Machete Just Got Sharper: Venezuelan Government

Total Page:16

File Type:pdf, Size:1020Kb

Machete Just Got Sharper: Venezuelan Government ESET Research White papers // July 2019 MACHETE JUST GOT SHARPER Venezuelan government institutions under attack How spies managed to steal gigabytes of confidential data over the course of a year TABLE OF CONTENTS 1. Introduction . 4 2. Delivery method . 4 3. Timeline of Machete’s latest version . 5 4. Targets . .6 5. Malware operators. 7 6. Technical analysis . 8 6.1 Downloader component . 8 6.2 Obfuscation . 9 6.3 Backdoor components . 10 6.4 Domain names . 27 7. Conclusion. 28 8. References . 29 9. IoCs . 30 LIST OF TABLES Table 1 Tasks scheduled for the execution of components 22 Table 2 Domain names and related IP addresses 27 LIST OF FIGURES Figure 1 Decoy (PDF file) in one of the Machete downloaders (blurred) 5 Figure 2 Countries with Machete victims in 2019 7 Figure 3 Example of a Spanish word in Machete’s code 7 Figure 4 Components of Machete 8 Figure 5 Configuration of a Machete downloader 8 Figure 6 Downloader code 9 Figure 7 Machete’s extra obfuscation 10 Figure 8 Example of Machete’s first layer of obfuscation 10 Figure 9 Executable py2exe components of Machete 11 Figure 10 Version check in GoogleCrash.exe 11 Figure 11 Code to encrypt/decrypt config 12 Figure 12 Main code of Chrome.exe 13 Figure 13 Code to create file listings 14 Figure 14 Code to access clipboard 14 Figure 15 File extensions to copy from removable drives 15 Figure 16 File extensions for physical exfiltration 16 Figure 17 Code on Hack Forums 16 Figure 18 Keys in a Spanish distribution 17 Figure 19 Code for geolocation 18 Figure 20 Code to upload files in Winde 19 Figure 21 Code to download a new configuration 19 Figure 22 Code to update file listings 19 Figure 23 Code to download and execute other binaries 20 Figure 24 Folders on the FTP server 20 Figure 25 Code for HTTP exfiltration 21 Figure 26 Configuration for self-extraction of python27 exe 22 Figure 27 Code for copying files 23 Figure 28 Archive names for different browsers 23 Figure 29 Code to obtain clipboard data 24 Figure 30 Code to obtain information about wireless networks 24 Figure 31 Downloads from C&C server 25 Figure 32 Code to move newest files 26 Figure 33 Part of encryption code 26 Figure 34 Code for sending files to the C&C server 27 Figure 35 Files spread in phishing emails 28 4 Machete just got sharper Venezuelan government institutions under attack EXECUTIVE SUMMARY Machete is a cyberespionage toolset developed by a Spanish-speaking group that has been operating since at least 2010. This group is very active and continues to develop new features for its malware, and implement infrastructure changes in 2019. Their long run of attacks, focused in Latin American countries, has allowed them to collect intelligence and refine their tactics over the years. ESET researchers have detected an ongoing, highly targeted campaign, with a majority of the targets being military organizations. Key points in this white paper: • In 2019, ESET has seen more than 50 computers compromised by Machete in various Latin American countries, with over 75% of them belonging to Venezuelan government institutions. • The group behind Machete uses effective spearphishing techniques. They know their targets, how to blend into regular communications, and which documents are of the most value to steal. Not only does Machete exfiltrate common office suite documents, but also specialized file types used by geo- graphic information systems (GIS) that describe geographic data for navigation and positioning purposes. • Machete has evolved from what was seen in earlier attacks. The main backdoor is still Python-based, but enriched with several new features such as a more resilient C&C communication mechanism, the use of Mozilla Location Service to geolocate compromised computers, and the possibility to exfiltrate data to removable drives when there is physical access to targets. • The group is very active. ESET has seen cases where stolen documents dated on one particular day were bundled with malware and used on the same day as lures to compromise new victims. For any inquiries, or to submit samples related to this white paper, contact us at: threatintel@eset com 1. INTRODUCTION Many events occurred in the first half of 2019 that have put Venezuela in the spotlight. From the uprising of the opposition against President Nicolás Maduro to plots in the government, the situation in Venezuela has been open to international scrutiny. There is, however, an ongoing case of cyberespionage against Venezuelan government institutions that has managed to stay under the radar. First described by Kaspersky in 2014 [1] and later, by Cylance in 2017 [2], Machete is a piece of malware found to be targeting high profile individuals and organizations in Latin American countries. In 2018 Machete reappeared with new code and new features. As of June 2019, ESET has seen over 50 victims being actively spied upon by Machete, with more than 75% of them being computers belonging to the Venezuelan govern- ment institutions. Several GBs of confidential documents and private information have been exfiltrated to a server controlled by the attackers. Machete has Latin American targets and has been developed by a Spanish-speaking group, presumably from a LATAM country. They are active and constantly working on very effective spearphishing campaigns. In some cases, they trick new victims by sending real documents that had been stolen on the very same day. They seem to have specialized knowledge about military operations, as they are focused on stealing specific files such as those that describe navigation routes. This white paper presents a technical analysis of the malware, as well as data related to these targeted attacks. 