The Prometheus League
Breaking News and Updates
- Abolition Of Work
- Ai
- Alt-right
- Alternative Medicine
- Antifa
- Artificial General Intelligence
- Artificial Intelligence
- Artificial Super Intelligence
- Ascension
- Astronomy
- Atheism
- Atheist
- Atlas Shrugged
- Automation
- Ayn Rand
- Bahamas
- Bankruptcy
- Basic Income Guarantee
- Big Tech
- Bitcoin
- Black Lives Matter
- Blackjack
- Boca Chica Texas
- Brexit
- Caribbean
- Casino
- Casino Affiliate
- Cbd Oil
- Censorship
- Cf
- Chess Engines
- Childfree
- Cloning
- Cloud Computing
- Conscious Evolution
- Corona Virus
- Cosmic Heaven
- Covid-19
- Cryonics
- Cryptocurrency
- Cyberpunk
- Darwinism
- Democrat
- Designer Babies
- DNA
- Donald Trump
- Eczema
- Elon Musk
- Entheogens
- Ethical Egoism
- Eugenic Concepts
- Eugenics
- Euthanasia
- Evolution
- Extropian
- Extropianism
- Extropy
- Fake News
- Federalism
- Federalist
- Fifth Amendment
- Fifth Amendment
- Financial Independence
- First Amendment
- Fiscal Freedom
- Food Supplements
- Fourth Amendment
- Fourth Amendment
- Free Speech
- Freedom
- Freedom of Speech
- Futurism
- Futurist
- Gambling
- Gene Medicine
- Genetic Engineering
- Genome
- Germ Warfare
- Golden Rule
- Government Oppression
- Hedonism
- High Seas
- History
- Hubble Telescope
- Human Genetic Engineering
- Human Genetics
- Human Immortality
- Human Longevity
- Illuminati
- Immortality
- Immortality Medicine
- Intentional Communities
- Jacinda Ardern
- Jitsi
- Jordan Peterson
- Las Vegas
- Liberal
- Libertarian
- Libertarianism
- Liberty
- Life Extension
- Macau
- Marie Byrd Land
- Mars
- Mars Colonization
- Mars Colony
- Memetics
- Micronations
- Mind Uploading
- Minerva Reefs
- Modern Satanism
- Moon Colonization
- Nanotech
- National Vanguard
- NATO
- Neo-eugenics
- Neurohacking
- Neurotechnology
- New Utopia
- New Zealand
- Nihilism
- Nootropics
- NSA
- Oceania
- Offshore
- Olympics
- Online Casino
- Online Gambling
- Pantheism
- Personal Empowerment
- Poker
- Political Correctness
- Politically Incorrect
- Polygamy
- Populism
- Post Human
- Post Humanism
- Posthuman
- Posthumanism
- Private Islands
- Progress
- Proud Boys
- Psoriasis
- Psychedelics
- Putin
- Quantum Computing
- Quantum Physics
- Rationalism
- Republican
- Resource Based Economy
- Robotics
- Rockall
- Ron Paul
- Roulette
- Russia
- Sealand
- Seasteading
- Second Amendment
- Second Amendment
- Seychelles
- Singularitarianism
- Singularity
- Socio-economic Collapse
- Space Exploration
- Space Station
- Space Travel
- Spacex
- Sports Betting
- Sportsbook
- Superintelligence
- Survivalism
- Talmud
- Technology
- Teilhard De Charden
- Terraforming Mars
- The Singularity
- Tms
- Tor Browser
- Trance
- Transhuman
- Transhuman News
- Transhumanism
- Transhumanist
- Transtopian
- Transtopianism
- Ukraine
- Uncategorized
- Vaping
- Victimless Crimes
- Virtual Reality
- Wage Slavery
- War On Drugs
- Waveland
- Ww3
- Yahoo
- Zeitgeist Movement
-
Prometheism
-
Forbidden Fruit
-
The Evolutionary Perspective
Category Archives: NSA
NSA brags about turning the tables on cyberwarfare hackers
Posted: January 17, 2015 at 8:49 pm
How confident is the National Security Agency about its ability to wage cyberwarfare? Enough so that it's bragging about it. A new round of Edward Snowden leaks published by Der Spiegel reveal that the institution has not only been gearing up for a future of digital battles (it asked for $1 billion to improve its cyberattacks back in 2013), but boasts about what it can already do. For example, it touts that it can "drink your milkshake" (There Will Be Blood style) if you dare attack American government computers. When China hacked the Department of Defense in 2009, the NSA not only pinpointed the source of attack, but broke into China's intelligence network and monitored the country's spying efforts. This "fourth party collection," as the NSA calls it, lets the agency find out what's happening without doing all the hard work.
