The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Daily Archives: August 19, 2016
In ‘Bizarre’ NSA-Linked Hacking Saga, Some Exploits Prove …
Posted: August 19, 2016 at 4:08 am
At least some of the hacking weapons possibly pilfered from an NSA-linked cyberoperation and exposed publicly earlier this week are real and include a zero-day exploit, according to two companies whose products were targeted.
Cybersecurity companies Cisco and Fortinet announced online Wednesday that some code published by the mysterious Shadow Group affected legacy versions of their firewalls, but the vulnerabilities already were addressed in upgraded versions. More severely, however, Cisco said one of the exploits in the code was unknown to the company until it popped up online and is still a threat.
If the right configurations are present, Cisco said, the vulnerability "could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system."
Yvonne Malmgren, a spokeswoman for Cisco, told ABC News that the company is directing its customers to workarounds to "mitigate that particular vulnerability" and that a fix is coming "in the near future."
Cybersecurity experts and former U.S. officials who have analyzed some of the code released online by the Shadow Brokers were already convinced at least some of it appeared very real. Zero-day vulnerabilities those that are unknown to makers of the target software are particularly valuable on the cyber black market because, by definition, there's no specific defense against them.
The Shadow Brokers a name that's new to the cybersecurity community and could be a reference to a popular video game popped up online over the weekend claiming to have broken into the files of another elite hacking team known as the Equation Group. The Equation Group was first identified in February 2015 by the Russian cybersecurity firm Kaspersky Lab, which recently described it as the "apex predator" of the hacking world.
In its initial report, Kaspersky said that the Equation Group "is unique almost in every aspect of their activities: They use tools that are very complicated and expensive to develop, in order to infect victims, retrieve data and hide activity in an outstandingly professional way, and utilize classic spying techniques to deliver malicious payloads to the victims."
Kaspersky also said the Equation Group appeared to have "solid links" with the creators of the cyber-superweapon Stuxnet, which was reportedly the product of a joint U.S. National Security AgencyIsraeli intelligence operation. That link, along with Equation Group's reported long-time targeting of Iranian, Russian, Chinese and Pakistani systems, among others, has led observers to suspect the Equation Group is at least connected to the NSA or some Western intelligence agency.
The names of some of the exploits released by the Shadow Brokers refer to operations exposed by former NSA contractor Edward Snowden, but researchers pointed out that since his revelations in 2013, those names have been public information.
The Shadow Brokers announced in stilted English earlier this week that they plan to put the best of the cyberweapons up for auction and that if it nets at least 1 million bitcoins (worth over $560 million), they will release more Equation Group files to the public. As of this report, the auction has pulled in less than $1,000.
It's unclear how the Shadow Brokers got a hold of the cyberweapons; the group claims to have "followed" Equation Group traffic to its "source range" and then hacked it.
The question remains whether the Equation Group or another U.S.-aligned or -allied hacking group, private contractor or intelligence agency was actually hacked and, more immediately, whether the yet-to-be-released cyberweapons are as real as the teaser code. The Shadow Group billed the unseen payloads as "better than Stuxnet," the game-changing worm that physically damaged an Iranian nuclear facility.
Snowden noted on Twitter that date references in the released code end in the fall of 2013, just after he went public with revelations about NSA surveillance operations. He speculated that perhaps an NSA outside "staging server" essentially a holding pen for malware had been hacked and the NSA migrated the malware to a different server after he went public as a security precaution, inadvertently but fortuitously cutting off the hackers' access.
Oren Falkowitz, a former NSA hacker with the agency's elite Tailored Access Operations, said he strongly doubted the NSA itself was hacked a sentiment shared by two other cybersecurity experts who spoke to ABC News.
"I can think of a dozen ways" the tools could have been stolen, Falkowitz said, such as being taken from an outside server and being pilfered from an unsecured laptop. The NSA from time to time outsources the development of offensive cyberweapons to private contractors, according to cybersecurity experts.
As for who the Shadow Brokers are, there's only speculation, which runs the gamut from a disgruntled insider at a U.S.-linked group to a sophisticated nation-state like Russia. But the group's public posturing has thrown observers for a loop.
"Revealing the results [of a major hack] in this way is extremely atypical," Falkowitz said. "To do something as childish as hold a public auction with bitcoin ... just seems like not consistent with the way really sophisticated government groups would operate."
"It's really bizarre," he said.
Fortinet did not immediately respond to a request for comment for this report.
See the article here:
In 'Bizarre' NSA-Linked Hacking Saga, Some Exploits Prove ...