2. DELIVERY METHOD Machete relies on spearphishing to compromise its targets. In other words, very specific emails are sent directly to the victims, and they change from target to target. These emails contain a link to download (or an attachment with) a compressed file with the malware and a document that serves as decoy. Figure 1 is a typical PDF file displayed to a potential victim before compromise. To trick unsuspecting targets, Machete operators use real documents they have previously stolen; Figure 1 is a classified official document 5 Machete just got sharper Venezuelan government institutions under attack that is dated May 21st, 2019, the same day the related .zip file was first sent to targets. Figure 1 // Decoy (PDF file) in one of the Machete downloaders (blurred) The kind of documents used as decoys are sent and received legitimately several times a day by targets. For example, Radiogramas are documents used for communication in the military forces. Attackers take advantage of that, along with their knowledge of military jargon and etiquette, to craft very convincing phishing emails. 3. TIMELINE OF MACHETE’S LATEST VERSION In order to get a general idea of Machete’s capabilities to steal documents and spy on its targets, we’ll describe its main features as they appeared, in chronological order. April 2018 The first time the new version was seen. It features: • Coded in Python • Code is obfuscated to try to thwart analysis • First stage downloader fetches the actual malware • Takes screenshots • Logs keystrokes • Accesses the clipboard • Communicates with an FTP server • AES encrypts and exfiltrates documents • Detects newly inserted drives and copies files • Updates configuration or malware binaries • Executes other binaries • Retrieves specific files from the system • Logs are generated in English Some of these early versions cannot have their code or configuration updated from the remote server. However, the binaries seen since late April do have these capabilities. August 2018 An extra layer of obfuscation was added, using zlib compression and base64 encoding. It managed to evade detection by most security products. November 2018 6 Machete just got sharper Venezuelan government institutions under attack Two new features were added: • Geolocation of victims and information about nearby Wi-Fi networks • Retrieves user profile data from Chrome and Firefox browsers February 2019 Physical exfiltration to removable drives was added, but both features added in November 2018 were removed from the code. Also, logs were changed to Spanish. May 2019 On May 5th, 2019, subdomains used by Machete to communicate with the remote server were taken down. New samples with new features started to emerge on May 16th. New features: • Data are sent over HTTP if FTP connection fails • AES encryption algorithm was dropped and replaced by base64 encoding • Logs (of keys and clipboard contents) are not sent until they are larger than 10 KB • List of file extensions that are exfiltrated was reduced • There is no obfuscation after first layer of base64/zlib compression • There is no downloader June 2019 • Communication is over HTTP only, with a main and a fallback server • Machete components are Python scripts; py2exe binaries were removed from this version • Documents are AES encrypted and base64 encoded before being sent • Now retrieves user data from more browsers • Only Microsoft Office documents, JPEG images, .pdf documents and archives are exfiltrated • Code was rewritten to perform the same tasks (keylogging, taking screenshots, etc.) but using different libraries 4. TARGETS Machete is a highly targeted backdoor that has managed to stay under the radar for years. Emails with malicious attachments are only sent in small numbers. Operators behind Machete apparently already have information about individuals or organizations of interest to them in Latin America, how to reach them, and how best to trick them into getting compromised. Real documents are used as decoys, so it is not rare that victims never realize they were compromised and are even compromised again after Machete C&C servers change. Since the end of March up until the end of May 2019, ESET observed that there were more than 50 victim- ized computers actively communicating with the C&C server.
