The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: August 8, 2017
Religion vs. state: Atheism and Al-Azhar – Egypt Independent
Posted: August 8, 2017 at 3:55 am
Typically, atheists in Muslim countries prefer to keep their beliefs secret, fearing their lack of faith will lead to their death.
In Egypt, the situation is different; young Egyptians have been touting atheist and agnostic ideologieson social media, which raisesquestions regarding thereal number of atheists in Egypt, and how the government and religious institutions are dealing with them.
Recently, massive controversy surfaced on social media outlets when Al-Azhar Egypts largest Muslim beacon released a statement that the countryhas the highest numberof atheists in the Arab world. The statement was issued bya member of Al-Azhars technical office Ahmed al-Malkai in aninterview onprivately-run news channel Al-Nahar.
It is not only the role of Al-Azhar and the government to combat atheism, but families are also responsible for thephenomenon, Malkai said during the interview.All questions that have been raised by atheists were met with proper answers from Al-Azhar.
Egypt Independent investigated the relations between the institution of Al-Azhar and atheists in Egypt, and how they are responding to clerics repeated calls for dialogue.
According to a report issued in 2014 by the state-run Dar al-Ifta, the number of Egyptian atheists reached 866.
Many Egyptians opposing the lack of religious faith are promoting a dialogue-based persuasion strategy to deal with the phenomenon, instead of marginalization.
There are, however, those whoconsider it a personal freedom that no one has the right tointerfere with, and argue that Egypt will only achieve progress if people focus theirattention on the workforce and production instead of citizens personal matters.
There is no clear acknowledgement of atheism in the Egyptian constitution, as only Islam, Christianity and Judaism are officially listed.
The undersecretary of the parliaments religious committee Amr Hamrowsh considers the recent declaration that Egypt is the Arab country with the highest rate of atheism to be incorrect information.
Atheism in Egypt is only present in individual cases, not a phenomenon as promoted through some media outlets, says Hamrowsh. The Egyptian constitution does not mention atheism as an official belief system, so it is hard for the parliament to issue legislation that will grant atheists freedom of belief, he explained.
In 2014, Endowments Minister Mohamed Mokhtar launched a national campaign in co-operation with the Youth Ministry to combat the spread of atheism, claiming it represents a danger to national security.
Similarly, Malkai believes that atheism is a phenomenon that should be combated, and said that Al-Azhar is holding seminars to discuss ways to eradicate it.
In any developed country, there is a principle that is followed citizenship; no one can ask you about your religion or beliefs, and all laws are applied without religious discrimination, Mohamed Ismail, an Egyptian atheist, told Egypt Independent on Thursday.
Ismailstated that the citizenship principle is not likely to be applied in Egypt, stressingthat Egyptians are obsessed with religion and refuse to acknowledge any faith that is not Abrahamic.
Ismail has adopted atheism as his personal ideology since 2012. He noted that it is not easy for an Egyptian to declare themselves atheist in front of others, as it could put them at fatal risk.
An Egyptian agnostic, who spoke to Egypt Independent on condition of anonymity, agreed that being open about dissident beliefs can incite danger.
I started to be agnostic after intensively studying science, which made me realize religion is a man-made concept, she said.
She rejects the call for dialogue with Al-Azhar and anystatesponsored religious institution, claimingthat engaging in dialogue with clerics would not be fruitful, as their ideology is different; she believes that Islam promotes terrorism.
However,Ismail says that the recent representation of Islam on the part of the clerics is a good step, as in the past there were only people from Salafist and Muslim Brotherhood political currents that acted as spokespersons of Islam, and they contributed to the religions distortion.
Nevertheless, Ismail also does not thinkthatengaging in discussion with them would be beneficial, saying, I can read what they have to say in books.
According to former undersecretary of Al-Azhar Mahmoud Ashour, there is no justification for reluctant refusal from atheists to engage in open dialogue with Al-Azhar, as it is not like IS or any extremist groups that kill atheists.
Ashournoted that it is important for all state institutions to encourage atheists in Egypt to engage in dialogue with Al-Azhar or churches, as he considers atheism a psychological disease that should be addressed.
The rest is here:
Religion vs. state: Atheism and Al-Azhar - Egypt Independent
Posted in Atheism
Comments Off on Religion vs. state: Atheism and Al-Azhar – Egypt Independent
Perak mufti: Quarrelling Muslim preachers pushed youths away to atheism – Malay Mail Online
Posted: at 3:55 am
Perak mufti Tan Sri Harussani Zakaria said there were arguments among the Muslim community that Islam in its original form no longer fits with the current times. Picture by Choo Choy MayKUALA LUMPUR, Aug 8 Tan Sri Harussani Zakaria has blamed Muslim preachers who disagreed in public today for confusing Muslim youths, claiming they subsequently lead them towards atheism.
The Perak mufti also put the blame on several others, including parents and schools, for the alleged lack of religious knowledge among youths which he said was a cause behind atheism.
The preachers are in a disarray, so many teachings and opinions, until there is confusion among Muslims themselves, he reportedly said in Malay paper Sinar Harian.
He said there were arguments among the Muslim community that Islam in its original form no longer fits with the current times.
So this resulted in those who say previous preachers were wrong. This caused the youths to become confused, he claimed.
