or another international terrorist organization."
Anderson called the NSA's surveillance programs "Orwellian."
Read more here:
NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says - Salt Lake Tribune
Posted in NSA
Comments Off on NSA conducted blanket surveillance of Salt Lakers during 2002 Games, former official says – Salt Lake Tribune
Putin: What Snowden did to the NSA was ‘wrong’ – The Hill
Posted: at 10:20 pm
Russian President Vladimir Putin condemned Edward Snowden's 2013 release of confidential NSA documents as "wrong" but defended Snowden against accusations of treason in a new interview released Thursday. He said in a show airing this month on Showtime that Snowden "didnt betray the interest of his country."
Putin made the comments to interviewer Oliver Stone as part of "ThePutin Interviews,"which will air on Showtime on June 12.
Stone is best known as the director of "Wall Street,""Natural Born Killers" and "Snowden," in which Joseph Gordon-Levitt plays Snowden.
Snowden currently lives in exile in Russia for leaking NSA documents that detailed international bulk surveillance operations.
In newly released clips from the interview, Putin reveals that he sees Snowden's actions as legal but not moral.
"I think he shouldnt have done it," Putin said of Snowden's actions. "If he didnt like anything at his work he should have simply resigned. But he went further. Thats his right. But since you are asking me whether it's right or wrong, I think its wrong."
Earlier in the interview, Putin said that Snowden had not taken any actions against the United States during or after the leaks.
"Snowden is not a traitor. He didnt betray the interest of his country. Nor did he transfer any information to any other country which would have been pernicious to his own country or to his own people." said Putin.
Putin, an ex-KGB agent, is known for his tight-gripped rule over Russia as well as an unrivaled intelligence operation against the United States.
During the interview, Putin said that Russian intelligence suffers from the problems he implied he saw with the NSA.
"Our intelligence services always conform to the law. Thats the first thing. And secondly, trying to spy on your allies if you really consider them allies and not vassals is just indecent. Because it undermines trust. And it means that in the end it deals damage to your own national security," he said.
See the article here:
Putin: What Snowden did to the NSA was 'wrong' - The Hill
Posted in NSA
Comments Off on Putin: What Snowden did to the NSA was ‘wrong’ – The Hill
ShadowBrokers launch subscription service for stolen NSA tools – FCW.com
Posted: at 10:20 pm
Cybersecurity
How much would you pay for access to stolen hacking tools developed by some of the NSA's most elite computer scientists? The enigmatic entity calling itself TheShadowBrokers thinks that $23,000 is a fair price.
The mysterious group that first appeared in August 2016 claiming to have a trove of tools pilfered from the Equation Group, which has been identified as an NSA hacking operation, have been periodically releasing bits of that stash for free.
In April, TheShadowBrokers dumped tools and exploits that led to the WannaCry ransomware attack as well as other malware that has been used in recent attacks.
The group then issued a long blog post written in pigeon English, complaining that no one had offered to buy the stolen data and make them "go dark," and contemplating the launch of a "wine of month" style subscription service.
In a new blog post, TheShadowBrokers announced that interested subscribers can sign up during the month of June for a fee of 100 ZEC or Zcash cryptocurrency worth about $235 a share -- and then in the first two weeks of July patrons will receive the next dump of hacking tools.
TheShadowBrokers said they have not decided what will be in the next release, but said it will include "Something of value to someone."
"The time for 'I'll show you mine if you show me yours first' is being over," states the post. "Peoples is seeing what happenings when theshadowbrokers is showing theshadowbrokers' first. This is being wrong question. Question to be asking 'Can my organization afford not to be first to get access to theshadowbrokers dumps?'"
In the May 15 blog post, TheShadowBrokers stated that future releases of tools could include, "web browser, router, handset exploits and tools; select items from newer Ops Disks, including newer exploits for Windows 10; compromised network data from more SWIFT providers and Central banks; compromised network data from Russian, Chinese, Iranian, or North Korean nukes and missile programs."
Cybersecurity experts continue to speculate over who is or are TheShadowBrokers and how they acquired the NSA data -- possibly from an insider such as former contractor Hal Martin, who has been charged under the Espionage Act with stealing classified data from the NSA and CIA.
About the Author
Sean Carberry is an FCW staff writer covering defense, cybersecurity and intelligence. Prior to joining FCW, he was Kabul Correspondent for NPR, and also served as an international producer for NPR covering the war in Libya and the Arab Spring. He has reported from more than two-dozen countries including Iraq, Yemen, DRC, and South Sudan. In addition to numerous public radio programs, he has reported for Reuters, PBS NewsHour, The Diplomat, and The Atlantic.
