Tumgik
#Solaris - Agency Archive
i-expect-you-to-die · 10 months
Text
One of the Two Password Locked Webpages - Shawn's Desk!
The password for this website is as follows:
that`sTHEpASscOdEx
The website has a habit of lagging, so below the cut is all the important files which can be found by going into the website!
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
^ This is the background image, the rainbow paperclips as well as his seeming break up with Sam heavily implies that Shawn is gay :]
29 notes · View notes
the-valiant-valkyrie · 3 months
Text
Who ever said undercover operations were just for Agency operatives? There's a thorn in Zor's side, and the Fabricator is the only person they trust to take care of it... Sure, 'assassin' isn't exactly in her resume, but that's not to say she's never gotten her hands dirty before. Besides, it isn't as though she's going alone. A night out with Solaris as her partner in crime sounds like a scene pulled straight from her beloved murder mysteries. What could possibly go wrong?
12 notes · View notes
ellascreams · 2 months
Text
You know I frequently think about what Magnus Archive entities different characters from things would be warlocks for but I don’t think I’ve ever really talked about any of my thoughts on it before. Maybe I should start doing that, just for fun. Someone might find it interesting. This one is for IEYTD because I don’t expect this hyperfixation to die very soon. Spoilers for all the games. Oh and if you want to use this as inspiration for some weird crossovers you can, but please tell me if you do, because I wanna see it.
Agent Phoenix: The End This one is especially fitting if you think of the time loops as being in universe, stuck dying again and again, but it works even without that. Constantly close to death, feeling the fear of death, but never actually dying. Causing others fear because their friends have to deal with grief and their enemies have to be terrified every time they survive something they shouldn’t have. You could make an argument for The Beholding, you can for most protagonists, but it doesn’t make as much sense to me.
Handler: The Beholding He watches his agents do such dangerous things and can’t do much more than watch. He can help in someways but not too many. I imagine it would also be uncomfortable for Zoraxis agents to know they’re being watched by someone who they can’t see, someone other than the agent in front of them. Alternatively, he could be The Web. (“A mere puppeteer, they only enslave you,”) I just don’t think that works as well since he also has to answer to The Agency and he doesn’t have any malicious intent with his manipulations.
Dr. Zor: The Web Constantly orchestrating schemes from the shadows, has no loyalty to anyone and will kill their highest ranks without remorse if they interfere with their plans, too clever to ever be caught, and knows what Phoenix will do well enough to leave messages for them. Could also make arguments for The Stranger, The Beholding, The End, and The Extinction, but I think all of those connect back to their plotting and masterminding.
Daniel Sans: The Corruption Very minor character but I felt like adding him here. He made a super virus. That’s it that’s all I’ve got.
Zoraxis AI: The Buried Specifically the one in the escape pod. Does this even count as a character? No idea, but you can’t tell me that escape pod doesn’t sound like it would be the subject of someone’s statement if they got out of it alive.
Hivemind: The Corruption He’s literally just bees. Like, a bunch of bees. His name is Hivemind. What else can I even say?
Solaris: Uh The Vast Maybe? Because space? I’ll be honest I’m not really sure about this one, if anyone has any ideas I’d love to hear them.
The Fabricator: The Desolation She seems to enjoy the pain she causes with her inventions, whereas some of the scientists in game seem more like they’re just hurting people for the sake of their science. I’d also definitely accept The End for her since death traps are kind of her main thing.
John Juniper: The Stranger He’s got the masks, the acting and lying, he impersonates people, it seems like a perfect fit honestly. I guess he could maybe work for The Spiral but that’s mostly because it’s so similar to The Stranger.
Gibson: The Beholding Ok this one might sound a bit weird but hear me out. Phoenix pretends to be Gibson for a reason, his radio allows him to eavesdrop and he probably does eavesdrop just so he won’t miss Juniper’s commands. Gibson is just a butler, but he hears all about these worldwide conspiracies and gets caught in the crossfire, and there really isn’t much he can do about it. Except threatening to share the things that he’s heard, which is very affective, because he’s heard a lot of important secrets.
Shawn in HR: The Beholding Honestly he really does give me archive assistant or object storage vibes. Just doing his job hearing about and sorting the horrors. The big difference is that the horrors in this situation are corporate espionage and conspiracies.
Dr. Prism: The Extinction Ok once again, this may seem a bit weird, but hear me out. Her main goal in game is to replace the agents with robots and there is an element of humanity being replaced to The Extinction, not just everyone dying. Then there’s Zor’s betrayal destroying all her robots at once. Then she helps Phoenix save all the agents in the world from death. Even if it’s never an extinction of humanity she certainly has experience with extinctions. An alternate might be The Hunt because of her obsession with revenge and killing Phoenix or Zor, and the Agency trying to track her down.
Robutler: The Stranger or The Spiral He just seems so friendly and happy to talk to you while he attempts to kill you.
Ollie: The Lonely I swear this isn’t just because Ollie’s voice reminds me of Alexander J Newall’s. The poor guy just got abandoned in the ocean for like at least a month. His coworkers and bosses seem to be pretty mean to him too.
Director Morales: The Web He really is just running The Agency behind the scenes. We really don’t hear much about him orchestrating anything but maybe that’s just because he’s really good at it. Out of all these characters, he would probably be the creepiest to me if he was actually a warlock for an entity.
The Phantom: The Web We really don’t know much about them but they manage to leave coins for Phoenix to find everywhere they go knowing that they’ll find them. Very Web like behavior. Maybe The Hunt. The coin thing is kinda like a scavenger hunt and they do have to track down Phoenix to leave those clues.
4 notes · View notes
Text
2019 Hugo Award finalists announced
Tumblr media
The 2019 Hugo Award nominees have been announced; the Hugos will be presented this summer at the 2019 World Science Fiction Convention in Dublin, Ireland.
Normally, I find that I've read and reviewed a huge slice of the year's finalists, but this year is different; I've done a lot less reading lately, partly because I wrote two books in 2018 and partly because the new EU Copyright Directive ate my life for about 10 months in the past year.
I was a little sad to be so far behind the curve when I saw the new list, but then I realized that this meant that I had a bunch of really exciting books to add to my to-be-read pile!
One notable inclusion: the Archive of Our Own fanfic archive -- a project of the Organization for Transformative Works (for whose advisory board I volunteer) -- is up for "Best Related Work."
Congrats to all the nominees!
Best Novel * The Calculating Stars, by Mary Robinette Kowal (Tor) * Record of a Spaceborn Few, by Becky Chambers (Hodder & Stoughton / Harper Voyager) * Revenant Gun, by Yoon Ha Lee (Solaris) * Space Opera, by Catherynne M. Valente (Saga) * Spinning Silver, by Naomi Novik (Del Rey / Macmillan) * Trail of Lightning, by Rebecca Roanhorse (Saga)
Best Novella * Artificial Condition, by Martha Wells (Tor.com Publishing) * Beneath the Sugar Sky, by Seanan McGuire (Tor.com Publishing) * Binti: The Night Masquerade, by Nnedi Okorafor (Tor.com Publishing) * The Black God’s Drums, by P. Djèlí Clark (Tor.com Publishing) * Gods, Monsters, and the Lucky Peach, by Kelly Robson (Tor.com Publishing) * The Tea Master and the Detective, by Aliette de Bodard (Subterranean Press / JABberwocky Literary Agency)
Best Novelette * “If at First You Don’t Succeed, Try, Try Again,” by Zen Cho (B&N Sci-Fi and Fantasy Blog, 29 November 2018) * “The Last Banquet of Temporal Confections,” by Tina Connolly (Tor.com, 11 July 2018) * “Nine Last Days on Planet Earth,” by Daryl Gregory (Tor.com, 19 September 2018) * The Only Harmless Great Thing, by Brooke Bolander (Tor.com Publishing) * “The Thing About Ghost Stories,” by Naomi Kritzer (Uncanny Magazine 25, November- December 2018) * “When We Were Starless,” by Simone Heller (Clarkesworld 145, October 2018)
Best Short Story * “The Court Magician,” by Sarah Pinsker (Lightspeed, January 2018) * “The Rose MacGregor Drinking and Admiration Society,” by T. Kingfisher (Uncanny Magazine 25, November-December 2018) * “The Secret Lives of the Nine Negro Teeth of George Washington,” by P. Djèlí Clark (Fireside Magazine, February 2018) * “STET,” by Sarah Gailey (Fireside Magazine, October 2018) * “The Tale of the Three Beautiful Raptor Sisters, and the Prince Who Was Made of Meat,” by Brooke Bolander (Uncanny Magazine 23, July-August 2018) * “A Witch’s Guide to Escape: A Practical Compendium of Portal Fantasies,” by Alix E. Harrow (Apex Magazine, February 2018)
Best Series * The Centenal Cycle, by Malka Older (Tor) * The Laundry Files, by Charles Stross (most recently Tor.com Publishing/Orbit) * Machineries of Empire, by Yoon Ha Lee (Solaris) * The October Daye Series, by Seanan McGuire (most recently DAW) * The Universe of Xuya, by Aliette de Bodard (most recently Subterranean Press) * Wayfarers, by Becky Chambers (Hodder & Stoughton / Harper Voyager)
Best Related Work * Archive of Our Own, a project of the Organization for Transformative Works * Astounding: John W. Campbell, Isaac Asimov, Robert A. Heinlein, L. Ron Hubbard, and the Golden Age of Science Fiction, by Alec Nevala-Lee (Dey Street Books) * The Hobbit Duology (documentary in three parts), written and edited by Lindsay Ellis and Angelina Meehan (YouTube) * An Informal History of the Hugos: A Personal Look Back at the Hugo Awards, 1953- 2000, by Jo Walton (Tor) * www.mexicanxinitiative.com: The Mexicanx Initiative Experience at Worldcon 76 (Julia Rios, Libia Brenda, Pablo Defendini, John Picacio) * Ursula K. Le Guin: Conversations on Writing, by Ursula K. Le Guin with David Naimon (Tin House Books)
Best Graphic Story * Abbott, written by Saladin Ahmed, art by Sami Kivelä, colours by Jason Wordie, letters by Jim Campbell (BOOM! Studios) * Black Panther: Long Live the King, written by Nnedi Okorafor and Aaron Covington, art by André Lima Araújo, Mario Del Pennino and Tana Ford (Marvel) * Monstress, Volume 3: Haven, written by Marjorie Liu, art by Sana Takeda (Image Comics) * On a Sunbeam, by Tillie Walden (First Second) * Paper Girls, Volume 4, written by Brian K. Vaughan, art by Cliff Chiang, colours by Matt Wilson, letters by Jared K. Fletcher (Image Comics) * Saga, Volume 9, written by Brian K. Vaughan, art by Fiona Staples (Image Comics)