Recommended publications
  • The Condors and Bottom, the Combat Machete
    NEW IMPORTS Top, the Hog Sticker Machete The Condors and bottom, the Combat Machete. Either blade would make a very useful light-duty trail knife for maintaining paths through heavy HAVE LANDED! vegetation. Left to right, the Condor Pipe Knife Dagger, Condor This new line from Central America combines Multi-Knife and Condor Jungle Bowie. The Jungle the best jungle designs with modern materials. Bowie was my pick of the three for all-round B Y S te V E N D I C K usefulness. While practically every Central and South American country has its own machete industry, there are a small number of brands that seem to be universally popular south of the Rio Grande. Tramontina from Brazil, Colima from Guatemala, and Imacasa from El Salvador are three of the big names. WI particularly remember one trip to Costa Rica when I asked some of the locals about the Larsson machetes made in that country. I was quickly told that they considered the Imacasa products far superior to their own local brand. Finding Imacasa knives and machetes has been kind of a hit and miss proposition in the U.S. I have the impression that the big hardware distrib- utors tend to go with the low bidder each time they place a large machete order. As a result, you never know what brand you will find in the local retailer from month to month. In the case of Imacasa, that may be changing. A new company, Condor Tool and Knife, is now importing a wide variety of blades and tools from El Salvador.
    [Show full text]
  • The Lawa River P.O
    INSTITUTE OF CURRENT WORLD AFFAIRS JHM-12 BACK TO THE LAWA RIVER P.O. Box 206 Kalimantan Mr. Peter Bird Martin Samarinda, East Executive Director Indonesia Institute of Current World Affairs April 1988 4 West Wheelock Street Hanover, New Hampshire 03755 USA Dear Peter, Two days and a night aboard the Aspian Noor, slowly chugging up the Mahakam and Pahu Rivers last December were enough to get me excited about the wind and speed of myfirst ride on the Kalhold Utama Company's logging road. Racing over smooth-packed earth in the night, the logging truck seemed like transport from another world. The driver, a wiry chain-smoker from South Sulawesi (the island east of Borneo) relished driving this road at night, headlights flashing yellow, red, or green in the eyes of nocturnal creatures stunned by the sudden brightness. He got poetic, talking about the road flowing through the jungle like a river, and pointing out how the treetops' deep black silhouettes stood out against the brilliant edge of the Milky Way. In the hour-long rush whoosh from the company's Pahu River landing place to the main logging camp, 69 kilometers over rolling hills to the south, the road began to seem almost miraculous to me, powerful technology in the starlight. When returned to the area almost three months later, any magic the company road held for me evaporated under the intensity of a mid-afternoon sun. The road was no river, but a heat-reflecting equatorial desert cutting through the ramains of logged-over forest interspersed with swidden fields of ripe padi.
    [Show full text]
  • Rules and Options
    Rules and Options The author has attempted to draw as much as possible from the guidelines provided in the 5th edition Players Handbooks and Dungeon Master's Guide. Statistics for weapons listed in the Dungeon Master's Guide were used to develop the damage scales used in this book. Interestingly, these scales correspond fairly well with the values listed in the d20 Modern books. Game masters should feel free to modify any of the statistics or optional rules in this book as necessary. It is important to remember that Dungeons and Dragons abstracts combat to a degree, and does so more than many other game systems, in the name of playability. For this reason, the subtle differences that exist between many firearms will often drop below what might be called a "horizon of granularity." In D&D, for example, two pistols that real world shooters could spend hours discussing, debating how a few extra ounces of weight or different barrel lengths might affect accuracy, or how different kinds of ammunition (soft-nosed, armor-piercing, etc.) might affect damage, may be, in game terms, almost identical. This is neither good nor bad; it is just the way Dungeons and Dragons handles such things. Who can use firearms? Firearms are assumed to be martial ranged weapons. Characters from worlds where firearms are common and who can use martial ranged weapons will be proficient in them. Anyone else will have to train to gain proficiency— the specifics are left to individual game masters. Optionally, the game master may also allow characters with individual weapon proficiencies to trade one proficiency for an equivalent one at the time of character creation (e.g., monks can trade shortswords for one specific martial melee weapon like a war scythe, rogues can trade hand crossbows for one kind of firearm like a Glock 17 pistol, etc.).