Harussani explained that some Muslims turn to atheism since they believe that religions are no longer relevant in this day and age.
Just yesterday, the minister in charge of Islamic affairs said the occasional conflicting interpretations of Islam between mufti from different states should be viewed positively.
Minister in the Prime Ministers Department Datuk Seri Jamil Khir Baharom said during Question Time that the dialectics between some of the Muslim clerics proved that the countrys Shariah system allowed for diversity.
A photo of the gathering by the Kuala Lumpur chapter, or consulate, of Atheist Republic has caused uproar from some in the Muslim community recently after it was highlighted by pro-Islamist blogs, leading to violent and death threats on social media.
Deputy minister in charge of Islamic affairs Datuk Dr Asyraf Wajdi Dusuki said yesterday Putrajaya will investigate the local group, even roping in the Malaysian Communications and Multimedia Commission, as it allegedly involved the faith of Muslims in the country.
See the article here:
Perak mufti: Quarrelling Muslim preachers pushed youths away to atheism - Malay Mail Online
Posted in Atheism
Comments Off on Perak mufti: Quarrelling Muslim preachers pushed youths away to atheism – Malay Mail Online
Hubble Telescope Sees Merging ‘David and Goliath’ Galaxy Pair (Photos, Video) – Space.com
Posted: at 3:54 am
The Hubble Space Telescope has taken a close look at the fascinating gravitational effects caused by a diminutive dwarf galaxy as it orbits its massive neighbor. The galactic pair will eventually merge, with the dwarf being eaten but it's not going down without a fight.
The barred spiral galaxy NGC 1512 (left) and the dwarf galaxy NGC 1510 (right) are merging with one another. The duo is 30 million light-years from Earth.
NGC 1512 is a colossal barred spiral galaxy containing billions of stars, plus active regions of star formation. Hubble, a joint project of NASA and the European Space Agency, can easily detect star formation in the galaxy's outer ring. That region is dotted with many blueish HII-emission regions, meaning that blasts of powerful radiation coming from nearby young stars are ionizing the clouds of hydrogen gas. In this observation of NGC 1512, however, the bright blue inner hub of star formation takes center-stage.
Known as a "circumnuclear starburst ring," this intense star-formation region measures 2,400 light-years across. It is fed by a conveyor belt of gas streaming down the two prominent bars from the galaxy's outer rim to the galactic core (hence the "barred spiral galaxy" designation). Astronomers think that the 400-million-year-old gravitational battle between NGC 1512 and its tiny buddy, NGC 1510 (on the right in the image), is driving the massive galaxy's gas supply and starburst ring, researchers said in a statement.
Although NGC 1510 seems to be holding its own against its neighboring gravitational bully, the unfortunate dwarf galaxy faces the beginning of the end. Already, the bigger galaxy's gravity is dragging extended tendrils of gas from the tiny galaxy, and NGC 1510's stars will eventually assimilate with NGC 1512's stellar metropolis. Astronomers know this because 2015 observations of the massive galaxy revealed that the outer regions of NGC 1512's spiral arms once belonged to another galaxy, one that was cannibalized and ingested a grim fate that also awaits NGC 1510. But in the cosmic ecosystem, this is the galactic cycle of life.
NGC 1512 and NGC 1510 (at center) as seen from the ground, in the surrounding sky.
Although the doomed dwarf galaxy is small, it has a big impact on its larger companion, the statement said. Observations of these effects will help astronomers learn more about the dramatic consequences galactic mergers have for star formation in massive galaxies, according to the statement.
Note: Space.com senior producer Steve Spaleta contributed to this report.
Follow Ian O'Neill @astroengine. Follow us @Spacedotcom, Facebook or Google+. Originally published on Space.com.
Continued here:
Hubble Telescope Sees Merging 'David and Goliath' Galaxy Pair (Photos, Video) - Space.com
Posted in Hubble Telescope
Comments Off on Hubble Telescope Sees Merging ‘David and Goliath’ Galaxy Pair (Photos, Video) – Space.com
Rep. of Macedonia Eyes NATO to Ward Off Russian Interference – Bloomberg
Posted: at 3:53 am
By
August 7, 2017, 7:00 PM EDT August 8, 2017, 2:23 AM EDT
The Republic of Macedonias new government is stepping up its efforts to join NATO, arguing that membership in the military alliance will protect the Balkan nation from Russia interfering in its affairs, the countrys defense minister said.
Influences interfering in this strategic goal arent helpful, and theyre not friendly, Defense Minister Radmila Sekerinska said in an interview in Skopje last week. Weve seen some leaks, even before the government was elected, about Russian attempts for influence in key political and security areas. And we have been concerned about them. We believe Macedonian NATO membership can put an end to these attempts.
After undergoing the first change in leadership in more than a decade in June, the nation of 2 million people is trying to rejuvenate its efforts to join the European Union and the North Atlantic Treaty Organization.
As part of that push,Prime Minister Zoran Zaevs government is trying to rebuild regional ties after accusing the previous administration of deliberately fueling a naming dispute with Greece dating back to 1991, when the nation broke away from Yugoslavia and called itself Republic of Macedonia. Greece, which blocked its neighbors attempts to join NATO because of the dispute, believes that to be a territorial claim on its neighboring northern province of the same name.
Get the latest on global politics in your inbox, every day.
Get our newsletter daily.