Posted in NSA
Comments Off on In ‘Bizarre’ NSA-Linked Hacking Saga, Some Exploits Prove …
Trump foes miss the mark on Clinton’s Second Amendment …
Posted: at 4:08 am
Donald Trump keeps saying that Hillary Clinton wants to essentially abolish the Second Amendment. But the media fact checkers are having none of it. Last week, CNN called his accusation persistent and false. At the same time, a Washington Post editorial also called the claim absurd.
In his analysis for CNN, Eric Bradner acknowledges Clintons support for many different types of gun control -- a 25 percent tax on handguns, an assault weapons ban, repeal of laws allowing permitted concealed handguns, and background checks on the private transfer of guns. Clinton also has supported increased fees and a variety of regulations that her husband imposed. Thanks to Bill Clintons regulations, the number of licensed firearms dealers from 248,155 in 1992 to 67,479 in 2000 -- a 73 percent reduction.
The media picks and chooses when to take Clinton at her word. CNN pointed to a recent Fox News Sunday appearance where Hillary Clinton claimed: "I'm not looking to repeal the Second Amendment. I'm not looking to take people's guns away." The Washington Post noted a statement from her campaign website about how gun ownership is part of the fabric of many law-abiding communities.
But in June, ABCs George Stephanopoulos pushed Clinton twice on whether people have a right to own guns. But that's not what I asked. I said do you believe that their conclusion that an individual's right to bear arms is a constitutional right? Clinton could only say: If it is a constitutional right . . . .
Similarly, in New York Cityin the fall, she told donors: The Supreme Court is wrong on the Second Amendment, and I am going to make that case every chance that I get. In Maryland in April, Chelsea Clinton promised that her mom would appoint to the Supreme Court justices who would overturn past decisions that struck down gun-control measures. But the only lawsthat the Supreme Court evaluated were complete gun bans and a law that made it a crime to use a gun.
Washington, D.C., had a complete handgun ban in place until 2008. It was also a felony, punishable by five years in prison, to put a bullet in the chamber of a gun. This amounted to a complete gun ban on using guns for self-defense. The U.S. Supreme Courts ruling in District of Columbia v. Heller struck down that ban.
Clinton told Stephanopoulos her opinion of this ruling: I think that for most of our history, there was a nuanced reading of the Second Amendment until the decision by the late Justice Scalia. She continued, There was no argument until then that localities and states and the federal government had a right, as we do with every amendment, to impose reasonable regulation.
Clinton went on to talk about her push for expanded background checks, an issue that was irrelevant to Scalias decision in Heller. Instead, the question is why was D.C.s local gun ban a reasonable regulation. Why should people be imprisoned for five years for defending their families?
In McDonald v. City of Chicago (2010), Supreme Court Justice Stephen Breyer wrote in his dissent: "I can find nothing in the Second Amendments text, history, or underlying rationale that could warrant characterizing it as fundamental insofar as it seeks to protect the keeping and bearing of arms for private self-defense purposes. Ruth Bader Ginsburg and Sonia Sotomayor signed on to Breyers opinion.
Breyer and Ginsburg were both appointed by President Bill Clinton. Sotomayor was Obamas first nominee to the Supreme Court. Obamas second nominee, Elana Kagan, would clearly have voted the same way had she been on the court at the time of McDonald. Indeed, Kagan served in Bill Clintons administration and helped lead the Presidents gun control initiatives.
The Washington Post dismisses all this talk about the Supreme Court by saying that appointing Justices to the court would not be anything like abolishing an amendment, which no court can do. And it is true that the court cant simply remove the amendment from the Constitution. But the media is appearing to be deliberately obtuse. If the court reverses Heller and McDonald and changes its interpretation of the Second Amendment as Hillary promises, what will really be left of the Second Amendment?
The media might not like to admit it, but The War on Guns is real. If Hillary wins in November, she will appoint Scalias successor and the Supreme Court will overturn the Heller and McDonald decisions. Make no mistake about it, the government will again be able to ban guns. Her claim that she isn't looking to take people's guns away is not consistent with her promise to overturn existing Supreme Court decisions.
John R. Lott, Jr. is a columnist forFoxNews.com. He is an economist and was formerly chief economist at the United States Sentencing Commission. Lott is also a leading expert on guns and op-eds on that issue are done in conjunction with the Crime Prevention Research Center. He is the author of nine books including "More Guns, Less Crime." His latest book is "The War on Guns: Arming Yourself Against Gun Control Lies (August 1, 2016). Follow him on Twitter@johnrlottjr.
Read the original post:
Trump foes miss the mark on Clinton's Second Amendment ...
Posted in Second Amendment
Comments Off on Trump foes miss the mark on Clinton’s Second Amendment …