    [Show full text]
  • Playing with Knives: the Socialization of Self-Initiated Learners 3 4 1 David F
    Child Development, xxxx 2015, Volume 00, Number 0, Pages 1–13 1 2 Playing With Knives: The Socialization of Self-Initiated Learners 3 4 1 David F. Lancy 5 Utah State University 6 7 8 Since Margaret Mead’s field studies in the South Pacific a century ago, there has been the tacit understanding 9 that as culture varies, so too must the socialization of children to become competent culture users and bearers. 10 More recently, the work of anthropologists has been mined to find broader patterns that may be common to 11 childhood across a range of societies. One improbable commonality has been the tolerance, even encourage- 12 ment, of toddler behavior that is patently risky, such as playing with or attempting to use a sharp-edged tool. 13 This laissez faire approach to socialization follows from a reliance on children as “self-initiated learners.” In 14 this article, ethnographic literature that shows why children are encouraged to learn without prompting or 15 guidance and how that happens is reviewed. 16 17 18 19 Concepts like socialization, parental caretaking A fruitful source of clues to the parental eth- “ ” 20 styles, and pedagogy are often studied in anthro- notheory is the culture shock experienced by the “ ” 21 pology within a cultural models framework. The investigator. Accompanied by his spouse during his 22 framework is built on the assumption that societies research on childhood among the Dusun in North Dispatch: 31.12.15No. CE: of Priya pages: 13 PE: Karpagavalli 23 incorporate templates or models to guide members Borneo, Williams reports: 24 (Quinn, 2005) that include customary practices, 25 sanctions for following or not following those prac- We were faced daily with Dusun parents raising 26 tices, and an ethnotheory that organizes these ideas their children in ways that violated the basic “ 27 and provides an overarching perspective.
    [Show full text]
  • Machetes — Specification
    DUS 162 DRAFT UGANDA STANDARD Second Edition 2017-05-dd Machetes — Specification Reference number DUS 162: 2017 © UNBS 2017 DUS 162: 2017 Compliance with this standard does not, of itself confer immunity from legal obligations A Uganda Standard does not purport to include all necessary provisions of a contract. Users are responsible for its correct application © UNBS 2017 All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilised in any form or by any means, electronic or mechanical, including photocopying and microfilm, without prior written permission from UNBS. Requests for permission to reproduce this document should be addressed to The Executive Director Uganda National Bureau of Standards P.O. Box 6329 Kampala Uganda Tel: +256 414 333 250/1/2/3 Fax: +256 414 286 123 E-mail: [email protected] Web: www.unbs.go.ug ii © UNBS 2017 – All rights reserved DUS 162:2017 Contents Foreword ............................................................................................................................................................ iv 1 Scope ...................................................................................................................................................... 1 2 Normative references ............................................................................................................................ 1 3 Terms and definitions ..........................................................................................................................
    [Show full text]
  • History of the Philippine Islands Vols 1 and 2 by Antonio De Morga
    History of the Philippine Islands Vols 1 and 2 by Antonio de Morga History of the Philippine Islands Vols 1 and 2 by Antonio de Morga This eBook was produced by Jeroen Hellingman MORGA'S PHILIPPINE ISLANDS VOLUME I Of this work five hundred copies are issued separately from "The Philippine Islands, 1493-1898," in fifty-five volumes. HISTORY OF THE PHILIPPINE ISLANDS From their discovery by Magellan in 1521 to the beginning of the XVII Century; with descriptions of Japan, China and adjacent countries, by Dr. ANTONIO DE MORGA page 1 / 538 and Counsel for the Holy Office of the Inquisition Completely translated into English, edited and annotated by E. H. BLAIR and J. A. ROBERTSON With Facsimiles [Separate publication from "The Philippine Islands, 1493-1898" in which series this appears as volumes 15 and 16.] VOLUME I Cleveland, Ohio The Arthur H. Clark Company 1907 COPYRIGHT 1907 THE ARTUR H. CLARK COMPANY ALL RIGHTS RESERVED CONTENTS OF VOLUME I [xv of series] Preface page 2 / 538 Sucesos de las Islas Filipinas. Dr. Antonio de Morga; Mexico, 1609 Bibliographical Data Appendix A: Expedition of Thomas Candish Appendix B: Early years of the Dutch in the East Indies ILLUSTRATIONS View of city of Manila; photographic facsimile of engraving in Mallet's Description de l'univers (Paris, 1683), ii, p. 127, from copy in Library of Congress. Title-page of Sucesos de las Islas Filipinas, by Dr. Antonio de Morga (Mexico, 1609); photographic facsimile from copy in Lenox Library. Map showing first landing-place of Legazpi in the Philippines; photographic facsimile of original MS.