While some countries that gained independence after the bloody breakup of Yugoslavia in the 1990s have joined the EU and NATO, laggards like the Republic of Macedonia are now caught in a power struggle between Russia on one side and Europe and the U.S. on the other. Tensions escalated after Russia annexed Crimea in 2014, prompting the biggest standoff with the U.S. since the Cold War. They deepened further after U.S. President Donald Trump raised questions about the future of NATO and relations with Moscow.
Russia remains opposed to NATO expansion in Europe and has been accused of trying to derail the regions western accession efforts. Last year, Montenegros government said the Kremlin led a failed coup during parliamentary elections, allegations that Russia denies.
Sekerinska, the 45-year-old deputy chairwoman of the ruling Social Democratic Union, said the cabinet was seeking to improve ties with Greece and commit to domestic reforms within nine months to be able to join NATO as soon as possible.
The country needs to address issues regarding the rule of law and judicial independence that are now seen as a problem for Macedonias NATO entry, Sekerinska said.
Well stay committed to making these reforms a reality, but well keep asking NATO member states to appreciate these efforts, take into account the results and make decisions as soon as possible, she said.
As it strives to follow the example of Montenegro, which joined the alliance in June, the country will start boosting defense spending in 2018 from below 1 percent of gross domestic product, she said.
Sekerinska, who also serves as a deputy premier, hailed last weeks visit of U.S. Vice President Mike Pence to Montenegro, which she said delivered a key message that removed all doubts from earlier this year about whether the U.S. remains committed to NATO and the region.
Those doubts have disappeared, she said.
Read the original:
Rep. of Macedonia Eyes NATO to Ward Off Russian Interference - Bloomberg
Posted in NATO
Comments Off on Rep. of Macedonia Eyes NATO to Ward Off Russian Interference – Bloomberg
In NATO Split, Turkey Warns of Syria Invasion Against Kurds – teleSUR English
Posted: at 3:53 am
The warning comes after several battles between Turkish proxies and U.S.-backed YPG, as well as a reshuffling of top officers in Turkey's military.
The Turkish Armed Forces are massing on the Syrian border days after a reshuffle of top brass in the country's military in anticipation of a potential invasion that could dramatically complicate Syria's ongoing civil war.
RELATED: US Sharply Snubs Turkey as It Announces Arms for Syrian Kurds
Kurdish militia backed by U.S. forces are currently taking part in an assault against the Islamic State group in their Syrian stronghold Raqqa. Turkey accuses the militia, known as the YPG, of being a terrorist group tied to the Turkey-based Kurdistan Workers Party, or PKK, against whom Turkey has waged a decades-long counterinsurgency campaign.
There have been regular exchanges of rocket and artillery fire in recent weeks between Turkish forces and YPG fighters who control part of Syria's northwestern border. On Monday morning, the YPG official website released video of its fighters firing an anti-tank guided missile system, or ATGM, at a tank belonging to the terrorist groups under the Turkish armys command a reference to Turkish-backed Free Syria Army fighters near the city of Azaz, Syria. Other footage showed YPG forces firing multiple rocket launcher systems at FSA targets.
Recent clashes have centered around the Arab towns of Tal Rifaat and Minnigh, near Afrin, which are held by the Kurdish YPG and allied fighters. However, the YPG's release of a video showing the deployment of an ATGM system is controversial, especially because the White House approved the arming of the group in May despite protests from the Turkish government.
Turkey, which has the second largest army in NATO after the United States, reinforced the northwestern section of the border over the weekend with artillery and tanks, and Erdogan said Turkey was ready to take action.
We are determined to extend the dagger we have put into the heart of the terror entity project with new moves, Erdogan said in a speech on Saturday in the eastern town of Malatya.
RELATED: 'Staggering, Disastrous': Monitors Slam US-Led Attacks in Syria
We would rather pay the price for spoiling plans against our future and liberty in Syria and Iraq rather than on our own soil, he added, referring to the YPG in Syria and PKK bases in Iraq. Soon we will take new and important steps.
Erdogan's comments follow the appointment of three new leaders of Turkey's army, air force and navy last week moves which analysts and officials said were at least partly aimed at preparing for any campaign against the YPG militia.
"With this new structure, some steps will be taken to be more active in the struggle against terror," an anonymous Turkish government source told Reuters. "A structure that acts according to the realities of the region will be formed".
The battle for Raqqa has been underway since June, and a senior U.S. official said Friday that 2,000 Islamic State fighters are believed to be still defending positions and "fighting for every last block" in the city. Even after the recapture of Raqqa, U.S. Defense Secretary Jim Mattis has left open the possibility of longer-term American assistance to the YPG.
Turkey, however, has adopted an increasingly angry tone in public communications with its NATO partners, raising fears in Washington of a potential split in the organization.
Last month, Turkey's official Anadolu Agency wire service published a detailed map revealing the locations of U.S. airports, military bases, and personnel in Syria in the Raqqa countryside. While the Pentagon complained that the release jeopardizes U.S.-led coalition efforts, Ankara was likely nonplussed by the complaint in light of their view that Washington is colluding with forces who pose a terrorist threat to Turkish national security.
In July, Erdogan noted that Turkey had reached the final stage of negotiations with Russia for the acquisition of Russia's S-400 air defense system, which is inconsistent with NATO's treaty-wide air defense network.