The NSA also makes it a point to use the tools and methods of their attackers against them, and to develop its own attacks against critical systems (like energy grids) in case they're needed. Its agents all that worried about getting caught, either. They regularly cover their tracks, such as by placing data on the servers of "scapegoat" targets to throw people off the scent.
It's not surprising that the NSA would turn the tables on its foes. However, it's willing to use "fourth party" techniques on any country that isn't part of the Five Eyes Alliance (Australia, Canada, New Zealand, the UK and the US), including its allies. And there's a concern that the US is shifting too much of its attention toward offensive capabilities, rather than focusing on defense -- it's hard to claim the moral high ground in cyberwarfare when you're willing and able to inflict serious damage.
View original post here:
NSA brags about turning the tables on cyberwarfare hackers
Posted in NSA
Comments Off on NSA brags about turning the tables on cyberwarfare hackers
CloneKoopaTroopas.nsa – Video
Posted: January 16, 2015 at 4:49 pm
CloneKoopaTroopas.nsa
WARNING! If you experience epileptic seizures from flashing colours do not watch the video. Also, make sure that your headphones are unpluged and switch to your speakers. Or else... Spooky...
By: Joshua Benson
Visit link:
CloneKoopaTroopas.nsa - Video
Posted in NSA
Comments Off on CloneKoopaTroopas.nsa – Video
[Almased] Tag 13 – Der neue Perso NSA CIA BND FBI – Video
Posted: at 4:49 pm
[Almased] Tag 13 - Der neue Perso NSA CIA BND FBI
Hallo Liebe Leute. Danke das ihr das Video angeschaut habt und hoffe es hat euch gefallen wenn ja dann hinterlast mir doch mal einen Daumen oder ein Kommentar. Schaut euch auch meine...
By: Michael Almased
See more here:
[Almased] Tag 13 - Der neue Perso NSA CIA BND FBI - Video
Posted in NSA
Comments Off on [Almased] Tag 13 – Der neue Perso NSA CIA BND FBI – Video
NSA : Orange Valley Meeting (4/5) – Video
Posted: at 4:49 pm
NSA : Orange Valley Meeting (4/5)
National Solidarity Assembly : Nirvan Maharaj : Orange Valley Meeting at the Orange Valley Community Centre . . . : 12th January 2015 : Part 3 of 5.
By: National Solidarity Assembly
Read more from the original source:
NSA : Orange Valley Meeting (4/5) - Video
Posted in NSA
Comments Off on NSA : Orange Valley Meeting (4/5) – Video
Edward Snowden; Edward Snowden what to do with remaining NSA secrets – Video
Posted: at 4:49 pm
Edward Snowden; Edward Snowden what to do with remaining NSA secrets
Edward Snowden Whistle blower or Patriot : What to do with the remaining NSA secrets. As Edward Snowden ponders on how to unload the remaining Government secrets he has. The value maybe ...
By: BSTV - News Brief
Continue reading here:
Edward Snowden; Edward Snowden what to do with remaining NSA secrets - Video
Posted in NSA
Comments Off on Edward Snowden; Edward Snowden what to do with remaining NSA secrets – Video
NSA PUA Statements 15.01.2015 (1) – Video
Posted: at 4:49 pm
NSA PUA Statements 15.01.2015 (1)
Martina Renner, Linke Konstantin von Notz, B90/Grne (ab 5m30s)
By: Daniel Lcking
Posted in NSA
Comments Off on NSA PUA Statements 15.01.2015 (1) – Video
John Boehner: NSA program helped foil U.S. terror plot – Video
Posted: at 4:49 pm
John Boehner: NSA program helped foil U.S. terror plot
House Speaker John Boehner reveals that the NSA surveillance program FISA helped stop an Ohio man #39;s terror plot against the U.S. Capitol.