    [Show full text]
  • Kata Pengantar
    This first edition published in 2007 by Tourism Working Group Kapuas Hulu District COPYRIGHT © 2007 TOURISM WORKING GROUP KAPUAS HULU DISTRICT All Rights Reserved, no part of this publication may be reproduced, stored in a retrieval system, or transmitted to any form or by any means, electronic, mecanical, photo-copying, recording, or otherwise without the prior permission of the copyright owners. CO-PUBLISHING MANAGER : Hermayani Putera, Darmawan Isnaini HEAD OF PRODUCTION : Jimmy WRITER : Anas Nasrullah PICTURES TITLE : Jean-Philippe Denruyter ILUSTRATOR : Sugeng Hendratno EDITOR : Syamsuni Arman, Caroline Kugel LAYOUT AND DESIGN : Jimmy TEAM OF RESEARCHER : Hermas Rintik Maring, Anas Nasrullah, Rudi Zapariza, Jimmy, Ade Kasiani, Sugeng Hendratno. PHOTOGRAPHIC CREDITS Sugeng Hendratno: 1, 2BL, 2BR, 4B, 5L, 6, 7, 14A, 14BR, 21R, 21BL, 22B, 26L, 27T, 27A, 30, 33, 35, 40AL, 40AR, 43A, 43BR, 46T, 51, 54BL, 55B, 58BL, 58BR, 64BR, 66A, 67A, 68, 72B, 75A, 76L, 77BL, 77BR, 78, 79BL, 80L, 83B, 84B, 85B, 90B, 94L, 94B, 94A, 99L, 102BL, 103M1, 103M3, 103M5, 103R3, 103R6, 104L1, 104M2, 105L3, 105L4, 105M3, 105R1, 105R3, 105R4, Jimmy: 2A, 3A, 3L, 4T, 5B, 13L, 14R, 14BL, 15, 16 AL, 16 AR, 16B, 17A, 18T, 18R, 18BL, 18BR, 19, 20, 21T, 21BR, 22T, 22A, 23AL, 24, 25, 32BL, 32BR, 40T, 40L, 42, 43BL, 44 All, 45 All, 47, 48, 49, 50 All, 52, 53L, 54BR, 55T, 57TR, 57B, 59 All, 61AL, 62, 64BL, 66R, 69A, 69BL, 69BR, 70 All, 71AL, 71AR, 71BL, 71BR, 72A, 74, 75B, 76B, 79A, 79BR, 80B, 81, 83, 84L, 85AL, 85AR, 87 All, 88, 89, 90AL, 90AR, 90M, 92, 93 All, 98B, 99B,
    [Show full text]
  • Sulawesi Phonologies (Workpapers in Indonesian Languages And
    WORIKPAPERS IN INDONESIAN LANGUAGES AND CULTURES Vol~um~e 12 THE SUM~MER INSTITU'TE OF LINGUISTICS IN COUPERATION \VITH~ TH~E DEPARTM~ENT OF EDUCATlON AND CULTURE WORKPAPERS IN INDONESIAN LANGUAGES AND CULTURES Volume 12 SULAWESI PHONOLOGIES Rene van den Berg Editor THE SUMMER INSTITUTE OF LINGUISTICS IN COOPERATION WITH THE DEPARTMENT OF EDUCATION AND CULTURE WORKPAPERS IN INDONESIAN LANGUAGES AND CULTURES VOLUME 12 SULAWESI PHONOLOGIES René van den Berg, Editor Printed 1991 Ujung Pandang, Sulawesi, "Indonesia Copies of this publication may be obtained from The Summer Institute of Linguistics KUlak Posl64 Ujung Pundang 90001 Sulewesi Selatan Indonesia Microfiche copies of this and other publications ofThe Summer Institute of Linguistics may be obtained from Academic Book Center The Summer Institute of Linguistics 7500 West Camp Wisdom Road Dallas, TX 75235 U.S.A. ISBN 979-8132-85-8 FOREWORD Earlier issues of Workpapers in Indonesian Languages and Cultures that focused on Sulawesi have dealt with survey results (see volumes 5 and 11). This is the first to be exclusively devoted to the results of phonological analysis in Sulawesi, following the pattern set by the volumes dealing with phonologies of Maluku and Irian Jaya languages. The phonologies of five languages are presented, three of which belong to the lesser known languages of the South Sulawesi group. PUS (Pitu Ulunna Salu) is described by Philip Campbell, Mamasa by DaVId Matti, and Aralle- Tabulahan by Robin McKenzie. Although the phonology of Mamasa appears to be very similar to that of Sa'dan Toraja, the other two languages show remarkable divergences, such as the presence of a sixth vowel, constraints on final nasals (only m in PUS) and the development of geminate consonants intohp,ht, etc.