Read the original:
In NATO Split, Turkey Warns of Syria Invasion Against Kurds - teleSUR English
Posted in NATO
Comments Off on In NATO Split, Turkey Warns of Syria Invasion Against Kurds – teleSUR English
Anti-sub defense, minesweeping ops on agenda at NATO’s Baltic States war games – RT
Posted: at 3:53 am
The Baltic Naval Squadron (BALTRON) annual naval war games kicked off Monday, the Lithuanian Ministry of Defense announced, local media reports. War ships from three NATO states are set to practice various military tactics amid the blocs build-up near the Russian border.
Starting from Tuesday, warships from Latvia, Lithuania, and Germany will take part in the BALTRON Squadron Exercise 17/2 in the Baltic Sea and Lithuanian territorial waters.
Over the course of five days, the vessels will practice naval maneuvers, submarine target defense, communication, as well as search-and-rescue and minesweeping operations under the supervision of Lithuanian Navy Commander Tomas Skurdenis.
Read more
Taking part in the exercise will be the Lithuanian LNS Jotvingis N42 ship, Suduvis M52 and Kursis M54 minehunters, Aukstaitis P14 and Selis P15 patrol ships, Sakiai rescue vessel and H21 harbor cutter in the exercises, while the Germans will use a Pegnitz M1090 minesweeper.
The Latvian contingent will consist of its Rusins minehunter ship and Varonis support vessel.
The BALTRON naval squadron was inaugurated in 1998 and comprises the navies of Latvia, Estonia, and Lithuania, with each contribute one to two minesweeping vessels to the group. Working under the NATO umbrella, its stated purpose is to minimize mine hazards, enhance security of the Baltic States territorial waters and help to remediate environmental damage in the territorial waters and economic zones of Estonia, Latvia and Lithuania.
The exercises come amid a heightened period of NATO build-up and military activity in the Baltic States and Eastern Europe, which has intensified since the Ukrainian crisis. In June, 5,300 troops from 10 NATO countries participated in the 10-day Iron Wolf military drills in Lithuania, with the stated purpose of deterring the perceived Russian threat.
Read more
Part of the drills took place on a 104-kilometer (64.6-mile) patch of land in the Suwalki Gap, which borders the Russian exclave of Kaliningrad. Around 1,500 troops took part in the drills, which were aimed at training them to respond to potential aggression.
Russian officials have repeatedly warned that such behavior could be seen as provocative and undermine regional security. In July, Russias permanent representative to NATO, Aleksandr Grushko, said that the alliances military activities near the Russian border pose a threat to national security.
Its clear for us that such activities not only ensure a reinforced military presence of the allies in the immediate vicinity of Russias borders but in fact represent an intensive mastering of the potential theater of military operations, accompanied by the development of the necessary infrastructure, Grushko told reporters.
Claiming that the growing NATO military presence in Eastern Europe undermines stability in the region, Grushko said that Moscow cannot leave such steps unanswered and will undertake necessary steps to boldly defend our interests.
See the original post here:
Anti-sub defense, minesweeping ops on agenda at NATO's Baltic States war games - RT
Posted in NATO
Comments Off on Anti-sub defense, minesweeping ops on agenda at NATO’s Baltic States war games – RT
NSA whistleblower discusses ‘How the NSA tracks you’ – CSO Online – CSO Online
Posted: at 3:53 am
Ms. Smith (not her real name) is a freelance writer and programmer with a special and somewhat personal interest in IT privacy and security issues.
At the outdoor hacker camp and conference SHA2017, which is taking place in the Netherlands, NSA whistleblower William Binney gave the talk, How the NSA tracks you.
As a former insider, Binney knew about this long before Snowden dropped the documents to prove it is happening. Although he didnt say anything new, Binney is certainly no fan of the NSAs spying he calls the NSA the New Stasi Agency. If you are no fan of surveillance, then his perspective from the inside about the total invasion of the privacy rights of everybody on the planet will fuel your fury at the NSA all over again.
In todays cable program, according to Binney, the NSA uses corporations that run fiber lines to get taps on the lines. If that fails, they use foreign governments to get taps on the lines. And if that doesnt work, theyll tap the line anywhere that they can get to it meaning corporations or governments wont even know about the taps.
The companies are involved at the next step the PRISM program, which includes collection directly from the servers of U.S. service providers. However, Binney said PRISM is the minor program when compared to Upstream, which includes collecting data from the taps on fiber-optic cables in hundreds of places around the world. Thats where they are collecting off the fiber lines all the data and storing it.
PRISM was for show-and-tell purposes, to show Congress and courts what the NSA was doing and to say we have warrants and are abiding by the laws. Upstream was the one that allowed the NSA to take everything off the line.
Regarding worldwide SIGINT, CNE (computer network exploitation) was the big one. Implants in hardware or software, lets say switches or servers, make them do anything they want because the NSA pwned them.
That feeds the NSAs Treasure Map, which provides a map of the entire internet in near real-time; any device, anywhere, all the time every minute of every day. As Binney put it, So its not just collecting what youre saying encrypted or not but its also monitoring where you are when you do it.
Treasure Map is also how intelligence agencies use GPS from cell phones to target drone attack victims. Binney noted there are at least 1.2 million people on the drone hit list.