Best Dramatic Presentation, Long Form * Annihilation, directed and written for the screen by Alex Garland, based on the novel by Jeff VanderMeer (Paramount Pictures / Skydance) * Avengers: Infinity War, screenplay by Christopher Markus and Stephen McFeely, directed by Anthony Russo and Joe Russo (Marvel Studios) * Black Panther, written by Ryan Coogler and Joe Robert Cole, directed by Ryan Coogler (Marvel Studios) * A Quiet Place, screenplay by Scott Beck, John Krasinski and Bryan Woods, directed by John Krasinski (Platinum Dunes / Sunday Night) * Sorry to Bother You, written and directed by Boots Riley (Annapurna Pictures) * Spider-Man: Into the Spider-Verse, screenplay by Phil Lord and Rodney Rothman, directed by Bob Persichetti, Peter Ramsey and Rodney Rothman (Sony)
Best Dramatic Presentation, Short Form * The Expanse: “Abaddon’s Gate,” written by Daniel Abraham, Ty Franck and Naren Shankar, directed by Simon Cellan Jones (Penguin in a Parka / Alcon Entertainment) * Doctor Who: “Demons of the Punjab,” written by Vinay Patel, directed by Jamie Childs (BBC) * Dirty Computer, written by Janelle Monáe, directed by Andrew Donoho and Chuck Lightning (Wondaland Arts Society / Bad Boy Records / Atlantic Records) * The Good Place: “Janet(s),” written by Josh Siegal & Dylan Morgan, directed by Morgan Sackett (NBC) * The Good Place: “Jeremy Bearimy,” written by Megan Amram, directed by Trent O’Donnell (NBC) * Doctor Who: “Rosa,” written by Malorie Blackman and Chris Chibnall, directed by Mark Tonderai (BBC)
Best Professional Editor, Short Form * Neil Clarke * Gardner Dozois * Lee Harris * Julia Rios * Lynne M. Thomas and Michael Damian Thomas * E. Catherine Tobler
Best Professional Editor, Long Form * Sheila E. Gilbert * Anne Lesley Groell * Beth Meacham * Diana Pho * Gillian Redfearn * Navah Wolfe
Best Professional Artist * Galen Dara * Jaime Jones * Victo Ngai * John Picacio * Yuko Shimizu * Charles Vess
Best Semiprozine * Beneath Ceaseless Skies, editor-in-chief and publisher Scott H. Andrews * Fireside Magazine, edited by Julia Rios, managing editor Elsa Sjunneson-Henry, social coordinator Meg Frank, special features editor Tanya DePass, founding editor Brian White, publisher and art director Pablo Defendini * FIYAH Magazine of Black Speculative Fiction, executive editors Troy L. Wiggins and DaVaun Sanders, editors L.D. Lewis, Brandon O’Brien, Kaleb Russell, Danny Lore, and Brent Lambert * Shimmer, publisher Beth Wodzinski, senior editor E. Catherine Tobler * Strange Horizons, edited by Jane Crowley, Kate Dollarhyde, Vanessa Rose Phin, Vajra Chandrasekera, Romie Stott, Maureen Kincaid Speller, and the Strange Horizons Staff * Uncanny Magazine, publishers/editors-in-chief Lynne M. Thomas and Michael Damian Thomas, managing editor Michi Trota, podcast producers Erika Ensign and Steven Schapansky, Disabled People Destroy Science Fiction Special Issue editors-in-chief Elsa Sjunneson-Henry and Dominik Parisien
Best Fanzine * Galactic Journey, founder Gideon Marcus, editor Janice Marcus * Journey Planet, edited by Team Journey Planet * Lady Business, editors Ira, Jodie, KJ, Renay & Susan * nerds of a feather, flock together, editors Joe Sherry, Vance Kotrla and The G * Quick Sip Reviews, editor Charles Payseur * Rocket Stack Rank, editors Greg Hullender and Eric Wong
Best Fancast * Be the Serpent, presented by Alexandra Rowland, Freya Marske and Jennifer Mace * The Coode Street Podcast, presented by Jonathan Strahan and Gary K. Wolfe * Fangirl Happy Hour, hosted by Ana Grilo and Renay Williams * Galactic Suburbia, hosted by Alisa Krasnostein, Alexandra Pierce, and Tansy Rayner Roberts, produced by Andrew Finch * Our Opinions Are Correct, hosted by Annalee Newitz and Charlie Jane Anders * The Skiffy and Fanty Show, produced by Jen Zink and Shaun Duke, hosted by the Skiffy and Fanty Crew
Best Fan Writer * Foz Meadows * James Davis Nicoll * Charles Payseur * Elsa Sjunneson-Henry * Alasdair Stuart * Bogi Takács
Best Fan Artist * Sara Felix * Grace P. Fong * Meg Frank * Ariela Housman * Likhain (Mia Sereno) * Spring Schoenhuth
Best Art Book * The Books of Earthsea: The Complete Illustrated Edition, illustrated by Charles Vess, written by Ursula K. Le Guin (Saga Press /Gollancz) * Daydreamer’s Journey: The Art of Julie Dillon, by Julie Dillon (self-published) * Dungeons & Dragons Art & Arcana: A Visual History, by Michael Witwer, Kyle Newman, Jon Peterson, Sam Witwer (Ten Speed Press) * Spectrum 25: The Best in Contemporary Fantastic Art, ed. John Fleskes (Flesk Publications) * Spider-Man: Into the Spider-Verse – The Art of the Movie, by Ramin Zahed (Titan Books) * Tolkien: Maker of Middle-earth, ed. Catherine McIlwaine (Bodleian Library)
John W. Campbell Award for Best New Writer * Katherine Arden (2nd year of eligibility) * S.A. Chakraborty (2nd year of eligibility) * R.F. Kuang (1st year of eligibility) * Jeannette Ng (2nd year of eligibility) * Vina Jie-Min Prasad (2nd year of eligibility) * Rivers Solomon (2nd year of eligibility)
Lodestar Award for Best Young Adult Book * The Belles, by Dhonielle Clayton (Freeform / Gollancz) * Children of Blood and Bone, by Tomi Adeyemi (Henry Holt / Macmillan Children’s Books) * The Cruel Prince, by Holly Black (Little, Brown / Hot Key Books) * Dread Nation, by Justina Ireland (Balzer + Bray) * The Invasion, by Peadar O’Guilin (David Fickling Books / Scholastic) * Tess of the Road, by Rachel Hartman (Random House / Penguin Teen)
https://boingboing.net/2019/04/02/dublin-worldcon.html
498 notes · View notes
jayhorsestar · 4 years
Text
(zero) [a], [b] internet service provider ISP, or even 'fortinet or 'broadcom (ie. symantec), why the need to buy a NEW small box, which 'calls back at 'home, automatically (for the trusted certificate and the mesh-up the area). m [c] 'glaxosmithkline (gsk) intranet corporate level, EMEA domain, and other domains logon capability user friendly policies, credentials over site resource access, letters A, B, C, D, E, merging to local LAW and REVISAL 401(k) pre-req(s), with IBM blade servers for email (lots of DDR RAM and 'xeon(tm)), archives mandatory kept in five same (carbon) copies, onto HP tapes, incl of PBX and thus 'voip (also audited w/ human agent, lively - just like AOL avaya ten years later on (single male), or ILPTO 2014 fourteen yrs later on - couple males same time). classification policies implemented due to budgets on AIDs medication, and due to military hospitals (units under 'don't ask don't tell). several liaisons, at Bucharest with Govt at Victoria sqr, or locally manufacturing, vs narcotics - mind South Africa and Laropharm, over morphines usage (abolished inside the E.U. w/ 2010), by 2006). outsourcing w/ barristers, 'black sea ports closed due to assessment risk 3 environmental hazard. poland and rotterdam to supply over 'constanta, by 2013 - vodafone replaced with orange GSM. SDD or HDD irrelevant - HP tapes and weekly cryptography - matching AOL 2010 yet only for Avaya sessions long-call by-the minute RSA securing lines keys). m) [d] 'greece and GREXIT (2015), implementing https://kedke.gr/?fbclid=IwAR29qnsRDr05z9GpLly_NyGoQDPllz4UVvBSXhDwPJQfUznpXsIY3kviN1U the GIS maps collateral business slice of (slang) 'do grab a BEZEL, sort of automated calling the 'mayor's office E.U. quality assurance at first Court when debating fences, rather than almost ALL on 2nd calling, the Appeals - comme d'habitude. and the STS couple hours live calling, the INFOFER daily cctv conferences, and the Greeks town halls UNION daily MS Teams (office 365), for five-six hours meetings cctv which are by LAW kept and archived at least six months. GIS data centers, 'continental, peninsular, archipelago(s) campus licensing. m  [e] INFOFER Inc own fiber net infrastructure owner and manager, live tracing railway nation-wide, inside designated area. ORACLE suite operator, and owner of licence. executing training to ALL personel over ORACLE various modules. only since 2010 onwards, thus inside the E.U. (2008 Lisbon treaty). no crypto implemented, no avaya secured lines RSA keys, live calling on daily basis, half an hour or an hour at most, regions (traditional eight). no Sparc TruAlpha64 or Solaris, computation capabilities (mind GSK over quarantine decaying calculus - it's railway only - they could carry nuclear waste, assigned ranking but no computation avail. - no monitoring - expedite shipment). m  [f] DISA of the Pentagon, also Washington DC secure lines provider (broadband availability), which is not NSA, the National Security Agency, in charge of crypto patterns and perhaps RSA keys alike manager. [g] U.N. resources (reserves) must not die, not the Academy credo (unit considered at WAR until last 'act of war, until last breath), the top bottom of the pool, only one way driven energy, pushing downwards, into the fields (i'm down in the fields, live in the afterglow). the 'betacarotene (mind recent fires at 'colorado, or recently past at 'frisco bay). the NYSE, the stock-exchange, thus TESLA and SpaceX, the Berlin 'gigafactory and the STANAG, or the NATO stage four batteries layout, NEW cell diameter, export of Intellectual property due to Pentagon Joint-Task command, CORTANA level of reach. which is not the Supreme Court and why women not a majority ever, PRAETOR(s) actio and law making by dropping by, the District Attorney job, and WHEN if thus achievable, a majority females, so that the Supreme Court reflect five to four. m obs.-thus MILK, the raw milk lab, the microscopy, GSK R&D also (microbio - and current 'farmacom inc chain of pharmacies providing me sulph). the HDD vs SDD when radiation (20KV) occur, data risk of loss, INFOFER engines on railway (electrified and shielded asbestos, retirement 401(k) REVISAL earlier in life, during 50s men only!!). m  [h] 'spaceX Inc part of Tesla Co group and the INFOFER Inc, the Starlink network for Internet signal coverage, the ISP feature, the lacking of NYSE, the sextant, silver painted mirrors and maps of sextant navigation points, the National Geo-Spatial Intelligence Agency, 50075 Elsworth Iowa vs 500075 Condmag Inc, the ISS Zaryia footprint when in orbit. m  [i] 'restitutio in integrum (upon the commis abolished 1989-1990), the orthodox religious (cult) buildings, the church Bell Tower at RO 'juneau kronstadt, part of the fortress wall, the Disneyland DRACULA themed fun park around, a Senator LAW making and an airfield LAW (2007), 'trump sponsoring the Sun-City Miss Universe and also Miss USA, the heart of a President, the satire of Walt Disney himself, commenting adult topics via toons. commenting WW2 sometimes. 'tarzan was british. the NYC NYC eyes on satire, and also a Church to be happy and winkle of eye so that DRACULA of the 1600s be established as fun-park. m  NYC NYC POLICE at the gateways, the UN HQs at Manhattan, perhaps Geneve SWISS (banking refusing the SD-WAN of CISCO, agreeing the Palo-Alto much simpler config of SD-WAN - no need of complicating with 'les cotes de geneves - Intel eyes hence portfolio consisted of PUBLIC services and Town-Hall links - thus no foreign affairs expected), m)
0 notes
fuckyeah-nerdery · 6 years
Text
The Hugo Award nominees were announced yesterday and it’s a pretty nice field
Best Novel
The Collapsing Empire, by John Scalzi (Tor)
New York 2140, by Kim Stanley Robinson (Orbit)
Provenance, by Ann Leckie (Orbit)
Raven Stratagem, by Yoon Ha Lee (Solaris)
Six Wakes, by Mur Lafferty (Orbit)
The Stone Sky, by N.K. Jemisin (Orbit)
========
It’s worth noting that Jemisin has won Best Novel two years running and chances are good that she’ll be the first person to ever threepeat.
