The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Category Archives: NSA
Upper Echelon Of NSA All Traitors – Video
Posted: March 21, 2015 at 9:53 pm
Upper Echelon Of NSA All Traitors
Alex Jones talks with NSA Whistleblower William Binney about why he went public and where the orders came from.
By: TheAlexJonesChannel
Read more here:
Upper Echelon Of NSA All Traitors - Video
Posted in NSA
Comments Off on Upper Echelon Of NSA All Traitors – Video
NSA Whistleblower Reveals U.S. Slide into Totalitarianism – Video
Posted: at 9:53 pm
NSA Whistleblower Reveals U.S. Slide into Totalitarianism
Alex Jones talks with NSA Whistleblower William Binney about his experiences and what he thinks needs to be done to fix the country. http://www.infowars.com/turkish-diplomat-says-western-intelligen...
By: THElNFOWARRlOR
Read the original:
NSA Whistleblower Reveals U.S. Slide into Totalitarianism - Video
Posted in NSA
Comments Off on NSA Whistleblower Reveals U.S. Slide into Totalitarianism – Video
The NSA's plan: improve cybersecurity by hacking everyone else
Posted: at 9:53 pm
The NSA wants more powers to hack whomever it wants. Photograph: Dado Ruvic/REUTERS
The National Security Agency want to be able to hack more people, vacuum up even more of your internet records and have the keys to tech companies encryption and, after 18 months of embarrassing inaction from Congress on surveillance reform, the NSA is now lobbying it for more powers, not less.
NSA director Mike Rogers testified in front of a Senate committee this week, lamenting that the poor ol NSA just doesnt have the cyber-offensive capabilities (read: the ability to hack people) it needs to adequately defend the US. How cyber-attacking countries will help cyber-defense is anybodys guess, but the idea that the NSA is somehow hamstrung is absurd.
The NSA runs sophisticated hacking operations all over the world. A Washington Post report showed that the NSA carried out 231 offensive operations in 2011 - and that number has surely grown since then. That report also revealed that the NSA runs a $652m project that has infected tens of thousands of computers with malware.
And that was four years ago - its likely increased significantly. A leaked presidential directive issued in 2012 called for an expanded list of hacking targets all over the world. The NSA spends ten of millions of dollars per year to procure software vulnerabilities from private malware vendors ie, holes in software that will make their hacking much easier. The NSA has even created a system, according to Edward Snowden, that can automatically hack computers overseas that attempt to hack systems in the US.
Moving further in this direction, Rogers has also called for another new law that would force tech companies to install backdoors into all their encryption.The move has provoked condemnation and scorn from the entire security community - including a very public upbraiding by Yahoos top security executive - as it would be a disaster for the very cybersecurity that the director says is a top priority.
And then there is the Cybersecurity Information Sharing Act (Cisa) the downright awful cybersecurity bill passed by the Senate Intelligence Committee last week in complete secrecy that is little more than an excuse to conduct more surveillance.The bill will do little to stop cyberattacks, but it will do a lot to give the NSA even more power to collect Americans communications from tech companies without any legal process whatsoever. The bills text was finally released a couple days ago, and, as EFF points out, tucked in the bill were the powers to do the exact type of offensive attacks for which Rogers is pining.
While the NSA tries to throw every conceivable expansion of power against the wall hoping that something sticks, the clock continues to tick on Section 215 of the Patriot Act the law which the spy agency secretly used to collect every Americans phone records. Congress has to re-authorize by vote in June or it will expire, and as Steve Vladick wrote on Just Security this week, there seems to be no high-level negotiations going on between the administration and Congress over reforms to the NSA in the lead-up to the deadline. Perhaps, as usual, the NSA now thinks it can emerge from yet another controversy over its extraordinary powers and still end up receiving more?
The rest is here:
The NSA's plan: improve cybersecurity by hacking everyone else
Posted in NSA
Comments Off on The NSA's plan: improve cybersecurity by hacking everyone else
Hacking BIOS Chips Isnt Just the NSAs Domain Anymore
Posted: at 9:53 pm
The ability to hack the BIOS chip at the heart of every computer is no longer reserved for the NSA and other three-letter agencies. Millions of machines contain basic BIOS vulnerabilities that letanyone with moderately sophisticated hacking skills compromise and control a system surreptitiously, according to two researchers.
The revelation comes two years after a catalogue of NSA spy tools leaked to journalists in Germany surprised everyone with its talk about the NSAs efforts to infect BIOS firmware with malicious implants.
The BIOS boots a computer and helps load the operating system. By infecting this core software, which operates below antivirus and other security products and therefore is not usually scanned by them, spies can plant malware that remains live and undetected even if the computers operating system were wiped and re-installed.
BIOS-hacking until now has been largely the domain of advanced hackers like those of the NSA. But researchers Xeno Kovah and Corey Kallenberg presented a proof-of-concept attack today at the CanSecWest conference in Vancouver, showing how they could remotely infect the BIOS of multiple systems using a host of new vulnerabilities that took them just hours to uncover. They also found a way to gain high-level system privileges for their BIOS malware to undermine the security of specializedoperating systems like Tailsused by journalists and activists for stealth communications and handling sensitive data.