He also mentioned the programs that include the input of all phone data, fixed, mobile, satellite any kind of phone which both the FBI and CIA can directly access so that when they want to see who did what, they have an index, all, to everything they ever said in their database.
All the data is collected without warrants so its a basic violation of the rights of every human, Binney said.
He also covered how other agencies can directly access the NSAs data, Five Eyes, CIA, FBI, DEA and DIA. The police can access it via the FBIs system.
The NSA could choose to look at the right targets, but doesnt. The NSA may collect it all, but thats not the same as intelligence, as understanding all of what was collected. If you use one of the hot keywords in an email, for example, it will get flagged for review. But planned attacks happen because analysts are so buried beneath the data they cant see the attacks coming. Binney previously tried to convince the U.K. that bulk data kills people.
While all this data isnt helping to stop attacks, having all the data gives the intelligence community the power to manipulate anyone they want. Its like J. Edgar Hoover on super steroids all the collected data gives intelligence agencies the means to target anyone. Then parallel construction is used after the fact to go back and build a separate basis for an investigation to cover up the fact that the data was obtained unconstitutionally.
Before taking questions from conference attendees, Binney pointed out an icon on a slide as a teaser to his startup, which will advise on ways you can do privacy and security by design. He came to Europe, since they cant get anything done in the U.S. The U.S. and U.K. are too dense to realize it can be done it also goes against their agenda for more money, power and control.
Can we expect more NSA employees to blow the whistle? Perhaps, but the people in power there are corrupt, Binney said. During the portion of the talk when attendees could ask questions, he talked about how the NSA has employed a lot of introverts, people with ISTJ personalities, making them easy to threaten. Binney added that the See Something, Say Something (about your fellow workers) program inside the NSA is what the Stasi did. Theyre picking up all the techniques from the Stasi and the KGB and the Gestapo and the SS; they just arent getting violent yet that we know of internally in the U.S.; outside is another story.
Read more from the original source:
NSA whistleblower discusses 'How the NSA tracks you' - CSO Online - CSO Online
Posted in NSA
Comments Off on NSA whistleblower discusses ‘How the NSA tracks you’ – CSO Online – CSO Online
Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report – Lawfare (blog)
Posted: at 3:53 am
The Government Accountability Office last week published a report that, among other things, weighs in on the pros and cons of the NSA/CYBERCOM dual-hat system (pursuant to which the director of the NSA/CSS and commander of CYBERCOM are the same person). The report deserves attention but also some criticism and context. Heres a bit of all three.
1. What is the dual-hat issue?
If you are new to the dual-hat issue, or if you have not closely followed developments of the past year, please read this recent post for an introduction and overview.
2. What was GAOs bottom line? Did it recommend keeping or abolishing the dual hat?
Neither. The report does not purport to answer that question. It is, instead, no more and no less than an attempt to convey the Defense Department perspective (and only the DOD perspective) on the pros and cons of keeping the dual-hat structure (as well as identifying some mitigation steps).
3. What method did GAO use to determine DODs perspective?
GAO did three things:
1. It reviewed documents previously generated by CYBERCOM and by the Joint Staff to educate their own leadership on the pros and cons.
2. It sent out questionnaires to various DOD components (with relevant responses received from CYBERCOM, six combatant commands, four combat support agencies, and three offices within the Office of the Secretary of Defense, plus a collective response for the Defense Department produced by DODs chief information officer); and
3. It conducted interviews with personnel from CYBERCOM, the Defense Department's chief information officer, and NSA/CSS.
4. Anything wrong with that methodology?
Not if your goal is to convey only the Defense Departments perspective. And to be fair, that was GAOs stated goal. But this approach is problematic.
One of the issues driving the dual-hat debate involves the tension that arises between intelligence-collection equities (which NSA would be inclined to favor) and disruption equities (which CYBERCOM would be inclined to favor), in the scenario in which access to enemy-controlled system could be used for either purpose. As a result, the intelligence community has a stake in this question. GAO should have reached out for input from the Office of the Director of National Intelligence in particular (it also is odd that GAO included only NSA in one of the three methods mentioned above).
GAO might respond that its terms of reference were DOD-specific. Thats clearly true for certain other parts of the GAO report in question, dealing with other topics. Its less clearly the case with the dual-hat portion of the report. But even if it is, it does not follow that GAO could not include in its report any reference to possibly competing perspectives from the intelligence community. Indeed, I would go further and say it was a big mistake not to do so, for it was perfectly foreseeable that this report would be taken by many (especially the media) as conveying a general assessment of the dual-hat issue rather than just a DOD-specific summary of opinions, no matter how many caveats are given.
5. Fine, but it is what it is. So lets look at what GAO actually reported, starting with the three pros favoring preservation of the dual-hat arrangement. The first one asserts that the dual hat promotes coordination and collaboration between NSA and CYBERCOM. Comments?
At bottom, this is a claim that having a common boss makes it relatively easy to collaborate when it comes to developing exploits and sorting out when and how they are used. That makes sense and is consistent with conventional wisdom on the dual-hat situation.
6. The second pro is about how the dual hat solves the deconfliction challenge mentioned above, but whats really interesting here is what the report implies about how that challenge would otherwise have to be managed.