Best Novella
All Systems Red, by Martha Wells (Tor.com Publishing)
“And Then There Were (N-One),” by Sarah Pinsker (Uncanny, March/April 2017)
Binti: Home, by Nnedi Okorafor (Tor.com Publishing)
The Black Tides of Heaven, by JY Yang (Tor.com Publishing)
Down Among the Sticks and Bones, by Seanan McGuire (Tor.com Publishing)
River of Teeth, by Sarah Gailey (Tor.com Publishing)
Best Novelette
“Children of Thorns, Children of Water,” by Aliette de Bodard (Uncanny, July-August 2017)
“Extracurricular Activities,” by Yoon Ha Lee (Tor.com, February 15, 2017)
“The Secret Life of Bots,” by Suzanne Palmer (Clarkesworld, September 2017)
“A Series of Steaks,” by Vina Jie-Min Prasad (Clarkesworld, January 2017)
“Small Changes Over Long Periods of Time,” by K.M. Szpara (Uncanny, May/June 2017)
“Wind Will Rove,” by Sarah Pinsker (Asimov’s, September/October 2017)
Best Short Story
“Carnival Nine,” by Caroline M. Yoachim (Beneath Ceaseless Skies, May 2017)
“Clearly Lettered in a Mostly Steady Hand,” by Fran Wilde (Uncanny, September 2017)
“Fandom for Robots,” by Vina Jie-Min Prasad (Uncanny, September/October 2017)
“The Martian Obelisk,” by Linda Nagata (Tor.com, July 19, 2017)
“Sun, Moon, Dust” by Ursula Vernon, (Uncanny, May/June 2017)
“Welcome to your Authentic Indian Experience™,” by Rebecca Roanhorse (Apex, August 2017)
Best Series
The Books of the Raksura, by Martha Wells (Night Shade)
The Divine Cities, by Robert Jackson Bennett (Broadway)
InCryptid, by Seanan McGuire (DAW)
The Memoirs of Lady Trent, by Marie Brennan (Tor US / Titan UK)
The Stormlight Archive, by Brandon Sanderson (Tor US / Gollancz UK)
World of the Five Gods, by Lois McMaster Bujold (Harper Voyager / Spectrum Literary Agency)
========
There are more categories and noms, but the list is too long to repost, so check them out here.
1 note · View note
pgoeltz · 7 years
Link
Press Release
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named "Vault 7" by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, "Year Zero", comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA's Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized "zero day" exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
"Year Zero" introduces the scope and direction of the CIA's global covert hacking program, its malware arsenal and dozens of "zero day" weaponized exploits against a wide range of U.S. and European company products, include Apple's iPhone, Google's Android and Microsoft's Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency's hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA's hacking capacities.
By the end of 2016, the CIA's hacking division, which formally falls under the agency's Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other "weaponized" malware. Such is the scale of the CIA's undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its "own NSA" with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA's hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Julian Assange, WikiLeaks editor stated that "There is an extreme proliferation risk in the development of cyber 'weapons'. Comparisons can be drawn between the uncontrolled proliferation of such 'weapons', which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of "Year Zero" goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective."
Wikileaks has carefully reviewed the "Year Zero" disclosure and published substantive CIA documentation while avoiding the distribution of 'armed' cyberweapons until a consensus emerges on the technical and political nature of the CIA's program and how such 'weapons' should analyzed, disarmed and published.
Wikileaks has also decided to redact and anonymise some identifying information in "Year Zero" for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in "Vault 7" part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.
Analysis
CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA's DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell's 1984, but "Weeping Angel", developed by the CIA's Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom's MI5/BTSS. After infestation, Weeping Angel places the target TV in a 'Fake-Off' mode, so that the owner falsely believes the TV is off when it is on. In 'Fake-Off' mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA's Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user's geolocation, audio and text communications as well as covertly activate the phone's camera and microphone.
Despite iPhone's minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA's Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA's arsenal includes numerous local and remote "zero days" developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google's Android which is used to run the majority of the world's smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. "Year Zero" shows that as of 2016 the CIA had 24 "weaponized" Android "zero days" which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.
These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the "smart" phones that they run on and collecting audio and message traffic before encryption is applied.
CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized "zero days", air gap jumping viruses such as "Hammer Drill" which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( "Brutal Kangaroo") and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA's Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as "Assassin" and "Medusa".
Attacks against Internet infrastructure and webservers are developed by the CIA's Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB's "HIVE" and the related "Cutthroat" and "Swindle" tools, which are described in the examples section below.
CIA 'hoarded' vulnerabilities ("zero days")
In the wake of Edward Snowden's leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or "zero days" to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
The U.S. government's commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.
"Year Zero" documents show that the CIA breached the Obama administration's commitments. Many of the vulnerabilities used in the CIA's cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in "Year Zero" is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities ("zero days") possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.
The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.
'Cyberwar' programs are a serious proliferation risk
Cyber 'weapons' are not possible to keep under effective control.
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber 'weapons', once developed, are very hard to retain.
Cyber 'weapons' are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Securing such 'weapons' is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same 'weapons' against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global "vulnerability market" that will pay hundreds of thousands to millions of dollars for copies of such 'weapons'. Similarly, contractors and companies who obtain such 'weapons' sometimes use them for their own purposes, obtaining advantage over their competitors in selling 'hacking' services.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.
Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.
Once a single cyber 'weapon' is 'loose' it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ( "Center for Cyber Intelligence Europe" or CCIE) are given diplomatic ("black") passports and State Department cover. The instructions for incoming CIA hackers make Germany's counter-intelligence efforts appear inconsequential: "Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport"
Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.
Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.
Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.
A number of the CIA's electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.
How the CIA dramatically increased proliferation risks
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of "Vault 7" — the CIA's weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.
The CIA made these systems unclassified.
Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the 'battlefield' of cyber 'war'.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber 'arms' manufactures and computer hackers can freely "pirate" these 'weapons' if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator's intent.
Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted "malware injections" (commercial jargon) or "implant drops" (NSA jargon) are being called "fires" as if a weapon was being fired. However the analogy is questionable.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its 'target'. CIA malware does not "explode on impact" but rather permanently infests its target. In order to infect target's device, copies of the malware must be placed on the target's devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.
A successful 'attack' on a target's computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization's leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target's territory including observation, infiltration, occupation and exploitation.
Evading forensics and anti-virus
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.
"Tradecraft DO's and DON'Ts"
contains CIA rules on how its malware should be written to avoid fingerprints implicating the "CIA, US government, or its witting partner companies" in "forensic review". Similar secret standards cover the
use of encryption to hide CIA hacker and malware communication
(pdf),
describing targets & exfiltrated data
(pdf) as well as
executing payloads
(pdf) and
persisting
(pdf) in the target's machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products,Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window's "Recycle Bin". While Comodo 6.x has a "Gaping Hole of DOOM".
CIA hackers discussed what the NSA's "Equation Group" hackers did wrong and how the CIA's malware makers could avoid similar exposure.
Examples
The CIA's Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by "Year Zero") each with their own sub-projects, malware and hacker tools.
The majority of these projects relate to tools that are used for penetration, infestation ("implanting"), control, and exfiltration.
Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.
Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks' "Year Zero".
UMBRAGE
The CIA's hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a "fingerprint" that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA's Remote Devices Branch's UMBRAGE group collects and maintains a substantial library of attack techniques 'stolen' from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the "fingerprints" of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
Fine Dining
Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency's OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically "exfiltrating" information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.
Among the list of possible targets of the collection are 'Asset', 'Liason Asset', 'System Administrator', 'Foreign Information Operations', 'Foreign Intelligence Agencies' and 'Foreign Government Entities'. Notably absent is any reference to extremists or transnational criminals. The 'Case Officer' is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The 'menu' also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA's 'JQJIMPROVISE' software (see below) to configure a set of CIA malware suited to the specific needs of an operation.
Improvise (JQJIMPROVISE)
'Improvise' is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from 'Fine Dining' questionairies.
HIVE
HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.
The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a 'Blot' server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the 'Honeycomb' toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.
The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.
Similar functionality (though limited to Windows) is provided by the RickBobby project.
See the classified
user
and
developer
guides for HIVE.
Frequently Asked Questions
Why now?
WikiLeaks published as soon as its verification and analysis were ready.
In Febuary the Trump administration has issued an Executive Order calling for a "Cyberwar" review to be prepared within 30 days.
While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.
Redactions
Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.
Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
Archive attachments (zip, tar.gz, ...) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.
Organizational Chart
The organizational chart corresponds to the material published by WikiLeaks so far.
Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.
Wiki pages
"Year Zero" contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.
The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).
What time period is covered?
The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).
WikiLeaks has obtained the CIA's creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
What is "Vault 7"
"Vault 7" is a substantial collection of material about CIA activities obtained by WikiLeaks.
When was each part of "Vault 7" obtained?
Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
Is each part of "Vault 7" from a different source?
Details on the other parts will be available at the time of publication.
What is the total size of "Vault 7"?
The series is the largest intelligence publication in history.
How did WikiLeaks obtain each part of "Vault 7"?
Sources trust WikiLeaks to not reveal information that might help identify them.
Isn't WikiLeaks worried that the CIA will act against its staff to stop the series?
No. That would be certainly counter-productive.
Has WikiLeaks already 'mined' all the best stories?
No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They're there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
Won't other journalists find all the best stories before me?
Unlikely. There are very considerably more stories than there are journalists or academics who are in a position to write them.
Top
WL Research Community - user contributed research based on documents published by WikiLeaks.
Tor is an encrypted anonymising network that makes it harder to intercept internet communications, or see where communications are coming from or going to.
Tails is a live operating system, that you can start on almost any computer from a DVD, USB stick, or SD card. It aims at preserving your privacy and anonymity.
The Courage Foundation is an international organisation that supports those who risk life or liberty to make significant contributions to the historical record.
Bitcoin uses peer-to-peer technology to operate with no central authority or banks; managing transactions and the issuing of bitcoins is carried out collectively by the network.
4 notes · View notes
viajandosobrelibros · 5 years
Text
Ayer en el marco de la  Worldcon,  77th World Science Fiction Convention, se dieorn a conocer a los ganadores de los premios Hugo y los premios Lodestar Award y John W. Campbell
Los premios Hugo 2019 se entregarán en el WorldCon de este año, que se celebrará en Dublín, Irlanda, entre el 15 y el 19 de agosto. No se olviden de bajarse el calendario que hicimos en Viajando Sobre Libros de ACA para poder tener todas las fechas de entregas de premios literarios. Aquí les dejo la lista completa de los nominados para los premios de este año y comenten si leyeron alguno.