Although most BIOS have protections to prevent unauthorized modifications, the researchers were able to bypass these to reflash the BIOS and implant their malicious code.
Kovah and Kallenberg recently left MITRE, a government contractor that conducts research for the Defense Department and other federal agencies, to launch LegbaCore, a firmware security consultancy. They note that the recent discovery of a firmware-hacking toolby Kaspersky Lab researchers makes it clear that firmware hacking like their BIOS demo is something the security community should be focusing on.
Because many BIOS share some of the same code, they were able to uncover vulnerabilities in 80 percent of the PCs they examined, including ones from Dell, Lenovo and HP. The vulnerabilities, which theyre calling incursion vulnerabilities, were so easy to find that they wrote a script to automate the process and eventuallystopped counting the vulns it uncovered because there were too many.
Theres one type of vulnerability, which theres literally dozens of instances of it in every given BIOS, says Kovah. They disclosed the vulnerabilities to the vendors and patches are in the works but have not yet been released. Kovah says, however, that even when vendors have produced BIOS patches in the past, few peoplehave applied them.
Because people havent been patching their BIOSes, all of the vulnerabilities that have been disclosed over the last couple of years are all open and available to an attacker, he notes. We spent the last couple of years at MITRE running around to companies trying to get them to do patches. They think BIOS is out of sight out of mind [because] they dont hear a lot about it being attacked in the wild.
An attacker could compromise the BIOS in two waysthrough remote exploitation by delivering the attack code via a phishing email or some other method, or through physical interdiction of a system. In that case, the researchers found that if they had physical access to a system they could infect the BIOS on some machines in just two minutes. This highlights just how quickly and easy it would be, for example, for a government agent or law enforcement officer with a moments access to a system to compromise it.
View post:
Hacking BIOS Chips Isnt Just the NSAs Domain Anymore
Posted in NSA
Comments Off on Hacking BIOS Chips Isnt Just the NSAs Domain Anymore
Tvice NSA Live Live @ LNDJ 10th March 7 15 – Video
Posted: March 20, 2015 at 3:52 pm
Tvice NSA Live Live @ LNDJ 10th March 7 15
By: Wilfrid Konpaevents
Read more here:
Tvice NSA Live Live @ LNDJ 10th March 7 15 - Video
Posted in NSA
Comments Off on Tvice NSA Live Live @ LNDJ 10th March 7 15 – Video
NSA: Why Should I Homeschool? – Video
Posted: at 3:52 pm
NSA: Why Should I Homeschool?
NSA: Special Report: 002 ... Infographic Study: A free supplementary session for Adult Language Students at Native Speakers Academy. More information on the topic: http://www.thechildwhisperer.com...
By: Native Speakers Academy - Official Page
Read more:
NSA: Why Should I Homeschool? - Video
Posted in NSA
Comments Off on NSA: Why Should I Homeschool? – Video
NSA Spying San Andreas Quake and CERN – Video
Posted: at 3:52 pm
NSA Spying San Andreas Quake and CERN
Jonathan Stickland files bill to cut off utilities to NSA facilities in Texas - See more at: http://jonathanstickland.com/2015/03/14/jonathan-stickland-files-bill-to-cut-off-utilities-to-nsa-facili...
By: Henning Kemner
Here is the original post:
NSA Spying San Andreas Quake and CERN - Video
Posted in NSA
Comments Off on NSA Spying San Andreas Quake and CERN – Video
[My Talking Angela]NSA CHALLENGE NON-STOP ACTION (ANGELA STYLE) – Video
Posted: at 3:52 pm
[My Talking Angela]NSA CHALLENGE NON-STOP ACTION (ANGELA STYLE)
Check out this video I made with My Talking Angela. Get the app: http://o7n.co/MyAngela.
By: Ny #39;kita Taylor
See the original post:
[My Talking Angela]NSA CHALLENGE NON-STOP ACTION (ANGELA STYLE) - Video
Posted in NSA
Comments Off on [My Talking Angela]NSA CHALLENGE NON-STOP ACTION (ANGELA STYLE) – Video
Eagle Eye(NSA Watching You) – Video
Posted: at 3:52 pm
Eagle Eye(NSA Watching You)
Executive Producer Steven Spielberg delivers the ultimate race-against-time thriller that will keep you on the edge of your seat! Shia LaBeouf (Transformers) and Michelle Monaghan (Mission:...
By: Kornbred Purpdrip
See the article here:
Eagle Eye(NSA Watching You) - Video
Posted in NSA
Comments Off on Eagle Eye(NSA Watching You) – Video
The Heat looks at the NSA and if it’s violating human rights – Video
Posted: at 3:52 pm
The Heat looks at the NSA and if it #39;s violating human rights
Critics have lambasted the NSA ever since 2013, when documents leaked by former NSA contractor Edward Snowden revealed the extent of the agency #39;s digital spying reach. A lawsuit has been ...
By: CCTV America
Go here to see the original:
The Heat looks at the NSA and if it's violating human rights - Video
Posted in NSA
Comments Off on The Heat looks at the NSA and if it’s violating human rights – Video