As already noted, the need to deconflict when collection and disruption equities compete is a big part of this story. Here, GAO acknowledges that the status quo provides a ready-made solution. So far, so good. What is really interesting, though, is the comment GAO then makes regarding what would happen in such cases of tension in the absence of the dual hat.
Tellingly, the report observes that, in that case, deconfliction issues would have to be taken to the Secretary of Defense and/or Director of National Intelligence for resolution (emphasis added). I love the use of and/or in that sentence. It perfectly captures a critical point: Absent a dual hat, there has to be a new deconfliction system, yet the lead contenders for that role each have a dog in the fight.
Let me expand on that a bit.
Assume we decide to end the dual-hat system, without first settling on a new deconfliction system. What then? In that case, CYBERCOM usually will win over NSA. Why? Think about it. NSA wants to use existing access to keep collecting, but CYBERCOM wants to use it to disrupt the platform. If NSA barrels ahead with its preference, nothing really changes; the target remains operational and the enemy is none the wiser, hopefully. But if CYBERCOM barrels ahead with its preference, in most instances that will shut down the target (or at least make clear to the enemy that the target has been penetrated); no more collection at that point. NSA will lose such battles, except when DIRNSA manages to see the issue coming and gets someone over CYBERCOMs head to make it back off.
Sounds like we would need a formal system to replace the dual hat for deconfliction then. But what would that look like? If the solution is to charge the director of national intelligence with making the call, CYBERCOM probably wont be happy. If the solution instead is to charge the secretary of defense (or USD(I) or the like), NSA (and DNI) probably wont be happy. If the solution instead is to convene a committee of some kind with stakeholders from both sidesand that committee works by majority votethen the same problem arises (unless you find some third-party player, such as the national security adviser, to ensure there is not a tie and that the intelligence community and military have equal voting power).
The point being: This issue needs serious attention. I dont doubt that a decent solution can be developed, but care must be taken lest we stumble into the default scenario mentioned above.
7. The third pro involves the efficient allocation of resources, but its really about the idea that NSA makes CYBERCOM possibleand that reminds us that the dual hat isnt going away soon.
The third pro noted by GAO is that the dual hat facilitates NSA and CYBERCOM sharing operational infrastructure (translated: hacking tools, accesses, staging servers, personnel, etc.), as well as the infrastructure for training. Of course, its pretty much a one-way street; this traditionally is all about NSA sharing its expertise with CYBERCOM as it has stood up. Legislation currently forbids separation of the dual hat until the Defense Department can certify that CYBERCOM is truly ready to operate independently. Thats supposed to be the case by September next year, but of course its one thing to say it and quite another to achieve it.
8. Turning now to the cons, GAO introduces the idea that the dual hat may give CYBERCOM an unfair advantage over other commands.
This one was phrased very carefully. Without saying that this problem already exists, GAO says that CYBERCOM thinks that other commands are worried that the dual hat may in the future unduly favor CYBERCOM requests for NSA support over the requests that come from other military commands. This is an interesting twist on the more familiar concern that military equities in general will trump collection equities. This is military-vs.-military instead. At any rate, again note that it is framed as speculation rather than a current observation. That might be politeness, or it might really be purely speculative. You really cant tell from the GAO report (see my last point below, on whether any of the reports observations have strong evidentiary foundations).
9. The second con GAO lists is a bombshell: The dual hat creates [i]ncreased potential for exposure of NSA/CSS tools and operations.
Wow. In an almost cavalier way, the GAO report links the dual-hat issue directly to the fierce, ongoing debate over the security of NSAs tools, a topic that goes to the heart of NSAs mission. Because of the importance of that latter debate, GAOs assertion will constitute a heavy thumb on the scale in favor of separating the dual hat, if it catches on. Time will tell if it will. For now, lets just take a closer look at the claim.
First, here is what GAO says on the subject:
The dual-hat command structure has led to a high-level of CYBERCOM dependence on NSA/CSS tools and infrastructure. According to NSA/CSS officials, the agency shares its tools and tactics for gaining access to networks with a number of U.S. government agencies, but CYBERCOMs dependence on and use of the tools and accesses is particularly prevalent. CYBERCOMs dependence on NSA/CSS tolls increases the potential that the tools could be exposed.
Lets parse the two claims here.
Does the dual hat create CYBERCOM dependence on NSA, as the first sentence indicates? I think that has things backwards. As noted in the prior con, CYBERCOM badly needed NSA at first and still needs it to no small extent. Thats not caused by the dual hat. It is caused by lack of capacity. The dual hat has been part of the solution to that need. Perhaps DOD meant to convey a different point: that keeping the status quo has become a crutch that prevents CYBERCOM from pressing faster to build its own capacities. That makes more sense.
Does CYBERCOM use of NSA tools and accesses (i.e., exploits and penetrations) increase the risk of their exposure? Put that way, the answer must be yes. Every instance of use of any exploit or access creates an opportunity for others to discover it, and so the risk must go up each time (you might say each use increases the exposure surface). But note that weve just put the question in a non-nuanced way, without any attempt to quantify the degree of increase in the risk, let alone to place it in context with off-setting benefits or with reference to mitigation strategies for this problem. All that emerges from the GAO report is the bottom line: CYBERCOM relies on NSA tools ostensibly because of the dual hat, and therefore the dual hat increases the risk of those tools getting loose. Any suggestion that a policy exacerbates that risk is bound to draw attention.