Best Novel
The Calculating Stars, by Mary Robinette Kowal (Tor) GANADOR
Record of a Spaceborn Few, by Becky Chambers (Hodder & Stoughton / Harper Voyager)
Revenant Gun, by Yoon Ha Lee (Solaris)
Space Opera, by Catherynne M. Valente (Saga)
Spinning Silver, by Naomi Novik (Del Rey / Macmillan)
Trail of Lightning, by Rebecca Roanhorse (Saga)
Best Novella
Artificial Condition, by Martha Wells (Tor.com publishing) GANADOR
Beneath the Sugar Sky, by Seanan McGuire (Tor.com publishing)
Binti: The Night Masquerade, by Nnedi Okorafor (Tor.com publishing)
The Black God’s Drums, by P. Djèlí Clark (Tor.com publishing)
Gods, Monsters, and the Lucky Peach, by Kelly Robson (Tor.com publishing)
The Tea Master and the Detective, by Aliette de Bodard (Subterranean Press / JABberwocky Literary Agency)
  Best Novelette
“If at First You Don’t Succeed, Try, Try Again,” by Zen Cho (B&N Sci-Fi and Fantasy Blog, 29 November 2018) GANADOR
“The Last Banquet of Temporal Confections,” by Tina Connolly (Tor.com, 11 July 2018)
“Nine Last Days on Planet Earth,” by Daryl Gregory (Tor.com, 19 September 2018)
The Only Harmless Great Thing, by Brooke Bolander (Tor.com publishing)
“The Thing About Ghost Stories,” by Naomi Kritzer (Uncanny Magazine 25, November-December 2018)
“When We Were Starless,” by Simone Heller (Clarkesworld 145, October 2018)
Best Short Story
“The Court Magician,” by Sarah Pinsker (Lightspeed, January 2018)
“The Rose MacGregor Drinking and Admiration Society,” by T. Kingfisher (Uncanny Magazine 25, November-December 2018)
“The Secret Lives of the Nine Negro Teeth of George Washington,” by P. Djèlí Clark (Fireside Magazine, February 2018)
“STET,” by Sarah Gailey (Fireside Magazine, October 2018)
“The Tale of the Three Beautiful Raptor Sisters, and the Prince Who Was Made of Meat,” by Brooke Bolander (Uncanny Magazine 23, July-August 2018)
“A Witch’s Guide to Escape: A Practical Compendium of Portal Fantasies,” by Alix E. Harrow (Apex Magazine, February 2018) GANADOR
Best Series
The Centenal Cycle, by Malka Older (Tor.com publishing)
The Laundry Files, by Charles Stross (most recently Tor.com publishing/Orbit)
Machineries of Empire, by Yoon Ha Lee (Solaris)
The October Daye Series, by Seanan McGuire (most recently DAW)
The Universe of Xuya, by Aliette de Bodard (most recently Subterranean Press)
Wayfarers, by Becky Chambers (Hodder & Stoughton / Harper Voyager) GANADOR
Best Related Work
Archive of Our Own, a project of the Organization for Transformative Works GANADOR
Astounding: John W. Campbell, Isaac Asimov, Robert A. Heinlein, L. Ron Hubbard, and the Golden Age of Science Fiction, by Alec Nevala-Lee (Dey Street Books)
The Hobbit Duology (documentary in three parts), written and edited by Lindsay Ellis and Angelina Meehan (YouTube)
An Informal History of the Hugos: A Personal Look Back at the Hugo Awards, 1953-2000, by Jo Walton (Tor)
http://www.mexicanxinitiative.com: The Mexicanx Initiative Experience at Worldcon 76(Julia Rios, Libia Brenda, Pablo Defendini, John Picacio)
Ursula K. Le Guin: Conversations on Writing, by Ursula K. Le Guin with David Naimon (Tin House Books)
Best Graphic Story
Abbott, written by Saladin Ahmed, art by Sami Kivelä, colours by Jason Wordie, letters by Jim Campbell (BOOM! Studios)
Black Panther: Long Live the King, written by Nnedi Okorafor and Aaron Covington, art by André Lima Araújo, Mario Del Pennino and Tana Ford (Marvel)
Monstress, Volume 3: Haven, written by Marjorie Liu, art by Sana Takeda (Image Comics) GANADOR
On a Sunbeam, by Tillie Walden (First Second)
Paper Girls, Volume 4, written by Brian K. Vaughan, art by Cliff Chiang, colours by Matt Wilson, letters by Jared K. Fletcher (Image Comics)
Saga, Volume 9, written by Brian K. Vaughan, art by Fiona Staples (Image Comics)
Best Dramatic Presentation, Long Form
Annihilation, directed and written for the screen by Alex Garland, based on the novel by Jeff VanderMeer (Paramount Pictures / Skydance)
Avengers: Infinity War, screenplay by Christopher Markus and Stephen McFeely, directed by Anthony Russo and Joe Russo (Marvel Studios)
Black Panther, written by Ryan Coogler and Joe Robert Cole, directed by Ryan Coogler (Marvel Studios)
A Quiet Place, screenplay by Scott Beck, John Krasinski and Bryan Woods, directed by John Krasinski (Platinum Dunes / Sunday Night)
Sorry to Bother You, written and directed by Boots Riley (Annapurna Pictures)
Spider-Man: Into the Spider-Verse, screenplay by Phil Lord and Rodney Rothman, directed by Bob Persichetti, Peter Ramsey and Rodney Rothman (Sony) GANADOR 
Best Dramatic Presentation, Short Form
The Expanse: “Abaddon’s Gate,” written by Daniel Abraham, Ty Franck and Naren Shankar, directed by Simon Cellan Jones (Penguin in a Parka / Alcon Entertainment)
Doctor Who: “Demons of the Punjab,” written by Vinay Patel, directed by Jamie Childs (BBC)
Dirty Computer, written by Janelle Monáe, directed by Andrew Donoho and Chuck Lightning (Wondaland Arts Society / Bad Boy Records / Atlantic Records)
The Good Place: “Janet(s),” written by Josh Siegal & Dylan Morgan, directed by Morgan Sackett (NBC)
The Good Place: “Jeremy Bearimy,” written by Megan Amram, directed by Trent O’Donnell (NBC) GANADOR
Doctor Who: “Rosa,” written by Malorie Blackman and Chris Chibnall, directed by Mark Tonderai (BBC)
Best Editor, Short Form
Neil Clarke
Gardner Dozois (GANADOR)
Lee Harris
Julia Rios
Lynne M. Thomas and Michael Damian Thomas
E. Catherine Tobler
Best Editor, Long Form
Sheila E. Gilbert
Anne Lesley Groell
Beth Meacham
Diana Pho
Gillian Redfearn
Navah Wolfe (GANADOR)
Best Professional Artist
Galen Dara
Jaime Jones
Victo Ngai
John Picacio
Yuko Shimizu
Charles Vess (GANADOR)
Best Semiprozine
Beneath Ceaseless Skies, editor-in-chief and publisher Scott H. Andrews
Fireside Magazine, edited by Julia Rios, managing editor Elsa Sjunneson-Henry, social coordinator Meg Frank, special features editor Tanya DePass, founding editor Brian White, publisher and art director Pablo Defendini
FIYAH Magazine of Black Speculative Fiction, executive editors Troy L. Wiggins and DaVaun Sanders, editors L.D. Lewis, Brandon O’Brien, Kaleb Russell, Danny Lore, and Brent Lambert
Shimmer, publisher Beth Wodzinski, senior editor E. Catherine Tobler
Strange Horizons, edited by Jane Crowley, Kate Dollarhyde, Vanessa Rose Phin, Vajra Chandrasekera, Romie Stott, Maureen Kincaid Speller, and the Strange Horizons Staff
Uncanny Magazine, publishers/editors-in-chief Lynne M. Thomas and Michael Damian Thomas, managing editor Michi Trota, podcast producers Erika Ensign and Steven Schapansky, Disabled People Destroy Science Fiction Special Issue editors-in-chief Elsa Sjunneson-Henry and Dominik Parisien (GANADOR)
Best Fanzine
Galactic Journey, founder Gideon Marcus, editor Janice Marcus
Journey Planet, edited by Team Journey Planet
Lady Business, editors Ira, Jodie, KJ, Renay & Susan (GANADOR)
nerds of a feather, flock together, editors Joe Sherry, Vance Kotrla and The G
Quick Sip Reviews, editor Charles Payseur
Rocket Stack Rank, editors Greg Hullender and Eric Wong
Best Fancast
Be the Serpent, presented by Alexandra Rowland, Freya Marske and Jennifer Mace
The Coode Street Podcast, presented by Jonathan Strahan and Gary K. Wolfe
Fangirl Happy Hour, hosted by Ana Grilo and Renay Williams
Galactic Suburbia, hosted by Alisa Krasnostein, Alexandra Pierce, and Tansy Rayner Roberts, produced by Andrew Finch
Our Opinions Are Correct, hosted by Annalee Newitz and Charlie Jane Anders (GANADOR)
The Skiffy and Fanty Show, produced by Jen Zink and Shaun Duke, hosted by the Skiffy and Fanty Crew
Best Fan Writer
Foz Meadows (GANADOR)
James Davis Nicoll
Charles Payseur
Elsa Sjunneson-Henry
Alasdair Stuart
Bogi Takács
Best Fan Artist
Sara Felix
Grace P. Fong
Meg Frank
Ariela Housman
Likhain (Mia Sereno) (GANADOR)
Spring Schoenhuth
Best Art Book
The Books of Earthsea: The Complete Illustrated Edition, illustrated by Charles Vess, written by Ursula K. Le Guin (Saga Press /Gollancz) GANADOR
Daydreamer’s Journey: The Art of Julie Dillon, by Julie Dillon (self-published)
Dungeons & Dragons Art & Arcana: A Visual History, by Michael Witwer, Kyle Newman, Jon Peterson, Sam Witwer (Ten Speed Press)
Spectrum 25: The Best in Contemporary Fantastic Art, ed. John Fleskes (Flesk Publications)
Spider-Man: Into the Spider-Verse – The Art of the Movie, by Ramin Zahed (Titan Books)
Tolkien: Maker of Middle-earth, ed. Catherine McIlwaine (Bodleian Library)
Además de los Hugo tenemos estos dos premios manejados por by Worldcon 76 :
Lodestar Award for Best Young Adult Book
The Belles, by Dhonielle Clayton (Freeform / Gollancz)
Children of Blood and Bone, by Tomi Adeyemi (Henry Holt / Macmillan Children’s Books) (GANADOR)
The Cruel Prince, by Holly Black (Little, Brown / Hot Key Books)
Dread Nation, by Justina Ireland (Balzer + Bray)
The Invasion, by Peadar O’Guilin (David Fickling Books / Scholastic)
Tess of the Road, by Rachel Hartman (Random House / Penguin Teen)
John W. Campbell Award for Best New Writer
Katherine Arden*
S.A. Chakraborty*
R.F. Kuang
Jeannette Ng* (GANADOR)
Vina Jie-Min Prasad*
Rivers Solomon*
 NOTICIAS: GANADORES DE LOS HUGO AWARDS 2019 Ayer en el marco de la  Worldcon,  77th World Science Fiction Convention, se dieorn a conocer a los ganadores de los premios Hugo y los premios…
0 notes
douglasacogan · 6 years
Text
So how was it decided Reality Winner should get 63 months for leaking classified information? Does it seem about right?
The questions in the title of this post are prompted by this news out of the federal criminal justice system via the New York Times: "Reality L. Winner, a former Air Force linguist who was the first person prosecuted by the Trump administration on charges of leaking classified information, pleaded guilty on Tuesday as part of an agreement with prosecutors that calls for a sentence of 63 months in prison." Here is more of the particulars and some context:
Ms. Winner, who entered her plea in Federal District Court in Augusta, Ga., was arrested last June and accused of sharing a classified report about Russian interference in the 2016 election with the news media. Ms. Winner, who is now 26, has been jailed since her arrest and wore an orange prison jumpsuit and white sneakers to the hearing. Her decision to plead guilty to one felony count allows the government both to avoid a complex trial that had been scheduled for October and to notch a victory in the Trump administration’s aggressive pursuit of leakers.
“All of my actions I did willfully, meaning I did so of my own free will,” Ms. Winner told Chief Judge J. Randal Hall on Tuesday. Throughout the hearing, Ms. Winner kept her hands behind her back while she answered questions about whether she understood the terms of the plea deal.
Ms. Winner, who was honorably discharged from the Air Force in 2016, was working as a contractor for the National Security Agency when she obtained a copy of a report that described hacks by a Russian intelligence service against local election officials and a company that sold software related to voter registration. The Intercept, an online news outlet that a prosecutor said Ms. Winner admired, published a copy of the top secret report shortly before Ms. Winner’s arrest was made public. The report described two cyberattacks by Russia’s military intelligence unit, the G.R.U. — one in August against a company that sells voter registration-related software and another, a few days before the election, against 122 local election officials.
