The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Category Archives: NSA
How the NSAs Firmware Hacking Works and Why Its So Unsettling
Posted: February 22, 2015 at 9:48 pm
One of the most shocking parts of the recently discovered spying network Equation Group is its mysterious module designed to reprogram or reflash a computer hard drives firmware with malicious code. The Kaspersky researchers who uncovered this said its ability to subvert hard drive firmwarethe guts of any computersurpasses anything else they had ever seen.
The hacking tool, believed to be a product of the NSA, is significant because subverting the firmware gives the attackers God-like control of the system in a way that is stealthy and persistent even through software updates. The module, named nls_933w.dll, is the first of its kind found in the wild and is used with both the EquationDrug and GrayFish spy platforms Kaspersky uncovered.
It also has another capability: to create invisible storage space on the hard drive to hide data stolen from the system so the attackers can retrieve it later. This lets spies like the Equation Group bypass disk encryption by secreting documents they want to seize in areas that dont get encrypted.
Kaspersky has so far uncovered 500 victims of the Equation Group, but only five of these had the firmware-flashing module on their systems. The flasher module is likely reserved for significant systems that present special surveillance challenges. Costin Raiu, director of Kasperskys Global Research and Analysis Team, believes these are high-value computers that are not connected to the internet and are protected with disk encryption.
Heres what we know about the firmware-flashing module.
Hard drive disks have a controller, essentially a mini-computer, that includes a memory chip or flash ROM where the firmware code for operating the hard drive resides.
When a machine is infected with EquationDrug or GrayFish, the firmware flasher module gets deposited onto the system and reaches out to a command server to obtain payload code that it then flashes to the firmware, replacing the existing firmware with a malicious one. The researchers uncovered two versions of the flasher module: one that appears to have been compiled in 2010 and is used with EquatinoDrug and one with a 2013 compilation date that is used with GrayFish.
The Trojanized firmware lets attackers stay on the system even through software updates. If a victim, thinking his or her computer is infected, wipes the computers operating system and reinstalls it to eliminate any malicious code, the malicious firmware code remains untouched. It can then reach out to the command server to restore all of the other malicious components that got wiped from the system.
Even if the firmware itself is updated with a new vendor release, the malicious firmware code may still persist because some firmware updates replace only parts of the firmware, meaning the malicious portions may not get overwritten with the update. The only solution for victims is to trash their hard drive and start over with a new one.
The attack works because firmware was never designed with security in mind. Hard disk makers dont cryptographically sign the firmware they install on drives the way software vendors do. Nor do hard drive disk designs have authentication built in to check for signed firmware. This makes it possible for someone to change the firmware. And firmware is the perfect place to conceal malware because antivirus scanners dont examine it. Theres also no easy way for users to read the firmware and manually check if its been altered.
View post:
How the NSAs Firmware Hacking Works and Why Its So Unsettling
Posted in NSA
Comments Off on How the NSAs Firmware Hacking Works and Why Its So Unsettling
Can the Senates new Republicans usher in NSA surveillance reform?
Posted: at 9:48 pm
With the snow-capped Montana mountains behind him, flannel-clad Steve Daines blasted the National Security Agencys sweeping surveillance practices. I stood up to the Washington establishment in support of [a bill] to stop the NSA from collecting the records of innocent Americans, he said. Big government can take away our freedoms.
That was Mr. Daines campaign ad. And the message clearly resonated Daines, a former House representative from Montana, won his election to the Senate.
Security and privacy became hot-button issues in political races across the country after former NSA contractor Edward Snowden disclosed the spy agencys collection of millions of Americans call records. With several national polls showing Americans support curbing the controversial program, many wannabe senators, like Daines, spoke out about the need to protect civil liberties.
Now, 13 new senators are here in Washington and their votes will be crucial in the upcoming debates over surveillance reform.
Congress failed to pass a reform bill last year, despite President Obamas urging and recommendations from government-appointed privacy and civil liberties boards to end the domestic call record bulk collection program. In a Republican-controlled Congress, however, the politics of privacy are even more complex.
After the November elections, incoming Senate Majority Leader Mitch McConnell encouraged his Republican colleagues to oppose advancing the USA Freedom Act because it could hurt the fight against terrorism. With the threat from the Islamic State in the news, the vote to debate the surveillance reform bill fell short by just two votes. This time around, privacy advocates are warily watching the fresh crop of senators all Republican but one.
If they stay consistent with their past pro-privacy positions, they could very well tip the precarious balance in the upper chamber in favor of reform.
Theres a pretty short list of issues where our phones start ringing off the hook here, Daines told Passcode. Guns, he says, is a key one and when you start looking at surveillance and the federal government overreach, our phone really starts ringing.
This year, the pressures on: A key provision of the Patriot Act the NSA says provides the legal authority for the domestic spying program is set to sunset in June.
Its something the Republican Party is going to have to debate, says Mark Jaycox, legislative analyst for the Electronic Frontier Foundation. The question is going to be, can new members convince the leadership that these authorities need to be reformed?
