Archive for June, 2017

Constitution and Fourth Amendment – Gettysburg Times

The Fourth Amendment states, "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." Pretty straightforward, right? It was, until something labeled the "Foreign Intelligence Surveillance Act" (FISA). Today, every electronic communication of every kind -- e-mail, telephone conversation, radio or TV communication, in any medium -- is routinely overheard, recorded, stored and available for use against any American citizen by the FBI, the CIA, the NSA, the IRS, the Social Security Administration and every information and intelligence gathering agency government-wide. Your cell phone isn't just a telephone any more: it's a GPS for government trackers; it stores your phone records and conversations; and the "your" telephone company routinely provides that Government whatever it asks about what we say, to whom, and when. So do our computers. The result? There is no longer any reasonable expectation of privacy, anywhere, anytime, for anyone.

One might ask, "How did this come to be?" In 1978, under President Jimmy Carter, Congress enacted something called the "Foreign Intelligence Surveillance Act" (FISA), whose nominal purpose was to enable the federal government to eavesdrop, wiretap, or otherwise capture the contents of communications and/or conversations involving people from other nations around the world whom our government believed might be plotting or conspiring to do America harm. Of course, some of those nefarious plotters might also be doing so in conjunction with Americans; therefore, it was necessary to "listen in" on everyone, lest our defenders in the intelligence community not be able to detect all they could. Which in turn meant that a mechanism needed to exist to honor the 4th Amendment - if only in form. Thus came about what is now known as the "FISA Court," whose two-fold purpose was to approve the "listening" while maintaining a cover for violating the 4th Amendment, and appearing to provide protection for American citizens against the very Government behavior things that Court was approving. (No, it doesn't make sense, but it's the way it is.) All this, of course, was long before cell phones, personal computers, laptops and even the internet.

Human nature being what it is, whatever Big Government can get away with, small government will follow. So now we have all kinds of electronic surveillance, 24/7, on everyone throughout the land, from the White House all the way to City Hall. For those readers familiar with George Orwell, "1984" is alive and well; and, yes, Big Brother is watching. And listening. And recording. And waiting -- to use whatever he has against anyone. It's no longer science-fiction; it's fact - and describes that part of the Intelligence community that has come to be labeled the "Deep State."

Again, human nature being what it is, and humans being the inherently curious political animals that we are, some in the intelligence community have turned their authorizations from guarding against our external threats, to attacking and destroying those they perceive as partisan political enemies - further violating the 4th Amendment, both in spirit and in fact.

All of this is not only in direct violation of the 4th Amendment, it's totally destructive to a free and open, self-governing society, i.e., our founding principles. If the Founders and Framers didn't want the Crown spying on us, why do we allow our government - at every level - to? For better security? Ben Franklin said it well: "Those who trade freedom for security deserve neither."

What can We, the People, do to turn this around? Obviously, trusting the Government to correct itself makes no sense at all - governments, by their very nature, acquire power; they neither share nor yield. But, we still have in place a (somewhat) representative governmental structure; why not make it truly representative? Yes, it means paying closer attention to what that government is actually doing. And it means paying even closer attention to how what it does affects us, both currently and down the road. And it means paying even more attention to knowing whether what those who claim to want to represent us will actually do that, or fall into more of the internecine partisanship that wins political victories but destroys the fabric of our Republic. It means, as Plato warned 2,500 years ago, that We, the People, must get involved and participate in this self-governance project; otherwise we'll simply continue transitioning to its opposite, i.e., tyranny. And we see tyranny blossoming everywhere, from schools to governments and everywhere in between, largely because We, the People, have assumed the best - and enabled the worst.

Remember, the Constitution neither guarantees nor enforces our rights and protections; it simply affirms them, and functions as a mechanism for us to exercise and protect them ourselves. Government, by its very nature, neither shares nor yields power; it takes it. That's why Thomas Jefferson's "In questions of power then, let no more be heard of confidence in man but bind him down from mischief by the chains of the Constitution," is so important. Bud Nason lives in Littlestown, is a Conservative Thinker and an Adams County Voter. E-mail him at budnason@aol.com.

The rest is here:
Constitution and Fourth Amendment - Gettysburg Times

Rare XP Patches Fix Three Remaining Leaked NSA Exploits – Threatpost

The unusual decision Microsoft made to release patches on Tuesday for unsupported versions of Windows was prompted by three NSA exploits that remained unaddressed from Aprils ShadowBrokers leak.

The worst of the bunch, an attack called ExplodingCan (CVE-2017-7269), targets older versions of Microsofts Internet Information Services (IIS) webserver, version 6.0 in particular, and enables an attacker to gain remote code execution on a Windows 2003 server.

All three attacks allow an adversary to gain remote code execution; one is EsteemAudit, a vulnerability in the Windows Remote Desktop Protocol (RDP) (CVE-2017-0176), while the other is EnglishmanDentist (CVE-2017-8487), a bug in OLE (Object Linking and Embedding). Microsoft said the patches are available for manual download.

ExplodingCan merits a closer look because of the wide deployment of IIS 6.0.

Generally, when you put a Windows machine on the internet, its going to be a server and its going to run a webserver, so there are production machines on the internet running IIS 6.0 right now, said Sean Dillon, senior analyst at RiskSense and one of the first to analyze the NSAs EternalBlue exploit that spread WannaCry ransomware on May 12.

Its probably already been exploited for months now, Dillon said. At least now theres a fix thats publicly available.