At a detention hearing last year, the prosecutor, Jennifer G. Solari, said that Ms. Winner had been “mad about some things she had seen in the media, and she wanted to set the facts right.”...
Once rare, leak cases have become much more common in the 21st century, in part because of such electronic trails. Depending on how they are counted, the Obama administration brought nine or 10 leak-related prosecutions — about twice as many as were brought under all previous presidencies combined.
The Justice Department prosecuted Ms. Winner under the Espionage Act, a World War I-era law that criminalizes the unauthorized disclosure of national-security secrets that could be used to harm the United States or aid a foreign adversary. Ms. Winner’s prosecution galvanized transparency advocates, who mounted a publicity campaign in her support that even included a billboard in Augusta, the east Georgia city where Ms. Winner lived at the time of her arrest. They were particularly infuriated by a judge’s ruling that she be held until her trial....
Ms. Winner is the second person known to have reached a plea agreement with the Trump administration to resolve a leak prosecution. A former F.B.I. agent, Terry J. Albury, pleaded guilty in April, but prosecutors in that case have signaled that they will ask that he serve 46 to 57 months in prison.
The Justice Department has brought at least two other leak-related cases under the Trump administration.  Earlier this month, James Wolfe, a former Senate Intelligence Committee staffer, was arrested and charged with lying to the F.B.I. about his contacts with reporters, including a Times reporter with whom he had a personal relationship and whose phone records the department secretly seized, during a leak investigation; Mr. Wolfe has not been charged with leaking classified information, however.  He has pleaded not guilty.  Also this month, Joshua A. Schulte, a former C.I.A. software engineer, with charged with violating the Espionage Act and other laws based on accusations that he sent a stolen archive of documents and electronic tools related to the agency’s hacking operations to WikiLkeas, which dubbed them the Vault 7 leak. Mr. Schulte had already been facing child pornography charges.
A judge must still decide whether to approve her sentence after reviewing a report that prosecutors will present.  But prosecutors’ recommendation of more than five years in prison — followed by three years of supervised release — was unusually harsh for a leak case.  For most of American history, people accused of leaking to the news media were not prosecuted at all.  In the flurry of cases that have arisen during the 21st century, most convicted defendants were sentenced to one to three-and-a-half years.
One — Chelsea Manning, who was convicted at a military court-martial for sending large archives of military and diplomatic documents to WikiLeaks — was sentenced to 35 years in prison, but served only about seven years because President Barack Obama commuted the remainder of her sentence.
As this article suggests, there is not a lot of history of sentences for these kinds of leaks, and arguably the Chelsea Manning case sets a notable benchmark for how high a sentence might go for this kind of illegal leaking. But there are lots of ways to distinguish Manning and Winner, and Winner still seems to be getting a sentence considerably more severe than most modern leakers. That said, if one believes that deterrence considerations are especially important and perhaps effective in this setting, perhaps it is particularly justifiable for federal prosecutors to try to throw the book at the few high-profile leakers who get convicted.
Notably, as this article notes, a federal judge has to decide whether to accept this particular plea deal with its built-in sentence of 63 months.  Comments are welcome concerning whether the judge out to have some pause about doing so.
from RSSMix.com Mix ID 8247011 http://sentencing.typepad.com/sentencing_law_and_policy/2018/06/so-how-was-it-decided-reality-winner-should-get-63-months-for-leaking-classified-information-does-it.html via http://www.rssmix.com/
0 notes
benrleeusa · 6 years
Text
So how was it decided Reality Winner should get 63 months for leaking classified information? Does it seem about right?
The questions in the title of this post are prompted by this news out of the federal criminal justice system via the New York Times: "Reality L. Winner, a former Air Force linguist who was the first person prosecuted by the Trump administration on charges of leaking classified information, pleaded guilty on Tuesday as part of an agreement with prosecutors that calls for a sentence of 63 months in prison." Here is more of the particulars and some context:
Ms. Winner, who entered her plea in Federal District Court in Augusta, Ga., was arrested last June and accused of sharing a classified report about Russian interference in the 2016 election with the news media. Ms. Winner, who is now 26, has been jailed since her arrest and wore an orange prison jumpsuit and white sneakers to the hearing. Her decision to plead guilty to one felony count allows the government both to avoid a complex trial that had been scheduled for October and to notch a victory in the Trump administration’s aggressive pursuit of leakers.
“All of my actions I did willfully, meaning I did so of my own free will,” Ms. Winner told Chief Judge J. Randal Hall on Tuesday. Throughout the hearing, Ms. Winner kept her hands behind her back while she answered questions about whether she understood the terms of the plea deal.
Ms. Winner, who was honorably discharged from the Air Force in 2016, was working as a contractor for the National Security Agency when she obtained a copy of a report that described hacks by a Russian intelligence service against local election officials and a company that sold software related to voter registration. The Intercept, an online news outlet that a prosecutor said Ms. Winner admired, published a copy of the top secret report shortly before Ms. Winner’s arrest was made public. The report described two cyberattacks by Russia’s military intelligence unit, the G.R.U. — one in August against a company that sells voter registration-related software and another, a few days before the election, against 122 local election officials.
At a detention hearing last year, the prosecutor, Jennifer G. Solari, said that Ms. Winner had been “mad about some things she had seen in the media, and she wanted to set the facts right.”...
Once rare, leak cases have become much more common in the 21st century, in part because of such electronic trails. Depending on how they are counted, the Obama administration brought nine or 10 leak-related prosecutions — about twice as many as were brought under all previous presidencies combined.
The Justice Department prosecuted Ms. Winner under the Espionage Act, a World War I-era law that criminalizes the unauthorized disclosure of national-security secrets that could be used to harm the United States or aid a foreign adversary. Ms. Winner’s prosecution galvanized transparency advocates, who mounted a publicity campaign in her support that even included a billboard in Augusta, the east Georgia city where Ms. Winner lived at the time of her arrest. They were particularly infuriated by a judge’s ruling that she be held until her trial....
Ms. Winner is the second person known to have reached a plea agreement with the Trump administration to resolve a leak prosecution. A former F.B.I. agent, Terry J. Albury, pleaded guilty in April, but prosecutors in that case have signaled that they will ask that he serve 46 to 57 months in prison.
The Justice Department has brought at least two other leak-related cases under the Trump administration.  Earlier this month, James Wolfe, a former Senate Intelligence Committee staffer, was arrested and charged with lying to the F.B.I. about his contacts with reporters, including a Times reporter with whom he had a personal relationship and whose phone records the department secretly seized, during a leak investigation; Mr. Wolfe has not been charged with leaking classified information, however.  He has pleaded not guilty.  Also this month, Joshua A. Schulte, a former C.I.A. software engineer, with charged with violating the Espionage Act and other laws based on accusations that he sent a stolen archive of documents and electronic tools related to the agency’s hacking operations to WikiLkeas, which dubbed them the Vault 7 leak. Mr. Schulte had already been facing child pornography charges.
A judge must still decide whether to approve her sentence after reviewing a report that prosecutors will present.  But prosecutors’ recommendation of more than five years in prison — followed by three years of supervised release — was unusually harsh for a leak case.  For most of American history, people accused of leaking to the news media were not prosecuted at all.  In the flurry of cases that have arisen during the 21st century, most convicted defendants were sentenced to one to three-and-a-half years.
One — Chelsea Manning, who was convicted at a military court-martial for sending large archives of military and diplomatic documents to WikiLeaks — was sentenced to 35 years in prison, but served only about seven years because President Barack Obama commuted the remainder of her sentence.
As this article suggests, there is not a lot of history of sentences for these kinds of leaks, and arguably the Chelsea Manning case sets a notable benchmark for how high a sentence might go for this kind of illegal leaking. But there are lots of ways to distinguish Manning and Winner, and Winner still seems to be getting a sentence considerably more severe than most modern leakers. That said, if one believes that deterrence considerations are especially important and perhaps effective in this setting, perhaps it is particularly justifiable for federal prosecutors to try to throw the book at the few high-profile leakers who get convicted.
Notably, as this article notes, a federal judge has to decide whether to accept this particular plea deal with its built-in sentence of 63 months.  Comments are welcome concerning whether the judge out to have some pause about doing so.
0 notes
ellascreams · 8 days
Text
Memory, Mortality, and Apathy
[Members of The Agency, Zoraxis, and this fandom, have all found themselves wondering how Phoenix survives so many things, and there have been many theories. Phoenix is worse at theorizing, but they’ve been wondering how even more than anyone else.]
There were hardly any Zoraxis or Agency employees who didn’t know the name Agent Phoenix. There were hardly any who hadn’t heard of them surviving things like being crushed under a building they just fell from or atmospheric reentry. There was hardly anyone in their line of work who hadn’t wondered how Phoenix did it.
Many people came up with their own theories. Plenty of people tried to ask them about it directly. Even some of the heads of the EOD asked them how they did it, and Reginald had asked them many times. Still, they never told anyone. They never even said anything. They’d simply put their pointer finger in front of their smug smile.
The secret to the Phoenix’s survival was something only they knew, or so everyone seemed to think. They did have a secret only they knew. The secret was that they were just as confused as everybody else.
There was no logical way they could’ve survived the Death Engine. Phoenix knew this because they had tried several times to think of one. But no. No matter how many times they tried, they always came to the same conclusion. They shouldn’t have survived. No wonder Zor bought their fake death. It made way more sense than the truth.
Then there was the Peace Summit. They had a much higher chance of surviving that so it wouldn’t be that odd if it wasn’t for literally everything else. If it wasn’t part of this pattern of them escaping death practically or relatively unscathed.
There were different types of unscathed, by the way. During their many trips to infirmaries, Phoenix noticed that even Agency doctors had their own codes. “Unscathed” meant what it was supposed to mean. They escaped with absolutely no injuries. “Practically unscathed” meant that they had gotten a few scrapes or cuts, but it wasn’t anything bad. It was injuries that really only needed some disinfectant and bandages, if not ointment and bandaids. “Relatively unscathed” meant that they were seriously injured, but they should have died, or at the very least had the decency to fall into a coma.
While Phoenix was never truly unscathed, they usually didn’t get very hurt. They broke their leg at the Peace Summit, which was the main reason it took them so long to contact Reginald, and they were covered in burns after the Death Engine, but both times they were still missing some injuries they should’ve had. Like concussions. They had never gotten a concussion. And while they were almost sure that was just dumb luck, it still worried them, because it meant they couldn’t make any excuses for their memory loss.
The Death Engine. They remembered being there. In space. The explosion and Solaris’s cries. The strange sensation of falling, but not because gravity was pulling them, it was because something was pushing them towards the world below. Then gravity began to pull. Then… well something must’ve happened. Maybe the air pressure or lack of oxygen made them pass out. That was perfectly reasonable, but Phoenix didn’t know if what was reasonable mattered anymore.
They had some very vague and fuzzy memories of getting medical attention. But their next clear memory was being back in their office with Reginald’s voice in their ear again, and a slight burning pain all over their left side and torso. They remembered it feeling like they had been half asleep and then suddenly woken up. They knew that time had passed in that weird way they just knew that every time they woke up, and they were generally aware of everything that had just happened, but if they tried to remember anything specific it got all weird and dream like.
They remembered the Peace Summit. They remembered the feeling of falling the normal way, where gravity was pulling them downwards. They remembered being so relieved that they stopped Zor, the world seemed to slow down. All seemed calm, even though it was anything but. Their muscles relaxed as they enjoyed the feeling of the wind rushing around them. Maybe they fell asleep. It wouldn’t have been that odd if they did, they were really tired, and they tended to feel very relaxed when they thought they were going to die. The worst was already happening, so why worry? Why not take a moment, their last moment, to rest?