Carberry earned a Master of Public Administration from the Harvard Kennedy School, and has a B.A. in Urban Studies from Lehigh University.
The rest is here:
ShadowBrokers launch subscription service for stolen NSA tools - FCW.com
Posted in NSA
Comments Off on ShadowBrokers launch subscription service for stolen NSA tools – FCW.com
Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers – Network World
Posted: at 10:20 pm
By Ms. Smith, Network World | May 31, 2017 8:54 AM PT
Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues.
The idea of crowdfunding to raise enough money to buy NSA-linked hacking tools from the Shadow Brokers is picking up steam and making some people steam.
The price tag for getting hold of stolen Equation Group hacking tools is 100 Zcash. When I started the article about the Shadow Brokers revealing details about its June dump of the month subscription service, the cost of 100 Zcash was equal to $22,779. By the time I finished writing, it was equal to $23,251. As I start this article, 100 Zcash is equal to $24,128. By tomorrow, the first day to subscribe to the Shadow Brokers monthly dump service, Zcash will likely cost even more dollars. If you dont have that kind of money, but want to partake in the spoils of the June dump, then maybe crowdfunding is the way to go?
At least that is what Hacker Houses Matthew Hickey and a security researcher gong by x0rz have proposed as the solution. They formed a Shadow Brokers Response Team, which a goal of creating open and transparent crowd-funded analysis of leaked NSA tools and launched a Patreon campaign to raise $25,000.
The campaign, dubbed a harm reduction exercise, states:
This patreon is a chance for those who may not have large budgets (SME, startups and individuals) in the ethical hacking and whitehat community to pool resources and buy a subscription for the new monthly released data.
Their hope is that by purchasing the stolen data and analyzing it, another attack like WannaCry can be prevented. But, oh my, some security experts are vehemently opposed to the idea and likened the crowdfunding effort to enabling cyberterrorists, negotiating with terrorists, or funding evil.
The Shadow Brokers did not reveal what data the group might dump in June, claimed to be undecided about it, but when first announcing the monthly dump subscription service, they said the dump could be:
The Patreon reads:
As a harm reduction exercise it is important that any compromised parties are notified, vulnerabilities in possession of criminals are patched and tools are assessed for capabilities. We will release any and all information obtained from this once we have assessed and notified vendors of any potential 0days.
We believe it is in the greater good to obtain these exploits and mitigate the risk presented by them, the campaign adds.
The campaign launched yesterday and thus far has 24 patrons with a crowdfunded total of $2,225. The goal is to raise $25,000. If that goal is not met, the bitcoin funds will be donated to a to a charitable organization campaigning for human and/or digital rights. Patreon subscribers will be refunded if the platform allows it (or we will not post to prevent a charge). We will split whatever maybe left over from this evenly between EDRI and the EFF. If you had money to spend on an exploit auction like this, giving it to charity should not be too objectionable for you.
Of course, the Shadow Brokers might be playing everyone and not have anything left to dump. Conversely, the group might still have powerful NSA Equation Group-developed exploits. The NSA could just step up and tell all affected parties how it was exploiting their products, as it allegedly did when it told Microsoft, so the patches can be developed and deployed before the exploits are in the public domain. But lets get real; thats highly unlikely to happen.
Nevertheless, the Patreon floats the idea:
If the NSA are willing to inform us about what it is they have lost, the capabilities and vulnerabilities it has exploits for - so that we can make informed decisions to defend our networks then we will withdraw from this option. We need accurate guidance to be able to defend our networks and so far that guidance is not forthcoming from anywhere else.
While some people view pooled funding resources as a way to give the Shadow Brokers the least amount yet still get hold of the dump to get things patched, others are adamant that giving the group any money is morally wrong.
At the time of publishing, 100 ZEC (Zcash) had slightly decreased from $24,128 at the time I started the article to $23,662. If you dont have that to spare for the June data dump monthly subscription, will you join the crowdfunding campaign?
Read more here:
Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers - Network World
Posted in NSA
Comments Off on Crowdfunding campaign to buy stolen NSA hacking tools from Shadow Brokers – Network World
Vietnamese hackers appear to be researching an NSA backdoor tool – CyberScoop
Posted: at 10:20 pm
A hacker group with suspected ties to the Vietnamese government appears to be researching a leaked National Security Agency tool codenamed ODDJOB, based on documents uploaded to the repository VirusTotal andtied to a source already identified as OceanLotus group, otherwise known as APT32.
A classified user manual for ODDJOB was originally published on April 14 by a mysterious group, known for sharing NSA documents, named the Shadow Brokers. A copy of this same document was then uploaded April 17 to VirusTotal along with other malicious email attachments by OceanLotus. Multiple U.S. cybersecurity firms say OceanLotus is aligned with the interests of the Vietnamese government.