Continue reading here:
Can the Senates new Republicans usher in NSA surveillance reform?
Posted in NSA
Comments Off on Can the Senates new Republicans usher in NSA surveillance reform?
The NSA has hacked your phone: What you need to know, and how to protect yourself
Posted: February 21, 2015 at 9:52 pm
Each passing leak from former National Security Agency (NSA) contractor Edward Snowden seems to paint a darker picture of the state of privacy and data security in the United States, and the world at large. At this point weve heard about mass surveillance of nude Webcam chats, the NSA tapping international leaders phones, mass metadata collection, spies pretending to be Facebookto infect computers, and countless other programs. Now, an even more frightening Snowden leak has appeared on the Intercept.
The NSA and GCHQ have had access to the vast majority of cell phone communications around the world since 2010.
In other words, the NSA and GCHQ have had access to the vast majority of cell phone communications (even encrypted communication) around the world since 2010. Theyve listened to your phone calls; theyve read your texts; and theyve almost certainly monitored the websites youve visited on your mobile devices.
To make matters worse, the same hacked company that makes SIM cards also makes the chips that are embedded into your next-generation credit cards and next-generation passports.
Heres everything you need to know about how these agencies pulled off this massive hack without anyone noticing, who they targeted, and how to protect yourself from surveillance.
Read more:
The NSA has hacked your phone: What you need to know, and how to protect yourself
Posted in NSA
Comments Off on The NSA has hacked your phone: What you need to know, and how to protect yourself
ShmooCon 2015 – NSA USB Playset – Video
Posted: at 6:54 am
ShmooCon 2015 - NSA USB Playset
CyberPunk http://n0where.net.
By: Ra Darth
Excerpt from:
ShmooCon 2015 - NSA USB Playset - Video
Posted in NSA
Comments Off on ShmooCon 2015 – NSA USB Playset – Video
GCHQ Unlawful NSA and The Apostle Paul’s Experience – Video
Posted: at 6:54 am
GCHQ Unlawful NSA and The Apostle Paul #39;s Experience
By: Edifying Others
Original post:
GCHQ Unlawful NSA and The Apostle Paul's Experience - Video
Posted in NSA
Comments Off on GCHQ Unlawful NSA and The Apostle Paul’s Experience – Video
NSA Bulk Data Collection Will Continue Despite Reforms – Video
Posted: at 6:54 am
NSA Bulk Data Collection Will Continue Despite Reforms
U.S. intelligence critics say the reforms for the NSA and other agencies fell short of expectations. Follow Christian Bryant: http://www.twitter.com/bryantcp...
By: Newsy Politics
Originally posted here:
NSA Bulk Data Collection Will Continue Despite Reforms - Video
Posted in NSA
Comments Off on NSA Bulk Data Collection Will Continue Despite Reforms – Video
Google Gagged and Ordered by NSA and FBI to Release Personal Data of Wikileaks Staffers – Video
Posted: at 6:54 am
Google Gagged and Ordered by NSA and FBI to Release Personal Data of Wikileaks Staffers
Michael Ratner says that US government is still pursuing criminal investigations against Wikileaks Editor and staffers, not just because of what they have al...
By: TheRealNews
See the original post:
Google Gagged and Ordered by NSA and FBI to Release Personal Data of Wikileaks Staffers - Video
Posted in NSA
Comments Off on Google Gagged and Ordered by NSA and FBI to Release Personal Data of Wikileaks Staffers – Video
Interview with NSA Whistleblowers on Privacy and Metadata – Video
Posted: at 6:54 am
Interview with NSA Whistleblowers on Privacy and Metadata
On January 22nd, the Ceremony for the Sam Adams Award was held in Berlin. This year #39;s awardee William Binney gave us an interview, as well as the Whistleblow...
By: samuel ezerzer
Continue reading here:
Interview with NSA Whistleblowers on Privacy and Metadata - Video
Posted in NSA
Comments Off on Interview with NSA Whistleblowers on Privacy and Metadata – Video
The NSA may have a backdoor in your computer that you cant get rid of – Video
Posted: at 6:54 am
The NSA may have a backdoor in your computer that you cant get rid of
Russian security software maker Kaspersky Lab announced that a cyber espionage group, perhaps connected to the NSA, has developed a means to hide spying soft...
By: TomoNews US
Read more here:
The NSA may have a backdoor in your computer that you cant get rid of - Video
Posted in NSA
Comments Off on The NSA may have a backdoor in your computer that you cant get rid of – Video
Laura Poitras on being Edward Snowden’s first contact over leaked NSA documents – Video
Posted: at 6:54 am
Laura Poitras on being Edward Snowden #39;s first contact over leaked NSA documents
Oscar-nominated filmmaker Laura Poitras talks about what it was like to be Edward Snowden #39;s first contact over leaked NSA documents. Subscribe to The National to watch more videos here:...
By: The National
Visit link:
Laura Poitras on being Edward Snowden's first contact over leaked NSA documents - Video
Posted in NSA
Comments Off on Laura Poitras on being Edward Snowden’s first contact over leaked NSA documents – Video