They remembered waking up with a broken leg pretty well because WOW did that hurt. You’d think a spy would get used to that, but no. Pain catching up when adrenaline wears off will always be unpleasant for everyone who experiences it. Then they remembered climbing out of rubble. Everything after that sort of blurred together. It was a lot of walking, limping, searching, and surviving. How long did it take them to find that base? A couple hours? A couple weeks? They didn’t know. But who would know in a situation like that? Then they got to the base and they remembered everything so clearly.
They remembered their other missions almost entirely. Well, they blacked out during Operation KBOOM so they didn’t remember all of that one, but there was a good explanation for that. Phoenix was pretty sure human brains weren’t designed for any amount of telekinesis, but they were positive human brains hadn’t been designed for that much telekinesis.
The important thing is that they could remember most of their missions all the way through in a way that made sense. In a way where it would actually make less sense for there to be something else there they had forgotten. Therefore, those memories should have been normal. But they weren’t.
Every now and then, when Phoenix thought back to a mission, they got this strange feeling that something was… off. Like something small was being blocked out. Like they were missing a couple moments, or something they remembered thinking wasn’t actually what they’d been thinking at the time, or maybe even that something or someone else was there with them. But they were sure that if they added in what they thought was missing, the memory would’ve made less sense.
How did Agent Phoenix survive so many things? Were they forgetting something? What was the secret to their success? Those questions were too broad. They started asking themself smaller questions.
Did any of this have to do with their TK implant? How were they supposed to know? They guessed that if these… symptoms only started after getting their implant, it was probably related to the implant. Phoenix didn’t remember forgetting anything before the implant. They didn’t have many near death experiences back then, so they weren’t sure if they could’ve avoided death. They had been pretty immune to anesthetics and stuff their whole life.
That led Phoenix to their next question: was being pretty immune to anesthetics and stuff related to everything else? Alcohol was supposed to mess with memories, so surely it wouldn’t affect their memories if it didn’t affect them any other ways, right? Then again, their odd constitution did make them resistant to certain poisons, and those could be lethal. That meant it was yet another thing that protected them from death.
They were assuming the cause was scientific, but what if it was magical? Phoenix didn’t believe in magic but they were open to being proven wrong. Maybe they were blessed with some sort of immortality, or luck, or something a while back. Actually, would it have been a blessing or a curse? They weren’t sure they liked it. They weren’t sure they disliked it either.
Question after question they discovered dead end after dead end. They had no idea what had been happening to them and they had no way of finding out. They considered asking Prism for her help. Maybe together they could find the answer. But they shook their head.
No matter how many questions they asked, how many hours they spent thinking, no matter how hard they tried, Phoenix couldn’t get themself to care that much. They felt like they should. Normal people would be worried or curious about these things happening to them. Normal people might even feel bad about having some weird protection, like they were cheating somehow. But they saw no issue with cheating if it meant saving the world, and they didn’t need to know about any strange powers they might have, so why bother knowing about them?
If an opportunity ever presented itself, Phoenix would be happy to learn what has happening to them. Until then, they decided they just didn’t care enough, and they stopped thinking about it. Eventually, something would remind them of their situation, then they’d start thinking about it all over again. It might take them a while to escape this cycle.
2 notes · View notes
brianlichtig · 7 years
Text
Shadow Brokers dump contained Solaris hacking tools
After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.
The Register reported that the dumped Shadow Broker files reference two programs, Extremeparr and Ebbisland, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and Sparc architectures.
To read this article in full or to leave a comment, please click here
from CIO http://www.cio.com/article/3189614/security/shadow-brokers-dump-contained-solaris-hacking-tools.html#tk.rss_all Baltimore IT Support
0 notes
Text
Shadow Brokers dump contained Solaris hacking tools
After the Shadow Brokers group opened up its archive of exploits allegedly stolen from the United States National Security Agency, security experts found a nasty surprise waiting for Solaris administrators.
The Register reported that the dumped Shadow Broker files reference two programs, EXTREMEPARR and EBBISLAND, that would let attackers obtain root access remotely over the network on Solaris boxes running versions 6 to 10 on x86 and SPARC architectures.
To read this article in full or to leave a comment, please click here
The post Shadow Brokers dump contained Solaris hacking tools appeared first on Computer Systems Design.
from Computer Systems Design http://ift.tt/2o7mVcZ
0 notes
annadianecass · 7 years
Text
Solaris admins! Look out – Working Remote Root Exploit Leaked in Shadow Brokers Dump
Now that the sulky Shadow Brokers gang has leaked its archive of stolen NSA exploits, security experts are trawling Uncle Sam’s classified attack code – and the results aren’t good for anyone using Oracle’s Solaris. Matthew Hickey, cofounder of British security shop Hacker House, has been going through the dumped files, which once belonged to the spy agency’s Equation Group and are now handily mirrored on GitHub. Hickey today identified two key programs – EXTREMEPARR and EBBISLAND – that can escalate a logged-in user’s privileges to root, and obtain root access remotely over the network, on Solaris boxes running versions 6 to 10 on x86 and Sparc, and possibly also the latest build, version 11.
View full story
ORIGINAL SOURCE: The Register
The post Solaris admins! Look out – Working Remote Root Exploit Leaked in Shadow Brokers Dump appeared first on IT SECURITY GURU.
from Solaris admins! Look out – Working Remote Root Exploit Leaked in Shadow Brokers Dump
0 notes
news-wars-blog · 7 years
Text
WikiLeaks Vault7 Leaked CIA Files
RELEASE: CIA Vault 7 Year Zero decryption passphrase: SplinterItIntoAThousandPiecesAndScatterItIntoTheWinds
Download here: https://t.co/gpBxJAoYD5 
Today, Tuesday 7 March 2017, WikiLeaks begins its new series of leaks on the U.S. Central Intelligence Agency. Code-named „Vault 7“ by WikiLeaks, it is the largest ever publication of confidential documents on the agency.
The first full part of the series, „Year Zero“, comprises 8,761 documents and files from an isolated, high-security network situated inside the CIA’s Center for Cyber Intelligence in Langley, Virgina. It follows an introductory disclosure last month of CIA targeting French political parties and candidates in the lead up to the 2012 presidential election.
Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized „zero day“ exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred million lines of code, gives its possessor the entire hacking capacity of the CIA. The archive appears to have been circulated among former U.S. government hackers and contractors in an unauthorized manner, one of whom has provided WikiLeaks with portions of the archive.
„Year Zero“ introduces the scope and direction of the CIA’s global covert hacking program, its malware arsenal and dozens of „zero day“ weaponized exploits against a wide range of U.S. and European company products, include Apple’s iPhone, Google’s Android and Microsoft’s Windows and even Samsung TVs, which are turned into covert microphones.
Since 2001 the CIA has gained political and budgetary preeminence over the U.S. National Security Agency (NSA). The CIA found itself building not just its now infamous drone fleet, but a very different type of covert, globe-spanning force — its own substantial fleet of hackers. The agency’s hacking division freed it from having to disclose its often controversial operations to the NSA (its primary bureaucratic rival) in order to draw on the NSA’s hacking capacities.
By the end of 2016, the CIA’s hacking division, which formally falls under the agency’s Center for Cyber Intelligence (CCI), had over 5000 registered users and had produced more than a thousand hacking systems, trojans, viruses, and other „weaponized“ malware. Such is the scale of the CIA’s undertaking that by 2016, its hackers had utilized more code than that used to run Facebook. The CIA had created, in effect, its „own NSA“ with even less accountability and without publicly answering the question as to whether such a massive budgetary spend on duplicating the capacities of a rival agency could be justified.
In a statement to WikiLeaks the source details policy questions that they say urgently need to be debated in public, including whether the CIA’s hacking capabilities exceed its mandated powers and the problem of public oversight of the agency. The source wishes to initiate a public debate about the security, creation, use, proliferation and democratic control of cyberweapons.
Once a single cyber ‚weapon‘ is ‚loose‘ it can spread around the world in seconds, to be used by rival states, cyber mafia and teenage hackers alike.
Julian Assange, WikiLeaks editor stated that „There is an extreme proliferation risk in the development of cyber ‚weapons‘. Comparisons can be drawn between the uncontrolled proliferation of such ‚weapons‘, which results from the inability to contain them combined with their high market value, and the global arms trade. But the significance of „Year Zero“ goes well beyond the choice between cyberwar and cyberpeace. The disclosure is also exceptional from a political, legal and forensic perspective.“
Wikileaks has carefully reviewed the „Year Zero“ disclosure and published substantive CIA documentation while avoiding the distribution of ‚armed‘ cyberweapons until a consensus emerges on the technical and political nature of the CIA’s program and how such ‚weapons‘ should analyzed, disarmed and published.
Wikileaks has also decided to redact and anonymise some identifying information in „Year Zero“ for in depth analysis. These redactions include ten of thousands of CIA targets and attack machines throughout Latin America, Europe and the United States. While we are aware of the imperfect results of any approach chosen, we remain committed to our publishing model and note that the quantity of published pages in „Vault 7“ part one (“Year Zero”) already eclipses the total number of pages published over the first three years of the Edward Snowden NSA leaks.
Analysis
  CIA malware targets iPhone, Android, smart TVs
CIA malware and hacking tools are built by EDG (Engineering Development Group), a software development group within CCI (Center for Cyber Intelligence), a department belonging to the CIA’s DDI (Directorate for Digital Innovation). The DDI is one of the five major directorates of the CIA (see this organizational chart of the CIA for more details).
The EDG is responsible for the development, testing and operational support of all backdoors, exploits, malicious payloads, trojans, viruses and any other kind of malware used by the CIA in its covert operations world-wide.
The increasing sophistication of surveillance techniques has drawn comparisons with George Orwell’s 1984, but „Weeping Angel“, developed by the CIA’s Embedded Devices Branch (EDB), which infests smart TVs, transforming them into covert microphones, is surely its most emblematic realization.
The attack against Samsung smart TVs was developed in cooperation with the United Kingdom’s MI5/BTSS. After infestation, Weeping Angel places the target TV in a ‚Fake-Off‘ mode, so that the owner falsely believes the TV is off when it is on. In ‚Fake-Off‘ mode the TV operates as a bug, recording conversations in the room and sending them over the Internet to a covert CIA server.
As of October 2014 the CIA was also looking at infecting the vehicle control systems used by modern cars and trucks. The purpose of such control is not specified, but it would permit the CIA to engage in nearly undetectable assassinations.
The CIA’s Mobile Devices Branch (MDB) developed numerous attacks to remotely hack and control popular smart phones. Infected phones can be instructed to send the CIA the user’s geolocation, audio and text communications as well as covertly activate the phone’s camera and microphone.
Despite iPhone’s minority share (14.5%) of the global smart phone market in 2016, a specialized unit in the CIA’s Mobile Development Branch produces malware to infest, control and exfiltrate data from iPhones and other Apple products running iOS, such as iPads. CIA’s arsenal includes numerous local and remote „zero days“ developed by CIA or obtained from GCHQ, NSA, FBI or purchased from cyber arms contractors such as Baitshop. The disproportionate focus on iOS may be explained by the popularity of the iPhone among social, political, diplomatic and business elites.
A similar unit targets Google’s Android which is used to run the majority of the world’s smart phones (~85%) including Samsung, HTC and Sony. 1.15 billion Android powered phones were sold last year. „Year Zero“ shows that as of 2016 the CIA had 24 „weaponized“ Android „zero days“ which it has developed itself and obtained from GCHQ, NSA and cyber arms contractors.