    [Show full text]
  • Semantic Specificity of Perception Verbs in Maniq
    Semantic specificity of perception verbs in Maniq © Ewelina Wnuk 2016 Printed and bound by Ipskamp Drukkers Cover photo: A Maniq campsite, Satun province, Thailand, September 2011 Photograph by Krittanon Thotsagool Semantic specificity of perception verbs in Maniq Proefschrift ter verkrijging van de graad van doctor aan de Radboud Universiteit Nijmegen op gezag van de rector magnificus prof. dr. J.H.J.M. van Krieken, volgens besluit van het college van decanen in het openbaar te verdedigen op vrijdag 16 september 2016 om 10.30 uur precies door Ewelina Wnuk geboren op 28 juli 1984 te Leżajsk, Polen Promotoren Prof. dr. A. Majid Prof. dr. S.C. Levinson Copromotor Dr. N. Burenhult (Lund University, Zweden) Manuscriptcommissie Prof. dr. P.C. Muysken Prof. dr. N. Evans (Australian National University, Canberra, Australië) Dr. N. Kruspe (Lund University, Zweden) The research reported in this thesis was supported by the Max-Planck-Gesellschaft zur Förderung der Wissenschaften, München, Germany. For my parents, Zofia and Stanisław Contents Acknowledgments ............................................................................................. i Abbreviations ................................................................................................ vii 1 General introduction ........................................................................................ 1 1.1 Aim and scope ................................................................................................... 1 1.2 Theoretical background to verbal semantic specificity
    [Show full text]
  • 1055 High Carbon Steel Retails from $9.99 to $21.99 13 Skus of Okapi's
    2016 Fall Okapi Lucky-13 Special Package Deal MSRP $527.61 Regularly $264.00 Now In-Stock from South Africa Special $237.60 13 SKUs - 3 each (39 total) Save 10% plus Free Freight* until 11-18-16 4 SKUs of 13”, 15”, 17” & 23” Bladed machetes with beveled rosewood Handles - 3 each Made in South Africa 4 SKUs of 14”, 16”, 18” & 24” Black Coated & Orange Injection Molded Handles - 3 each Latin Bolo with triple riveted, beveled Rosewood handle 2 SKUs of 12” for easy use - 3 units Corn Knife in both Blade with Rosewood Handles & Orange Injec- tion Molded Handles - 3 each 1055 High Carbon Steel 2 SKUs of 12” Slim Profile Machetes with Rosewood Retails from $9.99 to $21.99 Handles & Orange Injection 13 SKUs of Okapi’s Best Blades Molded Handles - 3 each 39 pieces total w/Free Freight Fall 2016 Okapi Lucky-13 Special $237.60 13 SKUs - 39 pieces MSRP $527.61 Regularly $264.00 Save 10%, Free Freight* until November 18, 2016 Okapi is a pocket knife and hand-tools manufacturing company based on the North-East coast of South Africa. The factory is in the small industrial village of Isithebe just North of the city of Durban. The products have been specially designed and manufactured in order to withstand the harshest conditions in Africa. The range of products are made from only the highest quality carbon steel that is hardened and tempered to ensure the maximum durability and maximum customer satisfaction. The Okapi knife is a working knife designed to be highly robust, practical and equally affordable all the while remaining faithful to its rich 112-year-old heritage.
