If the rocket Elon Musk’s SpaceX expects to launch next week looks familiar, that’s because it is.
The Falcon 9 rocket slated to take off from Kennedy Space Center in Cape Canaveral, Florida, has flown before, marking the first time Space Exploration Technologies Corp. will refly one of the 14-story-tall boosters it recovered from past missions. The reused rocket will ferry a communications satellite into orbit for Luxembourg-based SES SA, SpaceX’s first commercial customer, and signals a leap forward in Musk’s 15-year-quest to drive down launch costs and eventually create a human colony on Mars.
“This is a Wright Brothers moment for space,” said Phil Larson, a former space policy adviser to President Barack Obama who worked for SpaceX and is now at the University of Colorado. “It’s as important as the first plane taking off and landing and taking off again.”
Brock is still alive, but… Hmm:
Media Matters founder David Brock has suffered a heart attack but is expected to make a “swift recovery,” a senior aide said Wednesday.
“David Brock suffered a heart attack while working in the Washington DC office early Tuesday,” Bradley Beychok, Brock’s chief of staff, said in a statement.
“He was quickly transported to a local hospital, received prompt medical treatment, and we are looking forward to a swift recovery.”
“We thank everyone for their well wishes, and especially want to thank the wonderful doctors and staff who treated David. We kindly ask for privacy as he recovers,” the statement added.
Brock, 54, a staunch supporter of Hillary Clinton during the 2016 presidential campaign, founded the nonprofit liberal media watchdog publication Media Matters for America in 2004.
Anonymous ID:sQCgxrCb Tue 07 Mar 2017 10:49:59 No.115532326 Report
Quoted By: >>115557045,1 >>115557045,10 >>115557045,2 >>115557045,5 >>115557045,7 >>115557045,8
JAMES ALEFANTIS IS A ROTHSCHILD, HE WAS THE BOYFRIEND OF DAVID BROCK OF MEDIA MATTERS WHO IS NOW UNDER HEAVY INVESTIGATION AND IS THE ONLY LINK TO ALEFANTIS
ROTHSCHILDS ARE GOING TO CLEAN UP MEDIA MATTERS IN A GIANT FIRE, BROCK TO BE FOUND DEAD OF A HEART ATTACK LATER
SPREAD THE WORD
It’s a shit sandwich all around in the general purpose computing world. It’s a very serious worry, because I see the least capable computer users (most computer users, in other words) fully embracing swipetard devices and operating systems, which are mainly intended to serve as tamper proof vending machines and surveillance platforms.
An Apple patent application published Thursday details a so-called “thin” portable hardware accessory that boasts the components necessary to act as a laptop surrogate for iPhones and iPads.
Great, I wonder what’s in the other 99% of the Vault 7 docs…
We have preliminarily assessed the Wikileaks disclosures from this morning. Based on our initial analysis, the alleged iPhone vulnerability affected iPhone 3G only and was fixed in 2009 when iPhone 3GS was released. Additionally, our preliminary assessment shows the alleged Mac vulnerabilities were previously fixed in all Macs launched after 2013.
We have not negotiated with Wikileaks for any information. We have given them instructions to submit any information they wish through our normal process under our standard terms. Thus far, we have not received any information from them that isn’t in the public domain. We are tireless defenders of our users’ security and privacy, but we do not condone theft or coordinate with those that threaten to harm our users.
Today, March 23rd 2017, WikiLeaks releases Vault 7 “Dark Matter”, which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA’s Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain ‘persistence’ on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware.
Among others, these documents reveal the “Sonic Screwdriver” project which, as explained by the CIA, is a “mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting” allowing an attacker to boot its attack software for example from a USB stick “even when a firmware password is enabled”. The CIA’s “Sonic Screwdriver” infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.
“DarkSeaSkies” is “an implant that persists in the EFI firmware of an Apple MacBook Air computer” and consists of “DarkMatter”, “SeaPea” and “NightSkies”, respectively EFI, kernel-space and user-space implants.
Documents on the “Triton” MacOSX malware, its infector “Dark Mallet” and its EFI-persistent version “DerStake” are also included in this release. While the DerStake1.4 manual released today dates to 2013, other Vault 7 documents show that as of 2016 the CIA continues to rely on and update these systems and is working on the production of DerStarke2.0.
Also included in this release is the manual for the CIA’s “NightSkies 1.2” a “beacon/loader/implant tool” for the Apple iPhone. Noteworthy is that NightSkies had reached 1.2 by 2008, and is expressly designed to be physically installed onto factory fresh iPhones. i.e the CIA has been infecting the iPhone supply chain of its targets since at least 2008.
While CIA assets are sometimes used to physically infect systems in the custody of a target it is likely that many CIA physical access attacks have infected the targeted organization’s supply chain including by interdicting mail orders and other shipments (opening, infecting, and resending) leaving the United States or otherwise.