These techniques permit the CIA to bypass the encryption of WhatsApp, Signal, Telegram, Wiebo, Confide and Cloackman by hacking the „smart“ phones that they run on and collecting audio and message traffic before encryption is applied.
  CIA malware targets Windows, OSx, Linux, routers
The CIA also runs a very substantial effort to infect and control Microsoft Windows users with its malware. This includes multiple local and remote weaponized „zero days“, air gap jumping viruses such as „Hammer Drill“ which infects software distributed on CD/DVDs, infectors for removable media such as USBs, systems to hide data in images or in covert disk areas ( „Brutal Kangaroo“) and to keep its malware infestations going.
Many of these infection efforts are pulled together by the CIA’s Automated Implant Branch (AIB), which has developed several attack systems for automated infestation and control of CIA malware, such as „Assassin“ and „Medusa“.
Attacks against Internet infrastructure and webservers are developed by the CIA’s Network Devices Branch (NDB).
The CIA has developed automated multi-platform malware attack and control systems covering Windows, Mac OS X, Solaris, Linux and more, such as EDB’s „HIVE“ and the related „Cutthroat“ and „Swindle“ tools, which are described in the examples section below.
  CIA ‚hoarded‘ vulnerabilities („zero days“)
In the wake of Edward Snowden’s leaks about the NSA, the U.S. technology industry secured a commitment from the Obama administration that the executive would disclose on an ongoing basis — rather than hoard — serious vulnerabilities, exploits, bugs or „zero days“ to Apple, Google, Microsoft, and other US-based manufacturers.
Serious vulnerabilities not disclosed to the manufacturers places huge swathes of the population and critical infrastructure at risk to foreign intelligence or cyber criminals who independently discover or hear rumors of the vulnerability. If the CIA can discover such vulnerabilities so can others.
The U.S. government’s commitment to the Vulnerabilities Equities Process came after significant lobbying by US technology companies, who risk losing their share of the global market over real and perceived hidden vulnerabilities. The government stated that it would disclose all pervasive vulnerabilities discovered after 2010 on an ongoing basis.
„Year Zero“ documents show that the CIA breached the Obama administration’s commitments. Many of the vulnerabilities used in the CIA’s cyber arsenal are pervasive and some may already have been found by rival intelligence agencies or cyber criminals.
As an example, specific CIA malware revealed in „Year Zero“ is able to penetrate, infest and control both the Android phone and iPhone software that runs or has run presidential Twitter accounts. The CIA attacks this software by using undisclosed security vulnerabilities („zero days“) possessed by the CIA but if the CIA can hack these phones then so can everyone else who has obtained or discovered the vulnerability. As long as the CIA keeps these vulnerabilities concealed from Apple and Google (who make the phones) they will not be fixed, and the phones will remain hackable.
The same vulnerabilities exist for the population at large, including the U.S. Cabinet, Congress, top CEOs, system administrators, security officers and engineers. By hiding these security flaws from manufacturers like Apple and Google the CIA ensures that it can hack everyone &mdsh; at the expense of leaving everyone hackable.
  ‚Cyberwar‘ programs are a serious proliferation risk
Cyber ‚weapons‘ are not possible to keep under effective control.
While nuclear proliferation has been restrained by the enormous costs and visible infrastructure involved in assembling enough fissile material to produce a critical nuclear mass, cyber ‚weapons‘, once developed, are very hard to retain.
Cyber ‚weapons‘ are in fact just computer programs which can be pirated like any other. Since they are entirely comprised of information they can be copied quickly with no marginal cost.
Securing such ‚weapons‘ is particularly difficult since the same people who develop and use them have the skills to exfiltrate copies without leaving traces — sometimes by using the very same ‚weapons‘ against the organizations that contain them. There are substantial price incentives for government hackers and consultants to obtain copies since there is a global „vulnerability market“ that will pay hundreds of thousands to millions of dollars for copies of such ‚weapons‘. Similarly, contractors and companies who obtain such ‚weapons‘ sometimes use them for their own purposes, obtaining advantage over their competitors in selling ‚hacking‘ services.
Over the last three years the United States intelligence sector, which consists of government agencies such as the CIA and NSA and their contractors, such as Booze Allan Hamilton, has been subject to unprecedented series of data exfiltrations by its own workers.
A number of intelligence community members not yet publicly named have been arrested or subject to federal criminal investigations in separate incidents.
Most visibly, on February 8, 2017 a U.S. federal grand jury indicted Harold T. Martin III with 20 counts of mishandling classified information. The Department of Justice alleged that it seized some 50,000 gigabytes of information from Harold T. Martin III that he had obtained from classified programs at NSA and CIA, including the source code for numerous hacking tools.
Once a single cyber ‚weapon‘ is ‚loose‘ it can spread around the world in seconds, to be used by peer states, cyber mafia and teenage hackers alike.
  U.S. Consulate in Frankfurt is a covert CIA hacker base
In addition to its operations in Langley, Virginia the CIA also uses the U.S. consulate in Frankfurt as a covert base for its hackers covering Europe, the Middle East and Africa.
CIA hackers operating out of the Frankfurt consulate ( „Center for Cyber Intelligence Europe“ or CCIE) are given diplomatic („black“) passports and State Department cover. The instructions for incoming CIA hackers make Germany’s counter-intelligence efforts appear inconsequential: „Breeze through German Customs because you have your cover-for-action story down pat, and all they did was stamp your passport“
Your Cover Story (for this trip) Q: Why are you here? A: Supporting technical consultations at the Consulate.
Two earlier WikiLeaks publications give further detail on CIA approaches to customs and secondary screening procedures.
Once in Frankfurt CIA hackers can travel without further border checks to the 25 European countries that are part of the Shengen open border area — including France, Italy and Switzerland.
A number of the CIA’s electronic attack methods are designed for physical proximity. These attack methods are able to penetrate high security networks that are disconnected from the internet, such as police record database. In these cases, a CIA officer, agent or allied intelligence officer acting under instructions, physically infiltrates the targeted workplace. The attacker is provided with a USB containing malware developed for the CIA for this purpose, which is inserted into the targeted computer. The attacker then infects and exfiltrates data to removable media. For example, the CIA attack system Fine Dining, provides 24 decoy applications for CIA spies to use. To witnesses, the spy appears to be running a program showing videos (e.g VLC), presenting slides (Prezi), playing a computer game (Breakout2, 2048) or even running a fake virus scanner (Kaspersky, McAfee, Sophos). But while the decoy application is on the screen, the underlaying system is automatically infected and ransacked.
  How the CIA dramatically increased proliferation risks
In what is surely one of the most astounding intelligence own goals in living memory, the CIA structured its classification regime such that for the most market valuable part of „Vault 7“ — the CIA’s weaponized malware (implants + zero days), Listening Posts (LP), and Command and Control (C2) systems — the agency has little legal recourse.
The CIA made these systems unclassified.
Why the CIA chose to make its cyberarsenal unclassified reveals how concepts developed for military use do not easily crossover to the ‚battlefield‘ of cyber ‚war‘.
To attack its targets, the CIA usually requires that its implants communicate with their control programs over the internet. If CIA implants, Command & Control and Listening Post software were classified, then CIA officers could be prosecuted or dismissed for violating rules that prohibit placing classified information onto the Internet. Consequently the CIA has secretly made most of its cyber spying/war code unclassified. The U.S. government is not able to assert copyright either, due to restrictions in the U.S. Constitution. This means that cyber ‚arms‘ manufactures and computer hackers can freely „pirate“ these ‚weapons‘ if they are obtained. The CIA has primarily had to rely on obfuscation to protect its malware secrets.
Conventional weapons such as missiles may be fired at the enemy (i.e into an unsecured area). Proximity to or impact with the target detonates the ordnance including its classified parts. Hence military personnel do not violate classification rules by firing ordnance with classified parts. Ordnance will likely explode. If it does not, that is not the operator’s intent.
Over the last decade U.S. hacking operations have been increasingly dressed up in military jargon to tap into Department of Defense funding streams. For instance, attempted „malware injections“ (commercial jargon) or „implant drops“ (NSA jargon) are being called „fires“ as if a weapon was being fired. However the analogy is questionable.
Unlike bullets, bombs or missiles, most CIA malware is designed to live for days or even years after it has reached its ‚target‘. CIA malware does not „explode on impact“ but rather permanently infests its target. In order to infect target’s device, copies of the malware must be placed on the target’s devices, giving physical possession of the malware to the target. To exfiltrate data back to the CIA or to await further instructions the malware must communicate with CIA Command & Control (C2) systems placed on internet connected servers. But such servers are typically not approved to hold classified information, so CIA command and control systems are also made unclassified.
A successful ‚attack‘ on a target’s computer system is more like a series of complex stock maneuvers in a hostile take-over bid or the careful planting of rumors in order to gain control over an organization’s leadership rather than the firing of a weapons system. If there is a military analogy to be made, the infestation of a target is perhaps akin to the execution of a whole series of military maneuvers against the target’s territory including observation, infiltration, occupation and exploitation.
  Evading forensics and anti-virus
A series of standards lay out CIA malware infestation patterns which are likely to assist forensic crime scene investigators as well as Apple, Microsoft, Google, Samsung, Nokia, Blackberry, Siemens and anti-virus companies attribute and defend against attacks.
„Tradecraft DO’s and DON’Ts“ contains CIA rules on how its malware should be written to avoid fingerprints implicating the „CIA, US government, or its witting partner companies“ in „forensic review“. Similar secret standards cover the use of encryption to hide CIA hacker and malware communication (pdf), describing targets & exfiltrated data (pdf) as well as executing payloads (pdf) and persisting (pdf) in the target’s machines over time.
CIA hackers developed successful attacks against most well known anti-virus programs. These are documented in AV defeats, Personal Security Products, Detecting and defeating PSPs and PSP/Debugger/RE Avoidance. For example, Comodo was defeated by CIA malware placing itself in the Window’s „Recycle Bin“. While Comodo 6.x has a „Gaping Hole of DOOM“.
CIA hackers discussed what the NSA’s „Equation Group“ hackers did wrong and how the CIA’s malware makers could avoid similar exposure.
    Examples
  The CIA’s Engineering Development Group (EDG) management system contains around 500 different projects (only some of which are documented by „Year Zero“) each with their own sub-projects, malware and hacker tools.
The majority of these projects relate to tools that are used for penetration, infestation („implanting“), control, and exfiltration.
Another branch of development focuses on the development and operation of Listening Posts (LP) and Command and Control (C2) systems used to communicate with and control CIA implants; special projects are used to target specific hardware from routers to smart TVs.
Some example projects are described below, but see the table of contents for the full list of projects described by WikiLeaks‘ „Year Zero“.
  UMBRAGE
The CIA’s hand crafted hacking techniques pose a problem for the agency. Each technique it has created forms a „fingerprint“ that can be used by forensic investigators to attribute multiple different attacks to the same entity.
This is analogous to finding the same distinctive knife wound on multiple separate murder victims. The unique wounding style creates suspicion that a single murderer is responsible. As soon one murder in the set is solved then the other murders also find likely attribution.
The CIA’s Remote Devices Branch’s UMBRAGE group collects and maintains a substantial library of attack techniques ’stolen‘ from malware produced in other states including the Russian Federation.
With UMBRAGE and related projects the CIA cannot only increase its total number of attack types but also misdirect attribution by leaving behind the „fingerprints“ of the groups that the attack techniques were stolen from.
UMBRAGE components cover keyloggers, password collection, webcam capture, data destruction, persistence, privilege escalation, stealth, anti-virus (PSP) avoidance and survey techniques.