The possibility of loose NSA tools has become a flash point for debate, in a manner that threatens for better or worse to create new limits on the ability of NSA to develop or keep certain capacities (particularly knowledge of zero-day vulnerabilities). NSA received a substantial black eye when a Russian intelligence agency the mysterious entity identifying itself as the Shadowbrokers somehow acquired a cache of NSA-created exploits and then began dumping them publiclyespecially after one of those exploits was used in connection with WannaCry and NotPetya. Both WannaCry and NotPetya received a vast amount of media attention, much of it pinning the blame in large part on NSA. This fueled arguments to the effect that NSA should not be allowed to create or preserve such tools (or at least that current procedures for balancing the competing equities involved (building NSAs collection capacity, vs. improving the security of commercially available products) should be altered significantly to reduce NSAs capacities in this area).
That argument was out there before WannaCry and NotPetya broke, but once those stories broke it received a strong boost from Microsoft. As this June piece in The New York Times from Nicole Perlroth and David Sanger underscores, this perspective has gained considerable momentum with some in private industry, Congress and foreign governments. Just this morning, former NSA deputy director Rick Ledgett wrote a post here at Lawfare fighting back against this argument, highlighting how important the issue is.
Whether you agree or disagree with this argument, surely you can appreciate how it has made the government acutely sensitive to questions about the security of NSAs tools. As a result, the argument that the dual hat creates significant security risks for those tools has the potential to have an outsize impact on the dual-hat debate. Which is a good thing, if the argument is a persuasive one. Unfortunately, the GAO report does not come anywhere close to giving us enough information to judge the matter. And yet this part of the report grabbed headlines in some quarters (see this piece in NextGov, titled GAO: Keeping NSA and CyberCom Together Makes Hacking Tool Leaks More Likely).
10. The next con listed by GAO: NSA and CYBERCOM are too much for any one person to manage.
Thats a familiar and serious concern, and it is unsurprising that it arose here. It is entangled to some extent with the deconfliction issue, of course, but at the end of the day being director of NSA and commander of CYBERCOM both concern vastly more than deconfliction.
11. The next con on the list? Strangely, its the deconfliction issue, which we already discussed above as a pro for the dual hat. What gives?
It is telling that the deconfliction issue pops up both as a pro and a con. As noted above, the dual hat is a good thing for deconfliction insofar as one thinks there ought to be a single decision-maker who takes both collection and disruption equities seriously. But here we see the flip-side of the argument, as GAO reports that personnel from both NSA and CYBERCOM (including a senior-level official) told GAO that the dual-hat leads to increased tension between NSA and CYBERCOM staffs, because their respective collection and disruption missions may not always be mutually achievable.
You know what Im going to say, I suspect. The tension is caused by the combination of incompatible missions and shared tools/accesses. Thats not the dual hats fault. The dual hat is one solution to resolving the tension. As I have noted here, there clearly is a view in some circles that the fix is in with the dual hat, in favor of NSAs collection mission. Maybe thats right, maybe its not. But at any rate, listing the dual hat as a con here seems to be a reflection of that perspective.
12. The last con on the list has to do with difficulties in tracking expenditures the NSA makes on behalf of CYBERCOM.
This may well be a very important issue, but it seems to me the sort of thing to be addressed through improved procedures and should not matter much in deciding whether to keep the dual hat.
13. How strong is the evidence supporting the various pro and con claims?
I recommend caution. We get a description of GAOs methods, as noted above, but we do not also get the underlying documents, interview notes, etc. And the reports narrative on each point is exceedingly thin, no longer really than what Im providing here. Note, too, my earlier observation that GAO does not appear to have sought the views of ODNI, and sought NSA views only to a limited extent. None of which is to say that any of the observations are incorrect, of course.
Visit link:
Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report - Lawfare (blog)
Posted in NSA
Comments Off on Separating NSA and CYBERCOM? Be Careful When Reading the GAO Report – Lawfare (blog)
NSA HR McMaster Exposed, Time is Short – Live Trading News
Posted: at 3:53 am
NSA H. R. McMaster Exposed, Time is Short
People are growing more and more suspicious by the day of President Trumps National Security Adviser, H.R. McMaster.
Several reports last week painted General McMaster (US Army) as a man who is trying to consolidate power in the West Wing, and to undermine President Trumps specific goals when it comes to national security and foreign policy.
He is acting like he wants to limit the Presidents authority, ala the Democrats in the Senate, and if President Trump is really thinking about sending him to Afghanistan to manage the 17 yrs war, well, that might be far enough away for the 3-Star General to stop causing trouble here at home.
This week, we learned from a few news accounts that Gen. McMaster has been busy in recent weeks cleaning the National Security Council (NSC) of any holdovers from The Flynn Era.
Last Wednesday, he fired NSC Intelligence Director Ezra Cohen-Watnick, and earlier this month he fired Rich Higgins for a memo wrote about the globalists who were trying to undermine The Trump Administration.
Some reports say that McMaster is merely getting rid of dead weight analysts who have been presenting the President with foreign policy plans he does not like.
Other reports say Gen. McMaster himself cannot seem to please our President, and he is removing anyone who might take President Trumps side.
What really is worrisome is this the following report from Circa, which reveals that Gen.McMaster wrote a letter protecting Barack Hussein Obamas former National Security Adviser, Susan Rice.