Via: Daily Mail:
At least two people are dead after a terror attacker brought carnage to central London today, mowing down pedestrians on Westminster Bridge before attacking police with a knife in the grounds of the Houses of Parliament.
More than 12 people are said to have been hit by a vehicle on the bridge after a 4×4 drove into pedestrians and cyclists before crashing into the gates of Parliament.
An intruder, described by a witness as ‘middle-aged and Asian’, then managed to break into the grounds of the Parliament and stabbed a police officer before he was shot. The policeman is thought to have since died.
An hour after the attack, paramedics removed a man, thought to be the attacker, from the scene after extensive CPR. Another body appeared to have been left on the ground covered by a red blanket.
A doctor at St Thomas’ Hospital has said one woman has died and a number of others have been hurt – including some with ‘catastrophic’ injuries.
Prime Minister Theresa May is said to have been bundled into a car by a plain-clothes police officer and driven quickly from the scene. She will chair a meeting of the Government’s emergency Cobra committee tonight.
Scotland Yard said the attack, which comes a year to the day after the terrorist atrocities in Brussels, is being treated ‘as a terrorist incident until we know otherwise’.
An assailant was shot outside the British parliament by armed police, the leader of the House of Commons said on Wednesday after loud bangs were heard and a Reuters photographer saw at least a dozen injured people on a nearby bridge.
A parliamentary official earlier said two people had been shot outside parliament and the building was in lockdown. The House of Commons session was suspended and members of parliament who were in the chamber were told to remain there.
Police said they had been called to an incident at Westminster Bridge, officers were on the scene and it was being treated as a firearms incident.
Sears Holdings Corp. suffered its worst stock decline in six weeks after acknowledging “substantial doubt” about its future, raising fresh concerns about whether a company that was once the world’s largest retailer can survive.
Sears added so-called going-concern language to its latest annual report filing, suggesting that weak earnings have cast a pall on its ability to keep operating. The 131-year-old department-store chain, which has lost more than $10 billion in recent years, was cited last year by Fitch Ratings as a company at high risk of defaulting.
About a third of consumers say they would have trouble coming up with an emergency $2,000, according to a new study released Monday.
The New York Fed, as part of its survey of consumer expectations, has begun releasing the answers to questions about financial fragility. The study found around 67% said they were likely to come up with $2,000 in a month, meaning nearly 33% said they weren’t likely.
The differences were most pronounced by credit score — only 11% of those with a credit score of 760 and above said they would have difficulty, versus 64% of those with a credit score of 680 and below.
The survey is consistent with other findings. The more than one-third of families that had large fluctuations in their incomes were more likely than those with stable incomes to say they wouldn’t be able to come up with $2,000 for an unexpected need, according to a study by the Philadelphia-based nonprofit Pew Charitable Trusts released in March.
Via: Ars Technica:
Cisco Systems said that more than 300 models of switches it sells contain a critical vulnerability that allows the CIA to use a simple command to remotely execute malicious code that takes full control of the devices. There currently is no fix.
Cisco researchers said they discovered the vulnerability as they analyzed a cache of documents that are believed to have been stolen from the CIA and published by WikiLeaks two weeks ago. The flaw, found in at least 318 switches, allows remote attackers to execute code that runs with elevated privileges, Cisco warned in an advisory published Friday. The bug resides in the Cisco Cluster Management Protocol (CMP), which uses the telnet protocol to deliver signals and commands on internal networks. It stems from a failure to restrict telnet options to local communications and the incorrect processing of malformed CMP-only telnet options.
“An attacker could exploit this vulnerability by sending malformed CMP-specific telnet options while establishing a telnet session with an affected Cisco device configured to accept telnet connections,” the advisory stated. “An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device.”
Compounding the risk, vulnerable switches will process CMP-specific telnet options by default, “even if no cluster configuration commands are present on the device configuration,” the advisory warned. The vulnerability mostly affects Cisco Catalyst switches but is also found in Industrial Ethernet switches and embedded services. Cisco plans to release a fix at an unspecified date.
While Friday’s advisory said there are “no workaround that address this vulnerability,” it did say the vulnerability was active only when buggy devices were configured to accept incoming telnet connections. Disabling telnet as a means for receiving incoming connections eliminates the threat, and Cisco has provided instructions for disabling telnet. Cisco switch users who aren’t willing to disable telnet can lower the risk of exploits by using an access control list to restrict the devices that are permitted to send and receive telnet commands.
Via: The Verge:
Biometric authentication is moving from phones to laptops and onward to… public bathrooms. Chinese authorities in Beijing are now combating a toilet paper stealing epidemic by locking the supplies away behind a dispenser powered by facial recognition software, according to a report from The New York Times.
The unorthodox method ensures that the public bathroom at the Temple of Heaven Park disposes only a small amount of paper — approximately two feet in length — for each person once every nine minutes, following an initial face scan to store the identity of the user. The change marks the first time in a decade the park has taken such drastic measures to reduce its chronic toilet paper theft.