By: CNN
Read this article:
John Boehner: NSA program helped foil U.S. terror plot - Video
Posted in NSA
Comments Off on John Boehner: NSA program helped foil U.S. terror plot – Video
NSA PUA Statements 15.01.2015 (3) – Video
Posted: at 4:49 pm
NSA PUA Statements 15.01.2015 (3)
Nina Warken, CDU.
By: Daniel Lcking
More here:
NSA PUA Statements 15.01.2015 (3) - Video
Posted in NSA
Comments Off on NSA PUA Statements 15.01.2015 (3) – Video
Science panel: No alternative to NSA bulk data collection
Posted: at 4:49 pm
Originally published January 15, 2015 at 9:40 AM | Page modified January 15, 2015 at 12:26 PM
A committee of scientific experts has concluded that there is no viable technological alternative to bulk collection of data by the National Security Agency that allows analysts access to communications whose significance only becomes clear years later.
An 85-page report by the National Research Council, commissioned last year in the wake of surveillance revelations by former NSA contractor Edward Snowden, did not take a position on the merits of bulk collection of telephone or other records. But asked to look for effective software alternatives to bulk collection, it concluded there weren't any, in cases when, for example, the NSA wants to examine the past communications of new terror suspects.
"Restricting bulk collection will make intelligence less effective, and technology cannot do anything about this," the report says. 'Whether the gain in privacy is worth the loss is a policy question that the committee does not address."
If a particular set of communications becomes significant, the report says, "because of new circumstances such as identifying a new target, a non-nuclear nation that is now pursuing the development of nuclear weapons, an individual that is found to be a terrorist, or new intelligence-gathering priorities_historical events and the data they provide will be available for analysis only if they were previously collected."
The report does suggest ways to mitigate the privacy impact of bulk collection by restricting use of the data, something NSA says it does.
"Although no software can fully replace bulk with targeted information collection, software can be developed to more effectively target collection and to control the usage of collected data," the report says.
It recommends the use of automatic controls on bulk data, with audits that can be publicly shared.
The study was conducted by a committee of the National Academies, which advises the government on scientific matters. The committee was chaired by Robert Sproull, a former Oracle executive and computer scientist now at the University of Massachussetts.
The committee included a variety of experts, including Michael Leiter, former director of the National Counter Terrorism Center.
More:
Science panel: No alternative to NSA bulk data collection
Posted in NSA
Comments Off on Science panel: No alternative to NSA bulk data collection
Wikileaks 2012, NSA 2013, NTIA Mishaps & Global Cyber Crime 2014: U.S. Exceptionalism over IG 2015?
Posted: at 4:49 pm
The internet has become almost part of our daily involvement and reality is that it affects every facet of our modern lives. We are increasingly becoming dependent on the Internet, for which reason its availability, functionality, safety, stability and security are now of great and continuing concern to all of us and most importantly to US Congress, who so far has maintained stewardship over these key functions.
As the internet gets new updates, services apps and new technologies, so is the increased threats to the very resource we would like to use and trust. Several issues have become evident and have hit the headlines and drawn us to concerns we must boldly address. In my previous article, "From Wikileaks of 2012 to Snowden's NSA Leaks of 2013: Implications for Global Internet Governance, I covered the trending issue that came to the fore, that whilst Wiki leaks was about US diplomatic cables, the Edward Snowden disclosure of classified NSA information to private media organizations such as the UK Guardian newspaper has had graver implications for global Internet privacy. The NSA leak presented the United States of America as a country that practically spies on everybody in a most indiscriminate manner, including its own allies.