Microsoft released a hefty load of patches for supported products and services on Tuesday as part of its normal Patch Tuesday update cycle. Normally, patches for unsupported versions of Windows are available only for Microsoft customers on an expensive extended support contract. The companys decision to make all of those fixes public on Tuesday, it said, was prompted by an elevated risk for destructive cyber attacks.

Due to the elevated risk for destructive cyber attacks at this time, we made the decision to take this action because applying these updates provides further protection against potential attacks with characteristics similar to WannaCrypt, said Adrienne Hall, general manager of Microsofts Cyber Defense Operations Center.

In reviewing the updates for this month, some vulnerabilities were identified that pose elevated risk of cyber attacks by government organizations, sometimes referred to as nation-state actors or other copycat organizations, Hall said. To address this risk, today we are providing additional security updates along with our regular Update Tuesday service. These security updates are being made available toallcustomers, including those using older versions of Windows.

The ShadowBrokers leak in April unleashed a number of powerful Windows attacks into the public, allegedly belonging to the Equation Group, which is widely believed to the U.S. National Security Agency. Criminals and other nation states have already been leveraging the attacks to spread not only WannaCry ransomware, but also crytpocurrency mining utilities and other types of malware.

Microsoft said customers should not expect this type of patch release for unsupported products to become the norm. Some experts have been critical of Microsot, which also made a similar update available for unsupported products hours after the WannaCry outbreak.

I wish MS would stop releasing patches for xp/2003 it really harms efforts to get rid of legacy in the corporates

Quentyn Taylor (@quentynblog) June 13, 2017

Oh no. Take Windows XP off life support. Though it cannot die with dignity, it must be allowed to die. It will be messy. But this is cruel. https://t.co/euZVdTLC0z

Katie Moussouris (@k8em0) June 13, 2017

It was the right move by Microsoft, Dillon said. We saw the damage it can cause with WannaCry. Some of the most-used infrastructure, like SCADA systems, still run on XP whether theyre getting patches or not. When you have critical things [running on XP], its a good thing they released, but it should only be looked at as a temporary solution and people should look to upgrade off of legacy versions.

Some third-party services such as 0patch have provided micro-patches for some of these vulnerabilities on legacy versions, even before the ShadowBrokers leak, Dillon said. Hopefully people who are running legacy systems have looked into other means of patching beside official fixes, he said. Although, this is great that theres an official fix.

The remaining two vulnerabilities are a lesser severity but should be patched nonetheless on legacy systems.

EsteemAudit affects RDP, but only on XP and did not require a patch for modern versions of Windows. According to Microsoft, the vulnerability exists if the RDP server has smart card authentication enabled.

EnglishmanDentist, meanwhile, is triggered because Windows OLE fails to properly validate user input, Microsoft said.

Theres a whole wide assortment of exploits that were leaked, and weve only seen a few of them actively used at a mass scale. This is just plugging a hole before it becomes a bigger problem, Dillon said.

See the original post here:
Rare XP Patches Fix Three Remaining Leaked NSA Exploits - Threatpost

Tew: NSA site troubling for personal freedom – Daily Herald

Fridays, when driving home from the airport, I sometimes drive by the seven NSA concrete fortress abominations in Draper, Utah.

Are the employees inside utilizing supercomputers to vacuum up billions of e-mails, social media posts and phone calls from American heroes or deplorable violators of our rights? Without oaths and warrants based on probable cause that a crime has been committed to justify their vacuuming of our private information dont they continuously and daily violate the 4th Amendment prohibitions against such a vast collection of private data from Americans?

Are we all comfortable with their vast fishing expedition seeking information that could be used against any one of us by a federal government that has long ago escaped its Constitutional cage?

The collected data, stored in the 702 database (Section 702, 2008 Amendment Act of the 1978 Foreign Intelligence Surveillance Act) awaits the mining and use of bureaucrats who make up their own rules, doesnt it?

Your political observations, financial information, or complaints about politicians made in your e-mail, phone call, or on social media are there awaiting some future use you cant predict arent they?

Bliss W. Tew, Orem

Read the original post:
Tew: NSA site troubling for personal freedom - Daily Herald

New Bills Modify Stand Your Ground Law – My Panhandle

BAY COUNTY, Fla. - On June 9th, Governor Scott signed sixteen bills in to law. Two of the bills modify the "Stand your Ground" law.

The Self-Defense Immunity bill doesn't change the concept of stand your ground, but what it does is affect the procedure for how it's presented and defended. The phrase "clear and convincing" in the bill is a higher standard of proof but not the same level of proof that prosecutors must clear at trial. The procedure will make it much easier for the defense because they don't have to present as much evidence, whereas the prosecution has a higher burden initially.

"As a prosecutor, what it means is the things that we've been taking to trial...will not get to trial. You know, if we go the way it's going now, with "clear and convincing", a judge could very well say you know I've heard a lot of stuff but I'm not clearly convinced about anything. So therefore the immunity attaches at which point we'd have to take an appeal" said State Attorney, Glenn Hess.

The bills go into effect on July 1st.

The rest is here:
New Bills Modify Stand Your Ground Law - My Panhandle

Fox guest says gay people at Pulse vigil "probably don’t know what the Second Amendment is" – Media Matters for America


Media Matters for America
Fox guest says gay people at Pulse vigil "probably don't know what the Second Amendment is"
Media Matters for America
TUCKER CARLSON (HOST): Well, yesterday was the one year anniversary of the Pulse nightclub massacre, in which Islamic radical Omar Mateen murdered 49 people at a gay nightclub in Orlando, Florida. To commerate the shoot a vigil was held in New ...

Originally posted here:
Fox guest says gay people at Pulse vigil "probably don't know what the Second Amendment is" - Media Matters for America