From Circa: The undated and unclassified letter from McMaster was sent in the mail to Rices home during the last week of April. Trump was not aware of the letter or McMasters decision, according to two senior West Wing officials and an intelligence official, who spoke to Circa on condition that they not be named.
I hereby waive the requirement that you must have a need-to-know to access any classified information contained in items you originated, reviewed, signed or received while serving, as National Security Adviser, the letter said. The letter also states that the NSC will continue to work with you to ensure the appropriate security clearance documentation remains on file to allow you access to classified information.
It looks like Gen McMaster is being insubordinate to his Commander-in-Chief in here and that is deadly.
Ms. Rice is under investigation by the House Intelligence Committee for her role in unmasking the names of some Trump campaign officials caught on incidental foreign surveillance, and the President has suggested she may be guilty of violating the law.
The Big Q: Why would his national security adviser go behind the Commander-in-Chiefs back to ensure that Ms. Rice retains her clearances?
The Big A: We wait to see how the Marine 4-Star manages the Army 3-Star.
President Trump needs loyal people around him always, Gen. McMaster may not be suitable, best he retires before he is fired.
Stay tuned
intelligence, investigation, loyal, McMaster, NSA, president, reports, rice, Trump
Paul A. Ebeling, polymath, excels in diverse fields of knowledge. Pattern Recognition Analyst in Equities, Commodities and Foreign Exchange and author of The Red Roadmasters Technical Report on the US Major Market Indices, a highly regarded, weekly financial market letter, he is also a philosopher, issuing insights on a wide range of subjects to a following of over 250,000 cohorts. An international audience of opinion makers, business leaders, and global organizations recognizes Ebeling as an expert.
Read more here:
NSA HR McMaster Exposed, Time is Short - Live Trading News
Posted in NSA
Comments Off on NSA HR McMaster Exposed, Time is Short – Live Trading News
The Fourth Amendment’s Digital Update – The Daily Caller
Posted: at 3:52 am
The Fourth Amendment has protected our right to privacy since its ratification in 1791. Thetextof the amendment reads, the right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, but how well do these protections hold up in the digital age?
Today, most of us are typing emails on our laptops, not scribbling a letter with a quill and inkwell. Therefore, its important to ensure our sensitive, digital communications are well-protected. Clearly, the Fourth Amendment transcends time and technological change, but some sinister players are pretending otherwise.
Currently, under theElectronic Communications Privacy Act(ECPA), the United States federal government may seize any citizens private email communicationswithout a warrant, provided they are over 180 days old. By law, these older emails are not considered privy to a reasonable expectation of privacy under the ECPAsSection 2703(a).
Even worse, the ECPA was enacted in 1986, years before email usage was even widespread. However, the 180-day rule doesnt just apply to emailsevery Americans texts, GroupMe chats, and Facebook messages are fair game too.
Its time to modernize the Fourth Amendment to protect our online communications, and bipartisanThe Email Privacy Act, re-introduced by Reps. Kevin Yoder (R-KS) and Jared Polis (D-CO), does just that. Namely, the Email Privacy Act would require all government agencies to acquire a warrant before accessing any online communications over 180 days oldjust like any other private documents.
In the era of cloud technology, communications could be stored on enormous server, conceivably forever. More and more, our sensitive financial, relational, and personal details exist online, making their security absolutely essential.
The ECPA is problematic in other areas as well. In December of 2013, federal law enforcement sought asearch warrantfor Microsoft customers email account as a component of a criminal narcotics investigation. Microsoft complied up until a point, but there was one big problemthe actual emails were stored overseas.
Microsoft refused to turn the emails over, and was held in civil contempt by the district court. Three years later, however, the Second Circuit Court of Appeals ruled against the federal government, expressing that companies cannot be compelled to release customer emails stored outside the United States.
We conclude that 2703 of the Stored Communications Act does not authorize courts to issue and enforce against USbased service providers warrants for the seizure of customer email content that is stored exclusively on foreign servers, the courtruled.
TheInternational Communications Privacy Act (ICPA) is one potential solution to this issue, creating, a legal framework that clarifies the ability of law enforcement to obtain electronic communication of U.S. citizens, no matter where the person or the communications are located.
Additionally, the ICPA would allow law enforcement to obtain communications from foreign nationals, in consistency with international law. Sponsored by Senators Orrin Hatch (R-UT), Chris Coons (D-DE), and Dean Heller (R-NV), the bipartisan legislation would remedy this complex problem.
The International Communications Privacy Act aids law enforcement while safeguarding consumer privacy, striking amuch-needed balance in todays data-driven economy, Senator Hatchstated. Clearly, Americans can no longer be complacent about their privacy protections. In a digital age of prying eyes, the consequences of privacy violations can be costly, and long-lasting.
On June 23rd, the Department of Justiceapplied to take the Microsoft case to the Supreme Court, but Congress shouldnt wait for the court to take action. Passing the ICPA and other meaningful reform is too important to wait, when innocent Americans are being caught in the crossfire.
One way or another, its time to give the Fourth Amendment a sorely needed update.
Originally posted here:
The Fourth Amendment's Digital Update - The Daily Caller
Posted in Fourth Amendment
Comments Off on The Fourth Amendment’s Digital Update – The Daily Caller