    [Show full text]
  • The Philippine Islands, 1493-1803;
    fA/<(Yf r* ^,<?^ffyf/M^^ f^rM M<H ^ ^y^ /"^v/// f> .6S THE PHILIPPINE ISLANDS 1493-1898 The PHILIPPINE ISLANDS 1493-1898 Explorations by Early Navigators, Descriptions of the Islands and their Peoples, their History and Records of the Catholic Missions, as related in contemporaneous Books and Manuscripts, showing the Political, Eco- nomic, Commercial and Religious Conditions of those Islands from their earliest relations with European Nations to the close of the Nineteenth Century TRANSLATED FROM THE ORIGINALS Edited and annotated by Emma Helen Blair and James Alexander Robertson, with historical intro- duction and additional notes by Edward Gaylord Bourne. With maps, portraits and other illustrations Volume XXXV—1640-164^ The Arthur H. Clark Company Cleveland, Ohio MCMVI COPYRIGHT 1906 THE ARTHUR H. CLARK COMPANY ALL RIGHTS RESERVED CONTENTS OF VOLUME XXXV Preface. ........ 9 Documents of 1640- 1644 The Dominican missions, 1635-39. Baltasar de Santa Cruz, O. P. [From his Historia de la provincia del Santo Rosario (Zaragoza, 1693).] 25 The Recollect missions, 1625-40. [Extracts from the works of Juan de la Concepcion and Luis de Jesus.] . '59 News from Filipinas, 1640-42. [Unsigned]; [Manila, 1641], and July 25, 1642 . .114 Decree regarding the Indians. Felipe IV; ^arago9a, October 24, 1642 . .125 Formosa lost to Spain. Juan de los Angeles, O.P.; Macasar, March, 1643 • • .128 Letter to Corcuera. Felipe IV; Zaragoza, August 4, 1 643 1 63 Documents of 1644- 1649 Concessions to the Jesuits. Balthasar de La- gunilla, S. J., and others; 1640-44 . .169 Events in the Philippines, 1643-44. [Un- signed and undated.] .
    [Show full text]
  • Knives and the Second Amendment
    Knives and the Second Amendment By David B. Kopel,1 Clayton E. Cramer2 & Joseph Edward Olson3 This article is a working draft that will be published in 2013 in the University of Michigan Journal of Law Reform Abstract: This Article is the first scholarly analysis of knives and the Second Amendment. Knives are clearly among the “arms” which are protected by the Second Amendment. Under the Supreme Court’s standard in District of Columbia v. Heller, knives are Second Amendment “arms” because they are “typically possessed by law-abiding citizens for lawful purposes,” including self-defense. Bans of knives which open in a convenient way (bans on switchblades, gravity knives, and butterfly knives) are unconstitutional. Likewise unconstitutional are bans on folding knives which, after being opened, have a safety lock to prevent inadvertent closure. Prohibitions on the carrying of knives in general, or of particular knives, are unconstitutional. There is no knife which is more dangerous than a 1 Adjunct Professor of Advanced Constitutional Law, Denver University, Sturm College of Law. Research Director, Independence Institute, Denver, Colorado. Associate Policy Analyst, Cato Institute, Washington, D.C. Kopel is the author of 15 books and over 80 scholarly journal articles, including the first law school textbook on the Second Amendment: NICHOLAS J. JOHNSON, DAVID B. KOPEL, GEORGE A. MOCSARY, & MICHAEL P. O’SHEA, FIREARMS LAW AND THE SECOND AMENDMENT: REGULATION, RIGHTS, AND POLICY (Aspen Publishers, 2012). www.davekopel.org. 2 Adjunct History Faculty, College of Western Idaho. Cramer is the author of CONCEALED WEAPON LAWS OF THE EARLY REPUBLIC: DUELING, SOUTHERN VIOLENCE, AND MORAL REFORM (1999) (cited by Justice Breyer in McDonald v.
    [Show full text]