The specific version of the manual uploaded by OceanLotus was not weaponized, meaning it didnt carry malware that could be used to convert the harmless PDF to a phishing lure.
ODDJOB is a high-quality, masterfully engineered digital weapon believed to have been once used to help U.S. spies collect intelligence stored on machines running older versions of Microsoft Windows. Details on this backdoor implant are scarce at the moment. The operational computer code behind ODDJOB was not released by the ShadowBrokers.
OceanLotus apparent interest in the ODDJOB manual underscores the efforts now being made by nation-backed hacking groups to better understand, and potentially reuse, leaked NSA capabilities a fear perhaps already realized with the WannaCry ransomware campaign.
When ODDJOB is deployed against a target computer it attempts to obscure network traffic by appearing to be the Microsoft Background Intelligence Transfer Services, or BITS, which is typically used by Windows Update to apply a patch to a computer.
As of Thursday afternoon, the related file uploaded to VirusTotal remained in plain view.
The manual was first made public by the Shadow Brokers in April, but interest in this document by nation-states was previously unreported.
CyberScoop first reported Wednesday that OceanLotus was likely behinda cyber-espionage operation aimed at the Philippines government; a campaign which similarly saw sensitive documents be uploaded to VirusTotal. The reason for why these documents are being uploaded to a public forum remains unclear.
In addition to the ODDJOB manual, the aforementioned file dump includes, among other documents, an apparently leaked transcript of a phone conversation between U.S. President Donald Trump and Philippines President Rodrigo Duterte,briefing notes for a call between Philippine government officials and a U.S. senator, and internal documents tied to the Philippine National Security Council.
OceanLotus has been known to conduct missions against valuable corporations, foreign governments, dissidents and domestic journalists since at least 2014, according to research conducted by FireEye.
Read more:
Vietnamese hackers appear to be researching an NSA backdoor tool - CyberScoop
Posted in NSA
Comments Off on Vietnamese hackers appear to be researching an NSA backdoor tool – CyberScoop
Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties – 9to5Mac
Posted: at 10:20 pm
The law lags badly behind technology in a great many areas. One area where there is still huge uncertainty is whether the Fifth Amendment right against self-incrimination protects someone who refuses to disclose the passcode to their phone.
Weve seen conflicting rulings in the past, and a Miamireport shows that rulings may even vary between courts in the same state
TheMiami Herald reports that a child abuse suspect was jailed for six months for contempt of court after failing to reveal the correct passcode to his iPhone. Christopher Wheeler was arrested on suspicion of hitting and scratching his young daughter, with police believing that photos on the iPhone would help prove their case.
Detectives believe that his phone contains images of repeated injuries to the child, which could prove evidence in the case. A Broward judge earlier authorized a search warrant for Wheelers iPhone, but detectives had been unable to get in.
When a judge ordered him to provide the pass code, it didnt work. Rothschild held him in criminal contempt earlier this month.
Wheeler claimed he had given police the code and didnt know why it didnt work. The judge ruled that he would be released from jail if he reveals the correct code.
In a separate case in the same state, aMiami-Dade judge decided against holding a suspect in contempt of court for similarly refusing to reveal his passcode. Extortion suspectWesley Victor claimed that he didnt remember his passcode, and the judge ruled that there was no way to know given the passage of time.
[Wesley Victor was] accused of extorting a social-media celebrity over stolen sex videos. [He] and his girlfriend had been ordered by a judge to produce a pass code to phones suspected of containing text messages showing their collusion in the extortion plot. Victor claimed he didnt remember the number. He prevailed.
On Tuesday, Miami-Dade Circuit Judge Charles Johnson ruled that there was no way to prove that Victor actually remembered his pass code, more than 10 months after his initial arrest.
Back in 2014, a Virginia District Court ruledthat phone passcodes are protected by the 5th Amendment, though there is no such protection against using a suspects fingerprint to unlock a phone. Another Florida court took the opposite stance, insisting that the 5th Amendment does not apply to passcodes.
The legal position on using Touch ID to unlock a phone seems clearer, where multiple court rulings have decided that a fingerprint is the equivalent of a safe key, and police are free to use a suspects fingerprint to unlock the device. You can read a 2014 analysis of the legal position of both forms of protection here.
Via Engadget. Photo: MacWorld.
Check out 9to5Mac on YouTube for more Apple news!
Go here to read the rest:
Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties - 9to5Mac
Posted in Fifth Amendment
Comments Off on Man jailed for refusing to disclose iPhone passcode underlines Fifth Amendment uncertainties – 9to5Mac