  Fine Dining
Fine Dining comes with a standardized questionnaire i.e menu that CIA case officers fill out. The questionnaire is used by the agency’s OSB (Operational Support Branch) to transform the requests of case officers into technical requirements for hacking attacks (typically „exfiltrating“ information from computer systems) for specific operations. The questionnaire allows the OSB to identify how to adapt existing tools for the operation, and communicate this to CIA malware configuration staff. The OSB functions as the interface between CIA operational staff and the relevant technical support staff.
Among the list of possible targets of the collection are ‚Asset‘, ‚Liason Asset‘, ‚System Administrator‘, ‚Foreign Information Operations‘, ‚Foreign Intelligence Agencies‘ and ‚Foreign Government Entities‘. Notably absent is any reference to extremists or transnational criminals. The ‚Case Officer‘ is also asked to specify the environment of the target like the type of computer, operating system used, Internet connectivity and installed anti-virus utilities (PSPs) as well as a list of file types to be exfiltrated like Office documents, audio, video, images or custom file types. The ‚menu‘ also asks for information if recurring access to the target is possible and how long unobserved access to the computer can be maintained. This information is used by the CIA’s ‚JQJIMPROVISE‘ software (see below) to configure a set of CIA malware suited to the specific needs of an operation.
  Improvise (JQJIMPROVISE)
‚Improvise‘ is a toolset for configuration, post-processing, payload setup and execution vector selection for survey/exfiltration tools supporting all major operating systems like Windows (Bartender), MacOS (JukeBox) and Linux (DanceFloor). Its configuration utilities like Margarita allows the NOC (Network Operation Center) to customize tools based on requirements from ‚Fine Dining‘ questionairies.
HIVE
HIVE is a multi-platform CIA malware suite and its associated control software. The project provides customizable implants for Windows, Solaris, MikroTik (used in internet routers) and Linux platforms and a Listening Post (LP)/Command and Control (C2) infrastructure to communicate with these implants.
The implants are configured to communicate via HTTPS with the webserver of a cover domain; each operation utilizing these implants has a separate cover domain and the infrastructure can handle any number of cover domains.
Each cover domain resolves to an IP address that is located at a commercial VPS (Virtual Private Server) provider. The public-facing server forwards all incoming traffic via a VPN to a ‚Blot‘ server that handles actual connection requests from clients. It is setup for optional SSL client authentication: if a client sends a valid client certificate (only implants can do that), the connection is forwarded to the ‚Honeycomb‘ toolserver that communicates with the implant; if a valid certificate is missing (which is the case if someone tries to open the cover domain website by accident), the traffic is forwarded to a cover server that delivers an unsuspicious looking website.
The Honeycomb toolserver receives exfiltrated information from the implant; an operator can also task the implant to execute jobs on the target computer, so the toolserver acts as a C2 (command and control) server for the implant.
Similar functionality (though limited to Windows) is provided by the RickBobby project.
See the classified user and developer guides for HIVE.
  Frequently Asked Questions
  Why now?
WikiLeaks published as soon as its verification and analysis were ready.
In Febuary the Trump administration has issued an Executive Order calling for a „Cyberwar“ review to be prepared within 30 days.
While the review increases the timeliness and relevance of the publication it did not play a role in setting the publication date.
  Redactions
Names, email addresses and external IP addresses have been redacted in the released pages (70,875 redactions in total) until further analysis is complete.
Over-redaction: Some items may have been redacted that are not employees, contractors, targets or otherwise related to the agency, but are, for example, authors of documentation for otherwise public projects that are used by the agency.
Identity vs. person: the redacted names are replaced by user IDs (numbers) to allow readers to assign multiple pages to a single author. Given the redaction process used a single person may be represented by more than one assigned identifier but no identifier refers to more than one real person.
Archive attachments (zip, tar.gz, …) are replaced with a PDF listing all the file names in the archive. As the archive content is assessed it may be made available; until then the archive is redacted.
Attachments with other binary content are replaced by a hex dump of the content to prevent accidental invocation of binaries that may have been infected with weaponized CIA malware. As the content is assessed it may be made available; until then the content is redacted.
The tens of thousands of routable IP addresses references (including more than 22 thousand within the United States) that correspond to possible targets, CIA covert listening post servers, intermediary and test systems, are redacted for further exclusive investigation.
Binary files of non-public origin are only available as dumps to prevent accidental invocation of CIA malware infected binaries.
  Organizational Chart
The organizational chart corresponds to the material published by WikiLeaks so far.
Since the organizational structure of the CIA below the level of Directorates is not public, the placement of the EDG and its branches within the org chart of the agency is reconstructed from information contained in the documents released so far. It is intended to be used as a rough outline of the internal organization; please be aware that the reconstructed org chart is incomplete and that internal reorganizations occur frequently.
  Wiki pages
„Year Zero“ contains 7818 web pages with 943 attachments from the internal development groupware. The software used for this purpose is called Confluence, a proprietary software from Atlassian. Webpages in this system (like in Wikipedia) have a version history that can provide interesting insights on how a document evolved over time; the 7818 documents include these page histories for 1136 latest versions.
The order of named pages within each level is determined by date (oldest first). Page content is not present if it was originally dynamically created by the Confluence software (as indicated on the re-constructed page).
  What time period is covered?
The years 2013 to 2016. The sort order of the pages within each level is determined by date (oldest first).
WikiLeaks has obtained the CIA’s creation/last modification date for each page but these do not yet appear for technical reasons. Usually the date can be discerned or approximated from the content and the page order. If it is critical to know the exact time/date contact WikiLeaks.
  What is „Vault 7“
„Vault 7“ is a substantial collection of material about CIA activities obtained by WikiLeaks.
  When was each part of „Vault 7“ obtained?
Part one was obtained recently and covers through 2016. Details on the other parts will be available at the time of publication.
  Is each part of „Vault 7“ from a different source?
Details on the other parts will be available at the time of publication.
  What is the total size of „Vault 7“?
The series is the largest intelligence publication in history.
  How did WikiLeaks obtain each part of „Vault 7“?
Sources trust WikiLeaks to not reveal information that might help identify them.
  Isn’t WikiLeaks worried that the CIA will act against its staff to stop the series?
No. That would be certainly counter-productive.
  Has WikiLeaks already ‚mined‘ all the best stories?
No. WikiLeaks has intentionally not written up hundreds of impactful stories to encourage others to find them and so create expertise in the area for subsequent parts in the series. They’re there. Look. Those who demonstrate journalistic excellence may be considered for early access to future parts.
WikiLeaks Vault7 Leaked CIA Files was originally published on Alternative News und Medien
0 notes
david8381-blog · 7 years
Text
Electronic Medical Records Market  Share, Size, Analysis, Growth, Trends and Forecasts to 2024 | Hexa Research
An electronic medical record is a computerized version of paper-based medical data of patients. Such electronic medical records are gone for enhancing the general quality of care. Electronic medical record includes blend of clinical, money related, demographic and coded human services information. Numerous administration associations have likewise focused upon the significance of electronic medical records. As per the World Health Organization, the best possible accumulation, administration and utilization of data inside health care frameworks will decide the framework's adequacy in distinguishing wellbeing issues, characterizing needs, recognizing inventive arrangements and designating assets to enhance health outcomes. Right now, various clinics and hospitals are utilizing electronic medical records to store critical archives identified with the patient's sickness. The data store of individual patients would prompt better security and quick information recovery at whatever point required.EMR is a piece of health care information technology that is utilized to make paperless computerized patient information to improve the hospital systems efficiency.
A considerable development rate (more than 16%) of the U.S. human services IT spending and the activities taken by government towards improvement of an across the country social insurance data system are required to push EMR execution over the medical services area in the U.S. The rising interest for the human services cost control and the need to enhance the nature of social insurance administration are driving the development of the EMR market in the U.S.
Browse Details of Report @ https://www.hexaresearch.com/upcoming-research/electronic-medical-records-market
Increase in number of ailments and expanding interest for quality consideration by the patients is making ready for the general development of the electronic medical record innovation internationally. Appearance of incorporated human services administrations conveyance stage with the assistance of EMR innovation has prompted the wide popularity of EMR programming among clinics and hospitals. Rise in the quantity of doctor's facilities and centers is likewise anticipated that would support the general interest for electronic medical record innovation universally.
As of now, electronic medical record innovation is broadly utilized as a part of North America because of the different supporting activities taken by the legislature in this area through the Health Information Technology for Economic and Clinical Health (HITECH) Act of 2009, which coordinated the Office of the National Coordinator (ONC) for Health Information Technology to advance the appropriation and important utilization of electronic medical records in the district. Likewise, there is a motivating force arrangement for the doctor's facilities and centres in the U.S. for encouraging the 'important use' of EMR innovation.
Likewise, the EMR business is uniting, as the players in the electronic medical record industry are getting into organizations, mergers and acquisitions, very much arranged conveyance systems to capitalize over the opportunities present in the undiscovered markets in Latin America and Eastern Europe. In spite of the fact that this business sector is developing at a critical rate, the high cost of EMR programming and usage administrations, combined with the negative perception about the electronic medical record innovation, is ended up being a noteworthy block in the general development of the business sector.
In view of software delivery mode, the electronic medical records business sector can be portioned as: Cloud: Cloud computing programming permits centralized data storage and online access to administrations with various geographic areas. The product has the adaptability to permit anyplace and at any time access of information records. On-premise: On-premises programming, otherwise called shrink wrap, is introduced and worked from the premises of the individual or any association. It makes utilization of the associations nearby processing assets and requires an authorized programming duplicate from a free programming merchant. Taking into account end clients, the electronic medical records business sector can be sectioned as: Hospitals, Clinics and nursing homes, Home health agencies.
The electronic medical records market can be sectioned into four regions: North America, Europe, Asia Pacific and Rest of the World (RoW). Out of these four locales, North America holds a main position in the market took after by Europe. Innovative headway and modernization in the health care framework and enhanced clinical studies are additionally anticipated that would enlarge the development of the electronic medical records market in North America and Europe. Asia Pacific is one of the quickest developing areas internationally and is relied upon to rise as the most encouraging business sector for the development of the electronic medical records market. The components which would help the development of the business sector in Asia Pacific are developing interest for better quality of care, and expanding government activities for electronic health records (EHRs). Besides, better administration of patient's data record and expanding need to minimize records maintenance expenses is also anticipated to highlight the development of the electronic medical records market in Asia Pacific.
Browse Related Category Market Report @
https://www.hexaresearch.com/research-category/electronic-security-systems-industry
The main vendors of the electronic medical records market are 3M Company, Toshiba Medical Systems Corp., Hyland Software, Siemens Medical Solutions, McKesson Corporation, Henry Schein, Inc., Allscripts Healthcare Solutions, Inc., WRS Health, Medical Information Technology, Inc. (Meditech), Cerner Corporation,Quest Diagnostics, GE Healthcare, Epic Systems, SequelMed, Kofax Limited and others..
The major players operating in the electric bus market include AB Volvo, Zhengzhou Yutong Group Co. Ltd.,King Long United Automotive Industry Co. Ltd.,Ashok Leyland Ltd,Shenzhen Wuzhoulong Motors Co. Ltd., Alexander Dennis Limited, EBUSCO, Daimler AG ,Solaris Bus & Coach S.A., BYD Company Limited,Ashok Leyland Ltd and Proterra Inc.
About Us:
Hexa Research is a market research and consulting organization, offering industry reports, custom research and consulting services to a host of key industries across the globe. We offer comprehensive business intelligence in the form of industry reports which help our clients obtain clarity about their business environment and enable them to undertake strategic growth initiatives.
Contact Us:
Ryan Shaw
Hexa Research
Felton Office Plaza
6265 Highway 9
Felton, California 95018
United States
Phone: +1-800-489-3075
Website - http://www.hexaresearch.com/
Follow us on Linkedin : https://www.linkedin.com/company/hexa-research 
0 notes