In an interview with CIO East Africa, I gave the African continent's perspective as to why the "The AUCC debate on Cyber Security needs to involve all stakeholders" concerning the NSA issue and that "African governments are still a long way in accepting such technologies as open data African governments can prepare proper legislations and strategize on how to handle private data in a manner that is not intrusive to rights of its citizens. The backlash of the NSA revelations wouldn't be a good experience for any government". Therefore "this emphasizes that internet governance should be a matter that is handled by many stakeholders to avoid giving the governments a monopoly of leadership in policy development"
From a private sector perspective , I wrote a piece on the reality of Emerging Cyber-Security Threats and Implications for the Private Sector, including a case for New gTLDs & Security where I highlighted that "cyber-warfare will be conducted against computers and network resources owned and operated by the private sector who own the utilities, financial corporations, and a lot of intellectual property." As such "The cost of Internet Security protection is bound to sky-rocket in the coming years." As "Private sector organizations that have their information resources compromised as a result of cyber-security attacks will not only suffer huge financial losses, and loss of business good-will, but their stock value could be affected and plummet and suffer degradation of overall market value. Investors stand the risk of losing their money invested in such companies." A case and point that soon exasperated was when Target, a US National Retailer was attacked by hackers who gained access to as many as 40 million credit and debit cards used by customers of Target during the height of the holiday shopping season.
Only at the end of 2014, did we come across deafening noise on the famous Sony Pictures Entertainment cyber hack, as it also took interest of the US political scene. Here there was a release of confidential data belonging to Sony Pictures Entertainment, the hackers who also called themselves the "Guardians of Peace" or "GOP" demanded the cancellation of the planned release of the film "The Interview", a comedy about a plot to assassinate North Korean leader Kim Jong-un. The US leadership saw it as un-American to recoil to such threat and also an attack on free speech.
As a result of such global cyber crime matters, President Obama Obama signed an order to protect consumers from identity theft by strengthening security features in credit cards and the terminals that process them and also plans to announce legislation that would shield companies from lawsuits for sharing computer threat data with the government in an effort to prevent cyberattacks.
Most recently ICANN the internet gatekeeper announced that it was "investigating a recent intrusion into our systems. We believe a "spear phishing" attack was initiated in late November 2014. It involved email messages that were crafted to appear to come from our own domain being sent to members of our staff. The attack resulted in the compromise of the email credentials of several ICANN staff members". Whilst, this goes to show that no one is safe from these targeted attacks. ICANN's mission is tied to being the gatekeeper over the availability, functionality, safety, stability and security of the global internet, which directly impact Cyber Security. ICANN itself is embroiled in a bid to sever its ties with the US government; therefore, aside from the mainstream accountability concerns, governance of the cyber security has and will form a major part of discussions on designing a new model to oversight ICANN. From the statements and activities, the US congress is not keen to let this separation happen soon, with the budgetary interventions, the IANA transition may just be but a dream.
From an individual perspective, a recent case was reported by Addis Fortune Newspaper where "The Court passed a guilty verdict against Yonas, a member of the Ethiopian diaspora from Germany, and sentenced him to two years in prison (although reversal was made afterwards by a higher court to a 6 months only imprisonment by suspension, based on lack of reasonable prove on aggravating circumstances to delete data from the computer of the victim) and a 5,000-Br fine for the cyber crime he was said to have committed against his business partner lady Akiko Seyoum". This is among the rare cases of prosecution for cyber crime, and a signal that Africa is becoming aware of the need to mitigate the increase of cyber crime and money laundering schemes.
In conclusion, the need to protect the global internet from such implications above as to its availability, functionality, safety, stability and security and using it also as a diplomacy tool to ensure the same, would definitely give a justification by a wide margin to the US status quo over the internet. Whilst, the US would not allow itself to be liable as exemplified during the global financial crisis of 2009 and the 1930, for blowing out its house of cards over its American Exceptionalism, a concept that has its roots from the principle of a country organized around an ideology that includes a set of dogmas about the nature of a good society, especially the one that tied it to a future mission of bringing liberty and democracy to the world.
Therefore, expect nothing less but 2015 to be a year of American Excepionalism over Internet Governance!
Read the original here:
Wikileaks 2012, NSA 2013, NTIA Mishaps & Global Cyber Crime 2014: U.S. Exceptionalism over IG 2015?
Posted in NSA
Comments Off on Wikileaks 2012, NSA 2013, NTIA Mishaps & Global Cyber Crime 2014: U.S. Exceptionalism over IG 2015?